diff --git a/doc/admin/RELEASE_PROCESS.md b/doc/admin/RELEASE_PROCESS.md index 9cc55eba..6f71e21d 100644 --- a/doc/admin/RELEASE_PROCESS.md +++ b/doc/admin/RELEASE_PROCESS.md @@ -104,5 +104,5 @@ release. The following Markdown text is suggested at the top of the release note, see old GitHub releases for examples. ``` -***This release is no longer supported upsteam, please use a more recent release*** +***This release is no longer supported upstream, please use a more recent release*** ``` diff --git a/src/python/seccomp.pyx b/src/python/seccomp.pyx index e2f9f2a4..3551aace 100644 --- a/src/python/seccomp.pyx +++ b/src/python/seccomp.pyx @@ -623,7 +623,7 @@ cdef class SyscallFilter: Resets the seccomp filter state to an initial default state, if a default filter action is not specified in the reset call the original action will be reused. This function does not affect any - seccomp filters alread loaded into the kernel. + seccomp filters already loaded into the kernel. """ if defaction == -1: defaction = self._defaction @@ -800,7 +800,7 @@ cdef class SyscallFilter: In the case where the specific rule is not valid on a specific architecture, e.g. socket() on 32-bit x86, this method rewrites - the rule to the best possible match. If you don't want this fule + the rule to the best possible match. If you don't want this rule rewriting to take place use add_rule_exactly(). """ cdef libseccomp.scmp_arg_cmp c_arg[6] diff --git a/tests/regression b/tests/regression index d28b8482..746cea9a 100755 --- a/tests/regression +++ b/tests/regression @@ -567,7 +567,7 @@ function run_test_bpf_sim() { # if ranges exist, the following will loop through all syscall # and arg ranges and generate/run every combination of requested - # tests; if no ranges were specifed, then the single test is + # tests; if no ranges were specified, then the single test is # run for sys in $(get_seq $low_syscall $high_syscall); do for arg0 in $(get_seq ${low_arg[0]} ${high_arg[0]}); do @@ -628,7 +628,7 @@ function run_test_bpf_sim() { return fi - # simulate the specifed syscall against the BPF filter + # simulate the specified syscall against the BPF filter # and verify the results action=$($GLBL_SYS_SIM -a $simarch -f $tmpfile \ -s $sys ${arg[0]} ${arg[1]} ${arg[2]} \