Skip to content

Commit a12f4f8

Browse files
CaoXiaofengGHtorvalds
authored andcommitted
kernel/user_namespace.c: fix typos
change 'verifing' to 'verifying' change 'certaint' to 'certain' change 'approprpiate' to 'appropriate' Link: https://lkml.kernel.org/r/[email protected] Signed-off-by: Xiaofeng Cao <[email protected]> Signed-off-by: Andrew Morton <[email protected]> Signed-off-by: Linus Torvalds <[email protected]>
1 parent 48207f7 commit a12f4f8

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

kernel/user_namespace.c

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ int create_user_ns(struct cred *new)
8585
/*
8686
* Verify that we can not violate the policy of which files
8787
* may be accessed that is specified by the root directory,
88-
* by verifing that the root directory is at the root of the
88+
* by verifying that the root directory is at the root of the
8989
* mount namespace which allows all files to be accessed.
9090
*/
9191
ret = -EPERM;
@@ -1014,7 +1014,7 @@ static ssize_t map_write(struct file *file, const char __user *buf,
10141014
goto out;
10151015
ret = -EINVAL;
10161016
}
1017-
/* Be very certaint the new map actually exists */
1017+
/* Be very certain the new map actually exists */
10181018
if (new_map.nr_extents == 0)
10191019
goto out;
10201020

@@ -1169,7 +1169,7 @@ static bool new_idmap_permitted(const struct file *file,
11691169

11701170
/* Allow the specified ids if we have the appropriate capability
11711171
* (CAP_SETUID or CAP_SETGID) over the parent user namespace.
1172-
* And the opener of the id file also had the approprpiate capability.
1172+
* And the opener of the id file also has the appropriate capability.
11731173
*/
11741174
if (ns_capable(ns->parent, cap_setid) &&
11751175
file_ns_capable(file, ns->parent, cap_setid))

0 commit comments

Comments
 (0)