aboutsummaryrefslogtreecommitdiff
path: root/security/privileges.go
diff options
context:
space:
mode:
authorebiggers <ebiggers@google.com>2019-09-08 19:46:59 -0700
committerJoseph Richey <joerichey@google.com>2019-09-08 19:46:59 -0700
commit6445dad7d66fa6a1867090fcd9602c98863649f6 (patch)
treec0e5209f018a50ee8b0a1277cc7b06266eff18c1 /security/privileges.go
parent28b29d1c97ffd97671186b5e1fae37b64424f9ee (diff)
Fix various typos and grammatical errors (#141)
These were found by a combination of manual review and a custom script that checks for common errors. Also removed an outdated sentence from the comment for setupBefore().
Diffstat (limited to 'security/privileges.go')
-rw-r--r--security/privileges.go8
1 files changed, 4 insertions, 4 deletions
diff --git a/security/privileges.go b/security/privileges.go
index 649bc30..3a1ca81 100644
--- a/security/privileges.go
+++ b/security/privileges.go
@@ -60,7 +60,7 @@ import (
"github.com/google/fscrypt/util"
)
-// Privileges encapulate the effective uid/gid and groups of a process.
+// Privileges encapsulate the effective uid/gid and groups of a process.
type Privileges struct {
euid C.uid_t
egid C.gid_t
@@ -144,9 +144,9 @@ func SetProcessPrivileges(privs *Privileges) error {
func setUids(ruid, euid, suid int) error {
log.Printf("Setting ruid=%d euid=%d suid=%d", ruid, euid, suid)
- // We elevate the all the privs before setting them. This prevents
- // issues with (ruid=1000,euid=1000,suid=0), where just a single call
- // to setresuid might fail with permission denied.
+ // We elevate all the privs before setting them. This prevents issues
+ // with (ruid=1000,euid=1000,suid=0), where just a single call to
+ // setresuid might fail with permission denied.
if res, err := C.setresuid(0, 0, 0); res < 0 {
return errors.Wrapf(err.(syscall.Errno), "setting uids")
}