summaryrefslogtreecommitdiff
path: root/sys/dev
diff options
context:
space:
mode:
Diffstat (limited to 'sys/dev')
-rw-r--r--sys/dev/ramdisk.c6
-rw-r--r--sys/dev/rnd.c4
-rw-r--r--sys/dev/systrace.c6
3 files changed, 8 insertions, 8 deletions
diff --git a/sys/dev/ramdisk.c b/sys/dev/ramdisk.c
index 4387993ff04..0a1530e9a0e 100644
--- a/sys/dev/ramdisk.c
+++ b/sys/dev/ramdisk.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: ramdisk.c,v 1.21 2003/04/19 12:59:13 krw Exp $ */
+/* $OpenBSD: ramdisk.c,v 1.22 2003/10/21 05:24:40 jmc Exp $ */
/* $NetBSD: ramdisk.c,v 1.8 1996/04/12 08:30:09 leo Exp $ */
/*
@@ -33,7 +33,7 @@
*/
/*
- * This implements a general-puspose RAM-disk.
+ * This implements a general-purpose RAM-disk.
* See ramdisk.h for notes on the config types.
*
* Note that this driver provides the same functionality
@@ -75,7 +75,7 @@
* XXX: the "control" unit is (base unit + 16).
* We should just use the cdev as the "control", but
* that interferes with the security stuff preventing
- * simulatneous use of raw and block devices.
+ * simultaneous use of raw and block devices.
*
* XXX Assumption: 16 RAM-disks are enough!
*/
diff --git a/sys/dev/rnd.c b/sys/dev/rnd.c
index 54b692e47a8..a99dfb30c8a 100644
--- a/sys/dev/rnd.c
+++ b/sys/dev/rnd.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: rnd.c,v 1.64 2003/09/23 16:51:12 millert Exp $ */
+/* $OpenBSD: rnd.c,v 1.65 2003/10/21 05:24:40 jmc Exp $ */
/*
* rnd.c -- A strong random number generator
@@ -343,7 +343,7 @@ int rnd_debug = 0x0000;
* decrease the uncertainty).
*
* The chosen system lets the state of the pool be (essentially) the input
- * modulo the generator polymnomial. Now, for random primitive polynomials,
+ * modulo the generator polynomial. Now, for random primitive polynomials,
* this is a universal class of hash functions, meaning that the chance
* of a collision is limited by the attacker's knowledge of the generator
* polynomial, so if it is chosen at random, an attacker can never force
diff --git a/sys/dev/systrace.c b/sys/dev/systrace.c
index db645caef15..6faadffc21b 100644
--- a/sys/dev/systrace.c
+++ b/sys/dev/systrace.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: systrace.c,v 1.33 2003/10/08 16:30:01 sturm Exp $ */
+/* $OpenBSD: systrace.c,v 1.34 2003/10/21 05:24:40 jmc Exp $ */
/*
* Copyright 2002 Niels Provos <provos@citi.umich.edu>
* All rights reserved.
@@ -1164,8 +1164,8 @@ systrace_attach(struct fsystrace *fst, pid_t pid)
*
* [Note: once P_SUGID gets set in execve(), it stays
* set until the process does another execve(). Hence
- * this prevents a setuid process which revokes it's
- * special privilidges using setuid() from being
+ * this prevents a setuid process which revokes its
+ * special privileges using setuid() from being
* traced. This is good security.]
*/
if ((proc->p_cred->p_ruid != p->p_cred->p_ruid ||