From patchwork Sat Nov 18 16:56:32 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Christian Brauner X-Patchwork-Id: 24349 Received: (qmail 109269 invoked by alias); 18 Nov 2017 16:56:44 -0000 Mailing-List: contact libc-alpha-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Unsubscribe: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: libc-alpha-owner@sourceware.org Delivered-To: mailing list libc-alpha@sourceware.org Received: (qmail 109257 invoked by uid 89); 18 Nov 2017 16:56:44 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-26.3 required=5.0 tests=AWL, BAYES_00, GIT_PATCH_0, GIT_PATCH_1, GIT_PATCH_2, GIT_PATCH_3, KAM_LAZY_DOMAIN_SECURITY, KB_WAM_FROM_NAME_SINGLEWORD, RCVD_IN_DNSWL_LOW autolearn=ham version=3.3.2 spammy=Hx-languages-length:1082 X-HELO: mx1.mailbox.org From: Christian Brauner To: libc-alpha@sourceware.org Cc: fweimer@redhat.com, schwab@linux-m68k.org, Christian Brauner Subject: [PATCH] support_become_root: Fix comment style Date: Sat, 18 Nov 2017 17:56:32 +0100 Message-Id: <20171118165632.17396-1-christian.brauner@ubuntu.com> --- ChangeLog | 3 +++ support/support_become_root.c | 2 +- 2 files changed, 4 insertions(+), 1 deletion(-) diff --git a/ChangeLog b/ChangeLog index 5e3d174a5e..60713164da 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,5 +1,8 @@ 2017-11-18 Christian Brauner + * support/support_become_root.c (setup_uid_gid_mapping): Fix comment + style. + * support/support_become_root.c (setup_uid_gid_mapping): Don't fail when /proc//setgroups does not exist. diff --git a/support/support_become_root.c b/support/support_become_root.c index e45c939421..933138f99f 100644 --- a/support/support_become_root.c +++ b/support/support_become_root.c @@ -52,7 +52,7 @@ setup_uid_gid_mapping (uid_t original_uid, gid_t original_gid) xclose (fd); /* Linux 3.19 introduced the setgroups file. We need write "deny" to this - * file otherwise writing to gid_map will fail with EPERM. */ + file otherwise writing to gid_map will fail with EPERM. */ fd = open64 ("/proc/self/setgroups", O_WRONLY, 0); if (fd < 0) {