diff options
author | Laurent Bigonville <bigon@bigon.be> | 2016-05-01 20:18:03 +0200 |
---|---|---|
committer | Stephen Smalley <sds@tycho.nsa.gov> | 2016-05-02 08:45:45 -0400 |
commit | 8586ee56bedc802100df9dd27ce19fbe2eb4ef6d (patch) | |
tree | 25e5ec4c7b40a1e6fa11ddfcdc909d0bacef1573 /libselinux/man/man3 | |
parent | fa5ca393cf8c91baaec2d16740039f9cebfda21f (diff) | |
download | android_external_selinux-8586ee56bedc802100df9dd27ce19fbe2eb4ef6d.tar.gz android_external_selinux-8586ee56bedc802100df9dd27ce19fbe2eb4ef6d.tar.bz2 android_external_selinux-8586ee56bedc802100df9dd27ce19fbe2eb4ef6d.zip |
Fix multiple spelling errors
Thanks to the lintian utility from Debian
Diffstat (limited to 'libselinux/man/man3')
-rw-r--r-- | libselinux/man/man3/avc_add_callback.3 | 4 | ||||
-rw-r--r-- | libselinux/man/man3/avc_has_perm.3 | 2 | ||||
-rw-r--r-- | libselinux/man/man3/is_selinux_enabled.3 | 2 |
3 files changed, 4 insertions, 4 deletions
diff --git a/libselinux/man/man3/avc_add_callback.3 b/libselinux/man/man3/avc_add_callback.3 index dbfe72d3..bdbbadf1 100644 --- a/libselinux/man/man3/avc_add_callback.3 +++ b/libselinux/man/man3/avc_add_callback.3 @@ -57,7 +57,7 @@ and will cause any SID to match. .I callback is the callback function provided by the userspace object manager. The .I event -argument indicates the security event which occured; the remaining arguments +argument indicates the security event which occurred; the remaining arguments are interpreted according to the event as described below. The return value of the callback should be zero on success, \-1 on error with .I errno @@ -175,7 +175,7 @@ If the userspace AVC is running in threaded mode, callbacks registered via may be executed in the context of the netlink handler thread. This will likely introduce synchronization issues requiring the use of locks. See .BR avc_init (3). -Support for dynamic revocation and retained permissions is mostly unimplemented in the SELinux kernel module. The only security event that currently gets excercised is +Support for dynamic revocation and retained permissions is mostly unimplemented in the SELinux kernel module. The only security event that currently gets exercised is .BR AVC_CALLBACK_RESET . . .SH "AUTHOR" diff --git a/libselinux/man/man3/avc_has_perm.3 b/libselinux/man/man3/avc_has_perm.3 index 73539522..3e9fca84 100644 --- a/libselinux/man/man3/avc_has_perm.3 +++ b/libselinux/man/man3/avc_has_perm.3 @@ -108,7 +108,7 @@ for the first time. Using an uninitialized structure will produce undefined behavior. . .SH "RETURN VALUE" -If requested permissions are granted, zero is returned. If requested permissions are denied or an error occured, \-1 is returned and +If requested permissions are granted, zero is returned. If requested permissions are denied or an error occurred, \-1 is returned and .I errno is set appropriately. diff --git a/libselinux/man/man3/is_selinux_enabled.3 b/libselinux/man/man3/is_selinux_enabled.3 index f02052c4..b2df5626 100644 --- a/libselinux/man/man3/is_selinux_enabled.3 +++ b/libselinux/man/man3/is_selinux_enabled.3 @@ -3,7 +3,7 @@ is_selinux_enabled \- check whether SELinux is enabled . .SH "NAME" -is_selinux_mls_enabled \- check whether SELinux is enabled for (Multi Level Securty) MLS +is_selinux_mls_enabled \- check whether SELinux is enabled for (Multi Level Security) MLS . .SH "SYNOPSIS" .B #include <selinux/selinux.h> |