public inbox for systemtap@sourceware.org
 help / color / mirror / Atom feed
* [PATCH] Fix spelling errors
@ 2012-02-06 11:00 Timo Juhani Lindfors
  0 siblings, 0 replies; only message in thread
From: Timo Juhani Lindfors @ 2012-02-06 11:00 UTC (permalink / raw)
  To: systemtap; +Cc: Timo Juhani Lindfors

---
 README.unprivileged |   10 +++++-----
 1 files changed, 5 insertions(+), 5 deletions(-)

diff --git a/README.unprivileged b/README.unprivileged
index d622fd3..afd2aba 100644
--- a/README.unprivileged
+++ b/README.unprivileged
@@ -48,7 +48,7 @@ below for more details.
 Trust of Unprivileged Users
 ---------------------------
 Even with the appropriate compile server available, each
-unprivileged user must be explicitely trusted. This is done by adding each
+unprivileged user must be explicitly trusted. This is done by adding each
 unprivileged user to the group stapusr and possibly the group stapsys
 on each host on which they will
 run systemtap scripts. To see if you are a member of the group stapusr on the
@@ -99,7 +99,7 @@ stap_5330.ko
 # staprun stap_5330.ko
 Hello
 
-Note that the module has already been ceritified (signed), so no special options
+Note that the module has already been certified (signed), so no special options
 are needed.
 
 Additional Information
@@ -177,7 +177,7 @@ Starting stap-server -a "x86_64" -r "2.6.34.7-61.fc13.x86_64" -u "stap-server"
 This starts a compile server for the specified kernel release and hardware
 architecture. The kernel and kernel-devel package for the specified release and
 architecture must be installed on the server host. The kernel-debuginfo package
-for each kernel release and archtecture should also be installed, but is not
+for each kernel release and architecture should also be installed, but is not
 relevant for unprivileged users.
 
 If either one (or both) the kernel release and/or architecture is not
@@ -215,7 +215,7 @@ administrator trusts it to correctly check a systemtap script for
 behavior which should not be made available to unprivileged users. When a
 script is compiled using the --privilege option, the server checks the
 script for such behavior and cryptographically signs the resulting module if it
-is safe for use by unprivileged users. Verification of ths signature certifies
+is safe for use by unprivileged users. Verification of the signature certifies
 that the module was certified as 'safe' by the server and that it has not been
 altered since it was certified.
 
@@ -271,7 +271,7 @@ Each of the servers you specified in stap 2 above should be listed.
 Trust of Unprivileged Users
 ---------------------------
 Finally, once compile servers have been set up and are trusted, each
-unprivileged user must be explicitely trusted. This is done by adding each
+unprivileged user must be explicitly trusted. This is done by adding each
 unprivileged user to the group stapusr, and possibly the group stapsys on each host on which they
 will run systemtap scripts:
 
-- 
1.7.2.5

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2012-02-06 11:00 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2012-02-06 11:00 [PATCH] Fix spelling errors Timo Juhani Lindfors

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).