summaryrefslogtreecommitdiff
path: root/progs
diff options
context:
space:
mode:
authorSamanta Navarro <ferivoz@riseup.net>2021-08-14 12:08:22 +0000
committerAndrew G. Morgan <morgan@kernel.org>2021-08-14 11:03:27 -0700
commite721aff543186ca4463954f8bca150b97736a01a (patch)
tree3454076d8639b129e79db2b5c6411940e1b1a8af /progs
parent686084897c15348f42bde8e4d3448edfc78ece79 (diff)
downloadlibcap2-e721aff543186ca4463954f8bca150b97736a01a.tar.gz
Fix typos.
Typos found with codespell Signed-off-by: Samanta Navarro <ferivoz@riseup.net> Signed-off-by: Andrew G. Morgan <morgan@kernel.org>
Diffstat (limited to 'progs')
-rw-r--r--progs/capshdoc.h4
-rwxr-xr-xprogs/quicktest.sh6
2 files changed, 5 insertions, 5 deletions
diff --git a/progs/capshdoc.h b/progs/capshdoc.h
index 82f18fc..c182144 100644
--- a/progs/capshdoc.h
+++ b/progs/capshdoc.h
@@ -56,7 +56,7 @@ static const char *explanation6[] = { /* cap_setgid = 6 */
};
static const char *explanation7[] = { /* cap_setuid = 7 */
"Allows a process to freely manipulate its own UIDs:",
- " - arbitraily set the UID, EUID, REUID and RESUID",
+ " - arbitrarily set the UID, EUID, REUID and RESUID",
" values",
" - allows the forging of UID credentials passed over a",
" socket",
@@ -79,7 +79,7 @@ static const char *explanation8[] = { /* cap_setpcap = 8 */
"default, as its unsuppressed behavior was not",
"auditable: it could asynchronously grant its own",
"Permitted capabilities to and remove capabilities from",
- "other processes arbitraily. The former leads to",
+ "other processes arbitrarily. The former leads to",
"undefined behavior, and the latter is better served by",
"the kill system call.]",
NULL
diff --git a/progs/quicktest.sh b/progs/quicktest.sh
index e508d0b..ba64ab5 100755
--- a/progs/quicktest.sh
+++ b/progs/quicktest.sh
@@ -1,7 +1,7 @@
#!/bin/bash
#
# Run through a series of tests to try out the various capability
-# manipulations posible through exec.
+# manipulations possible through exec.
#
# [Run this as root in a root-enabled process tree.]
@@ -90,7 +90,7 @@ pass_capsh --keep=0 --keep=1 --keep=0 --keep=1 --print
/bin/chmod u+s tcapsh
/bin/ls -l tcapsh
-# leverage keep caps to maintain capabilities accross a change of euid
+# leverage keep caps to maintain capabilities across a change of euid
# from setuid root to capable luser (as per wireshark/dumpcap 0.99.7)
# This test is subtle. It is testing that a change to self, dropping
# euid=0 back to that of the luser keeps capabilities.
@@ -205,7 +205,7 @@ EOF
# Next force the privileged binary to have an empty capability set.
# This is sort of the opposite of privileged - it should ensure that
- # the file can never aquire privilege by the ambient method.
+ # the file can never acquire privilege by the ambient method.
./setcap = ./privileged
fail_capsh --keep=1 --uid=$nouid --inh=cap_setuid --addamb=cap_setuid -- -c "./privileged --print --uid=1"