diff options
author | Fabian Frederick <fabf@skynet.be> | 2014-06-06 17:37:53 -0400 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2014-06-06 19:08:15 -0400 |
commit | 119ce5c8b99cd6b874cec58c81ce9b56e52160c3 (patch) | |
tree | 94df24077fb1bccf8121655990120c82eecb35ed | |
parent | 9b44ee2eef124885d407a5f59bbd7a72634a05ba (diff) |
kernel/seccomp.c: kernel-doc warning fix
+ fix small typo
Signed-off-by: Fabian Frederick <fabf@skynet.be>
Cc: "David S. Miller" <davem@davemloft.net>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
-rw-r--r-- | kernel/seccomp.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/kernel/seccomp.c b/kernel/seccomp.c index b35c21503a36..f6d76bebe69f 100644 --- a/kernel/seccomp.c +++ b/kernel/seccomp.c | |||
@@ -39,7 +39,7 @@ | |||
39 | * is only needed for handling filters shared across tasks. | 39 | * is only needed for handling filters shared across tasks. |
40 | * @prev: points to a previously installed, or inherited, filter | 40 | * @prev: points to a previously installed, or inherited, filter |
41 | * @len: the number of instructions in the program | 41 | * @len: the number of instructions in the program |
42 | * @insns: the BPF program instructions to evaluate | 42 | * @insnsi: the BPF program instructions to evaluate |
43 | * | 43 | * |
44 | * seccomp_filter objects are organized in a tree linked via the @prev | 44 | * seccomp_filter objects are organized in a tree linked via the @prev |
45 | * pointer. For any task, it appears to be a singly-linked list starting | 45 | * pointer. For any task, it appears to be a singly-linked list starting |
@@ -220,7 +220,7 @@ static long seccomp_attach_filter(struct sock_fprog *fprog) | |||
220 | return -ENOMEM; | 220 | return -ENOMEM; |
221 | 221 | ||
222 | /* | 222 | /* |
223 | * Installing a seccomp filter requires that the task have | 223 | * Installing a seccomp filter requires that the task has |
224 | * CAP_SYS_ADMIN in its namespace or be running with no_new_privs. | 224 | * CAP_SYS_ADMIN in its namespace or be running with no_new_privs. |
225 | * This avoids scenarios where unprivileged tasks can affect the | 225 | * This avoids scenarios where unprivileged tasks can affect the |
226 | * behavior of privileged children. | 226 | * behavior of privileged children. |