@@ -10,7 +10,7 @@ TEX := $(patsubst %.sgml, %.tex, $(TOP))
LOG := $(patsubst %.sgml, %.log, $(TOP))
OUT := $(patsubst %.sgml, %.out, $(TOP))
-all: $(PS) $(PDF) $(HMTL)
+all: $(PS) $(PDF) $(HTML)
$(PS): $(ALL) custom.dsl
jw -f docbook -d custom.dsl -b ps $(TOP)
@@ -242,7 +242,7 @@ The socket scripts test the following hooks:
</para>
</sect2>
-<sect2 id="socket_secure"><title>Secure Socket Sytem Call Tests</title>
+<sect2 id="socket_secure"><title>Secure Socket System Call Tests</title>
<para>
The tests in the <filename>socket_secure</filename> and
<filename>unix_secure</filename> subdirectories create a single server
@@ -29,7 +29,7 @@ type test_nofcap_t;
typeattribute test_nofcap_t capabledomain;
testsuite_domain_type(test_nofcap_t)
-# Allow these domains to create a temporay file.
+# Allow these domains to create a temporary file.
allow capabledomain test_file_t:file { setattr rw_file_perms };
allow capabledomain test_file_t:chr_file { create };
allow capabledomain test_file_t:dir { setattr rw_dir_perms };
@@ -1,7 +1,7 @@
#################################
#
# Policy for testing network related capabilities. The test_capable_file.te
-# policy is a prequisite for this file.
+# policy is a prerequisite for this file.
#
# Type for process that is allowed certain capabilities
@@ -1,7 +1,7 @@
#################################
#
# Policy for testing system related capabilities. The test_capable_file.te
-# policy is a prequisite for this file.
+# policy is a prerequisite for this file.
#
# Type for process that is allowed certain capabilities
@@ -18,7 +18,7 @@ testsuite_domain_type(test_mqreadop_t)
domain_obj_id_change_exemption(test_mqreadop_t)
typeattribute test_mqreadop_t mqopdomain;
-# Domain for process that is allowed to wirte to write posix mqueues
+# Domain for process that is allowed to write the write posix mqueues
type test_mqwriteop_t;
testsuite_domain_type(test_mqwriteop_t)
domain_obj_id_change_exemption(test_mqwriteop_t)
@@ -286,7 +286,7 @@ int main(int argc, char **argv)
if (fd_type == BPF_TEST)
exit(0);
- /* If BPF enabed, then need to set limits */
+ /* If BPF enabled, then need to set limits */
if (fd_type == BPF_MAP_FD || fd_type == BPF_PROG_FD)
bpf_setrlimit();
#else
@@ -76,8 +76,8 @@ $result = system(
);
ok($result);
-# It ensure the child domain shall be bounded to the parent.
-# So, we expect all the alloed actiona are intersection with test_bounds_parent_t
+# It ensures the child domain shall be bounded to the parent.
+# So, we expect all the allowed actions are intersections with test_bounds_parent_t
$result = system(
"runcon -t test_bounds_child_t -- dd if=$basedir/bounds_file_red of=/dev/null count=1 2>&1 > /dev/null"
@@ -1,6 +1,6 @@
#!/usr/bin/perl
#
-# This test performs checks for network-related capabilties.
+# This test performs checks for network-related capabilities.
#
use Test;
@@ -1,6 +1,6 @@
#!/usr/bin/perl
#
-# This test performs checks for system-related capabilties.
+# This test performs checks for system-related capabilities.
#
use Test;
@@ -148,7 +148,7 @@ ok($result);
system "chcon -t nofileop_rw_file_t $basedir/temp_file2 2>&1 > /dev/null";
#
-# Check the fcntl for the bad domain. This uses the read-only accessable file.
+# Check the fcntl for the bad domain. This uses the read-only accessible file.
#
$result = system
"runcon -t test_nofileop_t -- $basedir/test_nofcntl $basedir/temp_file3 2>&1";
@@ -29,7 +29,7 @@ int main(int argc, char **argv)
exit(2);
}
- /* The next two acesses should fail, so if that happens, we return success. */
+ /* The next two accesses should fail, so if that happens, we return success. */
rc = fcntl(fd, F_SETFL, 0);
if( rc != -1 ) {
@@ -18,7 +18,7 @@
/*
* Test the sigio operations by creating a child and registering that process
* for SIGIO signals for the terminal. The main process forces a SIGIO
- * on the terminal by sending a charcter to that device.
+ * on the terminal by sending a character to that device.
*/
int main(int argc, char **argv)
{
@@ -31,14 +31,14 @@ $result = system "touch $basedir/temp_file 2>&1";
$result = system "chcon -t test_ioctl_file_t $basedir/temp_file 2>&1";
#
-# Attempt to perform the ioctls on the temproary file as the good domain
+# Attempt to perform the ioctls on the temporary file as the good domain
#
$result = system
"runcon -t test_ioctl_t -- $basedir/test_ioctl $basedir/temp_file 2>&1";
ok( $result, 0 );
#
-# Attempt to perform the ioctls on the temproary file as the bad domain
+# Attempt to perform the ioctls on the temporary file as the bad domain
# The test program, test_noioctl.c, determines success/failure for the
# individual calls, so we expect success always from that program.
#
@@ -18,7 +18,7 @@
* argument. This version of the program expects some of the ioctl()
* calls to fail, so if one does succeed, we exit with a bad return code.
* This program expects the domain it is running as to have only read
- * acess to the given file.
+ * access to the given file.
*/
int main(int argc, char **argv)
{
@@ -10,7 +10,7 @@
#include<errno.h>
/*
- * Managed the creation and distruction of a posix mqueue.
+ * Managed the creation and destruction of a posix mqueue.
* The first argument is the name of the mqueue to be managed
* (including starting '/'). The second argument is the
* operation. '1' to create, '0' to remove.
@@ -8,7 +8,7 @@ use Test::More;
BEGIN {
# check if kernel supports posix mqueues file system is mounted
if ( system("mount | grep -q mqueue") ) {
- plan skip_all => "mqueue fileystem not supported/mounted";
+ plan skip_all => "mqueue filesystem not supported/mounted";
}
else {
plan tests => 13;
@@ -29,7 +29,7 @@ setup () {
# (test_overlay_mounter_t, test_overlay_client_t)
chcon -R -t test_overlay_files_ro_t $BASEDIR/lower
- # Label noaccessfile and noaccessdir, with types not accessable to either the
+ # Label noaccessfile and noaccessdir, with types not accessible to either the
# mounter or the client types
chcon -t test_overlay_files_noaccess_t $BASEDIR/lower/noaccessfile $BASEDIR/lower/noaccessdir $BASEDIR/lower/null_noaccess
chcon -t test_overlay_mounter_files_t $BASEDIR/lower/mounterfile $BASEDIR/lower/mounterdir $BASEDIR/lower/null_mounter
@@ -23,7 +23,7 @@ close($f);
$cgroup_cpu = "/sys/fs/cgroup/cpu/tasks";
if ( -w $cgroup_cpu ) {
- # We can only set the scheduler policy fo SCHED_{RR,FIFO} in the root
+ # We can only set the scheduler policy to SCHED_{RR,FIFO} in the root
# cgroup so move our target process to the root cgroup.
open( my $fd, ">>", $cgroup_cpu );
print $fd $pid;
@@ -177,7 +177,7 @@ int main (int argc, char *argv[])
return -1;
}
- /* Acces to the registered memory range should invoke the 'missing'
+ /* Access to the registered memory range should invoke the 'missing'
* userfaultfd page fault, which should get handled by the thread
* created above.
*/