* [PATCH] Correct some typos
@ 2021-09-28 15:44 Christian Göttsche
2021-09-29 7:20 ` Petr Lautrbach
0 siblings, 1 reply; 3+ messages in thread
From: Christian Göttsche @ 2021-09-28 15:44 UTC (permalink / raw)
To: selinux
Found by codespell
Signed-off-by: Christian Göttsche <cgzones@googlemail.com>
---
policycoreutils/newrole/Makefile | 2 +-
policycoreutils/newrole/newrole.c | 2 +-
python/semanage/semanage | 6 +++---
python/sepolgen/src/sepolgen/refpolicy.py | 2 +-
python/sepolgen/src/sepolgen/yacc.py | 2 +-
python/sepolicy/sepolicy/manpage.py | 2 +-
secilc/docs/cil_access_vector_rules.md | 2 +-
secilc/docs/secil.xml | 2 +-
secilc/test/block_test.cil | 2 +-
9 files changed, 11 insertions(+), 11 deletions(-)
diff --git a/policycoreutils/newrole/Makefile b/policycoreutils/newrole/Makefile
index 0e7ebce3..4dedb7dd 100644
--- a/policycoreutils/newrole/Makefile
+++ b/policycoreutils/newrole/Makefile
@@ -12,7 +12,7 @@ AUDITH ?= $(shell test -f $(INCLUDEDIR)/libaudit.h && echo y)
# This will make newrole a setuid root program.
# The capabilities used are: CAP_AUDIT_WRITE.
AUDIT_LOG_PRIV ?= n
-# Enable capabilities to permit newrole to utilitize the pam_namespace module.
+# Enable capabilities to permit newrole to utilize the pam_namespace module.
# This will make newrole a setuid root program.
# The capabilities used are: CAP_SYS_ADMIN, CAP_CHOWN, CAP_FOWNER and
# CAP_DAC_OVERRIDE.
diff --git a/policycoreutils/newrole/newrole.c b/policycoreutils/newrole/newrole.c
index 7c1f062f..31b51c5a 100644
--- a/policycoreutils/newrole/newrole.c
+++ b/policycoreutils/newrole/newrole.c
@@ -1022,7 +1022,7 @@ static int set_signal_handles(void)
int main(int argc, char *argv[])
{
char *new_context = NULL; /* target security context */
- char *old_context = NULL; /* original securiy context */
+ char *old_context = NULL; /* original security context */
char *tty_context = NULL; /* current context of tty */
char *new_tty_context = NULL; /* new context of tty */
diff --git a/python/semanage/semanage b/python/semanage/semanage
index 18a27105..ff9fb66b 100644
--- a/python/semanage/semanage
+++ b/python/semanage/semanage
@@ -129,7 +129,7 @@ class SetImportFile(argparse.Action):
sys.exit(1)
setattr(namespace, self.dest, values)
-# define dictonary for seobject OBEJCTS
+# define dictionary for seobject OBEJCTS
object_dict = {
'login': seobject.loginRecords,
'user': seobject.seluserRecords,
@@ -146,7 +146,7 @@ object_dict = {
}
def generate_custom_usage(usage_text, usage_dict):
- # generate custom usage from given text and dictonary
+ # generate custom usage from given text and dictionary
sorted_keys = []
for i in usage_dict.keys():
sorted_keys.append(i)
@@ -160,7 +160,7 @@ def generate_custom_usage(usage_text, usage_dict):
def handle_opts(args, dict, target_key):
- # handle conflict and required options for given dictonary
+ # handle conflict and required options for given dictionary
# {action:[conflict_opts,require_opts]}
# first we need to catch conflicts
diff --git a/python/sepolgen/src/sepolgen/refpolicy.py b/python/sepolgen/src/sepolgen/refpolicy.py
index 74763687..3e907e91 100644
--- a/python/sepolgen/src/sepolgen/refpolicy.py
+++ b/python/sepolgen/src/sepolgen/refpolicy.py
@@ -42,7 +42,7 @@ PERMS = 3
ROLE = 4
DEST_TYPE = 5
-# String represenations of the above constants
+# String representations of the above constants
field_to_str = ["source", "target", "object", "permission", "role", "destination" ]
str_to_field = { "source" : SRC_TYPE, "target" : TGT_TYPE, "object" : OBJ_CLASS,
"permission" : PERMS, "role" : ROLE, "destination" : DEST_TYPE }
diff --git a/python/sepolgen/src/sepolgen/yacc.py b/python/sepolgen/src/sepolgen/yacc.py
index 55c1ef7d..c1c79880 100644
--- a/python/sepolgen/src/sepolgen/yacc.py
+++ b/python/sepolgen/src/sepolgen/yacc.py
@@ -1502,7 +1502,7 @@ class Grammar(object):
self.Precedence = {} # Precedence rules for each terminal. Contains tuples of the
# form ('right',level) or ('nonassoc', level) or ('left',level)
- self.UsedPrecedence = set() # Precedence rules that were actually used by the grammer.
+ self.UsedPrecedence = set() # Precedence rules that were actually used by the grammar.
# This is only used to provide error checking and to generate
# a warning about unused precedence rules.
diff --git a/python/sepolicy/sepolicy/manpage.py b/python/sepolicy/sepolicy/manpage.py
index 2f847abb..3e61e333 100755
--- a/python/sepolicy/sepolicy/manpage.py
+++ b/python/sepolicy/sepolicy/manpage.py
@@ -797,7 +797,7 @@ SELinux %(domainname)s policy is very flexible allowing users to setup their %(d
.B STANDARD FILE CONTEXT
SELinux defines the file context types for the %(domainname)s, if you wanted to
-store files with these types in a diffent paths, you need to execute the semanage command to sepecify alternate labeling and then use restorecon to put the labels on disk.
+store files with these types in a diffent paths, you need to execute the semanage command to specify alternate labeling and then use restorecon to put the labels on disk.
.B semanage fcontext -a -t %(type)s '/srv/%(domainname)s/content(/.*)?'
.br
diff --git a/secilc/docs/cil_access_vector_rules.md b/secilc/docs/cil_access_vector_rules.md
index fa68609e..f0ba4a90 100644
--- a/secilc/docs/cil_access_vector_rules.md
+++ b/secilc/docs/cil_access_vector_rules.md
@@ -360,7 +360,7 @@ dontauditx
Do not audit the access rights defined when access denied. This stops excessive log entries for known events.
-Note that for this to work there must *also* be atleast one [`allowx`](cil_access_vector_rules.md#allowx) rule associated with the target type.
+Note that for this to work there must *also* be at least one [`allowx`](cil_access_vector_rules.md#allowx) rule associated with the target type.
Note that these rules can be omitted by the CIL compiler command line parameter `-D` or `--disable-dontaudit` flags.
diff --git a/secilc/docs/secil.xml b/secilc/docs/secil.xml
index daa80ded..b015490d 100644
--- a/secilc/docs/secil.xml
+++ b/secilc/docs/secil.xml
@@ -208,7 +208,7 @@
<context name="String" attribute="String" lineEndContext="#stay">
<RegExpr attribute="Char" context="#stay" String="#\\."/>
- <!-- allow escaping " or similiar -->
+ <!-- allow escaping " or similar -->
<HlCStringChar attribute="String Char" context="#stay"/>
<DetectChar attribute="String" context="#pop" char="""/>
diff --git a/secilc/test/block_test.cil b/secilc/test/block_test.cil
index 2dfcb899..2dd30c23 100644
--- a/secilc/test/block_test.cil
+++ b/secilc/test/block_test.cil
@@ -84,7 +84,7 @@
)
-;; Inherting the abstract block causes the allow rule to be in the policy
+;; Inheriting the abstract block causes the allow rule to be in the policy
(type t5)
(block b5
(blockabstract b5)
--
2.33.0
^ permalink raw reply related [flat|nested] 3+ messages in thread
* Re: [PATCH] Correct some typos
2021-09-28 15:44 [PATCH] Correct some typos Christian Göttsche
@ 2021-09-29 7:20 ` Petr Lautrbach
2021-10-04 13:35 ` James Carter
0 siblings, 1 reply; 3+ messages in thread
From: Petr Lautrbach @ 2021-09-29 7:20 UTC (permalink / raw)
To: Christian Göttsche, selinux
Christian Göttsche <cgzones@googlemail.com> writes:
> Found by codespell
>
> Signed-off-by: Christian Göttsche <cgzones@googlemail.com>
Acked-by: Petr Lautrbach <plautrba@redhat.com>
Thanks!
> ---
> policycoreutils/newrole/Makefile | 2 +-
> policycoreutils/newrole/newrole.c | 2 +-
> python/semanage/semanage | 6 +++---
> python/sepolgen/src/sepolgen/refpolicy.py | 2 +-
> python/sepolgen/src/sepolgen/yacc.py | 2 +-
> python/sepolicy/sepolicy/manpage.py | 2 +-
> secilc/docs/cil_access_vector_rules.md | 2 +-
> secilc/docs/secil.xml | 2 +-
> secilc/test/block_test.cil | 2 +-
> 9 files changed, 11 insertions(+), 11 deletions(-)
>
> diff --git a/policycoreutils/newrole/Makefile b/policycoreutils/newrole/Makefile
> index 0e7ebce3..4dedb7dd 100644
> --- a/policycoreutils/newrole/Makefile
> +++ b/policycoreutils/newrole/Makefile
> @@ -12,7 +12,7 @@ AUDITH ?= $(shell test -f $(INCLUDEDIR)/libaudit.h && echo y)
> # This will make newrole a setuid root program.
> # The capabilities used are: CAP_AUDIT_WRITE.
> AUDIT_LOG_PRIV ?= n
> -# Enable capabilities to permit newrole to utilitize the pam_namespace module.
> +# Enable capabilities to permit newrole to utilize the pam_namespace module.
> # This will make newrole a setuid root program.
> # The capabilities used are: CAP_SYS_ADMIN, CAP_CHOWN, CAP_FOWNER and
> # CAP_DAC_OVERRIDE.
> diff --git a/policycoreutils/newrole/newrole.c b/policycoreutils/newrole/newrole.c
> index 7c1f062f..31b51c5a 100644
> --- a/policycoreutils/newrole/newrole.c
> +++ b/policycoreutils/newrole/newrole.c
> @@ -1022,7 +1022,7 @@ static int set_signal_handles(void)
> int main(int argc, char *argv[])
> {
> char *new_context = NULL; /* target security context */
> - char *old_context = NULL; /* original securiy context */
> + char *old_context = NULL; /* original security context */
> char *tty_context = NULL; /* current context of tty */
> char *new_tty_context = NULL; /* new context of tty */
>
> diff --git a/python/semanage/semanage b/python/semanage/semanage
> index 18a27105..ff9fb66b 100644
> --- a/python/semanage/semanage
> +++ b/python/semanage/semanage
> @@ -129,7 +129,7 @@ class SetImportFile(argparse.Action):
> sys.exit(1)
> setattr(namespace, self.dest, values)
>
> -# define dictonary for seobject OBEJCTS
> +# define dictionary for seobject OBEJCTS
> object_dict = {
> 'login': seobject.loginRecords,
> 'user': seobject.seluserRecords,
> @@ -146,7 +146,7 @@ object_dict = {
> }
>
> def generate_custom_usage(usage_text, usage_dict):
> - # generate custom usage from given text and dictonary
> + # generate custom usage from given text and dictionary
> sorted_keys = []
> for i in usage_dict.keys():
> sorted_keys.append(i)
> @@ -160,7 +160,7 @@ def generate_custom_usage(usage_text, usage_dict):
>
>
> def handle_opts(args, dict, target_key):
> - # handle conflict and required options for given dictonary
> + # handle conflict and required options for given dictionary
> # {action:[conflict_opts,require_opts]}
>
> # first we need to catch conflicts
> diff --git a/python/sepolgen/src/sepolgen/refpolicy.py b/python/sepolgen/src/sepolgen/refpolicy.py
> index 74763687..3e907e91 100644
> --- a/python/sepolgen/src/sepolgen/refpolicy.py
> +++ b/python/sepolgen/src/sepolgen/refpolicy.py
> @@ -42,7 +42,7 @@ PERMS = 3
> ROLE = 4
> DEST_TYPE = 5
>
> -# String represenations of the above constants
> +# String representations of the above constants
> field_to_str = ["source", "target", "object", "permission", "role", "destination" ]
> str_to_field = { "source" : SRC_TYPE, "target" : TGT_TYPE, "object" : OBJ_CLASS,
> "permission" : PERMS, "role" : ROLE, "destination" : DEST_TYPE }
> diff --git a/python/sepolgen/src/sepolgen/yacc.py b/python/sepolgen/src/sepolgen/yacc.py
> index 55c1ef7d..c1c79880 100644
> --- a/python/sepolgen/src/sepolgen/yacc.py
> +++ b/python/sepolgen/src/sepolgen/yacc.py
> @@ -1502,7 +1502,7 @@ class Grammar(object):
> self.Precedence = {} # Precedence rules for each terminal. Contains tuples of the
> # form ('right',level) or ('nonassoc', level) or ('left',level)
>
> - self.UsedPrecedence = set() # Precedence rules that were actually used by the grammer.
> + self.UsedPrecedence = set() # Precedence rules that were actually used by the grammar.
> # This is only used to provide error checking and to generate
> # a warning about unused precedence rules.
>
> diff --git a/python/sepolicy/sepolicy/manpage.py b/python/sepolicy/sepolicy/manpage.py
> index 2f847abb..3e61e333 100755
> --- a/python/sepolicy/sepolicy/manpage.py
> +++ b/python/sepolicy/sepolicy/manpage.py
> @@ -797,7 +797,7 @@ SELinux %(domainname)s policy is very flexible allowing users to setup their %(d
> .B STANDARD FILE CONTEXT
>
> SELinux defines the file context types for the %(domainname)s, if you wanted to
> -store files with these types in a diffent paths, you need to execute the semanage command to sepecify alternate labeling and then use restorecon to put the labels on disk.
> +store files with these types in a diffent paths, you need to execute the semanage command to specify alternate labeling and then use restorecon to put the labels on disk.
>
> .B semanage fcontext -a -t %(type)s '/srv/%(domainname)s/content(/.*)?'
> .br
> diff --git a/secilc/docs/cil_access_vector_rules.md b/secilc/docs/cil_access_vector_rules.md
> index fa68609e..f0ba4a90 100644
> --- a/secilc/docs/cil_access_vector_rules.md
> +++ b/secilc/docs/cil_access_vector_rules.md
> @@ -360,7 +360,7 @@ dontauditx
>
> Do not audit the access rights defined when access denied. This stops excessive log entries for known events.
>
> -Note that for this to work there must *also* be atleast one [`allowx`](cil_access_vector_rules.md#allowx) rule associated with the target type.
> +Note that for this to work there must *also* be at least one [`allowx`](cil_access_vector_rules.md#allowx) rule associated with the target type.
>
> Note that these rules can be omitted by the CIL compiler command line parameter `-D` or `--disable-dontaudit` flags.
>
> diff --git a/secilc/docs/secil.xml b/secilc/docs/secil.xml
> index daa80ded..b015490d 100644
> --- a/secilc/docs/secil.xml
> +++ b/secilc/docs/secil.xml
> @@ -208,7 +208,7 @@
> <context name="String" attribute="String" lineEndContext="#stay">
> <RegExpr attribute="Char" context="#stay" String="#\\."/>
>
> - <!-- allow escaping " or similiar -->
> + <!-- allow escaping " or similar -->
> <HlCStringChar attribute="String Char" context="#stay"/>
>
> <DetectChar attribute="String" context="#pop" char="""/>
> diff --git a/secilc/test/block_test.cil b/secilc/test/block_test.cil
> index 2dfcb899..2dd30c23 100644
> --- a/secilc/test/block_test.cil
> +++ b/secilc/test/block_test.cil
> @@ -84,7 +84,7 @@
> )
>
>
> -;; Inherting the abstract block causes the allow rule to be in the policy
> +;; Inheriting the abstract block causes the allow rule to be in the policy
> (type t5)
> (block b5
> (blockabstract b5)
> --
> 2.33.0
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [PATCH] Correct some typos
2021-09-29 7:20 ` Petr Lautrbach
@ 2021-10-04 13:35 ` James Carter
0 siblings, 0 replies; 3+ messages in thread
From: James Carter @ 2021-10-04 13:35 UTC (permalink / raw)
To: Petr Lautrbach; +Cc: Christian Göttsche, SElinux list
On Wed, Sep 29, 2021 at 3:22 AM Petr Lautrbach <plautrba@redhat.com> wrote:
>
> Christian Göttsche <cgzones@googlemail.com> writes:
>
> > Found by codespell
> >
> > Signed-off-by: Christian Göttsche <cgzones@googlemail.com>
>
> Acked-by: Petr Lautrbach <plautrba@redhat.com>
>
This patch has been merged.
Thanks,
Jim
> Thanks!
>
>
>
> > ---
> > policycoreutils/newrole/Makefile | 2 +-
> > policycoreutils/newrole/newrole.c | 2 +-
> > python/semanage/semanage | 6 +++---
> > python/sepolgen/src/sepolgen/refpolicy.py | 2 +-
> > python/sepolgen/src/sepolgen/yacc.py | 2 +-
> > python/sepolicy/sepolicy/manpage.py | 2 +-
> > secilc/docs/cil_access_vector_rules.md | 2 +-
> > secilc/docs/secil.xml | 2 +-
> > secilc/test/block_test.cil | 2 +-
> > 9 files changed, 11 insertions(+), 11 deletions(-)
> >
> > diff --git a/policycoreutils/newrole/Makefile b/policycoreutils/newrole/Makefile
> > index 0e7ebce3..4dedb7dd 100644
> > --- a/policycoreutils/newrole/Makefile
> > +++ b/policycoreutils/newrole/Makefile
> > @@ -12,7 +12,7 @@ AUDITH ?= $(shell test -f $(INCLUDEDIR)/libaudit.h && echo y)
> > # This will make newrole a setuid root program.
> > # The capabilities used are: CAP_AUDIT_WRITE.
> > AUDIT_LOG_PRIV ?= n
> > -# Enable capabilities to permit newrole to utilitize the pam_namespace module.
> > +# Enable capabilities to permit newrole to utilize the pam_namespace module.
> > # This will make newrole a setuid root program.
> > # The capabilities used are: CAP_SYS_ADMIN, CAP_CHOWN, CAP_FOWNER and
> > # CAP_DAC_OVERRIDE.
> > diff --git a/policycoreutils/newrole/newrole.c b/policycoreutils/newrole/newrole.c
> > index 7c1f062f..31b51c5a 100644
> > --- a/policycoreutils/newrole/newrole.c
> > +++ b/policycoreutils/newrole/newrole.c
> > @@ -1022,7 +1022,7 @@ static int set_signal_handles(void)
> > int main(int argc, char *argv[])
> > {
> > char *new_context = NULL; /* target security context */
> > - char *old_context = NULL; /* original securiy context */
> > + char *old_context = NULL; /* original security context */
> > char *tty_context = NULL; /* current context of tty */
> > char *new_tty_context = NULL; /* new context of tty */
> >
> > diff --git a/python/semanage/semanage b/python/semanage/semanage
> > index 18a27105..ff9fb66b 100644
> > --- a/python/semanage/semanage
> > +++ b/python/semanage/semanage
> > @@ -129,7 +129,7 @@ class SetImportFile(argparse.Action):
> > sys.exit(1)
> > setattr(namespace, self.dest, values)
> >
> > -# define dictonary for seobject OBEJCTS
> > +# define dictionary for seobject OBEJCTS
> > object_dict = {
> > 'login': seobject.loginRecords,
> > 'user': seobject.seluserRecords,
> > @@ -146,7 +146,7 @@ object_dict = {
> > }
> >
> > def generate_custom_usage(usage_text, usage_dict):
> > - # generate custom usage from given text and dictonary
> > + # generate custom usage from given text and dictionary
> > sorted_keys = []
> > for i in usage_dict.keys():
> > sorted_keys.append(i)
> > @@ -160,7 +160,7 @@ def generate_custom_usage(usage_text, usage_dict):
> >
> >
> > def handle_opts(args, dict, target_key):
> > - # handle conflict and required options for given dictonary
> > + # handle conflict and required options for given dictionary
> > # {action:[conflict_opts,require_opts]}
> >
> > # first we need to catch conflicts
> > diff --git a/python/sepolgen/src/sepolgen/refpolicy.py b/python/sepolgen/src/sepolgen/refpolicy.py
> > index 74763687..3e907e91 100644
> > --- a/python/sepolgen/src/sepolgen/refpolicy.py
> > +++ b/python/sepolgen/src/sepolgen/refpolicy.py
> > @@ -42,7 +42,7 @@ PERMS = 3
> > ROLE = 4
> > DEST_TYPE = 5
> >
> > -# String represenations of the above constants
> > +# String representations of the above constants
> > field_to_str = ["source", "target", "object", "permission", "role", "destination" ]
> > str_to_field = { "source" : SRC_TYPE, "target" : TGT_TYPE, "object" : OBJ_CLASS,
> > "permission" : PERMS, "role" : ROLE, "destination" : DEST_TYPE }
> > diff --git a/python/sepolgen/src/sepolgen/yacc.py b/python/sepolgen/src/sepolgen/yacc.py
> > index 55c1ef7d..c1c79880 100644
> > --- a/python/sepolgen/src/sepolgen/yacc.py
> > +++ b/python/sepolgen/src/sepolgen/yacc.py
> > @@ -1502,7 +1502,7 @@ class Grammar(object):
> > self.Precedence = {} # Precedence rules for each terminal. Contains tuples of the
> > # form ('right',level) or ('nonassoc', level) or ('left',level)
> >
> > - self.UsedPrecedence = set() # Precedence rules that were actually used by the grammer.
> > + self.UsedPrecedence = set() # Precedence rules that were actually used by the grammar.
> > # This is only used to provide error checking and to generate
> > # a warning about unused precedence rules.
> >
> > diff --git a/python/sepolicy/sepolicy/manpage.py b/python/sepolicy/sepolicy/manpage.py
> > index 2f847abb..3e61e333 100755
> > --- a/python/sepolicy/sepolicy/manpage.py
> > +++ b/python/sepolicy/sepolicy/manpage.py
> > @@ -797,7 +797,7 @@ SELinux %(domainname)s policy is very flexible allowing users to setup their %(d
> > .B STANDARD FILE CONTEXT
> >
> > SELinux defines the file context types for the %(domainname)s, if you wanted to
> > -store files with these types in a diffent paths, you need to execute the semanage command to sepecify alternate labeling and then use restorecon to put the labels on disk.
> > +store files with these types in a diffent paths, you need to execute the semanage command to specify alternate labeling and then use restorecon to put the labels on disk.
> >
> > .B semanage fcontext -a -t %(type)s '/srv/%(domainname)s/content(/.*)?'
> > .br
> > diff --git a/secilc/docs/cil_access_vector_rules.md b/secilc/docs/cil_access_vector_rules.md
> > index fa68609e..f0ba4a90 100644
> > --- a/secilc/docs/cil_access_vector_rules.md
> > +++ b/secilc/docs/cil_access_vector_rules.md
> > @@ -360,7 +360,7 @@ dontauditx
> >
> > Do not audit the access rights defined when access denied. This stops excessive log entries for known events.
> >
> > -Note that for this to work there must *also* be atleast one [`allowx`](cil_access_vector_rules.md#allowx) rule associated with the target type.
> > +Note that for this to work there must *also* be at least one [`allowx`](cil_access_vector_rules.md#allowx) rule associated with the target type.
> >
> > Note that these rules can be omitted by the CIL compiler command line parameter `-D` or `--disable-dontaudit` flags.
> >
> > diff --git a/secilc/docs/secil.xml b/secilc/docs/secil.xml
> > index daa80ded..b015490d 100644
> > --- a/secilc/docs/secil.xml
> > +++ b/secilc/docs/secil.xml
> > @@ -208,7 +208,7 @@
> > <context name="String" attribute="String" lineEndContext="#stay">
> > <RegExpr attribute="Char" context="#stay" String="#\\."/>
> >
> > - <!-- allow escaping " or similiar -->
> > + <!-- allow escaping " or similar -->
> > <HlCStringChar attribute="String Char" context="#stay"/>
> >
> > <DetectChar attribute="String" context="#pop" char="""/>
> > diff --git a/secilc/test/block_test.cil b/secilc/test/block_test.cil
> > index 2dfcb899..2dd30c23 100644
> > --- a/secilc/test/block_test.cil
> > +++ b/secilc/test/block_test.cil
> > @@ -84,7 +84,7 @@
> > )
> >
> >
> > -;; Inherting the abstract block causes the allow rule to be in the policy
> > +;; Inheriting the abstract block causes the allow rule to be in the policy
> > (type t5)
> > (block b5
> > (blockabstract b5)
> > --
> > 2.33.0
>
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2021-10-04 13:52 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-09-28 15:44 [PATCH] Correct some typos Christian Göttsche
2021-09-29 7:20 ` Petr Lautrbach
2021-10-04 13:35 ` James Carter
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.