Re: [PATCH] Fix multiple spelling errors

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 05/01/2016 02:18 PM, Laurent Bigonville wrote:
> From: Laurent Bigonville <bigon@xxxxxxxx>
> 
> Thanks to the lintian utility from Debian

Thanks, applied.

> ---
>  libselinux/man/man3/avc_add_callback.3   | 4 ++--
>  libselinux/man/man3/avc_has_perm.3       | 2 +-
>  libselinux/man/man3/is_selinux_enabled.3 | 2 +-
>  libsemanage/include/semanage/handle.h    | 2 +-
>  libsemanage/src/database.h               | 2 +-
>  libsepol/cil/src/cil_find.c              | 2 +-
>  policycoreutils/sandbox/seunshare.8      | 2 +-
>  7 files changed, 8 insertions(+), 8 deletions(-)
> 
> diff --git a/libselinux/man/man3/avc_add_callback.3 b/libselinux/man/man3/avc_add_callback.3
> index dbfe72d..bdbbadf 100644
> --- a/libselinux/man/man3/avc_add_callback.3
> +++ b/libselinux/man/man3/avc_add_callback.3
> @@ -57,7 +57,7 @@ and will cause any SID to match.
>  .I callback
>  is the callback function provided by the userspace object manager.  The
>  .I event
> -argument indicates the security event which occured; the remaining arguments
> +argument indicates the security event which occurred; the remaining arguments
>  are interpreted according to the event as described below.  The return value
>  of the callback should be zero on success, \-1 on error with
>  .I errno
> @@ -175,7 +175,7 @@ If the userspace AVC is running in threaded mode, callbacks registered via
>  may be executed in the context of the netlink handler thread.  This will likely introduce synchronization issues requiring the use of locks.  See
>  .BR avc_init (3).
>  
> -Support for dynamic revocation and retained permissions is mostly unimplemented in the SELinux kernel module.  The only security event that currently gets excercised is
> +Support for dynamic revocation and retained permissions is mostly unimplemented in the SELinux kernel module.  The only security event that currently gets exercised is
>  .BR AVC_CALLBACK_RESET .
>  .
>  .SH "AUTHOR"
> diff --git a/libselinux/man/man3/avc_has_perm.3 b/libselinux/man/man3/avc_has_perm.3
> index 7353952..3e9fca8 100644
> --- a/libselinux/man/man3/avc_has_perm.3
> +++ b/libselinux/man/man3/avc_has_perm.3
> @@ -108,7 +108,7 @@ for the first time.
>  Using an uninitialized structure will produce undefined behavior.
>  .
>  .SH "RETURN VALUE"
> -If requested permissions are granted, zero is returned.  If requested permissions are denied or an error occured, \-1 is returned and
> +If requested permissions are granted, zero is returned.  If requested permissions are denied or an error occurred, \-1 is returned and
>  .I errno
>  is set appropriately.
>  
> diff --git a/libselinux/man/man3/is_selinux_enabled.3 b/libselinux/man/man3/is_selinux_enabled.3
> index f02052c..b2df562 100644
> --- a/libselinux/man/man3/is_selinux_enabled.3
> +++ b/libselinux/man/man3/is_selinux_enabled.3
> @@ -3,7 +3,7 @@
>  is_selinux_enabled \- check whether SELinux is enabled
>  .
>  .SH "NAME"
> -is_selinux_mls_enabled \- check whether SELinux is enabled for (Multi Level Securty) MLS 
> +is_selinux_mls_enabled \- check whether SELinux is enabled for (Multi Level Security) MLS
>  .
>  .SH "SYNOPSIS"
>  .B #include <selinux/selinux.h>
> diff --git a/libsemanage/include/semanage/handle.h b/libsemanage/include/semanage/handle.h
> index 6cad529..c816590 100644
> --- a/libsemanage/include/semanage/handle.h
> +++ b/libsemanage/include/semanage/handle.h
> @@ -130,7 +130,7 @@ int semanage_commit(semanage_handle_t *);
>  #define SEMANAGE_CAN_READ 1
>  #define SEMANAGE_CAN_WRITE 2
>  /* returns SEMANAGE_CAN_READ or SEMANAGE_CAN_WRITE if the store is readable
> - * or writable, respectively. <0 if an error occured */
> + * or writable, respectively. <0 if an error occurred */
>  int semanage_access_check(semanage_handle_t * sh);
>  
>  /* returns 0 if not connected, 1 if connected */
> diff --git a/libsemanage/src/database.h b/libsemanage/src/database.h
> index e460379..6a4a164 100644
> --- a/libsemanage/src/database.h
> +++ b/libsemanage/src/database.h
> @@ -148,7 +148,7 @@ typedef struct dbase_table {
>  	 * This function must be invoked before using
>  	 * any of the database functions above. It may be invoked
>  	 * multiple times, and will update the cache if a commit
> -	 * occured between invocations */
> +	 * occurred between invocations */
>  	int (*cache) (struct semanage_handle * handle, dbase_t * dbase);
>  
>  	/* Forgets all changes that haven't been written
> diff --git a/libsepol/cil/src/cil_find.c b/libsepol/cil/src/cil_find.c
> index 8e0688c..4134242 100644
> --- a/libsepol/cil/src/cil_find.c
> +++ b/libsepol/cil/src/cil_find.c
> @@ -383,7 +383,7 @@ int cil_find_matching_avrule_in_ast(struct cil_tree_node *current, enum cil_flav
>  
>  	rc = cil_tree_walk(current, __cil_find_matching_avrule_in_ast, NULL, NULL, &args);
>  	if (rc) {
> -		cil_log(CIL_ERR, "An error occured while searching for avrule in AST\n");
> +		cil_log(CIL_ERR, "An error occurred while searching for avrule in AST\n");
>  	}
>  
>  	return rc;
> diff --git a/policycoreutils/sandbox/seunshare.8 b/policycoreutils/sandbox/seunshare.8
> index 76b75c8..9e105a1 100644
> --- a/policycoreutils/sandbox/seunshare.8
> +++ b/policycoreutils/sandbox/seunshare.8
> @@ -25,7 +25,7 @@ Allow apps executed within the namespace to use capabilities.  Default is no cap
>  Kill all processes with matching MCS level.
>  .TP
>  \fB\-Z\ context
> -Use alternate SELinux context while runing the executable.
> +Use alternate SELinux context while running the executable.
>  .TP
>  \fB\-v\fR
>  Verbose output
> 

_______________________________________________
Selinux mailing list
Selinux@xxxxxxxxxxxxx
To unsubscribe, send email to Selinux-leave@xxxxxxxxxxxxx.
To get help, send an email containing "help" to Selinux-request@xxxxxxxxxxxxx.



[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux