lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <358b9115-2dbe-0a63-12e5-27b4c8e8d76d@canonical.com>
Date:   Mon, 25 Sep 2017 10:24:02 -0400
From:   John Johansen <john.johansen@...onical.com>
To:     Colin King <colin.king@...onical.com>,
        James Morris <james.l.morris@...cle.com>,
        "Serge E . Hallyn" <serge@...lyn.com>,
        linux-security-module@...r.kernel.org
Cc:     linux-kernel@...r.kernel.org
Subject: Re: [PATCH] apparmor: fix spelling mistake: "resoure" -> "resource"

On 08/24/2017 04:31 AM, Colin King wrote:
> From: Colin Ian King <colin.king@...onical.com>
> 
> Trivial fix to spelling mistake in comment and also with text in
> audit_resource call.
> 
> Signed-off-by: Colin Ian King <colin.king@...onical.com>
> ---
>  security/apparmor/resource.c | 4 ++--
>  1 file changed, 2 insertions(+), 2 deletions(-)
> 
> diff --git a/security/apparmor/resource.c b/security/apparmor/resource.c
> index d8bc842594ed..cf4d234febe9 100644
> --- a/security/apparmor/resource.c
> +++ b/security/apparmor/resource.c
> @@ -47,7 +47,7 @@ static void audit_cb(struct audit_buffer *ab, void *va)
>  /**
>   * audit_resource - audit setting resource limit
>   * @profile: profile being enforced  (NOT NULL)
> - * @resoure: rlimit being auditing
> + * @resource: rlimit being auditing
>   * @value: value being set
>   * @error: error value
>   *
> @@ -128,7 +128,7 @@ int aa_task_setrlimit(struct aa_label *label, struct task_struct *task,
>  		error = fn_for_each(label, profile,
>  				audit_resource(profile, resource,
>  					       new_rlim->rlim_max, peer,
> -					       "cap_sys_resoure", -EACCES));
> +					       "cap_sys_resource", -EACCES));
>  	else
>  		error = fn_for_each_confined(label, profile,
>  				profile_setrlimit(profile, resource, new_rlim));
> 


pulled in to apparmor-next

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ