[PATCH] Spelling fixes for 2.5.63 - privilege

From: Michael Hayes (mike@aiinc.ca)
Date: Mon Feb 24 2003 - 22:37:45 EST


Spelling fixes for 2.5.63:

This patch fixes:
    priviledge -> privilege
    priviledged -> privileged
    unpriviledged -> unprivileged
    nonpriviledged -> nonprivileged

Fixes 7 occurrences in all.

diff -ur 2.5.63a/arch/alpha/kernel/traps.c 2.5.63b/arch/alpha/kernel/traps.c
--- 2.5.63a/arch/alpha/kernel/traps.c Mon Feb 24 11:05:40 2003
+++ 2.5.63b/arch/alpha/kernel/traps.c Mon Feb 24 16:08:23 2003
@@ -411,7 +411,7 @@
 }
 
 /* There is an ifdef in the PALcode in MILO that enables a
- "kernel debugging entry point" as an unpriviledged call_pal.
+ "kernel debugging entry point" as an unprivileged call_pal.
 
    We don't want to have anything to do with it, but unfortunately
    several versions of MILO included in distributions have it enabled,
diff -ur 2.5.63a/arch/i386/kernel/cpu/intel.c 2.5.63b/arch/i386/kernel/cpu/intel.c
--- 2.5.63a/arch/i386/kernel/cpu/intel.c Mon Feb 24 11:05:14 2003
+++ 2.5.63b/arch/i386/kernel/cpu/intel.c Mon Feb 24 16:07:56 2003
@@ -151,7 +151,7 @@
 #ifdef CONFIG_X86_F00F_BUG
         /*
          * All current models of Pentium and Pentium with MMX technology CPUs
- * have the F0 0F bug, which lets nonpriviledged users lock up the system.
+ * have the F0 0F bug, which lets nonprivileged users lock up the system.
          * Note that the workaround only should be initialized once...
          */
         c->f00f_bug = 0;
diff -ur 2.5.63a/drivers/net/wireless/airo.c 2.5.63b/drivers/net/wireless/airo.c
--- 2.5.63a/drivers/net/wireless/airo.c Mon Feb 24 11:05:08 2003
+++ 2.5.63b/drivers/net/wireless/airo.c Mon Feb 24 16:07:40 2003
@@ -5126,7 +5126,7 @@
         Resp rsp;
 
         /* Note : you may have realised that, as this is a SET operation,
- * this is priviledged and therefore a normal user can't
+ * this is privileged and therefore a normal user can't
          * perform scanning.
          * This is not an error, while the device perform scanning,
          * traffic doesn't flow, so it's a perfect DoS...
diff -ur 2.5.63a/include/asm-arm/bitops.h 2.5.63b/include/asm-arm/bitops.h
--- 2.5.63a/include/asm-arm/bitops.h Mon Feb 24 11:05:05 2003
+++ 2.5.63b/include/asm-arm/bitops.h Mon Feb 24 16:06:05 2003
@@ -9,7 +9,7 @@
  *
  * Please note that the code in this file should never be included
  * from user space. Many of these are not implemented in assembler
- * since they would be too costly. Also, they require priviledged
+ * since they would be too costly. Also, they require privileged
  * instructions (which are not available from user mode) to ensure
  * that they are atomic.
  */
diff -ur 2.5.63a/include/asm-mips/mipsregs.h 2.5.63b/include/asm-mips/mipsregs.h
--- 2.5.63a/include/asm-mips/mipsregs.h Mon Feb 24 11:05:32 2003
+++ 2.5.63b/include/asm-mips/mipsregs.h Mon Feb 24 16:06:26 2003
@@ -528,7 +528,7 @@
 #define CE1_SP_HINT_TO_SHARED_SC_BLOCKS 15
 
 /*
- * These flags define in which priviledge mode the counters count events
+ * These flags define in which privilege mode the counters count events
  */
 #define CEB_USER 8 /* Count events in user mode, EXL = ERL = 0 */
 #define CEB_SUPERVISOR 4 /* Count events in supvervisor mode EXL = ERL = 0 */
diff -ur 2.5.63a/include/asm-mips64/mipsregs.h 2.5.63b/include/asm-mips64/mipsregs.h
--- 2.5.63a/include/asm-mips64/mipsregs.h Mon Feb 24 11:05:41 2003
+++ 2.5.63b/include/asm-mips64/mipsregs.h Mon Feb 24 16:07:20 2003
@@ -310,7 +310,7 @@
 #define CE1_SP_HINT_TO_SHARED_SC_BLOCKS 15
 
 /*
- * These flags define in which priviledge mode the counters count events
+ * These flags define in which privilege mode the counters count events
  */
 #define CEB_USER 8 /* Count events in user mode, EXL = ERL = 0 */
 #define CEB_SUPERVISOR 4 /* Count events in supvervisor mode EXL = ERL = 0 */
diff -ur 2.5.63a/net/sunrpc/auth_unix.c 2.5.63b/net/sunrpc/auth_unix.c
--- 2.5.63a/net/sunrpc/auth_unix.c Mon Feb 24 11:05:34 2003
+++ 2.5.63b/net/sunrpc/auth_unix.c Mon Feb 24 16:08:37 2003
@@ -163,7 +163,7 @@
         memcpy(p, clnt->cl_nodename, n);
         p += (n + 3) >> 2;
 
- /* Note: we don't use real uid if it involves raising priviledge */
+ /* Note: we don't use real uid if it involves raising privilege */
         if (ruid && cred->uc_puid != 0 && cred->uc_pgid != 0) {
                 *p++ = htonl((u32) cred->uc_puid);
                 *p++ = htonl((u32) cred->uc_pgid);
Only in 2.5.63b: out
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/



This archive was generated by hypermail 2b29 : Fri Feb 28 2003 - 22:00:25 EST