[apparmor] [PATCH] documentation cleanups

Kees Cook kees at ubuntu.com
Thu Nov 4 21:23:42 GMT 2010


This fixes a few typos in documentation that lintian noticed.

-Kees
---

=== modified file 'parser/parser_main.c'
--- parser/parser_main.c	2010-09-16 17:24:50 +0000
+++ parser/parser_main.c	2010-11-04 20:54:45 +0000
@@ -168,7 +168,7 @@
 	       "-T, --skip-read-cache	Do not attempt to load cached profiles\n"
 	       "-W, --write-cache	Save cached profile (force with -T)\n"
 	       "-q, --quiet		Don't emit warnings\n"
-	       "-v, --verbose		Show profile nams as they load\n"
+	       "-v, --verbose		Show profile names as they load\n"
 	       "-Q, --skip-kernel-load	Do everything except loading into kernel\n"
 	       "-V, --version		Display version info and exit\n"
 	       "-d, --debug 		Debug apparmor definitions\n"

=== modified file 'utils/aa-genprof.pod'
--- utils/aa-genprof.pod	2010-11-04 00:03:52 +0000
+++ utils/aa-genprof.pod	2010-11-04 21:00:12 +0000
@@ -66,7 +66,7 @@
 After the user finishes selecting profile entries based on violations 
 that were detected during the program execution, aa-genprof will reload
 the updated profiles in complain mode and again prompt the user for (S)can and 
-(D)one. This cycle can then be repeated as neccesary until all application 
+(D)one. This cycle can then be repeated as necessary until all application 
 functionality has been exercised without generating access violations.
 
 When the user eventually hits (F)inish, aa-genprof will set the main profile,

=== modified file 'utils/aa-status.pod'
--- utils/aa-status.pod	2010-11-04 00:03:52 +0000
+++ utils/aa-status.pod	2010-11-04 20:39:38 +0000
@@ -92,6 +92,8 @@
 Upon exiting, B<aa-status> will set its return value to the
 following values:
 
+=over 4
+
 =item 0
 
 if apparmor is enabled and policy is loaded.
@@ -113,6 +115,8 @@
 if the user running the script doesn't have enough privileges to read
 the apparmor control files.
 
+=back
+
 If you find any additional bugs, please report them to bugzilla at
 L<http://bugzilla.novell.com>.
 


-- 
Kees Cook
Ubuntu Security Team



More information about the AppArmor mailing list