mirror of
https://gitlab.com/apparmor/apparmor.git
synced 2025-03-04 00:14:44 +01:00
Fix typos
Spotted by Lintian.
This commit is contained in:
parent
0da70b173c
commit
d6e18b0db8
5 changed files with 6 additions and 6 deletions
|
@ -83,7 +83,7 @@ if B<aa-enabled> doesn't have enough privileges to read the apparmor control fil
|
|||
|
||||
=item B<10>
|
||||
|
||||
AppArmor is enabled but does not have access to shared LSM interaces.
|
||||
AppArmor is enabled but does not have access to shared LSM interfaces.
|
||||
|
||||
=item B<64>
|
||||
|
||||
|
|
|
@ -32,7 +32,7 @@ B<aa-features-abi> [OPTIONS] <SOURCE> [OUTPUT OPTIONS]
|
|||
|
||||
B<aa-features-abi> is used to extract a features abi and output to
|
||||
either stdout or a specified file. A SOURCE_OPTION must be specified.
|
||||
If an output option is not specified the features abi is writen to
|
||||
If an output option is not specified the features abi is written to
|
||||
stdout.
|
||||
|
||||
=head1 OPTIONS
|
||||
|
|
|
@ -20,7 +20,7 @@ void print_help(const char *command)
|
|||
{
|
||||
printf(_("%s: [options]\n"
|
||||
" options:\n"
|
||||
" -x | --exclusive Shared interfaces must be availabe\n"
|
||||
" -x | --exclusive Shared interfaces must be available\n"
|
||||
" -q | --quiet Don't print out any messages\n"
|
||||
" -h | --help Print help\n"),
|
||||
command);
|
||||
|
|
|
@ -1273,7 +1273,7 @@ I<auto> keyword. Eg.
|
|||
To indicate that the rule only applies to auto binding of unix domain
|
||||
sockets. It is important to note this only applies to the I<bind>
|
||||
permission as once the socket is bound to an address it is
|
||||
indistiguishable from a socket that have an addr bound with a
|
||||
indistinguishable from a socket that have an addr bound with a
|
||||
specified name. When the I<auto> keyword is used with other permissions
|
||||
or as part of a peer addr it will be replaced with a pattern that
|
||||
can match an autobound socket. Eg. For some kernels
|
||||
|
@ -1752,7 +1752,7 @@ If the policy abi is specified as B<kernel> then the running kernel's
|
|||
abi will be used. This should never be used in shipped policy as it
|
||||
can cause system breakage when a new kernel is installed.
|
||||
|
||||
=head3 ABI compatability with AppArmor 2.x
|
||||
=head3 ABI compatibility with AppArmor 2.x
|
||||
|
||||
AppArmor 3 remains compatible with AppArmor 2.x by detecting when a
|
||||
profile does not have a feature ABI specified. In this case the policy
|
||||
|
|
|
@ -259,7 +259,7 @@ optflag_table_t warnflag_table[] = {
|
|||
{ 1, "jobs", "enable job control warnings", WARN_JOBS },
|
||||
{ 1, "dangerous", "warn on dangerous policy", WARN_DANGEROUS },
|
||||
{ 1, "unexpected", "warn when an unexpected condition is found", WARN_UNEXPECTED },
|
||||
{ 1, "format", "warn on unnecessary or confusing formating", WARN_FORMAT },
|
||||
{ 1, "format", "warn on unnecessary or confusing formatting", WARN_FORMAT },
|
||||
{ 1, "missing", "warn when missing qualifier and a default is used", WARN_MISSING },
|
||||
{ 1, "override", "warn when overriding", WARN_OVERRIDE },
|
||||
{ 1, "dev", "turn on warnings that are useful for profile development", WARN_DEV },
|
||||
|
|
Loading…
Add table
Reference in a new issue