Skip to content

Commit 3d913c7

Browse files
lindi2fche
authored andcommittedFeb 6, 2012
Fix spelling errors
1 parent 007fa07 commit 3d913c7

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed
 

‎README.unprivileged

+5-5
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ below for more details.
4848
Trust of Unprivileged Users
4949
---------------------------
5050
Even with the appropriate compile server available, each
51-
unprivileged user must be explicitely trusted. This is done by adding each
51+
unprivileged user must be explicitly trusted. This is done by adding each
5252
unprivileged user to the group stapusr and possibly the group stapsys
5353
on each host on which they will
5454
run systemtap scripts. To see if you are a member of the group stapusr on the
@@ -99,7 +99,7 @@ stap_5330.ko
9999
# staprun stap_5330.ko
100100
Hello
101101

102-
Note that the module has already been ceritified (signed), so no special options
102+
Note that the module has already been certified (signed), so no special options
103103
are needed.
104104

105105
Additional Information
@@ -177,7 +177,7 @@ Starting stap-server -a "x86_64" -r "2.6.34.7-61.fc13.x86_64" -u "stap-server"
177177
This starts a compile server for the specified kernel release and hardware
178178
architecture. The kernel and kernel-devel package for the specified release and
179179
architecture must be installed on the server host. The kernel-debuginfo package
180-
for each kernel release and archtecture should also be installed, but is not
180+
for each kernel release and architecture should also be installed, but is not
181181
relevant for unprivileged users.
182182

183183
If either one (or both) the kernel release and/or architecture is not
@@ -215,7 +215,7 @@ administrator trusts it to correctly check a systemtap script for
215215
behavior which should not be made available to unprivileged users. When a
216216
script is compiled using the --privilege option, the server checks the
217217
script for such behavior and cryptographically signs the resulting module if it
218-
is safe for use by unprivileged users. Verification of ths signature certifies
218+
is safe for use by unprivileged users. Verification of the signature certifies
219219
that the module was certified as 'safe' by the server and that it has not been
220220
altered since it was certified.
221221

@@ -271,7 +271,7 @@ Each of the servers you specified in stap 2 above should be listed.
271271
Trust of Unprivileged Users
272272
---------------------------
273273
Finally, once compile servers have been set up and are trusted, each
274-
unprivileged user must be explicitely trusted. This is done by adding each
274+
unprivileged user must be explicitly trusted. This is done by adding each
275275
unprivileged user to the group stapusr, and possibly the group stapsys on each host on which they
276276
will run systemtap scripts:
277277

0 commit comments

Comments
 (0)
Please sign in to comment.