From patchwork Sat Jun 30 08:46:25 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yuri Chornoivan X-Patchwork-Id: 10498075 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id E065C60284 for ; Sat, 30 Jun 2018 08:50:23 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id BD250290D9 for ; Sat, 30 Jun 2018 08:50:23 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id AF6C62925A; Sat, 30 Jun 2018 08:50:23 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-5.1 required=2.0 tests=BAYES_00,DKIM_SIGNED, FREEMAIL_FROM,MAILING_LIST_MULTI,RCVD_IN_DNSWL_MED,T_DKIM_INVALID autolearn=ham version=3.3.1 Received: from upbd19pa10.eemsg.mail.mil (upbd19pa10.eemsg.mail.mil [214.24.27.85]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id D2CE929253 for ; Sat, 30 Jun 2018 08:50:20 +0000 (UTC) X-EEMSG-Attachment-filename: 0001-Fix-minor-typos.patch X-EEMSG-Attachment-filesize: 9397 Received: from emsm-gh1-uea10.ncsc.mil ([214.29.60.2]) by upbd19pa10.eemsg.mail.mil with ESMTP/TLS/AES256-SHA; 30 Jun 2018 08:50:18 +0000 X-Attachment-Exists: TRUE X-IronPort-AV: E=Sophos;i="5.51,289,1526342400"; d="scan'208,223";a="13374715" IronPort-PHdr: =?us-ascii?q?9a23=3A8LaCOxHFq6XuGwRU8Ayg4J1GYnF86YWxBRYc79?= =?us-ascii?q?8ds5kLTJ7+os26bnLW6fgltlLVR4KTs6sC17KI9fi4EUU7or+5+EgYd5JNUx?= =?us-ascii?q?JXwe43pCcHRPC/NEvgMfTxZDY7FskRHHVs/nW8LFQHUJ2mPw6arXK99yMdFQ?= =?us-ascii?q?viPgRpOOv1BpTSj8Oq3Oyu5pHfeQpFiCa8bL9oMBm6sRjau9ULj4dlNqs/0A?= =?us-ascii?q?bCrGFSe+RRy2NoJFaTkAj568yt4pNt8Dletuw4+cJYXqr0Y6o3TbpDDDQ7KG?= =?us-ascii?q?81/9HktQPCTQSU+HQRVHgdnwdSDAjE6BH6WYrxsjf/u+Fg1iSWIdH6QLYpUj?= =?us-ascii?q?us9adrTALjhjkBOTA37WrbjtV8gaNerB+nuhdxwZPbYJuNOfR+YK3Tc9AURW?= =?us-ascii?q?1OUclNWCJPH5u8YokSA+cPI+lYtJLwp14ToxakHwSgGP/jxiFOi3Tr3aM6ye?= =?us-ascii?q?MhEQTe0QMiAtIOqnXUp8jrOacSVuC11q/IzTLCb/NIwzj97pXDfxchoPGRR7?= =?us-ascii?q?J/bcrRyU41Fw7ek1WQqpblMymT1usTr2iW9uxtXv+hhW4grgF+uDmvxsE0h4?= =?us-ascii?q?nGh4IV1lDE9Thiz4ovOdK4T0t7bNi5G5VTryGXL5Z6T8wtTm1yuCs216cKtY?= =?us-ascii?q?C0cSQU0pgr2gbTZviJfoSS/x7vSuecLS16iX9hYr6zmRa//Eamx+bhTMe7yk?= =?us-ascii?q?xKoTBAktTUs3AN0AHc5dafR/tm+0ehxS6P1wfO6uFYOUw0lbTUK5omwrMoip?= =?us-ascii?q?ocq17DHi7rmEXtlqOWd0Mk+uav6+T8fLrpuoWQN5N0iw7iMqQundazAeIkPQ?= =?us-ascii?q?gVQ2eX4+G81Lzn/UHhQbVKiOM5krXBvZzHKskWqbS1Dg9I3oo59RqyACmq3M?= =?us-ascii?q?4FkXUfKVJKYhOHj4znO1HUJ/D4CO+yg0+ynzdvxvDGOKDhA5rUInfYl7fhYL?= =?us-ascii?q?B95FJCxwoo1t1f+5JVBa0BIPL0QEPxssfYAQUjPwy7xObnFs1x1pkCVmKXHq?= =?us-ascii?q?+ZLKTSvEeK5uIoJemDfpMVuDbnJPgj/PPuj3g5mVkYfaazxpsXdG63Hu59I0?= =?us-ascii?q?mDZnrsmNgBG38QvgUiVOzqlEGCUTlLanawXaIz/C00CIG9DYfEQICtgaKB0T?= =?us-ascii?q?y1Hp1Se2BHBUuDEWrud4WYRvcAciWSItVukjYcT7iuV5ch1Q2ytA/907dmLv?= =?us-ascii?q?fU+jcEupLj09h1/fbelQwx9TxuFcid1X+CT31slGMSWzA2xLx/oVB6ylqbya?= =?us-ascii?q?h3nedXGsJV5/NITgc6MoXRz+1kBN/sRA3NZNCJSEypQt++GzE+Usoxw8MSY0?= =?us-ascii?q?Z6A9itkxfD3yysA7AIibOLAJ00/7nG0HfvPcZ9zGzK1K47j1kpWsFPL3Gphr?= =?us-ascii?q?Zj9wjPAI7Ei1iWl7qweqQGxyPC6GCDzW+Ss05CSw5wTb/JXXYBaUvKtd75/F?= =?us-ascii?q?/NT6eyCbQ7NQtM0c+CKq1WatL3iVVJWvLjN8rCY2Krm2a9HhGIxquSY4rsfm?= =?us-ascii?q?USxiTdCEwfnAAU8neKLw8+Bj2uo2jGFjxhCUrvY1/w8el5sH60UFc0wBuQb0?= =?us-ascii?q?1gzLq44QYViuaGS/MSxbIEoCMhpC9oE1mjxd7WDMCApwV5dqVGfdw9+EtH1X?= =?us-ascii?q?7etwFlMJ2gLqRihlsAfARtpE7u2Qt4BZhHkcgwtnwq1BByKaWa0FxfazyYwY?= =?us-ascii?q?r8OrrNKmn95BqvcbLZ2knC0NaK/acC8Po4q0/5swGvCkUi8m5n3sJQ03uE55?= =?us-ascii?q?XGFRESUJzqUkot8Bh6vb7aaDEn54zIzX1sLbW0sjja1tIqHuQlyRGgf8pEPa?= =?us-ascii?q?OHDgDyEMoaB9W0JOwtgVipYQoOPPpO+64sI8Oma/yG1baxM+l9hjKmjHpI4J?= =?us-ascii?q?pm302W6yV8T/TE35Efw/GXxgGHTSvzjE+9ssDrnoBJfS0dEXC7ySf6H45Req?= =?us-ascii?q?1zfYEQBGe1P8K3x8txh5jxW35Z7lGvHVUG19G1eRCKdVzywRVQ1VgLoXyggS?= =?us-ascii?q?a41SF7nCwyo6qQ2SzPzP7udBwZNW5XXGNil0vjIZCoj9AGW0ildxMplBW/5U?= =?us-ascii?q?b93KhbuL9yL3LVQUdPcSn2KnttUq2qurqEfcFP9IsisT9LX+SkfVCaVrn9rg?= =?us-ascii?q?MU0iz5G2te2C40dyuxupjigRx1lnidI21urHrcY81wwg3f5NPET/5LwjUGXD?= =?us-ascii?q?V4iSXQBlWkOdmp/NGUl5PdveClTG+uTINccTPszY+asyu7/2JqCwWln/+vgt?= =?us-ascii?q?3nDRQ60Sjj2tl0VCXHsAr8Yo7x16igLe1nfk5oBFnz68dhHoF+k40wi4sK2X?= =?us-ascii?q?gdnJmV+mAHkWjrO9VBxa3+dGYNRSIMw9PN5Ajl2VZjLm6Qy4LiSHqdxsphZ9?= =?us-ascii?q?+nYmIZwS899NhKCKaS7LxFgSR1uUC0rQTPbvhhhj0d0+ch6GYGg+EVvwog1j?= =?us-ascii?q?+dArcWHUlcIyPsjQiH79ewrahMf2avbKS/1FFkkdCmFrGCrRlWWGzldZc6AS?= =?us-ascii?q?9w8sJ/PUrP0HLt7IHkY8LdbdENuR2SiBfAifZaKI4rmvoNnypnNnr3vWc5xO?= =?us-ascii?q?4jkRxuwZa6sZCfK2p34aK5BgBXNiXvaMMV5jHik7xek92L34C0AJphAC4LUI?= =?us-ascii?q?HzTfKvDTISr+joOBiAED07sHebFqTQERWZ6Eh4s3LFC4qrOG2PJHkF0dViQw?= =?us-ascii?q?GQJFJZgA8JRzg6gJg5GR2qxMD7dkd2+CwR7EbiqhRQ0uJoKwX/UmDHqQewcD?= =?us-ascii?q?g0VZyfIQFK4QFD+0fUMdWS7uxpECFe5JGhqxaNKmODbQRSEW4JQlCEB0zkPr?= =?us-ascii?q?S25tnB8+yYCfSlIvvLZrWOp+JeWOmUxZKz0otm+DOMOduVMnlkEfI7xlJJXW?= =?us-ascii?q?plFMTBhzUPVysXmjrDb8GBohe85ip3rsWk/fTlRg3g+IyPC6FIPtV34RC2hq?= =?us-ascii?q?WDOPCMiyZlMzpY0YkMxXDQwrgFwFESkz1udyWqEbkYuy7NVrzflbJMDxEBbS?= =?us-ascii?q?NzKMxI77kn0wZXJcHbj8n51rlijv46E11FT0Dumtm1ZcwWJGGwLEjIC12MOL?= =?us-ascii?q?SCJD3L2N33YbimRb1Lkupbqwe8uS2FHE/nPzSDkSTpVh+0PO5QjCCbJgFeuJ?= =?us-ascii?q?qnfhdjE2fjUMnmahq9MNNtij0227I0jGvQNWEAKTh8b19NrrqI4CxDg/V/FG?= =?us-ascii?q?tB7nx+IOaZhSmW9OjYJYwQsfdxBSR0je1a6mwgy7RJ9CFEWOB1mCzKo9F0rF?= =?us-ascii?q?GpiPePxSR8XRpJsjZEmoSLvUB4NqXY8plPQnHE/R0X4WWXERQKqMNvCsfztK?= =?us-ascii?q?BI1tjPiKXzJS9e89LT+MsQHdLUKMWGMXU/NxrmAyTUDAwbQj6oLmzQm0tdkP?= =?us-ascii?q?SO+XKPtZg6toLgmJwQRb9HTFY1DO8VClx5HNweJ5d6RjEkkb6bjc4Q4nq+qB?= =?us-ascii?q?jRRNlEsZ3cU/KSAOnvKCyHgrVeYBsI27z4J5wJNoLnw0xidkV6nIPSFkrWQ9?= =?us-ascii?q?9CuClhYxQ3oEVK63h+Unc820T+agOu4X8fD/i0kQAqigFme+Qi6C/s40srJl?= =?us-ascii?q?rNvCYwilc+mc77jj+Laj7+MKewUJpNBCr1rUg+L5T7QwhtbQ2og0NlNC3IR7?= =?us-ascii?q?RPgLt8bWprkhPTuYNTGf5ASq1JeAIfyuuJZ/UpzFtcsT6qylVd5evfDptjmh?= =?us-ascii?q?AqfoCwoHJdwQJjbcI1JKzKKKpP0FdQmrqEvjW02eAp3A8eO0EN/XuWeC4Pok?= =?us-ascii?q?wHKL8mJiuv/uF35gyCnSZDdHILV/owrfJg7lk9NPiYzyL8z75DLVi8N/eBIK?= =?us-ascii?q?OdumjAk9OIQ1wr20wUkElF+KR53t04c0qITUwvyqWeFwgRP8rYNQ5Vd9ZS9G?= =?us-ascii?q?TUfSuWrOrC3Zd1P4K7FuD0UOODr7gUjVy+HAYoHoUM6cIBEoOq0E7GMcftNK?= =?us-ascii?q?QFxgk15AT3OFWFC+xEeA6KkDcCpMG/0J933IlGKz4AAGV8MT+46a3Nqg8snv?= =?us-ascii?q?WDQM88Ym0GUYscKnI2RMq6ljZDsHREDTm4zvwWxxCH7z78oCTQCz/8YMB4af?= =?us-ascii?q?iPZBNjEte29Swx86irk1LX9IvRJ33iP9R4ptDP8f8ap4qAC/5MVrZyrUHclp?= =?us-ascii?q?JCSHO3TW7AD8S1J4PqZIk2bd34EHG6UkawizgtVcf+IM6tLrSUgQHvXYtUqo?= =?us-ascii?q?+b3DE/Os+9ETEeHwxwqfka6qxhfwMOf501bAX0uAQ5MqywPB2X0s6yQ2q3Lz?= =?us-ascii?q?tZUeVfx/2gZ7NL1yoscvO6yHw4Q54mzem461ICSYoWgRHZwfajY4heXjbpGn?= =?us-ascii?q?xBZQrAuSo5m3JmNuYozec12AnIvkUEMzCXaOxpb3RJv8smClOIJnV5EXE1R0?= =?us-ascii?q?OGjYXZ/A6jwbQS/ypbn9Zb1e1FsXf+vp/DYDKiQqOrs5DVvzAmbdc4v617KZ?= =?us-ascii?q?bjLdeetJPCgjzfS4HdswOfXCGmF/pam91QICNCT/lLgmwlONIJtpRf5kYrUc?= =?us-ascii?q?c+PbNPArE2pr+2cTpkETISzSgBWoOFxjMCmOS81KXGlheRdpQiPwcJsZtYjd?= =?us-ascii?q?sbTyF2ZiQepLK+WIXNjWOETHYEIBsL5wRW+A0AjpNwfvzi4IfQVJ9MzDpWrO?= =?us-ascii?q?huUirFEZlo81X7R3qTgVj/T/WhiPKm0h5IzPLrydkbQx9/CU5Sx+pMkUsoMr?= =?us-ascii?q?53IbEKvoHWqj+IaV/6vGX1xeS8PllR1MvUe0f7DIfetGr8Uywc+WEPSoNVzn?= =?us-ascii?q?HQC4gSmRJjaKk3vFVMPJymekHm6jw4wIRpGqK1Vdy3y1YgtnkKXSGqHMRdC+?= =?us-ascii?q?t+qlLYRCVlY4y3qJXiI5hSQGhQ94OGplhEjkptKDC2yYBAK85T/zEARj5Pri?= =?us-ascii?q?uBvNGqUs1Mxdd2D4MQItd4o3r9BL5LN4WQo3Isvrzi0WPW+zc5sFim3jqzAL?= =?us-ascii?q?O4Q/hf/2IABgUjP36epVU3D+sw7mfS9UjAvUt6/+hHGrSCj1h9rThmE59SAT?= =?us-ascii?q?ZJ0GyqIE5oTHlaqelaLrrac9BESfkoeRCvIwA+FeIh30GR50F7g2r2YyxouQ?= =?us-ascii?q?tG4C3dWw40VTcLjbvzhTIerdyoNiEAR5JOczohcz/PKxiHliBPoBZfd0ZqVo?= =?us-ascii?q?gBAtZe57EUx5Zb/tbZREa3LiEFQQZiOR4m3vpZiU5Dql+XeSTHAQqvb/bPvQ?= =?us-ascii?q?V9fd2No86xMPT54ABHh5v7sOAi6aoMWWCplBawQdDas4/8rMeFtlWPdKf/N+?= =?us-ascii?q?2zf2PBQCLLjRCqircuF4PK8DTLMApHN5l6zmIpYZ37Bm7PORRJOb4bJ1ZBWq?= =?us-ascii?q?9gcthGpP5VZ9N/eKkV46BtHgyISgnpGIOxsPlMNkzTSijGLyWd7uy/ppre7b?= =?us-ascii?q?7HRuj6YcyM3HLHTLhpPpph7Dn7BrPq0ZNf+kXq2/di7EV6SUPcPyCGttThKR?= =?us-ascii?q?sB5NO+eUv6op0pATTWDY9ykHX3wEFAedAXQyq3/5sG055Z9Gz/SeRj0kj0qu?= =?us-ascii?q?FS8adr6ZUv6bBz1ci0PbvSKehdsUJ/DRiUGwRq9pEpAGdhQmBcefIeJ+nKcq?= =?us-ascii?q?QYl8/urfr7F6sN6B2a4+ZZc8fIJ1ndmsmjDTGRUR5EnAYEqTMBKwuTyf6ElL?= =?us-ascii?q?FuScako+j51Vgh416gIR4a1Lpt/5uL+rKUpO/LaBvc1b4EWqzxS8PyqLQsvl?= =?us-ascii?q?me5fwilL4AYGx6eRanEPQHVs4A2mjg0b0qzTgyHM/ZGLLg4vFDXWojnj38g5?= =?us-ascii?q?B9A0kWGvQMELqO+oRemHs4m+PHOdANd6BCm3yAFRi6Hb8ex3+r7DGXIGp+gh?= =?us-ascii?q?3U1RH/X3+z5kfsrSBkWSvM08vjkk1NW7mzHkdSWiqkNFR2sDyRIQXos8D3tr?= =?us-ascii?q?4t7EEsNWzktsyCm3e9OL9NGM3/PtOcKzEupF0LlJ0xWsCv2YcDFNq8IdYe6m?= =?us-ascii?q?txYefF5mOwjSBBv7lIiJbE7sGS4PXXEmGqj7eGpLWV2DBY1n84sEkk5dChLf?= =?us-ascii?q?HP6ceFQ/ap12YNVydwoRbBXxqup7PHqFAbJFKE313WmIwQOdFZx2M32lvh5O?= =?us-ascii?q?g5T9I57B9eGZrYZ/MeuTDzPyP5wU6FbNIrSiae0zVWHlXvEVl7AaQ8w3z/vM?= =?us-ascii?q?bIlXfW5l0pSZJ9d1T9ihxrE4o4KUws6F8NwioACwQNag6UDKuuBUv7KYsIT0?= =?us-ascii?q?8DaQ6I3LKiYKc4wVVzwq+z5O/UdeF8CLACNuxDgQ6SnFhWAZYWsawCQL1ie1?= =?us-ascii?q?9S7rPXphP4B4jhQffmiWI6NeepTcBC7cAZq3wi7x6wRxW+75dD87EbiJePeq?= =?us-ascii?q?5ff5fMuMF870F65T8AbSFNhAZwjwm5UO8Gvuzj5MbUsIaw4Oa0SKktX/kX9w?= =?us-ascii?q?QzB2lmiZvwgUwsodbT1+hGUY3Zk4X/8AdKI36Ro4bXyBx8JOUBKo6xe7Zg7X?= =?us-ascii?q?oHLTAEJ30SJdqWd+U84yh1PTXc+1NCGdgMacoFMsTCnw5Ui0vpWKxc98fAFV?= =?us-ascii?q?+YDp18d8Y24GbtzzA165Q8WP766DCqPZDf801NP/RbgSVuk9LCpO4VzeDOBy?= =?us-ascii?q?gX5XmZdgV6wyKDy5mLEPbw/uSMxcrKV1MHAC45SYNdKyeD+QC9QOq6ionpWB?= =?us-ascii?q?uO6sDvmJI+aF6QRnupkaQErKZDC+hAhz7/3jhDC4/1hvWVs8G25GtQrF1HH5?= =?us-ascii?q?557QfZF6VHIpV7JRP4m9GpRkdiCCv/dsXUewEgueWMwOcD/fl+O1H4ZYAFPh?= =?us-ascii?q?IO06j65mZNTgtyVL72uU6UXe0VZNthRvLLsHRV6YZ7Jq8UO1idop3qoStSpF?= =?us-ascii?q?AwHgApdKc6riZGeUnWgA1VR6H0taYFigsdUt55ukhMFHmyOG0k5DrHUqJVg7?= =?us-ascii?q?eXCPAP9DWcULAOWV1yMixiWxO1xIlue7yxkP9crGxGmD99reMx0zxiQxu8pT?= =?us-ascii?q?Hsp7wT1j094r24sy8BuXNdROWEjyjIEUlDzOgNjaoEBXbt91i8YHgbbITs+7?= =?us-ascii?q?RmJMXg9Ywk43shexUjezMJUf6nCyHqgKOCGpaPv85EhB6RpMXOaqe+LCYKNr?= =?us-ascii?q?QnyBLsW2Zy3xPbnBZp7GsLWCuv4MUjJIWnNsYv3jCoFnTDdFYQ/qNJt9P8tV?= =?us-ascii?q?kPTOQocl5h2GFj3dKcRi0RRczAB3o1jhI6Zmpaap5D7wEVF7UwiDaSoqZG5h?= =?us-ascii?q?0UYCvTEom9/onQnMHI2WQyTNtzwmLWp7aFho8x0HB+mtN79CiOuHMIe+zfSc?= =?us-ascii?q?9sDWD51p1Dxuzme/WtrucHRZNjyLu7TPACMsij+W2x2JhxRE+lx7IeEES9MO?= =?us-ascii?q?8CwLfbTiikRXefWeSRfGiGhyw5PVLq5Rm0Ml03b99Hr00nPevBgZ5TjBbsUa?= =?us-ascii?q?5yRiWMpV/by3EjMewadwIqoounfRIFTPIJbeiGOecu2OE+CEcLb3LRHyt2Du?= =?us-ascii?q?i2sUS3nIh6IHVt+kP6bv7o8g/4MdueAB4EEZTVrpRp4/y1WnqBOWN8zB11JE?= =?us-ascii?q?R07OnfF1EtueJdcJuchsbQiMph0e4EdvZtNis9tsQVmo199YnHmPuNJArcyp?= =?us-ascii?q?f0OMH9vumTA/qZyV8jPG5dTOk3ewTwsrQnJN9xcL3UB71evAoVA+BuUYE7PG?= =?us-ascii?q?f27olpLxk1dAPNMufnyvL2r/6GM8MH70Td6Ug9eWKC4UdRw+GoTQF9c5Ghjm?= =?us-ascii?q?nzJ5Z1XD9astlxEUE+QdlSEMQE9lu/CsbE3qy2jsS+vUZzuutMtKv0WZWonM?= =?us-ascii?q?+h0dBXWJ5XrVeOIC6XHLNi11V4lO+yhe3oz5rrT8XvZYBMT/B1F1bMcaSOBY?= =?us-ascii?q?CjMnSLM8P4dVRB9uuNzahyUhKLTD36ReyAuTH3UZcs+l01n6p/eueb1zkx9/?= =?us-ascii?q?fb1d/1MnlcvTumpGWVOYF34kbUXLGBGRxLRfGJ9iBuGqhECOm8+OQPNIk6yc?= =?us-ascii?q?OHq0lo7TtE2deYOaXpsELW20x6eJ6aZEvk0io0Q88LdTyiMlFqh2LFpw=3D?= =?us-ascii?q?=3D?= X-IPAS-Result: =?us-ascii?q?A2DDBwAARDdb/wHyM5BaHgEGDIMfJ1oLbRIog3mBQIcjj?= =?us-ascii?q?lqULBSBYicLCYQ7AwKDRTUXAQIBAQEBAQECAWwcDII1JIJdAQMEAiAdAQEMI?= =?us-ascii?q?AwCAwkCGwMBAgoNAQ8EAgIDAQsBIRUJFgsFGASDACiBPgEDCA0DAQEKqkpug?= =?us-ascii?q?hyCcQEBBX6CVRwtH4EcgR8HCIpDP4EPglqDTQKBLQESAT8MHAKCN4JVjQorj?= =?us-ascii?q?BAJg1qBWCIxhUiFUYtOAYowiRMBNiY7cXsKO4I1AQEBMQmCD4NohFmBDIRwb?= =?us-ascii?q?HkDKI0nDReCIgEB?= Received: from tarius.tycho.ncsc.mil (HELO tarius.infosec.tycho.ncsc.mil) ([144.51.242.1]) by EMSM-GH1-UEA10.NCSC.MIL with ESMTP; 30 Jun 2018 08:50:16 +0000 Received: from prometheus.infosec.tycho.ncsc.mil (prometheus.infosec.tycho.ncsc.mil [192.168.25.40]) by tarius.infosec.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id w5U8n7rS015614; Sat, 30 Jun 2018 04:49:25 -0400 Received: from tarius.infosec.tycho.ncsc.mil (tarius.infosec.tycho.ncsc.mil [144.51.242.1]) by prometheus.infosec.tycho.ncsc.mil (8.15.2/8.15.2) with ESMTP id w5U8mwhR022366 for ; Sat, 30 Jun 2018 04:48:58 -0400 Received: from goalie.tycho.ncsc.mil (goalie.infosec.tycho.ncsc.mil [144.51.242.250]) by tarius.infosec.tycho.ncsc.mil (8.14.4/8.14.4) with ESMTP id w5U8n4xF015612 for ; Sat, 30 Jun 2018 04:49:05 -0400 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A1CaBwD/Qjdbly0YGNZaHQEBGAoBBgGDB?= =?us-ascii?q?ydaC38og3mBQIcji16CfJQsgXouCYRAgyQhNhYBAgEBAQEBAQIUAQEBAQEGGAZ?= =?us-ascii?q?MhUIBKR0BATgrAwECCg0BEwIRAT8hgyABKIE+AQMIEAEBCqpJboIcgnEBAQV+g?= =?us-ascii?q?lUcLR+BHIEfBwiIbYFWP4EPglqDTQKCAAwcAoI3glWNNYwQCYNagVgiMYVIhVG?= =?us-ascii?q?LT4owiRkLTIEsewo7gjUBAQExCYIpg06EWYEMhHBseSuNJw0XgiIBAQ?= X-IPAS-Result: =?us-ascii?q?A1CaBwD/Qjdbly0YGNZaHQEBGAoBBgGDBydaC38og3mBQIc?= =?us-ascii?q?ji16CfJQsgXouCYRAgyQhNhYBAgEBAQEBAQIUAQEBAQEGGAZMhUIBKR0BATgrA?= =?us-ascii?q?wECCg0BEwIRAT8hgyABKIE+AQMIEAEBCqpJboIcgnEBAQV+glUcLR+BHIEfBwi?= =?us-ascii?q?IbYFWP4EPglqDTQKCAAwcAoI3glWNNYwQCYNagVgiMYVIhVGLT4owiRkLTIEse?= =?us-ascii?q?wo7gjUBAQExCYIpg06EWYEMhHBseSuNJw0XgiIBAQ?= X-IronPort-AV: E=Sophos; i="5.51,289,1526356800"; d="scan'208,223"; a="314014" Received: from emsm-gh1-uea10.ncsc.mil ([214.29.60.34]) by goalie.tycho.ncsc.mil with ESMTP; 30 Jun 2018 04:49:03 -0400 X-Attachment-Exists: TRUE IronPort-PHdr: =?us-ascii?q?9a23=3A1pFa+Rw+Wu0UikPXCy+O+j09IxM/srCxBDY+r6?= =?us-ascii?q?Qd1O4VIJqq85mqBkHD//Il1AaPAd2Fraocw8Pt8InYEVQa5piAtH1QOLdtbD?= =?us-ascii?q?Qizfssogo7HcSeAlf6JvO5JwYzHcBFSUM3tyrjaRsdF8nxfUDdrWOv5jAOBB?= =?us-ascii?q?r/KRB1JuPoEYLOksi7ze+/94HSbglSmDaxfa55IQmrownWqsQYm5ZpJLwryh?= =?us-ascii?q?vOrHtIeuBWyn1tKFmOgRvy5dq+8YB6/ShItP0v68BPUaPhf6QlVrNYFygpM3?= =?us-ascii?q?o05MLwqxbOSxaE62YGXWUXlhpIBBXF7A3/U5zsvCb2qvZx1S+HNsDwULs6Wy?= =?us-ascii?q?mt771zRRH1iCkJKTA3/mLQisN/kK1VrwmspxlizYPOeoyZKOZycr3bcNgHRW?= =?us-ascii?q?RBRMFRVylZD4y+cosPFesBNvtGoon9oFsOtx2+BQ6tBOPx0DBIgGL90Ko60u?= =?us-ascii?q?Q8CwHJwAwgH9UUsHnPsdX1N70SXfqzzKbW0TXOdvVb0irz5ojPdxAuu/CMXb?= =?us-ascii?q?RofMreyEkvCwPFjkiLpoD/IzyV0eENvm6G5ORjTeKik3Arpxx+rzS12MshhZ?= =?us-ascii?q?PFipwax1ze+ih0wJ45KNm2RUJhfNKoDppduzuYOoZyWM8uXWFltSg8x7Ybo5?= =?us-ascii?q?C0ZjIKx44ixxPHa/yIbYyI4hX7WemfPzp2nXRrdbyhihio7UWs1u/xWtOq31?= =?us-ascii?q?lUqypFidbMumoI1xPJ68iHTuFx/kKg2TaLzwzT6+dELl4olafDNZIt37E9mo?= =?us-ascii?q?ANvUnMBCP6hkr7gLWZe0gk4uSo7v7oYrTipp+SLY90jQT+P7wum8yiG+Q3Lg?= =?us-ascii?q?gOX2+B+emnyb3j/lf5TK9MjvIojqnVqIraKtgDpq6lHw9V1Z4u6w2hADei0d?= =?us-ascii?q?QYm2QHLV1edRKbj4nmJ1HOIPfiAfe5mFSjii1nx//BPr3/Ud3xKS3YnbPge6?= =?us-ascii?q?ttw1JNwwo0i9ZE7tRbDa9SDuj0XxrAqcbZRjQ5NBayxOf5AdM1gpIDQ2mPBb?= =?us-ascii?q?WxLaDI91mF+rR8cKG3eIYJtWOleLAe7Pn0gCphwwVPdLS13ZYRdHGzF+hnJE?= =?us-ascii?q?Pce3f3n9MdCj5b71gjR+vu0QyaWGYDIXu/WrkzoDQyCYbgCIbHFci2mLLU+i?= =?us-ascii?q?C9E9VNY3xeTEiWGCL5ap+PW/AWQD+ROIlnnyBXHaO5RdoZ3Aq1/BT/16IhK+?= =?us-ascii?q?PV/iMCspe2xcVv7O3Ujzkv9iYyCcmBgCmWV28huGQOSnct2bxn50xwzlDWya?= =?us-ascii?q?9jn/lRDsBe/dtHSBljaMGawfN2ANz0HAnGe4TBRFWnR4C+CCoqBpIqwtAIal?= =?us-ascii?q?pgAdjqkB3Z3iSrDrNU37yGDZA56OTdilDsJNw7zXva2Q=3D=3D?= X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0CdBwDKQjdbly0YGNZaHQEBGAoBBgG?= =?us-ascii?q?DBydaC38og3mBQIcji16CfJQsgXouCYRAgyQhNhYBAgEBAQEBAQIBEwEBAQE?= =?us-ascii?q?BBhgGTAyCNSKCXwEpHQEBOCsDAQIKDQETAhEBPyGDIAEogT4BAwgQAQEKqkt?= =?us-ascii?q?ughyCcQEBBX6CVRwtH4EcgR8HCIhtgVY/gQ+CWoNNAoIADBwCgjeCVY01jBA?= =?us-ascii?q?Jg1qBWCIxhUiFUYtPijCJGQtMgSx7CjuCNQEBATEJgimDToRZgQyEcGx5K40?= =?us-ascii?q?nDReCIgEB?= X-IPAS-Result: =?us-ascii?q?A0CdBwDKQjdbly0YGNZaHQEBGAoBBgGDBydaC38og3mBQ?= =?us-ascii?q?Icji16CfJQsgXouCYRAgyQhNhYBAgEBAQEBAQIBEwEBAQEBBhgGTAyCNSKCX?= =?us-ascii?q?wEpHQEBOCsDAQIKDQETAhEBPyGDIAEogT4BAwgQAQEKqktughyCcQEBBX6CV?= =?us-ascii?q?RwtH4EcgR8HCIhtgVY/gQ+CWoNNAoIADBwCgjeCVY01jBAJg1qBWCIxhUiFU?= =?us-ascii?q?YtPijCJGQtMgSx7CjuCNQEBATEJgimDToRZgQyEcGx5K40nDReCIgEB?= X-IronPort-AV: E=Sophos; i="5.51,289,1526342400"; d="scan'208,223"; a="13374713" X-IronPort-Outbreak-Status: No, level 0, Unknown - Unknown Received: from ucol3cpa07.eemsg.mail.mil ([214.24.24.45]) by EMSM-GH1-UEA10.NCSC.MIL with ESMTP; 30 Jun 2018 08:49:02 +0000 X-EEMSG-check-005: 0 X-EEMSG-check-006: 000-001;7cc8dc7c-ae16-40f7-8c10-2143a27caac0 Authentication-Results: ucol19pa08.eemsg.mail.mil; spf=None smtp.pra=yurchor@ukr.net; spf=Pass smtp.mailfrom=yurchor@ukr.net; spf=None smtp.helo=postmaster@frv157.fwdcdn.com; dkim=pass (signature verified) header.i=@ukr.net X-EEMSG-check-008: 145773462|UCOL19PA08_EEMSG_MP6.csd.disa.mil X-EEMSG-Attachment-filename: 0001-Fix-minor-typos.patch X-EEMSG-Attachment-filesize: 9397 X-EEMSG-check-001: false X-EEMSG-SBRS: 0.0 X-EEMSG-ORIG-IP: 212.42.77.157 X-EEMSG-check-002: true IronPort-PHdr: =?us-ascii?q?9a23=3AWOfFkRfZSE7pPCvSB78eu6WtlGMj4u6mDksu8pMi?= =?us-ascii?q?zoh2WeGdxc28ZR7h7PlgxGXEQZ/co6odzbGJ4+a9AidZvN6oizMrTt9lb1c9k8?= =?us-ascii?q?IYnggtUoauKHbQC7rUVRE8B9lIT1R//nu2YgB/Ecf6YEDO8DXptWZBUka3CQ0g?= =?us-ascii?q?PenxG4jPn+yrxuuy/NvVeAwOiz2jMp1oKxDjnBjLt4E9gYx4LKEw1BLP6i9ZZv?= =?us-ascii?q?5dxWRyDU+QhVD669vmr80ryDhZp/90r50Iaq79ZaltFeUJXgRjCHg84YjQjTeG?= =?us-ascii?q?SAKO4nUGVWBHwAdLGU7D4Q2oB86t4Bu/jfJ03WyhBeOzVao9CGa/7L0tThL02n?= =?us-ascii?q?9eamwJtVrPg8k1t5p15RKsoxsmktzaep/MaaU4cLzRdt8cA2FGW5QJWg=3D=3D?= X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0BtEgBlQzdbZJ1NKtRaHgEGDIMfKiEBN?= =?us-ascii?q?Qt/KIN5gUCHI4teghhklCyBehAeCYRAgyQZBwEEMRcBAgEBAQEBAQEBAQQcBwQ?= =?us-ascii?q?JBisjDII1IoJfASkdAQE4KwMBAgoNARMCEQE/IYMhKIE+AQMIEQEKqklughyCc?= =?us-ascii?q?QEBBX6CVRwtH4EcgR8HCIhtgVY/gQ+CWoNNAoIADBwCgjeCVY01jBAJg1qBWCI?= =?us-ascii?q?xhUiFUYtOAYowiRQBW4Esewo7gjUBAQExCYIPg2iEWYEMhHBseSuNJw0XgiIBA?= =?us-ascii?q?Q?= X-IPAS-Result: =?us-ascii?q?A0BtEgBlQzdbZJ1NKtRaHgEGDIMfKiEBNQt/KIN5gUCHI4t?= =?us-ascii?q?eghhklCyBehAeCYRAgyQZBwEEMRcBAgEBAQEBAQEBAQQcBwQJBisjDII1IoJfA?= =?us-ascii?q?SkdAQE4KwMBAgoNARMCEQE/IYMhKIE+AQMIEQEKqklughyCcQEBBX6CVRwtH4E?= =?us-ascii?q?cgR8HCIhtgVY/gQ+CWoNNAoIADBwCgjeCVY01jBAJg1qBWCIxhUiFUYtOAYowi?= =?us-ascii?q?RQBW4Esewo7gjUBAQExCYIPg2iEWYEMhHBseSuNJw0XgiIBAQ?= Received: from frv157.fwdcdn.com ([212.42.77.157]) by ucol19pa08.eemsg.mail.mil with ESMTP; 30 Jun 2018 08:48:57 +0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=ukr.net; s=fsm; h=Content-Transfer-Encoding:Content-Type:MIME-Version:Message-ID:Date: Subject:To:From:Sender:Reply-To:Cc:Content-ID:Content-Description:Resent-Date :Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To: References:List-Id:List-Help:List-Unsubscribe:List-Subscribe:List-Post: List-Owner:List-Archive; bh=HjRqBEF0iDKXjCcfDeufUSCgipY5a30LVLzc2FdF+hg=; b=F BGh+t1FcXnMmBIMnTCRNKXn9D6dBSGoIDpQEOgxQ/+tUJ0oeVio5B2zFVnmXWFW1IYsSlO/D4OgJd ODLxLEEHZI5o537GSAp5aNXNbMVekFR6mPzXhVaHAjXmYVI47CtNQ3LCBQV1hKiOG4m0sOrajkIdN MzAWSoZZmnOjsux8=; Received: from ip-4ffd.proline.net.ua ([93.126.79.253] helo=localhost.localdomain) by frv157.fwdcdn.com with esmtpsa ID 1fZBWT-0006JF-Qw for selinux@tycho.nsa.gov; Sat, 30 Jun 2018 11:46:25 +0300 X-EEMSG-check-009: 444-444 From: Yuri Chornoivan To: selinux@tycho.nsa.gov Date: Sat, 30 Jun 2018 11:46:25 +0300 Message-ID: <8230410.BG831gSa8N@localhost.localdomain> Organization: S.P. Timoshenko Institute of Mechanics MIME-Version: 1.0 Authentication-Result: IP=93.126.79.253; mail.from=yurchor@ukr.net; dkim=pass; header.d=ukr.net Subject: [PATCH] Fix minor typos X-BeenThere: selinux@tycho.nsa.gov X-Mailman-Version: 2.1.21 Precedence: list List-Id: "Security-Enhanced Linux \(SELinux\) mailing list" List-Post: List-Help: Errors-To: selinux-bounces@tycho.nsa.gov Sender: "Selinux" X-Virus-Scanned: ClamAV using ClamSMTP Hi, Attached is a minor fix for the typos in selinux's git/master. Many thanks for fixing them. The patch is also available here: https://github.com/fedora-selinux/selinux/pull/52/commits/ 7731e8fe46bce06a4915e5b772ce237b3021865b Best regards, Yuri From 7731e8fe46bce06a4915e5b772ce237b3021865b Mon Sep 17 00:00:00 2001 From: Yuri Chornoivan Date: Sat, 30 Jun 2018 11:33:23 +0300 Subject: [PATCH] Fix minor typos --- gui/html_util.py | 2 +- libselinux/include/selinux/restorecon.h | 4 ++-- libselinux/man/man3/selinux_policy_root.3 | 2 +- libselinux/man/man3/selinux_restorecon_xattr.3 | 2 +- libselinux/src/selinux_restorecon.c | 2 +- libsemanage/man/man3/semanage_count.3 | 2 +- libsemanage/man/man3/semanage_list.3 | 2 +- libsepol/src/node_record.c | 2 +- mcstrans/man/man8/setrans.conf.8 | 2 +- python/semanage/seobject.py | 2 +- python/sepolicy/sepolicy-interface.8 | 2 +- python/sepolicy/sepolicy/help/system_boot_mode.txt | 2 +- python/sepolicy/sepolicy/manpage.py | 2 +- 13 files changed, 14 insertions(+), 14 deletions(-) diff --git a/gui/html_util.py b/gui/html_util.py index e93c20c7..420f6b96 100644 --- a/gui/html_util.py +++ b/gui/html_util.py @@ -145,7 +145,7 @@ def html_to_text(html, maxcol=80): def html_document(*body_components): '''Wrap the body components in a HTML document structure with a valid header. - Accepts a variable number of arguments of of which canb be: + Accepts a variable number of arguments of which can be: * string * a sequences of strings (tuple or list). * a callable object taking no parameters and returning a string or sequence of strings. diff --git a/libselinux/include/selinux/restorecon.h b/libselinux/include/selinux/restorecon.h index de694cd9..595e7728 100644 --- a/libselinux/include/selinux/restorecon.h +++ b/libselinux/include/selinux/restorecon.h @@ -36,8 +36,8 @@ extern int selinux_restorecon(const char *pathname, */ #define SELINUX_RESTORECON_NOCHANGE 0x0002 /* - * If set set change file label to that in spec file. - * If not only change type component to that in spec file. + * If set, change file label to that in spec file. + * If not, only change type component to that in spec file. */ #define SELINUX_RESTORECON_SET_SPECFILE_CTX 0x0004 /* diff --git a/libselinux/man/man3/selinux_policy_root.3 b/libselinux/man/man3/selinux_policy_root.3 index 63dc9010..75ac8ec0 100644 --- a/libselinux/man/man3/selinux_policy_root.3 +++ b/libselinux/man/man3/selinux_policy_root.3 @@ -18,7 +18,7 @@ reads the contents of the file to determine which policy files should be used for this machine. . .BR selinux_set_policy_root () -sets up all all policy paths based on the alternate root +sets up all policy paths based on the alternate root .I /etc/selinux/config file to determine which policy files should be used for this machine. diff --git a/libselinux/man/man3/selinux_restorecon_xattr.3 b/libselinux/man/man3/selinux_restorecon_xattr.3 index 7280c958..516d2669 100644 --- a/libselinux/man/man3/selinux_restorecon_xattr.3 +++ b/libselinux/man/man3/selinux_restorecon_xattr.3 @@ -119,7 +119,7 @@ By default .BR selinux_restorecon_xattr (3) will use the default set of specfiles described in .BR files_contexts (5) -to calculate the initial SHA1 digest to be used for comparision. +to calculate the initial SHA1 digest to be used for comparison. To change this default behavior .BR selabel_open (3) must be called specifying the required diff --git a/libselinux/src/selinux_restorecon.c b/libselinux/src/selinux_restorecon.c index ced41152..41f22250 100644 --- a/libselinux/src/selinux_restorecon.c +++ b/libselinux/src/selinux_restorecon.c @@ -116,7 +116,7 @@ static pthread_once_t fc_once = PTHREAD_ONCE_INIT; * * check_excluded() - Check if directory/fs is to be excluded when relabeling. * - * file_system_count() - Calculates the the number of files to be processed. + * file_system_count() - Calculates the number of files to be processed. * The count is only used if SELINUX_RESTORECON_PROGRESS * is set and a mass relabel is requested. * diff --git a/libsemanage/man/man3/semanage_count.3 b/libsemanage/man/man3/semanage_count.3 index b865a217..4fcafffe 100644 --- a/libsemanage/man/man3/semanage_count.3 +++ b/libsemanage/man/man3/semanage_count.3 @@ -23,7 +23,7 @@ The count function will return the number of all objects in the selected locatio .B Parameters: The .I handle -is used to track persistent state across semanage calls, and for error reporting. The number of objects will be stored at the location poined by +is used to track persistent state across semanage calls, and for error reporting. The number of objects will be stored at the location pointed by .I response. .TP diff --git a/libsemanage/man/man3/semanage_list.3 b/libsemanage/man/man3/semanage_list.3 index acc161fe..47d63b94 100644 --- a/libsemanage/man/man3/semanage_list.3 +++ b/libsemanage/man/man3/semanage_list.3 @@ -25,7 +25,7 @@ The list function will return an array of all the objects in the selected locati .B Parameters: The .I handle -is used to track persistent state across semanage calls, and for error reporting. The function will allocate and populate the the array of objects, and store it at the location pointed by +is used to track persistent state across semanage calls, and for error reporting. The function will allocate and populate the array of objects, and store it at the location pointed by .I objects. It will write the number of objects at the location pointed by .I count. diff --git a/libsepol/src/node_record.c b/libsepol/src/node_record.c index 6189c312..f3e78ff3 100644 --- a/libsepol/src/node_record.c +++ b/libsepol/src/node_record.c @@ -83,7 +83,7 @@ static int node_parse_addr(sepol_handle_t * handle, } /* Allocates a sufficiently large buffer (addr, addr_sz) - * according the the protocol */ + * according to the protocol */ static int node_alloc_addr(sepol_handle_t * handle, int proto, char **addr, size_t * addr_sz) diff --git a/mcstrans/man/man8/setrans.conf.8 b/mcstrans/man/man8/setrans.conf.8 index dcf29b7d..b7609921 100644 --- a/mcstrans/man/man8/setrans.conf.8 +++ b/mcstrans/man/man8/setrans.conf.8 @@ -59,7 +59,7 @@ defines a translation of s15:c0.c1023 to SystemHigh. c0.c1023 is shorthand for a .TP s0\-s15:c0.c1023=SystemLow\-SystemHigh\fR -defines a range translation of of s0\-s15:c0.c1023 to SystemLow\-SystemHigh. The two range components are separated by a dash. +defines a range translation of s0\-s15:c0.c1023 to SystemLow\-SystemHigh. The two range components are separated by a dash. .TP s0:c0=PatientRecord\fR diff --git a/python/semanage/seobject.py b/python/semanage/seobject.py index c76dce85..1ec3cc52 100644 --- a/python/semanage/seobject.py +++ b/python/semanage/seobject.py @@ -2299,7 +2299,7 @@ class fcontextRecords(semanageRecords): raise ValueError(_("Target %s is not valid. Target is not allowed to end with '/'") % target) if substitute != "/" and substitute[-1] == "/": - raise ValueError(_("Substiture %s is not valid. Substitute is not allowed to end with '/'") % substitute) + raise ValueError(_("Substitute %s is not valid. Substitute is not allowed to end with '/'") % substitute) if target in self.equiv.keys(): raise ValueError(_("Equivalence class for %s already exists") % target) diff --git a/python/sepolicy/sepolicy-interface.8 b/python/sepolicy/sepolicy-interface.8 index 02c4c1a5..3e74ea62 100644 --- a/python/sepolicy/sepolicy-interface.8 +++ b/python/sepolicy/sepolicy-interface.8 @@ -31,7 +31,7 @@ List all interfaces List all domains with SELinux user role interface .TP .I \-v, \-\-verbose -Display extended information about the interface including parameters and desctiprion if available. +Display extended information about the interface including parameters and description if available. .SH "AUTHOR" This man page was written by Daniel Walsh diff --git a/python/sepolicy/sepolicy/help/system_boot_mode.txt b/python/sepolicy/sepolicy/help/system_boot_mode.txt index e8482d73..350873d6 100644 --- a/python/sepolicy/sepolicy/help/system_boot_mode.txt +++ b/python/sepolicy/sepolicy/help/system_boot_mode.txt @@ -10,4 +10,4 @@ SELinux Systems can boot in three different modes. You can use this screen to change the enforcing mode. -Note if you disable SELinux, you will need to to reboot, to turn it off. Also the next time you turn SELinux on, a full system relabel will be performed. +Note if you disable SELinux, you will need to reboot, to turn it off. Also the next time you turn SELinux on, a full system relabel will be performed. diff --git a/python/sepolicy/sepolicy/manpage.py b/python/sepolicy/sepolicy/manpage.py index 8121e5cf..751f45a9 100755 --- a/python/sepolicy/sepolicy/manpage.py +++ b/python/sepolicy/sepolicy/manpage.py @@ -1260,7 +1260,7 @@ USERNAME ALL=(ALL) ROLE=%(user)s_r TYPE=%(user)s_t COMMAND .br sudo will run COMMAND as staff_u:%(user)s_r:%(user)s_t:LEVEL -When using a a non login role, you need to setup SELinux so that your SELinux user can reach %(user)s_r role. +When using a non login role, you need to setup SELinux so that your SELinux user can reach %(user)s_r role. Execute the following to see all of the assigned SELinux roles: -- 2.13.7