Skip to content

Commit f897d8c

Browse files
committed
fix typo
Signed-off-by: sat0ken <15720506+sat0ken@users.noreply.github.com>
1 parent c3de134 commit f897d8c

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

experiment/seccomp/src/seccomp.rs

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -520,7 +520,7 @@ impl Rule {
520520
SeccompCompareOp::NotEqual => {
521521
// if system call number is not match, skip args check jf 4 to default action
522522
bpf_prog.push(Instruction::jump(BPF_JEQ | BPF_K, 0, 4, *syscall as c_uint));
523-
// uppper 32bit check of args
523+
// upper 32bit check of args
524524
bpf_prog.push(Instruction::stmt(
525525
BPF_LD | BPF_W | BPF_ABS,
526526
(offset + 4).into(),
@@ -543,7 +543,7 @@ impl Rule {
543543
SeccompCompareOp::LessThan => {
544544
// if system call number is not match, skip args check jf 4 to default action
545545
bpf_prog.push(Instruction::jump(BPF_JEQ | BPF_K, 0, 5, *syscall as c_uint));
546-
// uppper 32bit check of args
546+
// upper 32bit check of args
547547
bpf_prog.push(Instruction::stmt(
548548
BPF_LD | BPF_W | BPF_ABS,
549549
(offset + 4).into(),
@@ -571,7 +571,7 @@ impl Rule {
571571
}
572572
SeccompCompareOp::LessOrEqual => {
573573
bpf_prog.push(Instruction::jump(BPF_JEQ | BPF_K, 0, 5, *syscall as c_uint));
574-
// uppper 32bit check of args
574+
// upper 32bit check of args
575575
bpf_prog.push(Instruction::stmt(
576576
BPF_LD | BPF_W | BPF_ABS,
577577
(offset + 4).into(),
@@ -600,7 +600,7 @@ impl Rule {
600600
SeccompCompareOp::Equal => {
601601
// if system call number is not match, skip args check jf 4 to default action
602602
bpf_prog.push(Instruction::jump(BPF_JEQ | BPF_K, 0, 4, *syscall as c_uint));
603-
// uppper 32bit check of args
603+
// upper 32bit check of args
604604
bpf_prog.push(Instruction::stmt(
605605
BPF_LD | BPF_W | BPF_ABS,
606606
(offset + 4).into(),
@@ -623,7 +623,7 @@ impl Rule {
623623
SeccompCompareOp::GreaterOrEqual => {
624624
// if system call number is not match, skip args check jf 4 to default action
625625
bpf_prog.push(Instruction::jump(BPF_JEQ | BPF_K, 0, 5, *syscall as c_uint));
626-
// uppper 32bit check of args
626+
// upper 32bit check of args
627627
bpf_prog.push(Instruction::stmt(
628628
BPF_LD | BPF_W | BPF_ABS,
629629
(offset + 4).into(),
@@ -652,7 +652,7 @@ impl Rule {
652652
SeccompCompareOp::GreaterThan => {
653653
// if system call number is not match, skip args check jf 4 to default action
654654
bpf_prog.push(Instruction::jump(BPF_JEQ | BPF_K, 0, 5, *syscall as c_uint));
655-
// uppper 32bit check of args
655+
// upper 32bit check of args
656656
bpf_prog.push(Instruction::stmt(
657657
BPF_LD | BPF_W | BPF_ABS,
658658
(offset + 4).into(),
@@ -682,7 +682,7 @@ impl Rule {
682682
// if system call number is not match, skip args check jf 4 to default action
683683
bpf_prog.push(Instruction::jump(BPF_JEQ | BPF_K, 0, 4, *syscall as c_uint));
684684

685-
// uppper 32bit check of args
685+
// upper 32bit check of args
686686
bpf_prog.push(Instruction::stmt(
687687
BPF_LD | BPF_W | BPF_ABS,
688688
(offset + 4).into(),
@@ -775,7 +775,7 @@ mod tests {
775775
}
776776

777777
#[test]
778-
fn test_build_instruction_with_args_x86_euqal() {
778+
fn test_build_instruction_with_args_x86_equal() {
779779
let persolality = get_syscall_number(&Arch::X86, "personality").unwrap();
780780
let personality_args: SyscallArgs = SyscallArgs {
781781
arg0: 8,

0 commit comments

Comments
 (0)