aboutsummaryrefslogtreecommitdiffstats
path: root/libselinux/man/man3
diff options
context:
space:
mode:
authorLaurent Bigonville <bigon@bigon.be>2016-05-01 20:18:03 +0200
committerStephen Smalley <sds@tycho.nsa.gov>2016-05-02 08:45:45 -0400
commit8586ee56bedc802100df9dd27ce19fbe2eb4ef6d (patch)
tree25e5ec4c7b40a1e6fa11ddfcdc909d0bacef1573 /libselinux/man/man3
parentfa5ca393cf8c91baaec2d16740039f9cebfda21f (diff)
downloadandroid_external_selinux-8586ee56bedc802100df9dd27ce19fbe2eb4ef6d.tar.gz
android_external_selinux-8586ee56bedc802100df9dd27ce19fbe2eb4ef6d.tar.bz2
android_external_selinux-8586ee56bedc802100df9dd27ce19fbe2eb4ef6d.zip
Fix multiple spelling errors
Thanks to the lintian utility from Debian
Diffstat (limited to 'libselinux/man/man3')
-rw-r--r--libselinux/man/man3/avc_add_callback.34
-rw-r--r--libselinux/man/man3/avc_has_perm.32
-rw-r--r--libselinux/man/man3/is_selinux_enabled.32
3 files changed, 4 insertions, 4 deletions
diff --git a/libselinux/man/man3/avc_add_callback.3 b/libselinux/man/man3/avc_add_callback.3
index dbfe72d3..bdbbadf1 100644
--- a/libselinux/man/man3/avc_add_callback.3
+++ b/libselinux/man/man3/avc_add_callback.3
@@ -57,7 +57,7 @@ and will cause any SID to match.
.I callback
is the callback function provided by the userspace object manager. The
.I event
-argument indicates the security event which occured; the remaining arguments
+argument indicates the security event which occurred; the remaining arguments
are interpreted according to the event as described below. The return value
of the callback should be zero on success, \-1 on error with
.I errno
@@ -175,7 +175,7 @@ If the userspace AVC is running in threaded mode, callbacks registered via
may be executed in the context of the netlink handler thread. This will likely introduce synchronization issues requiring the use of locks. See
.BR avc_init (3).
-Support for dynamic revocation and retained permissions is mostly unimplemented in the SELinux kernel module. The only security event that currently gets excercised is
+Support for dynamic revocation and retained permissions is mostly unimplemented in the SELinux kernel module. The only security event that currently gets exercised is
.BR AVC_CALLBACK_RESET .
.
.SH "AUTHOR"
diff --git a/libselinux/man/man3/avc_has_perm.3 b/libselinux/man/man3/avc_has_perm.3
index 73539522..3e9fca84 100644
--- a/libselinux/man/man3/avc_has_perm.3
+++ b/libselinux/man/man3/avc_has_perm.3
@@ -108,7 +108,7 @@ for the first time.
Using an uninitialized structure will produce undefined behavior.
.
.SH "RETURN VALUE"
-If requested permissions are granted, zero is returned. If requested permissions are denied or an error occured, \-1 is returned and
+If requested permissions are granted, zero is returned. If requested permissions are denied or an error occurred, \-1 is returned and
.I errno
is set appropriately.
diff --git a/libselinux/man/man3/is_selinux_enabled.3 b/libselinux/man/man3/is_selinux_enabled.3
index f02052c4..b2df5626 100644
--- a/libselinux/man/man3/is_selinux_enabled.3
+++ b/libselinux/man/man3/is_selinux_enabled.3
@@ -3,7 +3,7 @@
is_selinux_enabled \- check whether SELinux is enabled
.
.SH "NAME"
-is_selinux_mls_enabled \- check whether SELinux is enabled for (Multi Level Securty) MLS
+is_selinux_mls_enabled \- check whether SELinux is enabled for (Multi Level Security) MLS
.
.SH "SYNOPSIS"
.B #include <selinux/selinux.h>