Skip to content

Commit

Permalink
tree-wide: fix misc typos
Browse files Browse the repository at this point in the history
Signed-off-by: Christian Göttsche <[email protected]>
Acked-by: James Carter <[email protected]>
  • Loading branch information
cgzones authored and jwcart2 committed Jun 14, 2024
1 parent 8c1110d commit a02fccf
Show file tree
Hide file tree
Showing 4 changed files with 7 additions and 7 deletions.
2 changes: 1 addition & 1 deletion libselinux/utils/sefcontext_compile.c
Original file line number Diff line number Diff line change
Expand Up @@ -189,7 +189,7 @@ static int write_binary_file(struct saved_data *data, int fd,
if (len != 1)
goto err;

/* original context strin (including nul) */
/* original context string (including nul) */
len = fwrite(context, sizeof(char), to_write, bin_file);
if (len != to_write)
goto err;
Expand Down
4 changes: 2 additions & 2 deletions libsepol/src/kernel_to_cil.c
Original file line number Diff line number Diff line change
Expand Up @@ -303,7 +303,7 @@ static int class_constraint_rules_to_strs(struct policydb *pdb, char *classkey,
goto exit;
}
if (*perms == '\0') {
ERR(NULL, "No permisisons in permission string");
ERR(NULL, "No permissions in permission string");
free(perms);
rc = -1;
goto exit;
Expand Down Expand Up @@ -1782,7 +1782,7 @@ static char *avtab_node_to_str(struct policydb *pdb, avtab_key_t *key, avtab_dat
goto exit;
}
if (*perms == '\0') {
ERR(NULL, "No permisisons in permission string");
ERR(NULL, "No permissions in permission string");
free(perms);
goto exit;
}
Expand Down
4 changes: 2 additions & 2 deletions libsepol/src/kernel_to_conf.c
Original file line number Diff line number Diff line change
Expand Up @@ -298,7 +298,7 @@ static int class_constraint_rules_to_strs(struct policydb *pdb, char *classkey,
goto exit;
}
if (*perms == '\0') {
ERR(NULL, "No permisisons in permission string");
ERR(NULL, "No permissions in permission string");
free(perms);
rc = -1;
goto exit;
Expand Down Expand Up @@ -1748,7 +1748,7 @@ static char *avtab_node_to_str(struct policydb *pdb, avtab_key_t *key, avtab_dat
goto exit;
}
if (*permstring == '\0') {
ERR(NULL, "No permisisons in permission string");
ERR(NULL, "No permissions in permission string");
free(permstring);
goto exit;
}
Expand Down
4 changes: 2 additions & 2 deletions secilc/docs/cil_reference_guide.md
Original file line number Diff line number Diff line change
Expand Up @@ -281,15 +281,15 @@ The number of `expr_set`'s in an `expr` is dependent on the statement type (ther
(mlsconstrain (process (transition dyntransition))
(or (and (eq h1 h2) (eq l1 l2)) (eq t1 mlstrustedsubject)))
; The equivalent policy language mlsconstrain statememt is:
; The equivalent policy language mlsconstrain statement is:
;mlsconstrain process { transition dyntransition }
; ((h1 eq h2 and l1 eq l2) or t1 == mlstrustedsubject);
; Process read operations: No read up unless trusted.
(mlsconstrain (process (getsched getsession getpgid getcap getattr ptrace share))
(or (dom l1 l2) (eq t1 mlstrustedsubject)))
; The equivalent policy language mlsconstrain statememt is:
; The equivalent policy language mlsconstrain statement is:
;mlsconstrain process { getsched getsession getpgid getcap getattr ptrace share }
; (l1 dom l2 or t1 == mlstrustedsubject);
```
Expand Down

0 comments on commit a02fccf

Please sign in to comment.