[PATCH 1/4] cap_get_proc.3: Typo fixes
Michael Kerrisk (man-pages)
mtk.manpages at gmail.com
Wed Jun 10 06:57:32 UTC 2020
Signed-off-by: Michael Kerrisk (man-pages) <mtk.manpages at gmail.com>
---
doc/cap_get_proc.3 | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/doc/cap_get_proc.3 b/doc/cap_get_proc.3
index 3eef3f7..c2ce212 100644
--- a/doc/cap_get_proc.3
+++ b/doc/cap_get_proc.3
@@ -87,7 +87,7 @@ with a
.I cap
as an argument returns the current value of this bounding set
capability flag in effect for the current process. This operation is
-unpriveged. Note, a macro function
+unprivileged. Note, a macro function
.BR "CAP_IS_SUPPORTED(cap_value_t " cap )
is provided that evaluates to true (1) if the system supports the
specified capability,
@@ -216,7 +216,7 @@ On failure,
.I errno
is set to
.BR EINVAL ,
-.BR EPERM,
+.BR EPERM ,
or
.BR ENOMEM .
.SH "CONFORMING TO"
@@ -298,7 +298,7 @@ Linux. Note that, by default, the only processes that have
available to them are processes started as a kernel thread.
(Typically this includes
.BR init (8),
-kflushd and kswapd). You will need to recompile the kernel to modify
+kflushd and kswapd.) You will need to recompile the kernel to modify
this default.
.SH EXAMPLE
The code segment below raises the
--
2.26.2
More information about the Linux-security-module-archive
mailing list