diff options
| author | ebiggers <ebiggers@google.com> | 2019-09-08 19:46:59 -0700 |
|---|---|---|
| committer | Joseph Richey <joerichey@google.com> | 2019-09-08 19:46:59 -0700 |
| commit | 6445dad7d66fa6a1867090fcd9602c98863649f6 (patch) | |
| tree | c0e5209f018a50ee8b0a1277cc7b06266eff18c1 /security/privileges.go | |
| parent | 28b29d1c97ffd97671186b5e1fae37b64424f9ee (diff) | |
Fix various typos and grammatical errors (#141)
These were found by a combination of manual review and a custom script
that checks for common errors.
Also removed an outdated sentence from the comment for setupBefore().
Diffstat (limited to 'security/privileges.go')
| -rw-r--r-- | security/privileges.go | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/security/privileges.go b/security/privileges.go index 649bc30..3a1ca81 100644 --- a/security/privileges.go +++ b/security/privileges.go @@ -60,7 +60,7 @@ import ( "github.com/google/fscrypt/util" ) -// Privileges encapulate the effective uid/gid and groups of a process. +// Privileges encapsulate the effective uid/gid and groups of a process. type Privileges struct { euid C.uid_t egid C.gid_t @@ -144,9 +144,9 @@ func SetProcessPrivileges(privs *Privileges) error { func setUids(ruid, euid, suid int) error { log.Printf("Setting ruid=%d euid=%d suid=%d", ruid, euid, suid) - // We elevate the all the privs before setting them. This prevents - // issues with (ruid=1000,euid=1000,suid=0), where just a single call - // to setresuid might fail with permission denied. + // We elevate all the privs before setting them. This prevents issues + // with (ruid=1000,euid=1000,suid=0), where just a single call to + // setresuid might fail with permission denied. if res, err := C.setresuid(0, 0, 0); res < 0 { return errors.Wrapf(err.(syscall.Errno), "setting uids") } |