[apparmor] [PATCH] documentation cleanups
Marc Deslauriers
marc.deslauriers at canonical.com
Thu Nov 4 21:40:01 GMT 2010
On Thu, 2010-11-04 at 14:23 -0700, Kees Cook wrote:
> This fixes a few typos in documentation that lintian noticed.
>
ACK
Marc.
>
> === modified file 'parser/parser_main.c'
> --- parser/parser_main.c 2010-09-16 17:24:50 +0000
> +++ parser/parser_main.c 2010-11-04 20:54:45 +0000
> @@ -168,7 +168,7 @@
> "-T, --skip-read-cache Do not attempt to load cached profiles\n"
> "-W, --write-cache Save cached profile (force with -T)\n"
> "-q, --quiet Don't emit warnings\n"
> - "-v, --verbose Show profile nams as they load\n"
> + "-v, --verbose Show profile names as they load\n"
> "-Q, --skip-kernel-load Do everything except loading into kernel\n"
> "-V, --version Display version info and exit\n"
> "-d, --debug Debug apparmor definitions\n"
>
> === modified file 'utils/aa-genprof.pod'
> --- utils/aa-genprof.pod 2010-11-04 00:03:52 +0000
> +++ utils/aa-genprof.pod 2010-11-04 21:00:12 +0000
> @@ -66,7 +66,7 @@
> After the user finishes selecting profile entries based on violations
> that were detected during the program execution, aa-genprof will reload
> the updated profiles in complain mode and again prompt the user for (S)can and
> -(D)one. This cycle can then be repeated as neccesary until all application
> +(D)one. This cycle can then be repeated as necessary until all application
> functionality has been exercised without generating access violations.
>
> When the user eventually hits (F)inish, aa-genprof will set the main profile,
>
> === modified file 'utils/aa-status.pod'
> --- utils/aa-status.pod 2010-11-04 00:03:52 +0000
> +++ utils/aa-status.pod 2010-11-04 20:39:38 +0000
> @@ -92,6 +92,8 @@
> Upon exiting, B<aa-status> will set its return value to the
> following values:
>
> +=over 4
> +
> =item 0
>
> if apparmor is enabled and policy is loaded.
> @@ -113,6 +115,8 @@
> if the user running the script doesn't have enough privileges to read
> the apparmor control files.
>
> +=back
> +
> If you find any additional bugs, please report them to bugzilla at
> L<http://bugzilla.novell.com>.
>
>
>
> --
> Kees Cook
> Ubuntu Security Team
>
More information about the AppArmor
mailing list