summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorGünther Noack <gnoack3000@gmail.com>2023-04-22 17:06:46 +0200
committerAlejandro Colomar <alx@kernel.org>2023-04-23 18:02:28 +0200
commit000632bfafe4f1abb4ddcc6864033fa1831a68d7 (patch)
treeb574e7260254528f121259e993376a5fc306b0a8
parent781cc14d9129084e57af38256d5f0632485b24a0 (diff)
man*/: wfix
Fix spelling of "run time", as documented in man-pages(7): - "run time" in two words when used as a noun - "run-time" with hyphen when used as an adjective There is another occurrence in bpf-helpers.7, but that content gets generated from the kernel source and should be fixed there. Signed-off-by: Günther Noack <gnoack3000@gmail.com> Signed-off-by: Alejandro Colomar <alx@kernel.org>
-rw-r--r--man2/mount_setattr.22
-rw-r--r--man2/openat2.22
-rw-r--r--man7/landlock.72
3 files changed, 3 insertions, 3 deletions
diff --git a/man2/mount_setattr.2 b/man2/mount_setattr.2
index 24801a4bd..8df02641a 100644
--- a/man2/mount_setattr.2
+++ b/man2/mount_setattr.2
@@ -862,7 +862,7 @@ may change in the future
user-space applications should zero-fill
.I struct mount_attr
to ensure that recompiling the program with new headers will not result in
-spurious errors at runtime.
+spurious errors at run time.
The simplest way is to use a designated initializer:
.PP
.in +4n
diff --git a/man2/openat2.2 b/man2/openat2.2
index e90211fad..182851089 100644
--- a/man2/openat2.2
+++ b/man2/openat2.2
@@ -545,7 +545,7 @@ may change in the future (with new fields being added when system headers are
updated), user-space applications should zero-fill
.I struct open_how
to ensure that recompiling the program with new headers will not result in
-spurious errors at runtime.
+spurious errors at run time.
The simplest way is to use a designated
initializer:
.PP
diff --git a/man7/landlock.7 b/man7/landlock.7
index b6c9d3821..df7b87e80 100644
--- a/man7/landlock.7
+++ b/man7/landlock.7
@@ -251,7 +251,7 @@ will stay enforced on all this thread's descendants.
This allows creating standalone and modular security policies
per application,
which will automatically be composed between themselves
-according to their runtime parent policies.
+according to their run-time parent policies.
.\"
.SS Ptrace restrictions
A sandboxed process has less privileges than a non-sandboxed process and