Skip to content

Commit d46515e

Browse files
aprettygoodprogramerjxwufan
authored andcommitted
docs: security: ipe: fix typos and grammar
Fix several spelling and grammar mistakes in the IPE documentation. No functional change. Signed-off-by: Evan Ducas <[email protected]> Acked-by: Bagas Sanjaya <[email protected]> Acked-by: Randy Dunlap <[email protected]> Signed-off-by: Fan Wu <[email protected]>
1 parent 028ef9c commit d46515e

1 file changed

Lines changed: 5 additions & 5 deletions

File tree

Documentation/security/ipe.rst

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ strong integrity guarantees over both the executable code, and specific
1818
*data files* on the system, that were critical to its function. These
1919
specific data files would not be readable unless they passed integrity
2020
policy. A mandatory access control system would be present, and
21-
as a result, xattrs would have to be protected. This lead to a selection
21+
as a result, xattrs would have to be protected. This led to a selection
2222
of what would provide the integrity claims. At the time, there were two
2323
main mechanisms considered that could guarantee integrity for the system
2424
with these requirements:
@@ -195,7 +195,7 @@ of the policy to apply the minute usermode starts. Generally, that storage
195195
can be handled in one of three ways:
196196

197197
1. The policy file(s) live on disk and the kernel loads the policy prior
198-
to an code path that would result in an enforcement decision.
198+
to a code path that would result in an enforcement decision.
199199
2. The policy file(s) are passed by the bootloader to the kernel, who
200200
parses the policy.
201201
3. There is a policy file that is compiled into the kernel that is
@@ -235,8 +235,8 @@ Updatable, Rebootless Policy
235235
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
236236

237237
As requirements change over time (vulnerabilities are found in previously
238-
trusted applications, keys roll, etcetera). Updating a kernel to change the
239-
meet those security goals is not always a suitable option, as updates are not
238+
trusted applications, keys roll, etcetera), updating a kernel to meet
239+
those security goals is not always a suitable option, as updates are not
240240
always risk-free, and blocking a security update leaves systems vulnerable.
241241
This means IPE requires a policy that can be completely updated (allowing
242242
revocations of existing policy) from a source external to the kernel (allowing
@@ -370,7 +370,7 @@ Simplified Policy:
370370
Finally, IPE's policy is designed for sysadmins, not kernel developers. Instead
371371
of covering individual LSM hooks (or syscalls), IPE covers operations. This means
372372
instead of sysadmins needing to know that the syscalls ``mmap``, ``mprotect``,
373-
``execve``, and ``uselib`` must have rules protecting them, they must simple know
373+
``execve``, and ``uselib`` must have rules protecting them, they must simply know
374374
that they want to restrict code execution. This limits the amount of bypasses that
375375
could occur due to a lack of knowledge of the underlying system; whereas the
376376
maintainers of IPE, being kernel developers can make the correct choice to determine

0 commit comments

Comments
 (0)