From patchwork Sat Jun 30 11:22:59 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yuri Chornoivan X-Patchwork-Id: 10498147 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 745B060230 for ; Sat, 30 Jun 2018 11:24:16 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 5255B291F7 for ; Sat, 30 Jun 2018 11:24:16 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 4510A291F9; Sat, 30 Jun 2018 11:24:16 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-5.1 required=2.0 tests=BAYES_00,DKIM_SIGNED, FREEMAIL_FROM,MAILING_LIST_MULTI,RCVD_IN_DNSWL_MED,T_DKIM_INVALID autolearn=ham version=3.3.1 Received: from upbd19pa07.eemsg.mail.mil (upbd19pa07.eemsg.mail.mil [214.24.27.82]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 73D9F291F7 for ; Sat, 30 Jun 2018 11:24:12 +0000 (UTC) X-EEMSG-Attachment-filename: 0001-Fix-minor-typos.patch X-EEMSG-Attachment-filesize: 11172 Received: from emsm-gh1-uea11.ncsc.mil ([214.29.60.3]) by upbd19pa07.eemsg.mail.mil with ESMTP/TLS/AES256-SHA; 30 Jun 2018 11:24:11 +0000 X-Attachment-Exists: TRUE X-IronPort-AV: E=Sophos;i="5.51,290,1526342400"; d="scan'208,223";a="15229727" IronPort-PHdr: =?us-ascii?q?9a23=3AI+mzIhf1NOWXry2/UTjHVDnClGMj4u6mDksu8p?= =?us-ascii?q?Mizoh2WeGdxcm/ZhCN2/xhgRfzUJnB7Loc0qyK6/6mATRIyK3CmUhKSIZLWR?= =?us-ascii?q?4BhJdetC0bK+nBN3fGKuX3ZTcxBsVIWQwt1Xi6NU9IBJS2PAWK8TW94jEIBx?= =?us-ascii?q?rwKxd+KPjrFY7OlcS30P2594HObwlSizexfbJ/IA+qoQnNq8IbnZZsJqEtxx?= =?us-ascii?q?XTv3BGYf5WxWRmJVKSmxbz+MK994N9/ipTpvws6ddOXb31cKokQ7NYCi8mM3?= =?us-ascii?q?0u683wqRbDVwqP6WACXWgQjxFFHhLK7BD+Xpf2ryv6qu9w0zSUMMHqUbw5Xy?= =?us-ascii?q?mp4KlxSB/slSwJKTg3/m/KgcB0la5WoRetqhpiyIDWfY6VLuJzcKPDc90URm?= =?us-ascii?q?RBWcReVyJODYygYIUBEvIBMORFo4TzuVQOtgCzBQyxCu710DJEmmP60K883u?= =?us-ascii?q?88EQ/GxgsgH9cWvXvWsdX1LqYSWv2rwanIyjXDdfVW2TD86IjWaB8hp+yHUL?= =?us-ascii?q?VwcMrM00kgCwPFjlKKqYH+IjOV1f4Nv3Kd7+V+SeKikmgqoBx/rDiow8cjkI?= =?us-ascii?q?jJhoQNx1DL9CV53IY1JcCjR0JhfdGkF55QuieHPIV1WsMvW3xktSk1x7EcuZ?= =?us-ascii?q?O3YTIGxIooyhLBcfCLbpCE7xbtWeqLPDt0mnNodKi9ihu260Ss1O3xW8ey3V?= =?us-ascii?q?1XtCRKiMPMuWoI1xHL78iHTeZy8Vm51DaU0gDT9vlEIUcplarHM5IhwqA/lp?= =?us-ascii?q?4UsUnbAi/5gl/2jK6LdkU/4OSo6uLnYrvhpp+HKYB7lhvyMrgum8OjAeQ4NR?= =?us-ascii?q?ICX26H9uSnyLLv50j5QLROjvEuk6nZto7VJdgDq6KkDAJY3Zwv5haiAzu8zt?= =?us-ascii?q?gVkmcLIEhYdB6fiojmIVDOIPT2DfelhFSslS9mx+vYMb3lA5XNKGXDkbj4cb?= =?us-ascii?q?lm7E5c1QwzwsxB6JJPEbwBPPLyVVPxtNzfFBM5NRe0zPz9BNVy0YMeR3qDAr?= =?us-ascii?q?WFP6PKrV+I+uUvLvGOZI8SvjbyMeQl5/70gn8/glIdf66p3Z0SaH+iBfRmP1?= =?us-ascii?q?uWYWD3gtsbFmcKpAU+RvTwiFKeST5Te2qyX6Uk6zE5CoKpF5vMRoO2gLyG2i?= =?us-ascii?q?e7H4NWa3tIClCIDHfpeJ6LW+oKaCKOP89tiDsEVaKuS4U5zxGhqBf6y6Z7Lu?= =?us-ascii?q?rT4iAZtY/j1MJp6O3TkhEy7yd5D9me02GXVW10mH0HRyMu1qBlvUN90kuD0b?= =?us-ascii?q?R/g/FADdxc+ehGXRk8NZ7d0+x6DMv/WgPfcdiXVlmqWNKmASs+Ttgp2d8Bf1?= =?us-ascii?q?59G8m+jhDExyelHrgVl7qNBJMp7K3c23nxKt1nxHnYzqkhiEMqQsxVNW2pnq?= =?us-ascii?q?R/7RTcB5bVk0WFkKanbbkT3DLX+2eZ1meBoEZYUAtsXqrfRnAfelHardLn6U?= =?us-ascii?q?PeV7WuE6goMhNdyc6eLatHctzpjVNaRPj9PNTRfWexlHmsBRaSxrKBd43qe3?= =?us-ascii?q?0D0yXbDUgLiQET/XKdOgg5CSatuWXeDCZhFVj3eUPj7fF+qG+nTk8z1wyFcV?= =?us-ascii?q?Vh2KCv+h4UnvyRUOsT0ageuCcgsDV0BFK90MjKBNWevQZhe79cYdwl6lddyW?= =?us-ascii?q?3ZrxB9PoCnL616iF8ecgB3v0bw2BVtEYhAn9Ylo24tzApoM62YyElBdzSa3Z?= =?us-ascii?q?/uJrLXNnP+/Be1a67ZwlveysqZ+r8T6PQkrFXupAKpGVAh83VgztlYyHic6Y?= =?us-ascii?q?/JDAoVTJL9SEE39wJ1p7vCeCky+5vU1WFwMamzqjLNwc8mBPEkyhm+ZddSK7?= =?us-ascii?q?mLGxP3E8EAAMiuMuMqkUCzbh0YJOBS6LI0P8S+evSawqGrOPhvnCm6jWVH54?= =?us-ascii?q?BwyVmM+DZ9SuHW2ZYF3/CY0RGdWzf6klihrtj9mZpYajEKAmq/1S/kCZZLZq?= =?us-ascii?q?JvYIkGEmiuI8i4x9lkgZ7iRWJY/ka5B1wawM+pZQaSb1vl0A1L20QXu3unmT?= =?us-ascii?q?CkzzFviDEpqK2f3SLLw+v4choLIGhLS3d+jV30O4i7k8gaXFS0bwgujBak61?= =?us-ascii?q?z1x6xHpKthNWnTWlxFfzboIGF4SaSwq7+Cb9RI6JMyviVdSP68bkyCSr7hvx?= =?us-ascii?q?sa1DvuH21fxDA/czGlpI75kgdgh22DNnZzq2DVecZqxRfQ/NbcX+Je3iIaRC?= =?us-ascii?q?lkjjnaHka8P9i18tWIkJfDqPqyWH6hVp1UdynrwpiNtC+65W1sGxK/hfezls?= =?us-ascii?q?fgEQgg3i/xz8NqWjnQrBbgfonr0Ly3MeZmfklzGF/w8tF6FZ96kosxgpEQxH?= =?us-ascii?q?cbi46O/XofkGfzN9Rb1r7lbHYXQz4E3cLV6hD/2EJ/NnKJ2575VnKFz8t7YN?= =?us-ascii?q?m6ZmcW1Twn789WD6eV4qdJnTBoolWktgLde/99ni0SyfE28n4Vn/kJuBYxzi?= =?us-ascii?q?WaGr0SHldXPSr3lxmT7NCxsqNXZH2pcbeuyEpyh9ehDKuNogtEQnb2Zo8iHT?= =?us-ascii?q?Ns7sV4KF/MyGf86pzgeNbOddIcrBuUkwvegOhPM58xi+EKijR9OWLmp3El0O?= =?us-ascii?q?k7jQF03Z6mooeHJWJt/Li2AhFGLDH1Yd0c+i31h6ZEgsmWx5yvHolmGjgTQp?= =?us-ascii?q?voS++nHSkMtfThKgmOECcwqnGFFrrDBQWf8ltpr2rTE5C3MHGaPGEZws9/RB?= =?us-ascii?q?mZP0FQnAEUXCk6n5IgGACl3srhfF1+5jAL6V7ysgFMxf5wNxnjTmffox+laj?= =?us-ascii?q?Q0SZibMhVb9QRC50DbMcyQ8O1zAz1Y/p2mrAyINGOXfQJIAn8VWkacHVDsIq?= =?us-ascii?q?Gu5cXc8+ifHue+IeHBYbOSqexZUveF3pyv3ZV78DaLLMWAJGFiD+c82kpBQ3?= =?us-ascii?q?92B9jZly8ISywNmCLHd9Sbqwuk+i1rssC/9+zmWAz15YSRFrRSKs9g+xaqga?= =?us-ascii?q?eELO6dnzx2Jipd1p8Wwn/I0rcf1kYIiy5ybzmtDagAtSnVQa3LgaBbCBobay?= =?us-ascii?q?JoNMtU9KIwxBJNNtDHhd/vzb53kPo1C1ZDVVz8lcCkftAFImGnNFPaH0aHLr?= =?us-ascii?q?qHKifXw8HsZqO8T6dcjOJOtx2/oTybCVPsPiyflzn1UBCiKfpDjCCUPBxZvo?= =?us-ascii?q?GwaQtiBnb4Q9LncBK7NsV7jToswb07nnnKL3ITMSBgc0NRqb2d9TlXgvplFG?= =?us-ascii?q?xf8HVoNu6Emz6H4OneL5YZq/prAiBvmOJd73U20bxV7DtLRPZtgivdssZuo0?= =?us-ascii?q?26kumI0jdnTB1OqjNRiIKRukVjOLvW9p9bVnbe+xIC82aQBg8WqNtiD93gp7?= =?us-ascii?q?pfysPTlK7pLjdN7c7U99MGB8fIMMKHLGYhMR3xFT7WDAsETSarNWbbh0xcjP?= =?us-ascii?q?Gd6GaYrp07qpjwgpoBVKVXVFsvFvMVEk5lBsANII9rXjM4lr6WlMgI6mSkox?= =?us-ascii?q?nVX8havZfHVumOAfr1LjaZlrpEZxoSzbP+M4sTKpXx21Z+ZVligITKB03QUM?= =?us-ascii?q?hXoiJ/dQ87vl9C8GJiQW0zwE/qcQKt4GUOGv6zkB42khF+bvot9Tv25Vc4OE?= =?us-ascii?q?bKrjMqkEYtgdXlnSyRcDnpIaitR45WFSv0uFUqMp7gWQl1dxeynUtqNTffWb?= =?us-ascii?q?1ek6ZgdXpqiA/AuZpDA/hcQrNYYBUI3/GYe+0o0UhAqiWg3UJH4ezFCYF8mw?= =?us-ascii?q?sscJ+sqGlN2w1lbN4oP6DQI7BJzldIjKKUoiCozvwxwBMZJ0sV62OdZioIuE?= =?us-ascii?q?0ONrk7KCul5fBj6QuHmzRfYmcMTOYqruhs9kwjJ+SK1zjg3KJbKkCtK+yfKL?= =?us-ascii?q?uUtHXcms6NRVMw0F8Im1Re8Lhoz8gjaUuUVkEozLuXDRgJM9TNKR1NZcpI6H?= =?us-ascii?q?fTZTqOsfnKwZ9tI4W9F+XoTeiStKYUgkOpBxsmH4UM78sbBZagykfYItn7LL?= =?us-ascii?q?Qd0xUi+BzrJEmZDPROYB+EijMHo8Cjw5BpxYZdIzEcAWN6MSWx/LnavRQlgP?= =?us-ascii?q?uZU9cwe3saUJYEOmgwWMKkhy5Tp25AAyWv0uIF1AiC6CfxqT/OAzn6dNdsfu?= =?us-ascii?q?qbZQ1yB9Gs4jUw6bK2iF7N/pXZPWH6OsxousXT5uMCu5aHF/RUQKFns0famo?= =?us-ascii?q?lXW3yqU2nLEd6uP5b+cpQiY8boB3i9SVGwlzU1T8LtM9m3NaiInRvkRYBKv4?= =?us-ascii?q?mHxDojL9OyFikCGxdsoOEO/L5zZQ8ZbJUnehPnqwM+N6i7IAeZzNquWXqtJi?= =?us-ascii?q?VKQPlf1+m6YKZXzyU0ZO+g1HQgVo06z/Ww8UMVXpEFlAvexfG4aIRFTSjzAG?= =?us-ascii?q?ZSexvRqio9lmhhMOkywuM+wBPHsVkcLz6Le/ZzaGxBpd08A02dIWluAGoiW1?= =?us-ascii?q?CclZbD4hKr370K8SpRhcpb0e1EsHj7v5/QejGsVbeqqZrLrSUvc8Iqo6prMY?= =?us-ascii?q?zsOsGGro/RniTDTJnMtQ2ISCu6GOBAmthTPi1YXPhImWcqOcEdt4tO80wxWd?= =?us-ascii?q?s6J7xIFakju6uqZSBiDSEM0S8TT5mA0yAaguegx7vakQ+dcIwlMBwAqppCmN?= =?us-ascii?q?UcUylyYiMQv6KjUoLWl2ifSmcVPAgT9wNM5Bkblo9xeODl75DETJhWyz5Zu/?= =?us-ascii?q?h0SDfEFoF091vnTWGbmUL3SO+8k+yvxw5Sz+nh0tgaWB5+FUhS3Pxalk02J7?= =?us-ascii?q?FrM6MQpJLFsieUdUPmu2Lg0PemJF5UycDPa130EI/FunHmXi0a53IUWZdFyG?= =?us-ascii?q?vDGpQKjwp5dKErqU1OIIChZEnz/CEryJpyH7amT8Cr20gqomscSyesDdVBF/?= =?us-ascii?q?lssEjLVz19f5CrtJLlNo1cQm9K4pKdrUtWkER2MyOizJpcM8BN7icXXDlBuj?= =?us-ascii?q?WRptyySNdM2cVuFZ8DPs9/u2vhGKNDIJWRv2A5taHuynDD/zAxq0u1xDK2G6?= =?us-ascii?q?CkVe1Z5HEeFh8vJ2uAtkklF/Es/XvK8lDRrlB0+P9WCaOBjUptvDpwHI1CCz?= =?us-ascii?q?hS2H+5KFRzSWVJvP9BKKTJacBcRec9ZQO3MRwkCfEmx1CJ/V1znXrheSx9qB?= =?us-ascii?q?ZV+yDHUAkoTiQVhrDtmSMApc25JTAaTI9HYis7YyfDNQ2bhThdvAxDZEFyR5?= =?us-ascii?q?AZHtFF9qkD3YtP4srNU1ujKT0eURx5MQI4zOBfmlJdv0WeZSDdFxCndfLVvh?= =?us-ascii?q?1wZ8eRo9ajLO7l8wdfloPnrOc4+r0fR328hwKiX83RopThtt2OqkuObr33M/?= =?us-ascii?q?O9YX/GSDjDkwywia0jD5nQ8CjZKBBbJIViyXo4fZjhDnbGPRFcKKIfI0pUS7?= =?us-ascii?q?x6aclcre9AfMJkfrgG+bN2Bh2bXBzvAJKgoONALlnNWTTUNz+B/fCnoYLP8b?= =?us-ascii?q?zdTvDtZs6WyHbdRKJ3JZN65iPlG7rx1I9e50722uts9kxmSFjJKSaBrM/7Kg?= =?us-ascii?q?MM/smieVPovoc1EjPOHJdwjH3ty1lCd8UNRS2q/o4YyJRE53nuUu94zlL8sO?= =?us-ascii?q?tJ97lj84U35a5mydusL6fINftaqVNnAgSTBghy+ZUtHWl/R2RVYuAPLffcZr?= =?us-ascii?q?kWgt71pOD2DaMX7geZ++tDadvIP0vBgNWwCimASRxYmwcMsTwaLgqZ1/Oenq?= =?us-ascii?q?97V8akqvbj2kIs5Vi+IQQKzLZz6oeY4qCIvvPYbwPNzbgYXajnXsXzrrA3tk?= =?us-ascii?q?OT4/0kkaQCem1zYw2pCugSTNUdxnv6zaA30S0sD97DH6j+9/JZUHI5hD3gkY?= =?us-ascii?q?hnH1oKAvMUAaaL/YNGk2c9nOzZMMEWcq9clWuUEB6kE6UNyXi15CuLLmhlhQ?= =?us-ascii?q?vO0xLrQW+p6l/5szN4SzPWz9j/ikpVSqW3BUBKUiqtIk94tTOCMRHmtNXppK?= =?us-ascii?q?s161s2PXb8tNKXk2uhOq1YENHjJNCGJik0vl0XhoUrRtOzwYAbBca9INAJ/X?= =?us-ascii?q?F/b/rR8XmknDNarqdcmYXe/t+a9enNEXmnla2apK2HxCpExXggoVE/9tegO+?= =?us-ascii?q?nV6N2LWPSp2XweTyV+uwvdRx66sKHbr1QPNEOX10fEhZIFMctE3Xki0UHm/v?= =?us-ascii?q?IsTMg09AVEGYbKf+kCqizrODvo3VafZMo6VjGE3DtLAl31EVd5GK8m2GLzpc?= =?us-ascii?q?7Jjmnf+1kpRol2akzmigd6D50iJkIx9FcXwiQCEQ8XaRCYFr2oBlrqLZECVU?= =?us-ascii?q?cdbRSLxr+6er043Udr2LOg+PfTbfBgB6oKLvtdgRSBnEJFFZIKsa0TW7Z8e1?= =?us-ascii?q?5B9KHJpgjtEZXnX+P8mXo2K/K1XthQ8doFuHs6/ga/Wx2g5I9M77kFjpCIaq?= =?us-ascii?q?lEYZ/LsMBn8Uhn4T8PdipQgBlwlB65Vf4TpPrj49fBqpao7PihVLo1TeUN6x?= =?us-ascii?q?c0H3h+j4f3gF07p9HX1vtTSorRiYvl6wBBOX+KuIHd0xlnMuoDMIercblv9n?= =?us-ascii?q?kdICgePX0ON8KMa/Yg+y9tLCnT51taD8MDedwYJ9HNlRlJhEPmXr9T98zbGk?= =?us-ascii?q?KXCopoeMAo6nD4yDYr/pcmVebg8jC2L4jF715RJ/NDkDlslNXaqegXxvrSCC?= =?us-ascii?q?4X7WOFZBh1xiOC1oSCCvfx/eWK09HUVFIGEzUoU4dcOjqN4winSfe0lJnzVA?= =?us-ascii?q?Ob9NPziookdE2MXnyxgLgFsqFUHO5BlCX0xD5eG5vxh/KIrtWs6WxXtkZdHI?= =?us-ascii?q?Z09x3FF71VPo9nNhTgismrWk98CzP9eM7KeBoutu6Wy/wC4upkMUvxe5MbLg?= =?us-ascii?q?gCy73k9XpfVhFuR6LuvlaFQeIRY8NrSPzArnBS54NvNasPPFyGqZzxqTdIrl?= =?us-ascii?q?E2DxMzZL82sDNaalHEnBdJVKbspL4AlgwcXMZ8uU9NGmKwO2U+6iHFVatPj6?= =?us-ascii?q?mRD/oV/SuVTqAUVUVnLD9+SQuv2JpyY7upgexHsmRekyxmvvcq1SBmSQCnuS?= =?us-ascii?q?3ooKINxS4g+K+muzoco3BFSf+ekyjQA1VZ0PsKlbscC2rl6VGkbnkMco/y4L?= =?us-ascii?q?h/Jcv+7oQg4nU/YRAmfyIYR+SgDz//g7mPAoyVv9JWnASNt9nWbb+vMSgSMa?= =?us-ascii?q?wwyBz7R3hn0wjRgAhn/XAOQjWh8N8kPpuyNdwixiqyFmjRbEwM7b9RsMvtqV?= =?us-ascii?q?4LS/M7aVRlwGp9ycWHXikNS9bUG2YpjwgrdXlEcIhd5hAEDaUohCiHvrVe9A?= =?us-ascii?q?EOfDjUCpil+pXXncrQ3Xk9TNFqxn/Zp6GcgpMq0WZlm89v7iOVuXQdberYU8?= =?us-ascii?q?h2Dnj0zIdfxvT0Z++xveAfVItm1LOhXecHMsa55WS22JRqWkmixrkFAVq5Me?= =?us-ascii?q?kDyanfUyekT22YROuKf3KLnzYjPU74/QOoIUEvaMdWs089NfPPhpxGmA3iVr?= =?us-ascii?q?N7XT6dpULdzGw/MeMacB82uIinewwWVuIRYfaTJfQ2yv0kFFQMd2PJHTdxC+?= =?us-ascii?q?Kus16tmY97O2964UX7euTg6QbmP8GXGhYaEI7WtJlx+ea1RmiZI39v0AVyPF?= =?us-ascii?q?Vo9+fYD1kxreFcc5ONktXRhNl2yvAFeOl3MS08u98TnYRj5ZOS0MiUbRGChq?= =?us-ascii?q?r1cMrYpvmeHu2Xm18nfmBcT6oxfRL+54J8OMUwHbLUA+0Kkw4bAP0LXYYgf0?= =?us-ascii?q?zx87tyKwJtewiZMKWpmMLqofije5hO4Xnb8gRjf2/npxQfx6nsHkRAZJewii?= =?us-ascii?q?C3fspqFDtcs91gDAdnF4JTGsQG6hCqGIOQhLrk1I2Mw29R4MQymPKqTP3H0c?= =?us-ascii?q?+2mYB4Xpwc4E2Pb1OzTKVog0Ewlumoh/rayJ7rQYPhdMJMSO98CnXAY7vCX8?= =?us-ascii?q?2/JzuCN9i6ehtu7r2GlrR0Thg=3D?= X-IPAS-Result: =?us-ascii?q?A2AtAgDxZzdb/wHyM5BbHQIFDIMgJ2VtEiiDeYFAhkRfj?= =?us-ascii?q?WV1lC8UgVgKJw0Hg3pBAwKDRTQYAQIBAQEBAQECAWwcDII1JIJdAQEBAQMBA?= =?us-ascii?q?iAdAQEMIAwCAwkBAQgCEQMBAgEJDQEPBAICAwELASEVCQgGCAsFGASDACiBP?= =?us-ascii?q?gEDCA0DAQEKjzeaWm6CHIJxAQEFfoJUHC0fgRyBHwcIikM/gQ+CWjWDGAKBL?= =?us-ascii?q?QERAgEeIAwcAoI3glWNCyuMEgmDWoFYIjKFSIUPQ4NJiAmHeoI5iRU4YXF7C?= =?us-ascii?q?juCNQEBATEJhXeEWYEMhHBseQMojTMCDRcEgh4BAQ?= Received: from tarius.tycho.ncsc.mil (HELO tarius.infosec.tycho.ncsc.mil) ([144.51.242.1]) by emsm-gh1-uea11.NCSC.MIL with ESMTP; 30 Jun 2018 11:23:52 +0000 Received: from prometheus.infosec.tycho.ncsc.mil (prometheus.infosec.tycho.ncsc.mil [192.168.25.40]) by tarius.infosec.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id w5UBNG86021356; Sat, 30 Jun 2018 07:23:29 -0400 Received: from tarius.infosec.tycho.ncsc.mil (tarius.infosec.tycho.ncsc.mil [144.51.242.1]) by prometheus.infosec.tycho.ncsc.mil (8.15.2/8.15.2) with ESMTP id w5UBN6W8024472 for ; Sat, 30 Jun 2018 07:23:06 -0400 Received: from goalie.tycho.ncsc.mil (goalie.infosec.tycho.ncsc.mil [144.51.242.250]) by tarius.infosec.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id w5UBNCSI021354 for ; Sat, 30 Jun 2018 07:23:14 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A1DsBABAZzdblywbGNZbHQIiB4MIJ2V/K?= =?us-ascii?q?IN5gUCHI4teggd1lC8UgWYwB4N6RgKDIiE2FgECAQEBAQEBAhQBAQEBAQYYBky?= =?us-ascii?q?FQgEBAgMjHQEBOA8JEwMBAgEJDQETAgIPAT8IBhODIAEogT4BAwgQAQEKjzqaW?= =?us-ascii?q?m6CHIJxAQEFfoJUHC0fgRyBHwcIiG2BVj+BD4Jag00CgS0BEQIBPgwcAoI3glW?= =?us-ascii?q?NNowSCYNagVgiMoVIhQ9Dg0mICYd6gjmJHAOBD3F7CjuCNQEBATEJgimDToRZg?= =?us-ascii?q?QyEcGx5K40zAg0XBIIeAQE?= X-IPAS-Result: =?us-ascii?q?A1DsBABAZzdblywbGNZbHQIiB4MIJ2V/KIN5gUCHI4teggd?= =?us-ascii?q?1lC8UgWYwB4N6RgKDIiE2FgECAQEBAQEBAhQBAQEBAQYYBkyFQgEBAgMjHQEBO?= =?us-ascii?q?A8JEwMBAgEJDQETAgIPAT8IBhODIAEogT4BAwgQAQEKjzqaWm6CHIJxAQEFfoJ?= =?us-ascii?q?UHC0fgRyBHwcIiG2BVj+BD4Jag00CgS0BEQIBPgwcAoI3glWNNowSCYNagVgiM?= =?us-ascii?q?oVIhQ9Dg0mICYd6gjmJHAOBD3F7CjuCNQEBATEJgimDToRZgQyEcGx5K40zAg0?= =?us-ascii?q?XBIIeAQE?= X-IronPort-AV: E=Sophos; i="5.51,290,1526356800"; d="scan'208,223"; a="314038" Received: from emsm-gh1-uea11.ncsc.mil ([214.29.60.35]) by goalie.tycho.ncsc.mil with ESMTP; 30 Jun 2018 07:23:11 -0400 X-Attachment-Exists: TRUE IronPort-PHdr: =?us-ascii?q?9a23=3A9hOFExPBodAxB+3JegIl6mtUPXoX/o7sNwtQ0K?= =?us-ascii?q?IMzox0Lfn8rarrMEGX3/hxlliBBdydt6oazbKO+4nbGkU4qa6bt34DdJEeHz?= =?us-ascii?q?Qksu4x2zIaPcieFEfgJ+TrZSFpVO5LVVti4m3peRMNQJW2aFLduGC94iAPER?= =?us-ascii?q?vjKwV1Ov71GonPhMiryuy+4ZLebxlJiTanfb9+MAi9oBnMuMURnYZsMLs6xA?= =?us-ascii?q?HTontPdeRWxGdoKkyWkh3h+Mq+/4Nt/jpJtf45+MFOTav1f6IjTbxFFzsmKH?= =?us-ascii?q?w65NfqtRbYUwSC4GYXX3gMnRpJBwjF6wz6Xov0vyDnuOdxxDWWMMvrRr0yRD?= =?us-ascii?q?+s7bpkSAXwhSkaNzA37m/ZhM93jK1ZrhKuqABwzYHPbYGQKfRzZLnQcc8GSW?= =?us-ascii?q?dDWMtaSixPApm7b4sKF+cOP/tYr5P8p1ATsxa+BQ6sBPnpyj9Ph3/2w7c10+?= =?us-ascii?q?I8GgzB3A0gAsgOv2jUrNXyLqcfSv21zKrSzTnZafNZxyv95ZHOfxs8r/+MWr?= =?us-ascii?q?dwftDQyUkpDw7FgVSQqZDlPzOIzesBqXSU7+1lVe+plmUpqBlxryCxyssxhY?= =?us-ascii?q?TFnJwZx1/e+Slnwos5P9K1RUFjbdOgHpZcrTyWO5V3T884QWxlvDw2xqMGtJ?= =?us-ascii?q?O1eiUB1Y4pyATFa/OddoiF+hLjW/iVITd/nH9qdqixiRis/EWu1ODyTNW53E?= =?us-ascii?q?pKoyZfjNbDqHUN1wfc6sSdT/ty5Eah2TKV2wDW6+FEJVg4lavdK5E/3r49jo?= =?us-ascii?q?QfvVnMEyPshkn7g7Waelsm9+Sy5Onqba3qppqGOI91jgH+PL4umsu6AekgMg?= =?us-ascii?q?kOQnKb9vi81L3k5030W6hKjv4skqXDtpDVO9gbqrajAwBJyoYj9wq/DzC+3d?= =?us-ascii?q?QDg3YHKFNFeBSaj4nmIFzOPPD5Auu/g1SrijtrwevGMaf7DpXCKXjDjuSpQb?= =?us-ascii?q?Eo8ENYyQwu3ZgL/J9QC7ccMNrvS0Txs5reFRZ/PAuqlbXJEtJ4g7IDQ2PHKa?= =?us-ascii?q?+eKqXVsEGB4Kp7MvSWb48Soh7gKOJj4fPy2yxq0WQBdLWkiMNEIEuzGe5rdh?= =?us-ascii?q?3DOyjln8sBHGEWvwE3UO3tjhiYXCVOY2qpAP9u2wkXI9mNNa6bHMagjbma02?= =?us-ascii?q?G+F5xSIGVHDgPEHXTpctCcVu0JZTiIJdUp0j8JRPC9TIhpzhSnsAu7g7pqJ+?= =?us-ascii?q?bZ4GsZ4Lr+18Iz4eDPmA=3D=3D?= X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0DuBAAEZzdblywbGNZbHQIiB4MIJ2V?= =?us-ascii?q?/KIN5gUCHI4teggd1lC8UgWYwB4N6RgKDIiE2FgECAQEBAQEBAgETAQEBAQE?= =?us-ascii?q?GGAZMDII1IoJfAQECAyMdAQE4DwkTAwECAQkNARMCAg8BPwgGE4MgASiBPgE?= =?us-ascii?q?DCBABAQqPOppaboIcgnEBAQV+glQcLR+BHIEfBwiIbYFWP4EPglqDTQKBLQE?= =?us-ascii?q?RAgE+DBwCgjeCVY02jBIJg1qBWCIyhUiFD0ODSYgJh3qCOYkcA4EPcXsKO4I?= =?us-ascii?q?1AQEBMQmCKYNOhFmBDIRwbHkrjTMCDRcEgh4BAQ?= X-IPAS-Result: =?us-ascii?q?A0DuBAAEZzdblywbGNZbHQIiB4MIJ2V/KIN5gUCHI4teg?= =?us-ascii?q?gd1lC8UgWYwB4N6RgKDIiE2FgECAQEBAQEBAgETAQEBAQEGGAZMDII1IoJfA?= =?us-ascii?q?QECAyMdAQE4DwkTAwECAQkNARMCAg8BPwgGE4MgASiBPgEDCBABAQqPOppab?= =?us-ascii?q?oIcgnEBAQV+glQcLR+BHIEfBwiIbYFWP4EPglqDTQKBLQERAgE+DBwCgjeCV?= =?us-ascii?q?Y02jBIJg1qBWCIyhUiFD0ODSYgJh3qCOYkcA4EPcXsKO4I1AQEBMQmCKYNOh?= =?us-ascii?q?FmBDIRwbHkrjTMCDRcEgh4BAQ?= X-IronPort-AV: E=Sophos; i="5.51,290,1526342400"; d="scan'208,223"; a="15229725" X-IronPort-Outbreak-Status: No, level 0, Unknown - Unknown Received: from updc3cpa05.eemsg.mail.mil ([214.24.27.44]) by emsm-gh1-uea11.NCSC.MIL with ESMTP; 30 Jun 2018 11:23:10 +0000 X-EEMSG-check-005: 0 X-EEMSG-check-006: 000-001;c8525404-f1b0-4b2d-9a72-faab636540da Received: from localhost.localdomain (localhost [127.0.0.1]) by UPDCF3IC08.oob.disa.mil (Postfix) with SMTP id 41HrjT3J1Bz34qRT for ; Sat, 30 Jun 2018 11:23:09 +0000 (UTC) Received: from UPDC3CPA02.eemsg.mil (unknown [192.168.18.9]) by UPDCF3IC08.oob.disa.mil (Postfix) with ESMTP id 41HrjR1rP8z34qRN for ; Sat, 30 Jun 2018 11:23:07 +0000 (UTC) Authentication-Results: UPDC3CPA02.eemsg.mail.mil; dkim=permerror (key too small) header.i=@ukr.net X-EEMSG-check-008: 232529369|UPDC3CPA02_EEMSG_MP18.csd.disa.mil X-EEMSG-Attachment-filename: 0001-Fix-minor-typos.patch X-EEMSG-Attachment-filesize: 11172 X-EEMSG-check-001: false X-EEMSG-SBRS: 1.9 X-EEMSG-ORIG-IP: 212.42.77.149 X-EEMSG-check-002: true X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: A0AwAgByZDdbd5VNKtRbHgEGDIMfgQx/KIN5gUCHI4teggcRZJQvFIFmMAeDekYCgyIhNBgBAgEBAQEBAQIUAQwHBAkIKSMMhTYBAQEBAyMdAQE4DwkCEQMBAgEJDQETAgIPAT8IBhODISiBPgEDCBEBCo8/mlpughyCcQEBBX6CVBwtH4EcgR8HCIhtgVY/gQ+CWjWDGAKBLQERAgEeIAwcAoI3glWNNowSCYNagVgiMoVIhQ9Dg0mICYd6gjmJFYEZcXsKO4I1AQEBMQmCD4NohFmBDIRwbHkrjTMCDRcEgh4BAQ X-IPAS-Result: A0AwAgByZDdbd5VNKtRbHgEGDIMfgQx/KIN5gUCHI4teggcRZJQvFIFmMAeDekYCgyIhNBgBAgEBAQEBAQIUAQwHBAkIKSMMhTYBAQEBAyMdAQE4DwkCEQMBAgEJDQETAgIPAT8IBhODISiBPgEDCBEBCo8/mlpughyCcQEBBX6CVBwtH4EcgR8HCIhtgVY/gQ+CWjWDGAKBLQERAgEeIAwcAoI3glWNNowSCYNagVgiMoVIhQ9Dg0mICYd6gjmJFYEZcXsKO4I1AQEBMQmCD4NohFmBDIRwbHkrjTMCDRcEgh4BAQ Received: from frv149.fwdcdn.com ([212.42.77.149]) by UPDC3CPA02.eemsg.mail.mil with ESMTP; 30 Jun 2018 11:23:04 +0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ukr.net; s=fsm; h=Content-Transfer-Encoding:Content-Type:MIME-Version:References: In-Reply-To:Message-ID:Date:Subject:To:From:Sender:Reply-To:Cc:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=d+5LhwwxY35fiYUEaAV1hhz4QfNdGhq7w33qJryZhB8=; b=pZME5Fn5z7RWIEPkh/TfhorikN hkxRB5Xt5TCpALdQ8ONt2b31/hTCze1fxmDYZqy1mF3fMapACS9MK7UsgejRh6lj1bB8zkLqTFWx5 e5sqHAAKQSlkwr3tb187J4/2OhizP12yroVfVQcegHgyAIS9Vo47DKNoBtkOnDAr6/HY=; Received: from ip-4ffd.proline.net.ua ([93.126.79.253] helo=localhost.localdomain) by frv149.fwdcdn.com with esmtpsa ID 1fZDy0-000Hbi-Ou for selinux@tycho.nsa.gov; Sat, 30 Jun 2018 14:23:00 +0300 X-EEMSG-check-009: 444-444 From: Yuri Chornoivan To: selinux Date: Sat, 30 Jun 2018 14:22:59 +0300 Message-ID: <4626168.H9xaOJR6cL@localhost.localdomain> Organization: S.P. Timoshenko Institute of Mechanics In-Reply-To: References: <8230410.BG831gSa8N@localhost.localdomain> MIME-Version: 1.0 Authentication-Result: IP=93.126.79.253; mail.from=yurchor@ukr.net; dkim=pass; header.d=ukr.net Subject: Re: [PATCH] Fix minor typos X-BeenThere: selinux@tycho.nsa.gov X-Mailman-Version: 2.1.21 Precedence: list List-Id: "Security-Enhanced Linux \(SELinux\) mailing list" List-Post: List-Help: Errors-To: selinux-bounces@tycho.nsa.gov Sender: "Selinux" X-Virus-Scanned: ClamAV using ClamSMTP субота, 30 червня 2018 р. 12:55:42 EEST ви написали: > On Sat, Jun 30, 2018 at 10:46 AM, Yuri Chornoivan wrote: > > Hi, > > > > Attached is a minor fix for the typos in selinux's git/master. Many thanks > > for fixing them. > > > > The patch is also available here: > > > > https://github.com/fedora-selinux/selinux/pull/52/commits/ > > 7731e8fe46bce06a4915e5b772ce237b3021865b > > Hello, > Your patch does not apply cleanly on > https://github.com/SELinuxProject/selinux master branch because the > typo in libselinux/man/man3/selinux_restorecon_xattr.3 has already > been fixed, with > https://github.com/SELinuxProject/selinux/commit/f42c3d4564322af9d6f573860a1 > 48f07abb36a6f . Otherwise its content looks good to me. Thanks! > > On the way you sent your patch, we prefer inline patches (sent with > "git send-email" for example) and we require a "Signed-off-by:" line > in the description. Could you please update the description, remove > the part which has already been fixed and send this patch again? > > Thanks, > Nicolas Many thanks for your review. The updated patch with a couple more fixes is attached. For some reason, 'git send-mail' does not work for my email provider ("Unable to initialize SMTP properly.", other clients like KMail and Trojita work fine). Sorry. Best regards, Yuri From 5103283629018e7a9e3ebf56b3114a7ba905f925 Mon Sep 17 00:00:00 2001 From: Yuri Chornoivan Date: Sat, 30 Jun 2018 13:51:24 +0300 Subject: [PATCH] Fix minor typos Signed-off-by: Yuri Chornoivan --- gui/html_util.py | 2 +- libselinux/include/selinux/restorecon.h | 4 ++-- libselinux/man/man3/selinux_policy_root.3 | 2 +- libselinux/man/man5/virtual_domain_context.5 | 2 +- libselinux/man/man5/virtual_image_context.5 | 2 +- libselinux/src/selinux_restorecon.c | 2 +- libsemanage/man/man3/semanage_count.3 | 2 +- libsemanage/man/man3/semanage_list.3 | 2 +- libsepol/src/node_record.c | 2 +- mcstrans/man/man8/setrans.conf.8 | 2 +- python/semanage/seobject.py | 2 +- python/sepolicy/sepolicy-interface.8 | 2 +- python/sepolicy/sepolicy/help/system_boot_mode.txt | 2 +- python/sepolicy/sepolicy/manpage.py | 2 +- sandbox/seunshare.8 | 2 +- 15 files changed, 16 insertions(+), 16 deletions(-) diff --git a/gui/html_util.py b/gui/html_util.py index e93c20c7..420f6b96 100644 --- a/gui/html_util.py +++ b/gui/html_util.py @@ -145,7 +145,7 @@ def html_to_text(html, maxcol=80): def html_document(*body_components): '''Wrap the body components in a HTML document structure with a valid header. - Accepts a variable number of arguments of of which canb be: + Accepts a variable number of arguments of which can be: * string * a sequences of strings (tuple or list). * a callable object taking no parameters and returning a string or sequence of strings. diff --git a/libselinux/include/selinux/restorecon.h b/libselinux/include/selinux/restorecon.h index de694cd9..595e7728 100644 --- a/libselinux/include/selinux/restorecon.h +++ b/libselinux/include/selinux/restorecon.h @@ -36,8 +36,8 @@ extern int selinux_restorecon(const char *pathname, */ #define SELINUX_RESTORECON_NOCHANGE 0x0002 /* - * If set set change file label to that in spec file. - * If not only change type component to that in spec file. + * If set, change file label to that in spec file. + * If not, only change type component to that in spec file. */ #define SELINUX_RESTORECON_SET_SPECFILE_CTX 0x0004 /* diff --git a/libselinux/man/man3/selinux_policy_root.3 b/libselinux/man/man3/selinux_policy_root.3 index 63dc9010..75ac8ec0 100644 --- a/libselinux/man/man3/selinux_policy_root.3 +++ b/libselinux/man/man3/selinux_policy_root.3 @@ -18,7 +18,7 @@ reads the contents of the file to determine which policy files should be used for this machine. . .BR selinux_set_policy_root () -sets up all all policy paths based on the alternate root +sets up all policy paths based on the alternate root .I /etc/selinux/config file to determine which policy files should be used for this machine. diff --git a/libselinux/man/man5/virtual_domain_context.5 b/libselinux/man/man5/virtual_domain_context.5 index 2f555a0d..a76fe145 100644 --- a/libselinux/man/man5/virtual_domain_context.5 +++ b/libselinux/man/man5/virtual_domain_context.5 @@ -5,7 +5,7 @@ virtual_domain_context \- The SELinux virtual machine domain context configurati .SH "DESCRIPTION" The .I virtual_domain_context -file contains a list of domain contexts that are available for use by the SELinux-aware virtulization API libvirt (see \fBlibvirtd\fR(8)). +file contains a list of domain contexts that are available for use by the SELinux-aware virtualization API libvirt (see \fBlibvirtd\fR(8)). .sp .BR selinux_virtual_domain_context_path "(3) " will return the active policy path to this file. The default virtual domain context file is: diff --git a/libselinux/man/man5/virtual_image_context.5 b/libselinux/man/man5/virtual_image_context.5 index 04cbd791..df1c0e90 100644 --- a/libselinux/man/man5/virtual_image_context.5 +++ b/libselinux/man/man5/virtual_image_context.5 @@ -5,7 +5,7 @@ virtual_image_context \- The SELinux virtual machine image context configuration .SH "DESCRIPTION" The .I virtual_image_context -file contains a list of image contexts for use by the SELinux-aware virtulization API libvirt (see \fBlibvirtd\fR(8)). +file contains a list of image contexts for use by the SELinux-aware virtualization API libvirt (see \fBlibvirtd\fR(8)). .sp .BR selinux_virtual_image_context_path "(3) " will return the active policy path to this file. The default virtual image context file is: diff --git a/libselinux/src/selinux_restorecon.c b/libselinux/src/selinux_restorecon.c index ced41152..41f22250 100644 --- a/libselinux/src/selinux_restorecon.c +++ b/libselinux/src/selinux_restorecon.c @@ -116,7 +116,7 @@ static pthread_once_t fc_once = PTHREAD_ONCE_INIT; * * check_excluded() - Check if directory/fs is to be excluded when relabeling. * - * file_system_count() - Calculates the the number of files to be processed. + * file_system_count() - Calculates the number of files to be processed. * The count is only used if SELINUX_RESTORECON_PROGRESS * is set and a mass relabel is requested. * diff --git a/libsemanage/man/man3/semanage_count.3 b/libsemanage/man/man3/semanage_count.3 index b865a217..6ff89be3 100644 --- a/libsemanage/man/man3/semanage_count.3 +++ b/libsemanage/man/man3/semanage_count.3 @@ -23,7 +23,7 @@ The count function will return the number of all objects in the selected locatio .B Parameters: The .I handle -is used to track persistent state across semanage calls, and for error reporting. The number of objects will be stored at the location poined by +is used to track persistent state across semanage calls, and for error reporting. The number of objects will be stored at the location pointed by .I response. .TP diff --git a/libsemanage/man/man3/semanage_list.3 b/libsemanage/man/man3/semanage_list.3 index acc161fe..0e1ca7b4 100644 --- a/libsemanage/man/man3/semanage_list.3 +++ b/libsemanage/man/man3/semanage_list.3 @@ -25,7 +25,7 @@ The list function will return an array of all the objects in the selected locati .B Parameters: The .I handle -is used to track persistent state across semanage calls, and for error reporting. The function will allocate and populate the the array of objects, and store it at the location pointed by +is used to track persistent state across semanage calls, and for error reporting. The function will allocate and populate the array of objects, and store it at the location pointed by .I objects. It will write the number of objects at the location pointed by .I count. diff --git a/libsepol/src/node_record.c b/libsepol/src/node_record.c index 6189c312..f3e78ff3 100644 --- a/libsepol/src/node_record.c +++ b/libsepol/src/node_record.c @@ -83,7 +83,7 @@ static int node_parse_addr(sepol_handle_t * handle, } /* Allocates a sufficiently large buffer (addr, addr_sz) - * according the the protocol */ + * according to the protocol */ static int node_alloc_addr(sepol_handle_t * handle, int proto, char **addr, size_t * addr_sz) diff --git a/mcstrans/man/man8/setrans.conf.8 b/mcstrans/man/man8/setrans.conf.8 index dcf29b7d..b7609921 100644 --- a/mcstrans/man/man8/setrans.conf.8 +++ b/mcstrans/man/man8/setrans.conf.8 @@ -59,7 +59,7 @@ defines a translation of s15:c0.c1023 to SystemHigh. c0.c1023 is shorthand for a .TP s0\-s15:c0.c1023=SystemLow\-SystemHigh\fR -defines a range translation of of s0\-s15:c0.c1023 to SystemLow\-SystemHigh. The two range components are separated by a dash. +defines a range translation of s0\-s15:c0.c1023 to SystemLow\-SystemHigh. The two range components are separated by a dash. .TP s0:c0=PatientRecord\fR diff --git a/python/semanage/seobject.py b/python/semanage/seobject.py index d3e14a8b..e5c81a7d 100644 --- a/python/semanage/seobject.py +++ b/python/semanage/seobject.py @@ -2291,7 +2291,7 @@ class fcontextRecords(semanageRecords): raise ValueError(_("Target %s is not valid. Target is not allowed to end with '/'") % target) if substitute != "/" and substitute[-1] == "/": - raise ValueError(_("Substiture %s is not valid. Substitute is not allowed to end with '/'") % substitute) + raise ValueError(_("Substitute %s is not valid. Substitute is not allowed to end with '/'") % substitute) if target in self.equiv.keys(): raise ValueError(_("Equivalence class for %s already exists") % target) diff --git a/python/sepolicy/sepolicy-interface.8 b/python/sepolicy/sepolicy-interface.8 index 02c4c1a5..3e74ea62 100644 --- a/python/sepolicy/sepolicy-interface.8 +++ b/python/sepolicy/sepolicy-interface.8 @@ -31,7 +31,7 @@ List all interfaces List all domains with SELinux user role interface .TP .I \-v, \-\-verbose -Display extended information about the interface including parameters and desctiprion if available. +Display extended information about the interface including parameters and description if available. .SH "AUTHOR" This man page was written by Daniel Walsh diff --git a/python/sepolicy/sepolicy/help/system_boot_mode.txt b/python/sepolicy/sepolicy/help/system_boot_mode.txt index e8482d73..350873d6 100644 --- a/python/sepolicy/sepolicy/help/system_boot_mode.txt +++ b/python/sepolicy/sepolicy/help/system_boot_mode.txt @@ -10,4 +10,4 @@ SELinux Systems can boot in three different modes. You can use this screen to change the enforcing mode. -Note if you disable SELinux, you will need to to reboot, to turn it off. Also the next time you turn SELinux on, a full system relabel will be performed. +Note if you disable SELinux, you will need to reboot, to turn it off. Also the next time you turn SELinux on, a full system relabel will be performed. diff --git a/python/sepolicy/sepolicy/manpage.py b/python/sepolicy/sepolicy/manpage.py index ed8cb71c..cb211ba0 100755 --- a/python/sepolicy/sepolicy/manpage.py +++ b/python/sepolicy/sepolicy/manpage.py @@ -1283,7 +1283,7 @@ USERNAME ALL=(ALL) ROLE=%(user)s_r TYPE=%(user)s_t COMMAND .br sudo will run COMMAND as staff_u:%(user)s_r:%(user)s_t:LEVEL -When using a a non login role, you need to setup SELinux so that your SELinux user can reach %(user)s_r role. +When using a non login role, you need to setup SELinux so that your SELinux user can reach %(user)s_r role. Execute the following to see all of the assigned SELinux roles: diff --git a/sandbox/seunshare.8 b/sandbox/seunshare.8 index 9e105a19..0da35261 100644 --- a/sandbox/seunshare.8 +++ b/sandbox/seunshare.8 @@ -16,7 +16,7 @@ within the specified context, using the alternate home directory and /tmp direct Alternate homedir to be used by the application. Homedir must be owned by the user. .TP \fB\-t\ tmpdir -Use alternate tempory directory to mount on /tmp. tmpdir must be owned by the user. +Use alternate temporary directory to mount on /tmp. tmpdir must be owned by the user. .TP \fB\-C --capabilities\fR Allow apps executed within the namespace to use capabilities. Default is no capabilities. -- 2.13.7