Re: [apparmor] [PATCH 1/8] apparmor: fix typo "strictly"

2018-05-03 Thread John Johansen
On 04/12/2018 03:34 AM, Zygmunt Krynicki wrote:
> Signed-off-by: Zygmunt Krynicki 
> ---
>  security/apparmor/domain.c | 4 ++--
>  1 file changed, 2 insertions(+), 2 deletions(-)
> 
> diff --git a/security/apparmor/domain.c b/security/apparmor/domain.c
> index 6a54d2ffa840..6919721a2aa9 100644
> --- a/security/apparmor/domain.c
> +++ b/security/apparmor/domain.c
> @@ -595,7 +595,7 @@ static struct aa_label *profile_transition(struct 
> aa_profile *profile,
>   /* Policy has specified a domain transitions. if no_new_privs and
>* confined and not transitioning to the current domain fail.
>*
> -  * NOTE: Domain transitions from unconfined and to stritly stacked
> +  * NOTE: Domain transitions from unconfined and to strictly stacked
>* subsets are allowed even when no_new_privs is set because this
>* aways results in a further reduction of permissions.
>*/
> @@ -687,7 +687,7 @@ static int profile_onexec(struct aa_profile *profile, 
> struct aa_label *onexec,
>   /* Policy has specified a domain transitions. if no_new_privs and
>* confined and not transitioning to the current domain fail.
>*
> -  * NOTE: Domain transitions from unconfined and to stritly stacked
> +  * NOTE: Domain transitions from unconfined and to strictly stacked
>* subsets are allowed even when no_new_privs is set because this
>* aways results in a further reduction of permissions.
>*/
> 

this no longer applies to upstream, the comment has been rewritten and
the offending word dropped

-- 
AppArmor mailing list
AppArmor@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/apparmor


[apparmor] [PATCH 1/8] apparmor: fix typo "strictly"

2018-04-12 Thread Zygmunt Krynicki
Signed-off-by: Zygmunt Krynicki 
---
 security/apparmor/domain.c | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/security/apparmor/domain.c b/security/apparmor/domain.c
index 6a54d2ffa840..6919721a2aa9 100644
--- a/security/apparmor/domain.c
+++ b/security/apparmor/domain.c
@@ -595,7 +595,7 @@ static struct aa_label *profile_transition(struct 
aa_profile *profile,
/* Policy has specified a domain transitions. if no_new_privs and
 * confined and not transitioning to the current domain fail.
 *
-* NOTE: Domain transitions from unconfined and to stritly stacked
+* NOTE: Domain transitions from unconfined and to strictly stacked
 * subsets are allowed even when no_new_privs is set because this
 * aways results in a further reduction of permissions.
 */
@@ -687,7 +687,7 @@ static int profile_onexec(struct aa_profile *profile, 
struct aa_label *onexec,
/* Policy has specified a domain transitions. if no_new_privs and
 * confined and not transitioning to the current domain fail.
 *
-* NOTE: Domain transitions from unconfined and to stritly stacked
+* NOTE: Domain transitions from unconfined and to strictly stacked
 * subsets are allowed even when no_new_privs is set because this
 * aways results in a further reduction of permissions.
 */
-- 
2.14.1


-- 
AppArmor mailing list
AppArmor@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/apparmor