Skip to content

Commit 6560343

Browse files
austindhkimmimizohar
authored andcommitted
ima: Fix trivial typos in the comments
There are a few minor typos in the comments. Fix these. Signed-off-by: Austin Kim <austindh.kim@gmail.com> Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
1 parent 754e0b0 commit 6560343

4 files changed

Lines changed: 4 additions & 4 deletions

File tree

security/integrity/ima/ima_api.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -238,7 +238,7 @@ int ima_collect_measurement(struct integrity_iint_cache *iint,
238238
goto out;
239239

240240
/*
241-
* Dectecting file change is based on i_version. On filesystems
241+
* Detecting file change is based on i_version. On filesystems
242242
* which do not support i_version, support is limited to an initial
243243
* measurement/appraisal/audit.
244244
*/

security/integrity/ima/ima_main.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -764,7 +764,7 @@ int ima_post_read_file(struct file *file, void *buf, loff_t size,
764764
* call to ima_post_load_data().
765765
*
766766
* Callers of this LSM hook can not measure, appraise, or audit the
767-
* data provided by userspace. Enforce policy rules requring a file
767+
* data provided by userspace. Enforce policy rules requiring a file
768768
* signature (eg. kexec'ed kernel image).
769769
*
770770
* For permission return 0, otherwise return -EACCES.

security/integrity/ima/ima_policy.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -429,7 +429,7 @@ static int ima_lsm_update_rule(struct ima_rule_entry *entry)
429429
/*
430430
* ima_lsm_copy_rule() shallow copied all references, except for the
431431
* LSM references, from entry to nentry so we only want to free the LSM
432-
* references and the entry itself. All other memory refrences will now
432+
* references and the entry itself. All other memory references will now
433433
* be owned by nentry.
434434
*/
435435
ima_lsm_free_rule(entry);

security/integrity/ima/ima_template_lib.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -272,7 +272,7 @@ static int ima_eventdigest_init_common(const u8 *digest, u32 digestsize,
272272
* digest formats:
273273
* - DATA_FMT_DIGEST: digest
274274
* - DATA_FMT_DIGEST_WITH_ALGO: [<hash algo>] + ':' + '\0' + digest,
275-
* where <hash algo> is provided if the hash algoritm is not
275+
* where <hash algo> is provided if the hash algorithm is not
276276
* SHA1 or MD5
277277
*/
278278
u8 buffer[CRYPTO_MAX_ALG_NAME + 2 + IMA_MAX_DIGEST_SIZE] = { 0 };

0 commit comments

Comments
 (0)