[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20190402114414.23767-1-cquast@hanoverdisplays.com>
Date: Tue, 2 Apr 2019 13:44:14 +0200
From: Christina Quast <cquast@...overdisplays.com>
To: unlisted-recipients:; (no To-header on input)
Cc: trivial@...nel.org, Christina Quast <cquast@...overdisplays.com>,
Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
Tejun Heo <tj@...nel.org>, linux-kernel@...r.kernel.org
Subject: [PATCH] fs: kernfs: Corrected spelling mistake
Signed-off-by: Christina Quast <cquast@...overdisplays.com>
---
include/linux/kernfs.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/include/linux/kernfs.h b/include/linux/kernfs.h
index c8893f663470..e446ab97ee0c 100644
--- a/include/linux/kernfs.h
+++ b/include/linux/kernfs.h
@@ -64,7 +64,7 @@ enum kernfs_root_flag {
KERNFS_ROOT_CREATE_DEACTIVATED = 0x0001,
/*
- * For regular flies, if the opener has CAP_DAC_OVERRIDE, open(2)
+ * For regular files, if the opener has CAP_DAC_OVERRIDE, open(2)
* succeeds regardless of the RW permissions. sysfs had an extra
* layer of enforcement where open(2) fails with -EACCES regardless
* of CAP_DAC_OVERRIDE if the permission doesn't have the
--
2.20.1
Powered by blists - more mailing lists