mirror of
https://gitlab.com/apparmor/apparmor
synced 2025-08-30 13:58:22 +00:00
parser: misc fixes on apparmor.d man page
Signed-off-by: Georgia Garcia <georgia.garcia@canonical.com> (cherry picked from commit 998ee0595e28f8ad5923607fdfae2a2d4397804b) Signed-off-by: John Johansen <john.johansen@canonical.com>
This commit is contained in:
parent
0390e2a7ec
commit
181f49b20f
@ -1024,7 +1024,7 @@ If a conditional is specified using '=', then the rule only grants permission
|
||||
for mounts matching the exactly specified options. For example, an AppArmor
|
||||
policy with the following rule:
|
||||
|
||||
mount options=ro /dev/foo -E<gt> /mnt/,
|
||||
mount options=ro /dev/foo -> /mnt/,
|
||||
|
||||
Would match:
|
||||
|
||||
@ -1071,7 +1071,7 @@ grants permission for each set of options. This provides a shorthand when
|
||||
writing mount rules which might help to logically break up a conditional. For
|
||||
example, if an AppArmor policy has the following rule:
|
||||
|
||||
mount options=ro options=atime
|
||||
mount options=ro options=atime,
|
||||
|
||||
both of these mount commands will match:
|
||||
|
||||
@ -1319,7 +1319,7 @@ Example IO_URING rules:
|
||||
=over 4
|
||||
|
||||
# Allow io_uring operations
|
||||
io_ring,
|
||||
io_uring,
|
||||
|
||||
# Allow creation of a polling thread
|
||||
io_uring sqpoll,
|
||||
|
Loading…
x
Reference in New Issue
Block a user