diff options
author | Samanta Navarro <ferivoz@riseup.net> | 2021-08-14 12:08:22 +0000 |
---|---|---|
committer | Andrew G. Morgan <morgan@kernel.org> | 2021-08-14 11:03:27 -0700 |
commit | e721aff543186ca4463954f8bca150b97736a01a (patch) | |
tree | 3454076d8639b129e79db2b5c6411940e1b1a8af /progs | |
parent | 686084897c15348f42bde8e4d3448edfc78ece79 (diff) | |
download | libcap2-e721aff543186ca4463954f8bca150b97736a01a.tar.gz |
Fix typos.
Typos found with codespell
Signed-off-by: Samanta Navarro <ferivoz@riseup.net>
Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
Diffstat (limited to 'progs')
-rw-r--r-- | progs/capshdoc.h | 4 | ||||
-rwxr-xr-x | progs/quicktest.sh | 6 |
2 files changed, 5 insertions, 5 deletions
diff --git a/progs/capshdoc.h b/progs/capshdoc.h index 82f18fc..c182144 100644 --- a/progs/capshdoc.h +++ b/progs/capshdoc.h @@ -56,7 +56,7 @@ static const char *explanation6[] = { /* cap_setgid = 6 */ }; static const char *explanation7[] = { /* cap_setuid = 7 */ "Allows a process to freely manipulate its own UIDs:", - " - arbitraily set the UID, EUID, REUID and RESUID", + " - arbitrarily set the UID, EUID, REUID and RESUID", " values", " - allows the forging of UID credentials passed over a", " socket", @@ -79,7 +79,7 @@ static const char *explanation8[] = { /* cap_setpcap = 8 */ "default, as its unsuppressed behavior was not", "auditable: it could asynchronously grant its own", "Permitted capabilities to and remove capabilities from", - "other processes arbitraily. The former leads to", + "other processes arbitrarily. The former leads to", "undefined behavior, and the latter is better served by", "the kill system call.]", NULL diff --git a/progs/quicktest.sh b/progs/quicktest.sh index e508d0b..ba64ab5 100755 --- a/progs/quicktest.sh +++ b/progs/quicktest.sh @@ -1,7 +1,7 @@ #!/bin/bash # # Run through a series of tests to try out the various capability -# manipulations posible through exec. +# manipulations possible through exec. # # [Run this as root in a root-enabled process tree.] @@ -90,7 +90,7 @@ pass_capsh --keep=0 --keep=1 --keep=0 --keep=1 --print /bin/chmod u+s tcapsh /bin/ls -l tcapsh -# leverage keep caps to maintain capabilities accross a change of euid +# leverage keep caps to maintain capabilities across a change of euid # from setuid root to capable luser (as per wireshark/dumpcap 0.99.7) # This test is subtle. It is testing that a change to self, dropping # euid=0 back to that of the luser keeps capabilities. @@ -205,7 +205,7 @@ EOF # Next force the privileged binary to have an empty capability set. # This is sort of the opposite of privileged - it should ensure that - # the file can never aquire privilege by the ambient method. + # the file can never acquire privilege by the ambient method. ./setcap = ./privileged fail_capsh --keep=1 --uid=$nouid --inh=cap_setuid --addamb=cap_setuid -- -c "./privileged --print --uid=1" |