Commit 99639a8c authored by Michael Hayes's avatar Michael Hayes Committed by David Woodhouse

[PATCH] Spelling fixes - privilege

This fixes:
    priviledge -> privilege
    priviledged -> privileged
    unpriviledged -> unprivileged
    nonpriviledged -> nonprivileged

Fixes 7 occurrences in all.
parent bfc2b3aa
......@@ -411,7 +411,7 @@ do_entIF(unsigned long type, struct pt_regs *regs)
}
/* There is an ifdef in the PALcode in MILO that enables a
"kernel debugging entry point" as an unpriviledged call_pal.
"kernel debugging entry point" as an unprivileged call_pal.
We don't want to have anything to do with it, but unfortunately
several versions of MILO included in distributions have it enabled,
......
......@@ -151,7 +151,7 @@ static void __init init_intel(struct cpuinfo_x86 *c)
#ifdef CONFIG_X86_F00F_BUG
/*
* All current models of Pentium and Pentium with MMX technology CPUs
* have the F0 0F bug, which lets nonpriviledged users lock up the system.
* have the F0 0F bug, which lets nonprivileged users lock up the system.
* Note that the workaround only should be initialized once...
*/
c->f00f_bug = 0;
......
......@@ -5126,7 +5126,7 @@ static int airo_set_scan(struct net_device *dev,
Resp rsp;
/* Note : you may have realised that, as this is a SET operation,
* this is priviledged and therefore a normal user can't
* this is privileged and therefore a normal user can't
* perform scanning.
* This is not an error, while the device perform scanning,
* traffic doesn't flow, so it's a perfect DoS...
......
......@@ -9,7 +9,7 @@
*
* Please note that the code in this file should never be included
* from user space. Many of these are not implemented in assembler
* since they would be too costly. Also, they require priviledged
* since they would be too costly. Also, they require privileged
* instructions (which are not available from user mode) to ensure
* that they are atomic.
*/
......
......@@ -528,7 +528,7 @@ __BUILD_SET_CP0(config,CP0_CONFIG)
#define CE1_SP_HINT_TO_SHARED_SC_BLOCKS 15
/*
* These flags define in which priviledge mode the counters count events
* These flags define in which privilege mode the counters count events
*/
#define CEB_USER 8 /* Count events in user mode, EXL = ERL = 0 */
#define CEB_SUPERVISOR 4 /* Count events in supvervisor mode EXL = ERL = 0 */
......
......@@ -310,7 +310,7 @@ __BUILD_SET_CP0(config,CP0_CONFIG)
#define CE1_SP_HINT_TO_SHARED_SC_BLOCKS 15
/*
* These flags define in which priviledge mode the counters count events
* These flags define in which privilege mode the counters count events
*/
#define CEB_USER 8 /* Count events in user mode, EXL = ERL = 0 */
#define CEB_SUPERVISOR 4 /* Count events in supvervisor mode EXL = ERL = 0 */
......
......@@ -163,7 +163,7 @@ unx_marshal(struct rpc_task *task, u32 *p, int ruid)
memcpy(p, clnt->cl_nodename, n);
p += (n + 3) >> 2;
/* Note: we don't use real uid if it involves raising priviledge */
/* Note: we don't use real uid if it involves raising privilege */
if (ruid && cred->uc_puid != 0 && cred->uc_pgid != 0) {
*p++ = htonl((u32) cred->uc_puid);
*p++ = htonl((u32) cred->uc_pgid);
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment