[apparmor] [PATCH] documentation cleanups

Marc Deslauriers marc.deslauriers at canonical.com
Thu Nov 4 21:40:01 GMT 2010


On Thu, 2010-11-04 at 14:23 -0700, Kees Cook wrote:
> This fixes a few typos in documentation that lintian noticed.
> 

ACK

Marc.


> 
> === modified file 'parser/parser_main.c'
> --- parser/parser_main.c	2010-09-16 17:24:50 +0000
> +++ parser/parser_main.c	2010-11-04 20:54:45 +0000
> @@ -168,7 +168,7 @@
>  	       "-T, --skip-read-cache	Do not attempt to load cached profiles\n"
>  	       "-W, --write-cache	Save cached profile (force with -T)\n"
>  	       "-q, --quiet		Don't emit warnings\n"
> -	       "-v, --verbose		Show profile nams as they load\n"
> +	       "-v, --verbose		Show profile names as they load\n"
>  	       "-Q, --skip-kernel-load	Do everything except loading into kernel\n"
>  	       "-V, --version		Display version info and exit\n"
>  	       "-d, --debug 		Debug apparmor definitions\n"
> 
> === modified file 'utils/aa-genprof.pod'
> --- utils/aa-genprof.pod	2010-11-04 00:03:52 +0000
> +++ utils/aa-genprof.pod	2010-11-04 21:00:12 +0000
> @@ -66,7 +66,7 @@
>  After the user finishes selecting profile entries based on violations 
>  that were detected during the program execution, aa-genprof will reload
>  the updated profiles in complain mode and again prompt the user for (S)can and 
> -(D)one. This cycle can then be repeated as neccesary until all application 
> +(D)one. This cycle can then be repeated as necessary until all application 
>  functionality has been exercised without generating access violations.
>  
>  When the user eventually hits (F)inish, aa-genprof will set the main profile,
> 
> === modified file 'utils/aa-status.pod'
> --- utils/aa-status.pod	2010-11-04 00:03:52 +0000
> +++ utils/aa-status.pod	2010-11-04 20:39:38 +0000
> @@ -92,6 +92,8 @@
>  Upon exiting, B<aa-status> will set its return value to the
>  following values:
>  
> +=over 4
> +
>  =item 0
>  
>  if apparmor is enabled and policy is loaded.
> @@ -113,6 +115,8 @@
>  if the user running the script doesn't have enough privileges to read
>  the apparmor control files.
>  
> +=back
> +
>  If you find any additional bugs, please report them to bugzilla at
>  L<http://bugzilla.novell.com>.
>  
> 
> 
> -- 
> Kees Cook
> Ubuntu Security Team
> 






More information about the AppArmor mailing list