diff --git a/src/nsresourced/bpf/userns_restrict/userns-restrict.bpf.c b/src/nsresourced/bpf/userns_restrict/userns-restrict.bpf.c index 956f91759a..c9a936ba13 100644 --- a/src/nsresourced/bpf/userns_restrict/userns-restrict.bpf.c +++ b/src/nsresourced/bpf/userns_restrict/userns-restrict.bpf.c @@ -26,7 +26,7 @@ void *bpf_rdonly_cast(void *, __u32) __ksym; * by their inode number in nsfs) that restricts creation of inodes (which would inherit the callers UID/GID) * or changing of ownership (similar). * - * This hooks into the varius path-based LSM entrypoints that control inode creation as well as chmod(), and + * This hooks into the various path-based LSM entrypoints that control inode creation as well as chmod(), and * then looks up the calling process' user namespace in a global map of namespaces, which points us to * another map that is simply a list of allowed mnt_ids. */