From patchwork Fri May 27 15:13:21 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Philipp Gesang X-Patchwork-Id: 9138675 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 2AF1A6075C for ; Fri, 27 May 2016 15:27:11 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 1CE3827CCD for ; Fri, 27 May 2016 15:27:11 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 1167E28159; Fri, 27 May 2016 15:27:11 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-1.9 required=2.0 tests=BAYES_00 autolearn=ham version=3.3.1 Received: from emsm-gh1-uea11.nsa.gov (smtp.nsa.gov [8.44.101.9]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id 9F5AB27CCD for ; Fri, 27 May 2016 15:27:09 +0000 (UTC) X-IronPort-AV: E=Sophos;i="5.26,374,1459814400"; d="scan'208";a="16486502" IronPort-PHdr: =?us-ascii?q?9a23=3ARLiQjR1ZSktnlzb1smDT+DRfVm0co7zxezQtwd8Z?= =?us-ascii?q?segQL/ad9pjvdHbS+e9qxAeQG96LurQY1KGG7+jJYi8p39WoiDg6aptCVhsI24?= =?us-ascii?q?09vjcLJ4q7M3D9N+PgdCcgHc5PBxdP9nC/NlVJSo6lPwWB6kO74TNaIBjjLw09?= =?us-ascii?q?fr2zQd6DyZjonLDus7ToICx2xxOFKYtoKxu3qQiD/uI3uqBFbpgL9x3Sv3FTcP?= =?us-ascii?q?5Xz247bXianhL7+9vitMU7q3cYhuglv/Jkfe26Ov1gDO8QMDNzCG0x5cv2pTHf?= =?us-ascii?q?XACP4T0aSWxQnR1WUCbf6xSvZpfwtirirqJS1TKTO8K+Gag0WDCj978tRxLzgS?= =?us-ascii?q?EIHz8/7Hve0Mp9kORQpxf39E83+JLdfIzAbKk2RajaZ95PADMZUw=3D=3D?= X-IPAS-Result: =?us-ascii?q?A2EfBQAEZ0hX/wHyM5BcgzlWfbttH4csTAEBAQEBAQICYie?= =?us-ascii?q?CLoIdAjcUIAsDAwkCFyEBBwgIAwEtFR8LBRgEiA4EAcQuAQslhieGFoJHEQFkA?= =?us-ascii?q?YURBYd/hxiJIIFWigGCS4lWhUICj0xig29siEwHF4EeAQEB?= Received: from unknown (HELO tarius.tycho.ncsc.mil) ([144.51.242.1]) by emsm-gh1-uea11.nsa.gov with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 27 May 2016 15:26:46 +0000 Received: from prometheus.infosec.tycho.ncsc.mil (prometheus [192.168.25.40]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id u4RFLmCJ025798; Fri, 27 May 2016 11:23:10 -0400 Received: from tarius.tycho.ncsc.mil (tarius.infosec.tycho.ncsc.mil [144.51.242.1]) by prometheus.infosec.tycho.ncsc.mil (8.15.2/8.15.2) with ESMTP id u4RFEVW3206864 for ; Fri, 27 May 2016 11:14:31 -0400 Received: from goalie.tycho.ncsc.mil (goalie [144.51.242.250]) by tarius.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id u4RFELdS024736 for ; Fri, 27 May 2016 11:14:31 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A1B8BACqYkhXcBy1Sz5chA99t2CEFRKFf4ExTAEBAQEBARMBFzOFckkBgQeIMwHEToYnhhaDPQGFEQWHf4cYiSCBVooBgkuPGAKPTIIYAYI4OjKITAcXgR4BAQE X-IPAS-Result: A1B8BACqYkhXcBy1Sz5chA99t2CEFRKFf4ExTAEBAQEBARMBFzOFckkBgQeIMwHEToYnhhaDPQGFEQWHf4cYiSCBVooBgkuPGAKPTIIYAYI4OjKITAcXgR4BAQE X-IronPort-AV: E=Sophos;i="5.26,374,1459828800"; d="scan'208";a="5473619" Received: from emsm-gh1-uea10.corp.nsa.gov (HELO emsm-gh1-uea10.nsa.gov) ([10.208.41.36]) by goalie.tycho.ncsc.mil with ESMTP; 27 May 2016 11:14:17 -0400 IronPort-PHdr: =?us-ascii?q?9a23=3AKXsS6hGpSyWBCXuPVzAZ5Z1GYnF86YWxBRYc798d?= =?us-ascii?q?s5kLTJ75osywAkXT6L1XgUPTWs2DsrQf27uQ7/+rBjFIyK3CmU5BWaQEbwUCh8?= =?us-ascii?q?QSkl5oK+++Imq/EsTXaTcnFt9JTl5v8iLzG0FUHMHjew+a+SXqvnYsExnyfTB4?= =?us-ascii?q?Ov7yUtaLyZ/nhqbupNaMPk1hv3mUX/BbFF2OtwLft80b08NJC50a7V/3mEZOYP?= =?us-ascii?q?lc3mhyJFiezF7W78a0+4N/oWwL46pyv50IbaKvRKk8TLpFHBw6Ims144vtrhCF?= =?us-ascii?q?QgyRtVUGVWBDqhpJBwnd9FnVU4z4tCSy4vJ92S2bJdWwQr0vUDKtx6ZtVAXh0i?= =?us-ascii?q?EKK3gy92SB2Z84t75SvB/0/083+IXTeozAbPc=3D?= X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0FBBAAkY0hXcBy1Sz5chA99t2CEFRKFf?= =?us-ascii?q?4ExTAEBAQEBAQICDwEXMy+CLoMVSQGBB4gzAcRUhieGFoM9AYURBYd/hxiJIIF?= =?us-ascii?q?WigGCS48YAo9MghgBgjg6MohMBxeBHgEBAQ?= X-IPAS-Result: =?us-ascii?q?A0FBBAAkY0hXcBy1Sz5chA99t2CEFRKFf4ExTAEBAQEBAQI?= =?us-ascii?q?CDwEXMy+CLoMVSQGBB4gzAcRUhieGFoM9AYURBYd/hxiJIIFWigGCS48YAo9Mg?= =?us-ascii?q?hgBgjg6MohMBxeBHgEBAQ?= X-IronPort-AV: E=Sophos;i="5.26,374,1459814400"; d="scan'208";a="14119374" Received: from rp02.intra2net.com ([62.75.181.28]) by emsm-gh1-uea10.nsa.gov with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 27 May 2016 15:14:03 +0000 Received: from intranator.m.i2n (unknown [172.16.1.99]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by rp02.intra2net.com (Postfix) with ESMTPS id 7F29E1001DF; Fri, 27 May 2016 17:14:01 +0200 (CEST) Received: from localhost (intranator.m.i2n [127.0.0.1]) by localhost (Postfix) with ESMTP id 5CF2F732; Fri, 27 May 2016 17:14:01 +0200 (CEST) X-Virus-Scanned: by Intra2net Mail Security (AVE=8.3.40.6,VDF=8.12.89.248) Received: from drift.m.i2n (drift.m.i2n [172.16.1.85]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) (Authenticated sender: smtp-auth-user) by intranator.m.i2n (Postfix) with ESMTPSA id 5FD244AB; Fri, 27 May 2016 17:13:59 +0200 (CEST) From: Philipp Gesang To: Selinux@tycho.nsa.gov Subject: [PATCH] policycoreutils: fix typos in semanage manpages Date: Fri, 27 May 2016 17:13:21 +0200 Message-Id: <1464362001-5636-1-git-send-email-philipp.gesang@intra2net.com> X-Mailer: git-send-email 2.4.11 X-Mailman-Approved-At: Fri, 27 May 2016 11:21:46 -0400 X-BeenThere: selinux@tycho.nsa.gov X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Security-Enhanced Linux \(SELinux\) mailing list" List-Post: List-Help: Cc: Philipp Gesang MIME-Version: 1.0 Errors-To: selinux-bounces@tycho.nsa.gov Sender: "Selinux" X-Virus-Scanned: ClamAV using ClamSMTP Signed-off-by: Philipp Gesang --- policycoreutils/semanage/semanage-dontaudit.8 | 2 +- policycoreutils/semanage/semanage-export.8 | 2 +- policycoreutils/semanage/semanage-import.8 | 2 +- policycoreutils/semanage/semanage-interface.8 | 2 +- policycoreutils/semanage/semanage-port.8 | 2 +- 5 files changed, 5 insertions(+), 5 deletions(-) diff --git a/policycoreutils/semanage/semanage-dontaudit.8 b/policycoreutils/semanage/semanage-dontaudit.8 index 122780d..3d29911 100644 --- a/policycoreutils/semanage/semanage-dontaudit.8 +++ b/policycoreutils/semanage/semanage-dontaudit.8 @@ -8,7 +8,7 @@ semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation from policy sources. semanage dontaudit toggles whether or not dontaudit rules will be in the policy. Policy writers use dontaudit rules to cause -confined applications to use alternative paths. Dontaudit rules are denied but not reported in the logs. Some times dontaudit rules can cause bugs in applications but policy writers will not relize it since the AVC is not audited. Turning off dontaudit rules with this command to see if the kernel is blocking an access. +confined applications to use alternative paths. Dontaudit rules are denied but not reported in the logs. Some times dontaudit rules can cause bugs in applications but policy writers will not realize it since the AVC is not audited. Turning off dontaudit rules with this command to see if the kernel is blocking an access. .SH "OPTIONS" .TP diff --git a/policycoreutils/semanage/semanage-export.8 b/policycoreutils/semanage/semanage-export.8 index 469b1bb..d688224 100644 --- a/policycoreutils/semanage/semanage-export.8 +++ b/policycoreutils/semanage/semanage-export.8 @@ -7,7 +7,7 @@ .SH "DESCRIPTION" semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation -from policy sources. semanage import and export can be used to extract the SELinux modifications from one machine and apply them to another. You can put a hole group of semanage commands within a file and apply them to a machine in a single transaction. +from policy sources. semanage import and export can be used to extract the SELinux modifications from one machine and apply them to another. You can put a whole group of semanage commands within a file and apply them to a machine in a single transaction. .SH "OPTIONS" .TP diff --git a/policycoreutils/semanage/semanage-import.8 b/policycoreutils/semanage/semanage-import.8 index 5437de3..4a9b3e7 100644 --- a/policycoreutils/semanage/semanage-import.8 +++ b/policycoreutils/semanage/semanage-import.8 @@ -7,7 +7,7 @@ .SH "DESCRIPTION" semanage is used to configure certain elements of SELinux policy without requiring modification to or recompilation -from policy sources. semanage import and export can be used to extract the SELinux modifications from one machine and apply them to another. You can put a hole group of semanage commands within a file and apply them to a machine in a single transaction. +from policy sources. semanage import and export can be used to extract the SELinux modifications from one machine and apply them to another. You can put a whole group of semanage commands within a file and apply them to a machine in a single transaction. .SH "OPTIONS" .TP diff --git a/policycoreutils/semanage/semanage-interface.8 b/policycoreutils/semanage/semanage-interface.8 index d318bb8..fe8b250 100644 --- a/policycoreutils/semanage/semanage-interface.8 +++ b/policycoreutils/semanage/semanage-interface.8 @@ -52,7 +52,7 @@ MLS/MCS Security Range (MLS/MCS Systems only) SELinux Range for SELinux login ma .SH EXAMPLE .nf -list all interface defitions +list all interface definitions # semanage interface \-l .SH "SEE ALSO" diff --git a/policycoreutils/semanage/semanage-port.8 b/policycoreutils/semanage/semanage-port.8 index 3f067c5..5a6a57f 100644 --- a/policycoreutils/semanage/semanage-port.8 +++ b/policycoreutils/semanage/semanage-port.8 @@ -53,7 +53,7 @@ Protocol for the specified port (tcp|udp) or internet protocol version for the s .SH EXAMPLE .nf -List all port defitions +List all port definitions # semanage port \-l Allow Apache to listen on tcp port 81 # semanage port \-a \-t http_port_t \-p tcp 81