Skip to content

Commit 2aad5cd

Browse files
committed
Smack: fix typos and spelling errors
Fix typos and spelling errors in security/smack module comments that were identified using the codespell tool. No functional changes - documentation only. Signed-off-by: Tanya Agarwal <[email protected]> Reviewed-by: Mimi Zohar <[email protected]> Signed-off-by: Casey Schaufler <[email protected]>
1 parent 2014c95 commit 2aad5cd

File tree

4 files changed

+7
-7
lines changed

4 files changed

+7
-7
lines changed

security/smack/smack.h

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@
4242

4343
/*
4444
* This is the repository for labels seen so that it is
45-
* not necessary to keep allocating tiny chuncks of memory
45+
* not necessary to keep allocating tiny chunks of memory
4646
* and so that they can be shared.
4747
*
4848
* Labels are never modified in place. Anytime a label

security/smack/smack_access.c

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -242,7 +242,7 @@ int smk_tskacc(struct task_smack *tsp, struct smack_known *obj_known,
242242
}
243243

244244
/*
245-
* Allow for priviliged to override policy.
245+
* Allow for privileged to override policy.
246246
*/
247247
if (rc != 0 && smack_privileged(CAP_MAC_OVERRIDE))
248248
rc = 0;
@@ -276,7 +276,7 @@ int smk_curacc(struct smack_known *obj_known,
276276
}
277277

278278
/**
279-
* smack_str_from_perm : helper to transalate an int to a
279+
* smack_str_from_perm : helper to translate an int to a
280280
* readable string
281281
* @string : the string to fill
282282
* @access : the int

security/smack/smack_lsm.c

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1934,7 +1934,7 @@ static int smack_file_send_sigiotask(struct task_struct *tsk,
19341934
*/
19351935
file = fown->file;
19361936

1937-
/* we don't log here as rc can be overriden */
1937+
/* we don't log here as rc can be overridden */
19381938
blob = smack_file(file);
19391939
skp = *blob;
19401940
rc = smk_access(skp, tkp, MAY_DELIVER, NULL);
@@ -4195,7 +4195,7 @@ static int smack_socket_sock_rcv_skb(struct sock *sk, struct sk_buff *skb)
41954195
/*
41964196
* Receiving a packet requires that the other end
41974197
* be able to write here. Read access is not required.
4198-
* This is the simplist possible security model
4198+
* This is the simplest possible security model
41994199
* for networking.
42004200
*/
42014201
rc = smk_access(skp, ssp->smk_in, MAY_WRITE, &ad);
@@ -4701,7 +4701,7 @@ static int smack_post_notification(const struct cred *w_cred,
47014701
* @gfp: type of the memory for the allocation
47024702
*
47034703
* Prepare to audit cases where (@field @op @rulestr) is true.
4704-
* The label to be audited is created if necessay.
4704+
* The label to be audited is created if necessary.
47054705
*/
47064706
static int smack_audit_rule_init(u32 field, u32 op, char *rulestr, void **vrule,
47074707
gfp_t gfp)

security/smack/smackfs.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -165,7 +165,7 @@ static int smk_cipso_doi_value = SMACK_CIPSO_DOI_DEFAULT;
165165
#define SMK_LOADLEN (SMK_LABELLEN + SMK_LABELLEN + SMK_ACCESSLEN)
166166

167167
/*
168-
* Stricly for CIPSO level manipulation.
168+
* Strictly for CIPSO level manipulation.
169169
* Set the category bit number in a smack label sized buffer.
170170
*/
171171
static inline void smack_catset_bit(unsigned int cat, char *catsetp)

0 commit comments

Comments
 (0)