Skip to content

Commit ceb5fae

Browse files
TanyaAgarwal25mimizohar
authored andcommitted
integrity: fix typos and spelling errors
Fix typos and spelling errors in integrity module comments that were identified using the codespell tool. No functional changes - documentation only. Signed-off-by: Tanya Agarwal <tanyaagarwal25699@gmail.com> Reviewed-by: Mimi Zohar <zohar@linux.ibm.com> Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
1 parent 2014c95 commit ceb5fae

File tree

3 files changed

+5
-5
lines changed

3 files changed

+5
-5
lines changed

security/integrity/evm/evm_crypto.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -180,7 +180,7 @@ static void hmac_add_misc(struct shash_desc *desc, struct inode *inode,
180180
}
181181

182182
/*
183-
* Dump large security xattr values as a continuous ascii hexademical string.
183+
* Dump large security xattr values as a continuous ascii hexadecimal string.
184184
* (pr_debug is limited to 64 bytes.)
185185
*/
186186
static void dump_security_xattr_l(const char *prefix, const void *src,

security/integrity/evm/evm_main.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -169,7 +169,7 @@ static int is_unsupported_hmac_fs(struct dentry *dentry)
169169
* and compare it against the stored security.evm xattr.
170170
*
171171
* For performance:
172-
* - use the previoulsy retrieved xattr value and length to calculate the
172+
* - use the previously retrieved xattr value and length to calculate the
173173
* HMAC.)
174174
* - cache the verification result in the iint, when available.
175175
*

security/integrity/ima/ima_main.c

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1011,9 +1011,9 @@ int process_buffer_measurement(struct mnt_idmap *idmap,
10111011
}
10121012

10131013
/*
1014-
* Both LSM hooks and auxilary based buffer measurements are
1015-
* based on policy. To avoid code duplication, differentiate
1016-
* between the LSM hooks and auxilary buffer measurements,
1014+
* Both LSM hooks and auxiliary based buffer measurements are
1015+
* based on policy. To avoid code duplication, differentiate
1016+
* between the LSM hooks and auxiliary buffer measurements,
10171017
* retrieving the policy rule information only for the LSM hook
10181018
* buffer measurements.
10191019
*/

0 commit comments

Comments
 (0)