summaryrefslogtreecommitdiff
path: root/sys
diff options
context:
space:
mode:
authorJason McIntyre <jmc@cvs.openbsd.org>2006-11-14 18:00:28 +0000
committerJason McIntyre <jmc@cvs.openbsd.org>2006-11-14 18:00:28 +0000
commit34bbb4b424903cb41ab2282ced986b7df8d833e8 (patch)
treece4751267c5564420a832d39b08ca64dfbaa78e4 /sys
parent38e31f133263e45d9626b09f6c6c87b5ed346743 (diff)
grammar, spelling, and style fixes from bret lambert;
kern_descrip.c change ok deraadt
Diffstat (limited to 'sys')
-rw-r--r--sys/kern/clock_subr.c4
-rw-r--r--sys/kern/exec_elf.c4
-rw-r--r--sys/kern/exec_script.c10
-rw-r--r--sys/kern/exec_subr.c4
-rw-r--r--sys/kern/init_main.c4
-rw-r--r--sys/kern/kern_acct.c4
-rw-r--r--sys/kern/kern_descrip.c8
7 files changed, 20 insertions, 18 deletions
diff --git a/sys/kern/clock_subr.c b/sys/kern/clock_subr.c
index b661121c6af..7cbef619a6c 100644
--- a/sys/kern/clock_subr.c
+++ b/sys/kern/clock_subr.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: clock_subr.c,v 1.1 2006/06/19 15:13:35 deraadt Exp $ */
+/* $OpenBSD: clock_subr.c,v 1.2 2006/11/14 18:00:27 jmc Exp $ */
/* $NetBSD: clock_subr.c,v 1.3 1997/03/15 18:11:16 is Exp $ */
/*
@@ -92,7 +92,7 @@ clock_ymdhms_to_secs(struct clock_ymdhms *dt)
year = dt->dt_year;
/*
- * Compute days since start of time
+ * Compute days since start of time.
* First from years, then from months.
*/
days = 0;
diff --git a/sys/kern/exec_elf.c b/sys/kern/exec_elf.c
index a07a9aa02e3..c09aba62e95 100644
--- a/sys/kern/exec_elf.c
+++ b/sys/kern/exec_elf.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: exec_elf.c,v 1.54 2006/07/10 20:00:08 kettenis Exp $ */
+/* $OpenBSD: exec_elf.c,v 1.55 2006/11/14 18:00:27 jmc Exp $ */
/*
* Copyright (c) 1996 Per Fogelstrom
@@ -639,7 +639,7 @@ native:
switch (ph[i].p_type) {
case PT_LOAD:
/*
- * Calcuates size of text and data segments
+ * Calculates size of text and data segments
* by starting at first and going to end of last.
* 'rwx' sections are treated as data.
* this is correct for BSS_PLT, but may not be
diff --git a/sys/kern/exec_script.c b/sys/kern/exec_script.c
index 97535cecc50..791fc3f5ab9 100644
--- a/sys/kern/exec_script.c
+++ b/sys/kern/exec_script.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: exec_script.c,v 1.23 2005/11/12 04:31:24 jsg Exp $ */
+/* $OpenBSD: exec_script.c,v 1.24 2006/11/14 18:00:27 jmc Exp $ */
/* $NetBSD: exec_script.c,v 1.13 1996/02/04 02:15:06 christos Exp $ */
/*
@@ -60,7 +60,7 @@
* exec_script_makecmds(): Check if it's an executable shell script.
*
* Given a proc pointer and an exec package pointer, see if the referent
- * of the epp is in shell script. If it is, then set thing up so that
+ * of the epp is in shell script. If it is, then set things up so that
* the script can be run. This involves preparing the address space
* and arguments for the shell which will run the script.
*
@@ -125,7 +125,7 @@ exec_script_makecmds(struct proc *p, struct exec_package *epp)
cp++)
;
- /* collect the shell name; remember it's length for later */
+ /* collect the shell name; remember its length for later */
shellname = cp;
shellnamelen = 0;
if (*cp == '\0')
@@ -169,7 +169,7 @@ check_shell:
* if the script isn't readable, or it's set-id, then we've
* gotta supply a "/dev/fd/..." for the shell to read.
* Note that stupid shells (csh) do the wrong thing, and
- * close all open fd's when the start. That kills this
+ * close all open fd's when they start. That kills this
* method of implementing "safe" set-id and x-only scripts.
*/
vn_lock(scriptvp, LK_EXCLUSIVE|LK_RETRY, p);
@@ -274,7 +274,7 @@ check_shell:
epp->ep_fa = shellargp;
#ifdef SETUIDSCRIPTS
/*
- * set thing up so that set-id scripts will be
+ * set things up so that set-id scripts will be
* handled appropriately
*/
epp->ep_vap->va_mode |= script_sbits;
diff --git a/sys/kern/exec_subr.c b/sys/kern/exec_subr.c
index b1c563bf5ac..0c8c28cde1d 100644
--- a/sys/kern/exec_subr.c
+++ b/sys/kern/exec_subr.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: exec_subr.c,v 1.27 2006/07/26 19:11:01 sturm Exp $ */
+/* $OpenBSD: exec_subr.c,v 1.28 2006/11/14 18:00:27 jmc Exp $ */
/* $NetBSD: exec_subr.c,v 1.9 1994/12/04 03:10:42 mycroft Exp $ */
/*
@@ -170,7 +170,7 @@ vmcmd_map_pagedvn(p, cmd)
struct exec_vmcmd *cmd;
{
/*
- * note that if you're going to map part of an process as being
+ * note that if you're going to map part of a process as being
* paged from a vnode, that vnode had damn well better be marked as
* VTEXT. that's handled in the routine which sets up the vmcmd to
* call this routine.
diff --git a/sys/kern/init_main.c b/sys/kern/init_main.c
index 1f7dd45da46..3ebb901b5cc 100644
--- a/sys/kern/init_main.c
+++ b/sys/kern/init_main.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: init_main.c,v 1.130 2006/05/06 23:02:36 deraadt Exp $ */
+/* $OpenBSD: init_main.c,v 1.131 2006/11/14 18:00:27 jmc Exp $ */
/* $NetBSD: init_main.c,v 1.84.4.1 1996/06/02 09:08:06 mrg Exp $ */
/*
@@ -423,7 +423,7 @@ main(void *framep)
panic("fork init");
/*
- * Create any kernel threads who's creation was deferred because
+ * Create any kernel threads whose creation was deferred because
* initproc had not yet been created.
*/
kthread_run_deferred_queue();
diff --git a/sys/kern/kern_acct.c b/sys/kern/kern_acct.c
index 65b6d9bc114..0a229b2ebc3 100644
--- a/sys/kern/kern_acct.c
+++ b/sys/kern/kern_acct.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: kern_acct.c,v 1.18 2006/01/05 03:18:46 tedu Exp $ */
+/* $OpenBSD: kern_acct.c,v 1.19 2006/11/14 18:00:27 jmc Exp $ */
/* $NetBSD: kern_acct.c,v 1.42 1996/02/04 02:15:12 christos Exp $ */
/*-
@@ -109,7 +109,7 @@ sys_acct(struct proc *p, void *v, register_t *retval)
/*
* If accounting is to be started to a file, open that file for
- * writing and make sure it's a 'normal'.
+ * writing and make sure it's 'normal'.
*/
if (SCARG(uap, path) != NULL) {
NDINIT(&nd, LOOKUP, NOFOLLOW, UIO_USERSPACE, SCARG(uap, path),
diff --git a/sys/kern/kern_descrip.c b/sys/kern/kern_descrip.c
index e41013a29b0..8d9c1189032 100644
--- a/sys/kern/kern_descrip.c
+++ b/sys/kern/kern_descrip.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: kern_descrip.c,v 1.74 2006/05/07 20:12:41 tedu Exp $ */
+/* $OpenBSD: kern_descrip.c,v 1.75 2006/11/14 18:00:27 jmc Exp $ */
/* $NetBSD: kern_descrip.c,v 1.42 1996/03/30 22:24:38 christos Exp $ */
/*
@@ -609,8 +609,10 @@ sys_fstat(struct proc *p, void *v, register_t *retval)
error = (*fp->f_ops->fo_stat)(fp, &ub, p);
FRELE(fp);
if (error == 0) {
- /* Don't let non-root see generation numbers
- (for NFS security) */
+ /*
+ * Don't let non-root see generation numbers
+ * (for NFS security)
+ */
if (suser(p, 0))
ub.st_gen = 0;
error = copyout((caddr_t)&ub, (caddr_t)SCARG(uap, sb),