summaryrefslogtreecommitdiffstats
path: root/sys/kern/exec_script.c
diff options
context:
space:
mode:
authorjmc <jmc@openbsd.org>2006-11-14 18:00:27 +0000
committerjmc <jmc@openbsd.org>2006-11-14 18:00:27 +0000
commitd8a79e40f88ff6a2ce75d5e655dffda47994bf02 (patch)
tree0258886c02d7af1677da845d1a980a0ebed85a22 /sys/kern/exec_script.c
parentimprove previous; (diff)
downloadwireguard-openbsd-d8a79e40f88ff6a2ce75d5e655dffda47994bf02.tar.xz
wireguard-openbsd-d8a79e40f88ff6a2ce75d5e655dffda47994bf02.zip
grammar, spelling, and style fixes from bret lambert;
kern_descrip.c change ok deraadt
Diffstat (limited to 'sys/kern/exec_script.c')
-rw-r--r--sys/kern/exec_script.c10
1 files changed, 5 insertions, 5 deletions
diff --git a/sys/kern/exec_script.c b/sys/kern/exec_script.c
index 97535cecc50..791fc3f5ab9 100644
--- a/sys/kern/exec_script.c
+++ b/sys/kern/exec_script.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: exec_script.c,v 1.23 2005/11/12 04:31:24 jsg Exp $ */
+/* $OpenBSD: exec_script.c,v 1.24 2006/11/14 18:00:27 jmc Exp $ */
/* $NetBSD: exec_script.c,v 1.13 1996/02/04 02:15:06 christos Exp $ */
/*
@@ -60,7 +60,7 @@
* exec_script_makecmds(): Check if it's an executable shell script.
*
* Given a proc pointer and an exec package pointer, see if the referent
- * of the epp is in shell script. If it is, then set thing up so that
+ * of the epp is in shell script. If it is, then set things up so that
* the script can be run. This involves preparing the address space
* and arguments for the shell which will run the script.
*
@@ -125,7 +125,7 @@ exec_script_makecmds(struct proc *p, struct exec_package *epp)
cp++)
;
- /* collect the shell name; remember it's length for later */
+ /* collect the shell name; remember its length for later */
shellname = cp;
shellnamelen = 0;
if (*cp == '\0')
@@ -169,7 +169,7 @@ check_shell:
* if the script isn't readable, or it's set-id, then we've
* gotta supply a "/dev/fd/..." for the shell to read.
* Note that stupid shells (csh) do the wrong thing, and
- * close all open fd's when the start. That kills this
+ * close all open fd's when they start. That kills this
* method of implementing "safe" set-id and x-only scripts.
*/
vn_lock(scriptvp, LK_EXCLUSIVE|LK_RETRY, p);
@@ -274,7 +274,7 @@ check_shell:
epp->ep_fa = shellargp;
#ifdef SETUIDSCRIPTS
/*
- * set thing up so that set-id scripts will be
+ * set things up so that set-id scripts will be
* handled appropriately
*/
epp->ep_vap->va_mode |= script_sbits;