Spell "privilege" correctly (correct spelling from Jonathan Stone).
This commit is contained in:
parent
f6e5e6544e
commit
299578ebd5
@ -24249,7 +24249,7 @@ If I have seen farther than others, it is because I was standing on the
|
||||
shoulders of giants.
|
||||
-- Isaac Newton
|
||||
|
||||
In the sciences, we are now uniquely priviledged to sit side by side with
|
||||
In the sciences, we are now uniquely privileged to sit side by side with
|
||||
the giants on whose shoulders we stand.
|
||||
-- Gerald Holton
|
||||
|
||||
|
@ -1,4 +1,4 @@
|
||||
/* $NetBSD: atrun.c,v 1.6 1999/02/12 15:04:00 kleink Exp $ */
|
||||
/* $NetBSD: atrun.c,v 1.7 1999/08/16 03:08:33 simonb Exp $ */
|
||||
|
||||
/*
|
||||
* atrun.c - run jobs queued by at; run with root privileges.
|
||||
@ -70,7 +70,7 @@ static char *namep;
|
||||
#if 0
|
||||
static char rcsid[] = "$OpenBSD: atrun.c,v 1.7 1997/09/08 22:12:10 millert Exp $";
|
||||
#else
|
||||
__RCSID("$NetBSD: atrun.c,v 1.6 1999/02/12 15:04:00 kleink Exp $");
|
||||
__RCSID("$NetBSD: atrun.c,v 1.7 1999/08/16 03:08:33 simonb Exp $");
|
||||
#endif
|
||||
|
||||
static int debug = 0;
|
||||
@ -407,7 +407,7 @@ main(argc, argv)
|
||||
|
||||
/*
|
||||
* We don't need root privileges all the time; running under uid
|
||||
* and gid nobody is fine except for priviledged operations.
|
||||
* and gid nobody is fine except for privileged operations.
|
||||
*/
|
||||
RELINQUISH_PRIVS_ROOT(NOBODY_UID, NOBODY_GID)
|
||||
|
||||
|
@ -1,4 +1,4 @@
|
||||
/* $NetBSD: compat_13_machdep.c,v 1.5 1999/08/10 23:35:43 thorpej Exp $ */
|
||||
/* $NetBSD: compat_13_machdep.c,v 1.6 1999/08/16 02:59:22 simonb Exp $ */
|
||||
|
||||
/*
|
||||
* Copyright (c) 1994, 1995, 1996 Carnegie-Mellon University.
|
||||
@ -29,7 +29,7 @@
|
||||
|
||||
#include <sys/cdefs.h> /* RCS ID & Copyright macro defns */
|
||||
|
||||
__KERNEL_RCSID(0, "$NetBSD: compat_13_machdep.c,v 1.5 1999/08/10 23:35:43 thorpej Exp $");
|
||||
__KERNEL_RCSID(0, "$NetBSD: compat_13_machdep.c,v 1.6 1999/08/16 02:59:22 simonb Exp $");
|
||||
|
||||
#include <sys/param.h>
|
||||
#include <sys/systm.h>
|
||||
@ -51,7 +51,7 @@ __KERNEL_RCSID(0, "$NetBSD: compat_13_machdep.c,v 1.5 1999/08/10 23:35:43 thorpe
|
||||
* Return to previous pc and psl as specified by
|
||||
* context left by sendsig. Check carefully to
|
||||
* make sure that the user has not modified the
|
||||
* psl to gain improper priviledges or to cause
|
||||
* psl to gain improper privileges or to cause
|
||||
* a machine fault.
|
||||
*/
|
||||
/* ARGSUSED */
|
||||
|
@ -1,4 +1,4 @@
|
||||
/* $NetBSD: machdep.c,v 1.179 1999/08/10 23:35:44 thorpej Exp $ */
|
||||
/* $NetBSD: machdep.c,v 1.180 1999/08/16 02:59:22 simonb Exp $ */
|
||||
|
||||
/*-
|
||||
* Copyright (c) 1998, 1999 The NetBSD Foundation, Inc.
|
||||
@ -80,7 +80,7 @@
|
||||
|
||||
#include <sys/cdefs.h> /* RCS ID & Copyright macro defns */
|
||||
|
||||
__KERNEL_RCSID(0, "$NetBSD: machdep.c,v 1.179 1999/08/10 23:35:44 thorpej Exp $");
|
||||
__KERNEL_RCSID(0, "$NetBSD: machdep.c,v 1.180 1999/08/16 02:59:22 simonb Exp $");
|
||||
|
||||
#include <sys/param.h>
|
||||
#include <sys/systm.h>
|
||||
@ -1714,7 +1714,7 @@ sendsig(catcher, sig, mask, code)
|
||||
* Return to previous pc and psl as specified by
|
||||
* context left by sendsig. Check carefully to
|
||||
* make sure that the user has not modified the
|
||||
* psl to gain improper priviledges or to cause
|
||||
* psl to gain improper privileges or to cause
|
||||
* a machine fault.
|
||||
*/
|
||||
/* ARGSUSED */
|
||||
|
@ -1,4 +1,4 @@
|
||||
/* $NetBSD: hpux_machdep.c,v 1.22 1999/03/24 05:50:59 mrg Exp $ */
|
||||
/* $NetBSD: hpux_machdep.c,v 1.23 1999/08/16 02:59:23 simonb Exp $ */
|
||||
|
||||
/*-
|
||||
* Copyright (c) 1996, 1997, 1998 The NetBSD Foundation, Inc.
|
||||
@ -572,7 +572,7 @@ hpux_sendsig(catcher, sig, mask, code)
|
||||
* Return to previous pc and psl as specified by
|
||||
* context left by sendsig. Check carefully to
|
||||
* make sure that the user has not modified the
|
||||
* psl to gain improper priviledges or to cause
|
||||
* psl to gain improper privileges or to cause
|
||||
* a machine fault.
|
||||
*/
|
||||
/* ARGSUSED */
|
||||
|
@ -1,4 +1,4 @@
|
||||
/* $NetBSD: compat_13_machdep.c,v 1.1 1998/10/01 01:03:56 thorpej Exp $ */
|
||||
/* $NetBSD: compat_13_machdep.c,v 1.2 1999/08/16 02:59:23 simonb Exp $ */
|
||||
|
||||
/*
|
||||
* Copyright (c) 1988 University of Utah.
|
||||
@ -66,7 +66,7 @@ void m68881_restore __P((struct fpframe *));
|
||||
* Return to previous pc and psl as specified by
|
||||
* context left by sendsig. Check carefully to
|
||||
* make sure that the user has not modified the
|
||||
* psl to gain improper priviledges or to cause
|
||||
* psl to gain improper privileges or to cause
|
||||
* a machine fault.
|
||||
*/
|
||||
int
|
||||
|
@ -1,4 +1,4 @@
|
||||
/* $NetBSD: sig_machdep.c,v 1.12 1998/10/04 23:56:17 thorpej Exp $ */
|
||||
/* $NetBSD: sig_machdep.c,v 1.13 1999/08/16 02:59:23 simonb Exp $ */
|
||||
|
||||
/*
|
||||
* Copyright (c) 1988 University of Utah.
|
||||
@ -232,7 +232,7 @@ sendsig(catcher, sig, mask, code)
|
||||
* Return to previous pc and psl as specified by
|
||||
* context left by sendsig. Check carefully to
|
||||
* make sure that the user has not modified the
|
||||
* psl to gain improper priviledges or to cause
|
||||
* psl to gain improper privileges or to cause
|
||||
* a machine fault.
|
||||
*/
|
||||
int
|
||||
|
@ -1,4 +1,4 @@
|
||||
/* $NetBSD: sunos_machdep.c,v 1.18 1999/03/25 00:41:46 mrg Exp $ */
|
||||
/* $NetBSD: sunos_machdep.c,v 1.19 1999/08/16 02:59:23 simonb Exp $ */
|
||||
|
||||
/*
|
||||
* Copyright (c) 1988 University of Utah.
|
||||
@ -204,7 +204,7 @@ sunos_sendsig(catcher, sig, mask, code)
|
||||
* Return to previous pc and psl as specified by
|
||||
* context left by sendsig. Check carefully to
|
||||
* make sure that the user has not modified the
|
||||
* psl to gain improper priviledges or to cause
|
||||
* psl to gain improper privileges or to cause
|
||||
* a machine fault.
|
||||
*/
|
||||
int
|
||||
|
@ -1,4 +1,4 @@
|
||||
/* $NetBSD: mips_machdep.c,v 1.53 1999/05/20 08:21:45 lukem Exp $ */
|
||||
/* $NetBSD: mips_machdep.c,v 1.54 1999/08/16 02:59:23 simonb Exp $ */
|
||||
|
||||
/*-
|
||||
* Copyright (c) 1998 The NetBSD Foundation, Inc.
|
||||
@ -52,7 +52,7 @@
|
||||
|
||||
#include <sys/cdefs.h> /* RCS ID & Copyright macro defns */
|
||||
|
||||
__KERNEL_RCSID(0, "$NetBSD: mips_machdep.c,v 1.53 1999/05/20 08:21:45 lukem Exp $");
|
||||
__KERNEL_RCSID(0, "$NetBSD: mips_machdep.c,v 1.54 1999/08/16 02:59:23 simonb Exp $");
|
||||
|
||||
#include "opt_compat_netbsd.h"
|
||||
#include "opt_compat_ultrix.h"
|
||||
@ -783,7 +783,7 @@ sendsig(catcher, sig, mask, code)
|
||||
* Return to previous pc and psl as specified by
|
||||
* context left by sendsig. Check carefully to
|
||||
* make sure that the user has not modified the
|
||||
* psl to gain improper priviledges or to cause
|
||||
* psl to gain improper privileges or to cause
|
||||
* a machine fault.
|
||||
*/
|
||||
/* ARGSUSED */
|
||||
|
@ -1,4 +1,4 @@
|
||||
/* $NetBSD: machdep.c,v 1.104 1999/06/28 08:20:47 itojun Exp $ */
|
||||
/* $NetBSD: machdep.c,v 1.105 1999/08/16 02:59:23 simonb Exp $ */
|
||||
|
||||
/*-
|
||||
* Copyright (c) 1996 Matthias Pfaller.
|
||||
@ -460,7 +460,7 @@ sendsig(catcher, sig, mask, code)
|
||||
* Return to previous pc and psl as specified by
|
||||
* context left by sendsig. Check carefully to
|
||||
* make sure that the user has not modified the
|
||||
* psl to gain improper priviledges or to cause
|
||||
* psl to gain improper privileges or to cause
|
||||
* a machine fault.
|
||||
*/
|
||||
int
|
||||
|
@ -1,4 +1,4 @@
|
||||
/* $NetBSD: osf1_prot.c,v 1.2 1999/05/05 01:51:35 cgd Exp $ */
|
||||
/* $NetBSD: osf1_prot.c,v 1.3 1999/08/16 02:59:24 simonb Exp $ */
|
||||
|
||||
/*
|
||||
* Copyright (c) 1999 Christopher G. Demetriou. All rights reserved.
|
||||
@ -104,10 +104,10 @@ osf1_sys_setgid(p, v, retval)
|
||||
* setuid() won't work.
|
||||
*
|
||||
* Instead, by P1003.1b-1993, setuid() is supposed to work like:
|
||||
* If the process has appropriate [super-user] priviledges, the
|
||||
* If the process has appropriate [super-user] privileges, the
|
||||
* setuid() function sets the real user ID, effective user
|
||||
* ID, and the saved set-user-ID to uid.
|
||||
* If the process does not have appropriate priviledges, but uid
|
||||
* If the process does not have appropriate privileges, but uid
|
||||
* is equal to the real user ID or the saved set-user-ID, the
|
||||
* setuid() function sets the effective user ID to uid; the
|
||||
* real user ID and saved set-user-ID remain unchanged by
|
||||
|
@ -1,4 +1,4 @@
|
||||
/* $NetBSD: pw_yp.c,v 1.14 1998/07/26 21:25:16 mycroft Exp $ */
|
||||
/* $NetBSD: pw_yp.c,v 1.15 1999/08/16 03:02:46 simonb Exp $ */
|
||||
|
||||
/*
|
||||
* Copyright (c) 1988 The Regents of the University of California.
|
||||
@ -37,7 +37,7 @@
|
||||
#if 0
|
||||
static char sccsid[] = "@(#)pw_yp.c 1.0 2/2/93";
|
||||
#else
|
||||
__RCSID("$NetBSD: pw_yp.c,v 1.14 1998/07/26 21:25:16 mycroft Exp $");
|
||||
__RCSID("$NetBSD: pw_yp.c,v 1.15 1999/08/16 03:02:46 simonb Exp $");
|
||||
#endif
|
||||
#endif /* not lint */
|
||||
|
||||
@ -151,7 +151,7 @@ pw_yp(pw, uid)
|
||||
}
|
||||
|
||||
/*
|
||||
* Be sure the port is priviledged
|
||||
* Be sure the port is privileged
|
||||
*/
|
||||
if (rpcport >= IPPORT_RESERVED) {
|
||||
warnx("yppasswd daemon is on an invalid port.");
|
||||
|
@ -1,4 +1,4 @@
|
||||
/* $NetBSD: modstat.c,v 1.13 1999/06/15 15:04:40 christos Exp $ */
|
||||
/* $NetBSD: modstat.c,v 1.14 1999/08/16 03:02:46 simonb Exp $ */
|
||||
|
||||
/*
|
||||
* Copyright (c) 1993 Terrence R. Lambert.
|
||||
@ -34,7 +34,7 @@
|
||||
|
||||
#include <sys/cdefs.h>
|
||||
#ifndef lint
|
||||
__RCSID("$NetBSD: modstat.c,v 1.13 1999/06/15 15:04:40 christos Exp $");
|
||||
__RCSID("$NetBSD: modstat.c,v 1.14 1999/08/16 03:02:46 simonb Exp $");
|
||||
#endif
|
||||
|
||||
#include <sys/param.h>
|
||||
@ -176,7 +176,7 @@ main(argc, argv)
|
||||
if ((devfd = open(_PATH_LKM, O_RDONLY, 0)) == -1)
|
||||
err(2, _PATH_LKM);
|
||||
|
||||
/* get rid of our priviledges now */
|
||||
/* get rid of our privileges now */
|
||||
setgid(getgid());
|
||||
|
||||
atexit(cleanup);
|
||||
|
@ -1,4 +1,4 @@
|
||||
/* $NetBSD: yp_passwd.c,v 1.19 1998/07/26 22:15:38 mycroft Exp $ */
|
||||
/* $NetBSD: yp_passwd.c,v 1.20 1999/08/16 03:02:46 simonb Exp $ */
|
||||
|
||||
/*
|
||||
* Copyright (c) 1988, 1990, 1993, 1994
|
||||
@ -38,7 +38,7 @@
|
||||
#if 0
|
||||
static char sccsid[] = "from: @(#)local_passwd.c 8.3 (Berkeley) 4/2/94";
|
||||
#else
|
||||
__RCSID("$NetBSD: yp_passwd.c,v 1.19 1998/07/26 22:15:38 mycroft Exp $");
|
||||
__RCSID("$NetBSD: yp_passwd.c,v 1.20 1999/08/16 03:02:46 simonb Exp $");
|
||||
#endif
|
||||
#endif /* not lint */
|
||||
|
||||
@ -150,7 +150,7 @@ yp_passwd(username)
|
||||
}
|
||||
|
||||
/*
|
||||
* Be sure the port is priviledged
|
||||
* Be sure the port is privileged
|
||||
*/
|
||||
if (rpcport >= IPPORT_RESERVED)
|
||||
errx(1, "yppasswd daemon is on an invalid port.");
|
||||
|
@ -1,4 +1,4 @@
|
||||
/* $NetBSD: tip.h,v 1.12 1998/12/19 23:00:43 christos Exp $ */
|
||||
/* $NetBSD: tip.h,v 1.13 1999/08/16 03:02:46 simonb Exp $ */
|
||||
|
||||
/*
|
||||
* Copyright (c) 1989, 1993
|
||||
@ -177,7 +177,7 @@ typedef
|
||||
typedef
|
||||
struct {
|
||||
char e_char; /* char to match on */
|
||||
char e_flags; /* experimental, priviledged */
|
||||
char e_flags; /* experimental, privileged */
|
||||
char *e_help; /* help string */
|
||||
void (*e_func) __P((char)); /* command */
|
||||
}
|
||||
@ -185,7 +185,7 @@ typedef
|
||||
|
||||
#define NORM 00 /* normal protection, execute anyone */
|
||||
#define EXP 01 /* experimental, mark it with a `*' on help */
|
||||
#define PRIV 02 /* priviledged, root execute only */
|
||||
#define PRIV 02 /* privileged, root execute only */
|
||||
|
||||
extern int vflag; /* verbose during reading of .tiprc file */
|
||||
extern value_t vtable[]; /* variable table */
|
||||
|
@ -1,4 +1,4 @@
|
||||
.\" $NetBSD: install.1,v 1.18 1999/08/01 05:02:06 sommerfeld Exp $
|
||||
.\" $NetBSD: install.1,v 1.19 1999/08/16 03:02:46 simonb Exp $
|
||||
.\"
|
||||
.\" Copyright (c) 1987, 1990, 1993
|
||||
.\" The Regents of the University of California. All rights reserved.
|
||||
@ -219,7 +219,7 @@ directly. This flag implies -s.
|
||||
Create directories.
|
||||
Missing parent directories are created as required.
|
||||
.It Fl U
|
||||
Indicate that install is running unpriviledged, and that it should not
|
||||
Indicate that install is running unprivileged, and that it should not
|
||||
try to change the owner or the group of the destination.
|
||||
A future version of this file may log the owner/group information
|
||||
elsewhere; currently, it's just discarded.
|
||||
|
@ -44,7 +44,7 @@ __COPYRIGHT("@(#) Copyright (c) 1980, 1990, 1993\n\
|
||||
#if 0
|
||||
static char sccsid[] = "from: @(#)edquota.c 8.3 (Berkeley) 4/27/95";
|
||||
#else
|
||||
__RCSID("$NetBSD: edquota.c,v 1.17 1998/03/30 03:33:05 mrg Exp $");
|
||||
__RCSID("$NetBSD: edquota.c,v 1.18 1999/08/16 03:12:31 simonb Exp $");
|
||||
#endif
|
||||
#endif /* not lint */
|
||||
|
||||
@ -342,7 +342,7 @@ putprivs(id, quotatype, quplist)
|
||||
}
|
||||
|
||||
/*
|
||||
* Take a list of priviledges and get it edited.
|
||||
* Take a list of privileges and get it edited.
|
||||
*/
|
||||
int
|
||||
editit(tmpfile)
|
||||
|
@ -1,4 +1,4 @@
|
||||
/* $NetBSD: lprm.c,v 1.8 1998/07/06 07:03:29 mrg Exp $ */
|
||||
/* $NetBSD: lprm.c,v 1.9 1999/08/16 03:12:32 simonb Exp $ */
|
||||
|
||||
/*
|
||||
* Copyright (c) 1983, 1993
|
||||
@ -41,7 +41,7 @@ __COPYRIGHT("@(#) Copyright (c) 1983, 1993\n\
|
||||
#if 0
|
||||
static char sccsid[] = "@(#)lprm.c 8.1 (Berkeley) 6/6/93";
|
||||
#else
|
||||
__RCSID("$NetBSD: lprm.c,v 1.8 1998/07/06 07:03:29 mrg Exp $");
|
||||
__RCSID("$NetBSD: lprm.c,v 1.9 1999/08/16 03:12:32 simonb Exp $");
|
||||
#endif
|
||||
#endif /* not lint */
|
||||
|
||||
@ -52,7 +52,7 @@ __RCSID("$NetBSD: lprm.c,v 1.8 1998/07/06 07:03:29 mrg Exp $");
|
||||
*
|
||||
* Using information in the lock file, lprm will kill the
|
||||
* currently active daemon (if necessary), remove the associated files,
|
||||
* and startup a new daemon. Priviledged users may remove anyone's spool
|
||||
* and startup a new daemon. Privileged users may remove anyone's spool
|
||||
* entries, otherwise one can only remove their own.
|
||||
*/
|
||||
|
||||
|
@ -1,4 +1,4 @@
|
||||
/* $NetBSD: mountd.c,v 1.54 1999/08/09 20:22:39 perseant Exp $ */
|
||||
/* $NetBSD: mountd.c,v 1.55 1999/08/16 03:12:32 simonb Exp $ */
|
||||
|
||||
/*
|
||||
* Copyright (c) 1989, 1993
|
||||
@ -51,7 +51,7 @@ __COPYRIGHT("@(#) Copyright (c) 1989, 1993\n\
|
||||
#if 0
|
||||
static char sccsid[] = "@(#)mountd.c 8.15 (Berkeley) 5/1/95";
|
||||
#else
|
||||
__RCSID("$NetBSD: mountd.c,v 1.54 1999/08/09 20:22:39 perseant Exp $");
|
||||
__RCSID("$NetBSD: mountd.c,v 1.55 1999/08/16 03:12:32 simonb Exp $");
|
||||
#endif
|
||||
#endif /* not lint */
|
||||
|
||||
@ -1898,7 +1898,7 @@ parsecred(namelist, cr)
|
||||
int ngroups, groups[NGROUPS + 1];
|
||||
|
||||
/*
|
||||
* Set up the unpriviledged user.
|
||||
* Set up the unprivileged user.
|
||||
*/
|
||||
cr->cr_ref = 1;
|
||||
cr->cr_uid = -2;
|
||||
|
@ -1,4 +1,4 @@
|
||||
/* $NetBSD: ypbind.c,v 1.39 1999/06/06 02:38:00 thorpej Exp $ */
|
||||
/* $NetBSD: ypbind.c,v 1.40 1999/08/16 03:12:32 simonb Exp $ */
|
||||
|
||||
/*
|
||||
* Copyright (c) 1992, 1993 Theo de Raadt <deraadt@fsa.ca>
|
||||
@ -34,7 +34,7 @@
|
||||
|
||||
#include <sys/cdefs.h>
|
||||
#ifndef LINT
|
||||
__RCSID("$NetBSD: ypbind.c,v 1.39 1999/06/06 02:38:00 thorpej Exp $");
|
||||
__RCSID("$NetBSD: ypbind.c,v 1.40 1999/08/16 03:12:32 simonb Exp $");
|
||||
#endif
|
||||
|
||||
#include <sys/param.h>
|
||||
@ -392,7 +392,7 @@ ypbindproc_setdom_2(transp, argp)
|
||||
if (ntohs(fromsin->sin_port) >= IPPORT_RESERVED) {
|
||||
#ifdef DEBUG
|
||||
if (debug)
|
||||
printf("ypset from unpriviledged port denied\n");
|
||||
printf("ypset from unprivileged port denied\n");
|
||||
#endif
|
||||
return &res;
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user