Signed-off-by: Zygmunt Krynicki <zygmunt.kryni...@canonical.com> --- security/apparmor/domain.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/security/apparmor/domain.c b/security/apparmor/domain.c index 6a54d2ffa840..6919721a2aa9 100644 --- a/security/apparmor/domain.c +++ b/security/apparmor/domain.c @@ -595,7 +595,7 @@ static struct aa_label *profile_transition(struct aa_profile *profile, /* Policy has specified a domain transitions. if no_new_privs and * confined and not transitioning to the current domain fail. * - * NOTE: Domain transitions from unconfined and to stritly stacked + * NOTE: Domain transitions from unconfined and to strictly stacked * subsets are allowed even when no_new_privs is set because this * aways results in a further reduction of permissions. */ @@ -687,7 +687,7 @@ static int profile_onexec(struct aa_profile *profile, struct aa_label *onexec, /* Policy has specified a domain transitions. if no_new_privs and * confined and not transitioning to the current domain fail. * - * NOTE: Domain transitions from unconfined and to stritly stacked + * NOTE: Domain transitions from unconfined and to strictly stacked * subsets are allowed even when no_new_privs is set because this * aways results in a further reduction of permissions. */ -- 2.14.1 -- AppArmor mailing list AppArmor@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/apparmor