summaryrefslogtreecommitdiff
path: root/sys/kern
diff options
context:
space:
mode:
authorMiod Vallat <miod@cvs.openbsd.org>2007-04-10 17:47:57 +0000
committerMiod Vallat <miod@cvs.openbsd.org>2007-04-10 17:47:57 +0000
commitb79f7d8019552bffbfb9132282c9e400ed234e23 (patch)
tree746cae9358ef503518bb08df39c8d11a2ea50ded /sys/kern
parent3b1e074fc83378f28653b59731c5a50a5b3d8bf3 (diff)
``it's'' -> ``its'' when the grammar gods require this change.
Diffstat (limited to 'sys/kern')
-rw-r--r--sys/kern/exec_elf.c6
-rw-r--r--sys/kern/sys_process.c4
2 files changed, 5 insertions, 5 deletions
diff --git a/sys/kern/exec_elf.c b/sys/kern/exec_elf.c
index f09a19ff141..1481356b67c 100644
--- a/sys/kern/exec_elf.c
+++ b/sys/kern/exec_elf.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: exec_elf.c,v 1.59 2007/03/20 12:32:07 thib Exp $ */
+/* $OpenBSD: exec_elf.c,v 1.60 2007/04/10 17:47:55 miod Exp $ */
/*
* Copyright (c) 1996 Per Fogelstrom
@@ -159,7 +159,7 @@ ELFNAME(copyargs)(struct exec_package *pack, struct ps_strings *arginfo,
*/
if (pack->ep_interp != NULL) {
pack->ep_emul_argp = stack;
- (char *)stack += ELF_AUX_ENTRIES * sizeof (AuxInfo);
+ stack = (char *)stack + ELF_AUX_ENTRIES * sizeof (AuxInfo);
}
return (stack);
}
@@ -739,7 +739,7 @@ native:
/*
* Check if we found a dynamically linked binary and arrange to load
- * it's interpreter when the exec file is released.
+ * its interpreter when the exec file is released.
*/
if (interp) {
struct elf_args *ap;
diff --git a/sys/kern/sys_process.c b/sys/kern/sys_process.c
index 188c581983d..748e07bf99f 100644
--- a/sys/kern/sys_process.c
+++ b/sys/kern/sys_process.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: sys_process.c,v 1.38 2007/03/15 10:22:30 art Exp $ */
+/* $OpenBSD: sys_process.c,v 1.39 2007/04/10 17:47:55 miod Exp $ */
/* $NetBSD: sys_process.c,v 1.55 1996/05/15 06:17:47 tls Exp $ */
/*-
@@ -147,7 +147,7 @@ sys_ptrace(struct proc *p, void *v, register_t *retval)
* [Note: once P_SUGID or P_SUGIDEXEC gets set in
* execve(), they stay set until the process does
* another execve(). Hence this prevents a setuid
- * process which revokes it's special privileges using
+ * process which revokes its special privileges using
* setuid() from being traced. This is good security.]
*/
if ((t->p_cred->p_ruid != p->p_cred->p_ruid ||