diff options
author | Pairman Guo | 2024-02-17 21:35:04 +0800 |
---|---|---|
committer | Paul Moore | 2024-02-21 19:03:35 -0500 |
commit | 936615f63768482be942644dd3b1b1dca862f25b (patch) | |
tree | 7297b4557e398b8f960d32b7f7bdec25f1179b97 /security | |
parent | b6c0dec9f78bc691166d60347b52b3adf03d5875 (diff) |
lsm: fix typos in security/security.c comment headers
This commit fixes several typos in comment headers in security/security.c
where "Check is" should be "Check if".
Signed-off-by: Pairman Guo <pairmanxlr@gmail.com>
[PM: subject line tweak]
Signed-off-by: Paul Moore <paul@paul-moore.com>
Diffstat (limited to 'security')
-rw-r--r-- | security/security.c | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/security/security.c b/security/security.c index cbdc9bebe802..c31e45da672b 100644 --- a/security/security.c +++ b/security/security.c @@ -2955,7 +2955,7 @@ int security_file_send_sigiotask(struct task_struct *tsk, } /** - * security_file_receive() - Check is receiving a file via IPC is allowed + * security_file_receive() - Check if receiving a file via IPC is allowed * @file: file being received * * This hook allows security modules to control the ability of a process to @@ -3182,7 +3182,7 @@ int security_kernel_create_files_as(struct cred *new, struct inode *inode) } /** - * security_kernel_module_request() - Check is loading a module is allowed + * security_kernel_module_request() - Check if loading a module is allowed * @kmod_name: module name * * Ability to trigger the kernel to automatically upcall to userspace for @@ -4155,7 +4155,7 @@ int security_netlink_send(struct sock *sk, struct sk_buff *skb) } /** - * security_ismaclabel() - Check is the named attribute is a MAC label + * security_ismaclabel() - Check if the named attribute is a MAC label * @name: full extended attribute name * * Check if the extended attribute specified by @name represents a MAC label. @@ -4528,7 +4528,7 @@ int security_socket_accept(struct socket *sock, struct socket *newsock) } /** - * security_socket_sendmsg() - Check is sending a message is allowed + * security_socket_sendmsg() - Check if sending a message is allowed * @sock: sending socket * @msg: message to send * @size: size of message |