Signed-off-by: Zygmunt Krynicki <zygmunt.kryni...@canonical.com>
---
 security/apparmor/domain.c | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/security/apparmor/domain.c b/security/apparmor/domain.c
index 6a54d2ffa840..6919721a2aa9 100644
--- a/security/apparmor/domain.c
+++ b/security/apparmor/domain.c
@@ -595,7 +595,7 @@ static struct aa_label *profile_transition(struct 
aa_profile *profile,
        /* Policy has specified a domain transitions. if no_new_privs and
         * confined and not transitioning to the current domain fail.
         *
-        * NOTE: Domain transitions from unconfined and to stritly stacked
+        * NOTE: Domain transitions from unconfined and to strictly stacked
         * subsets are allowed even when no_new_privs is set because this
         * aways results in a further reduction of permissions.
         */
@@ -687,7 +687,7 @@ static int profile_onexec(struct aa_profile *profile, 
struct aa_label *onexec,
        /* Policy has specified a domain transitions. if no_new_privs and
         * confined and not transitioning to the current domain fail.
         *
-        * NOTE: Domain transitions from unconfined and to stritly stacked
+        * NOTE: Domain transitions from unconfined and to strictly stacked
         * subsets are allowed even when no_new_privs is set because this
         * aways results in a further reduction of permissions.
         */
-- 
2.14.1


-- 
AppArmor mailing list
AppArmor@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/apparmor

Reply via email to