diff --git a/libraries/libapparmor/doc/Makefile.am b/libraries/libapparmor/doc/Makefile.am index e21a0755a..80cdcac0d 100644 --- a/libraries/libapparmor/doc/Makefile.am +++ b/libraries/libapparmor/doc/Makefile.am @@ -16,4 +16,5 @@ BUILT_SOURCES = $(man_MANS) --section=2 \ --release="AppArmor $(VERSION)" \ --center="AppArmor" \ + --stderr \ $< > $@ diff --git a/libraries/libapparmor/doc/aa_change_profile.pod b/libraries/libapparmor/doc/aa_change_profile.pod index 8c27bd68f..88c367e6e 100644 --- a/libraries/libapparmor/doc/aa_change_profile.pod +++ b/libraries/libapparmor/doc/aa_change_profile.pod @@ -170,6 +170,7 @@ The output when run: If /tmp/change_p is to be confined as well, then the following profile can be used (in addition to the one for 'i_cant_be_trusted_anymore', above): + # Confine change_p to be able to read /etc/passwd and aa_change_profile() # to the 'i_cant_be_trusted_anymore' profile. /tmp/change_p { diff --git a/libraries/libapparmor/doc/aa_find_mountpoint.pod b/libraries/libapparmor/doc/aa_find_mountpoint.pod index 98fa27651..4d4a238c8 100644 --- a/libraries/libapparmor/doc/aa_find_mountpoint.pod +++ b/libraries/libapparmor/doc/aa_find_mountpoint.pod @@ -38,8 +38,9 @@ Link with B<-lapparmor> when compiling. =head1 DESCRIPTION -The aa_is_enabled function returns true (1) if apparmor is enabled. If it -isn't it sets the errno to reflect the reason it is not enabled and returns 0. +The aa_is_enabled function returns true (1) if apparmor is enabled. +If it isn't it sets the errno(3) to reflect the reason it is not +enabled and returns 0. The aa_find_mountpoint function finds where the apparmor filesystem is mounted on the system, and returns a string containing the mount path. It is the @@ -57,10 +58,10 @@ appropriately. =head1 ERRORS -=over 4 - B +=over 4 + =item B AppArmor extensions to the system are not available. @@ -84,18 +85,21 @@ Did not have sufficient permissions to determine if AppArmor is enabled. =item B -+Did not have sufficient permissions to determine if AppArmor is enabled. +Did not have sufficient permissions to determine if AppArmor is enabled. +=back B +=over 4 + =item B Insufficient memory was available. =item B -Access to the the required paths was denied. +Access to the required paths was denied. =item B diff --git a/libraries/libapparmor/doc/aa_getcon.pod b/libraries/libapparmor/doc/aa_getcon.pod index 7ca816343..2c722646c 100644 --- a/libraries/libapparmor/doc/aa_getcon.pod +++ b/libraries/libapparmor/doc/aa_getcon.pod @@ -50,7 +50,7 @@ Link with B<-lapparmor> when compiling. The aa_getcon function gets the current AppArmor confinement context for the current task. The confinement context is usually just the name of the AppArmor profile restricting the task, but it may include the profile namespace or in -some cases a set of profile names (known as a stack of profiles). The returned string *con should be freed using . +some cases a set of profile names (known as a stack of profiles). The returned string *con should be freed using free(). The aa_gettaskcon function is like the aa_getcon function except it will work for any arbitrary task in the system.