summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorNis Martensen <nis.martensen@web.de>2014-05-18 15:43:18 +0200
committerLennart Poettering <lennart@poettering.net>2014-05-19 00:40:44 +0900
commitf1721625e7145977ba705e169580f2eb0002600c (patch)
tree3155b020761a008b109b136199c88ed78d007614 /src
parent8891f695c71bd4c266d827c9aaedbbbbaf79d3eb (diff)
fix spelling of privilege
Diffstat (limited to 'src')
-rw-r--r--src/core/load-fragment-gperf.gperf.m42
-rw-r--r--src/core/load-fragment.c2
-rw-r--r--src/core/load-fragment.h2
-rw-r--r--src/nspawn/nspawn.c2
-rw-r--r--src/systemctl/systemctl.c2
-rw-r--r--src/timesync/timesyncd.c6
6 files changed, 8 insertions, 8 deletions
diff --git a/src/core/load-fragment-gperf.gperf.m4 b/src/core/load-fragment-gperf.gperf.m4
index 21bccbb1cd..4f8a2ddc1b 100644
--- a/src/core/load-fragment-gperf.gperf.m4
+++ b/src/core/load-fragment-gperf.gperf.m4
@@ -48,7 +48,7 @@ $1.Capabilities, config_parse_exec_capabilities, 0,
$1.SecureBits, config_parse_exec_secure_bits, 0, offsetof($1, exec_context)
$1.CapabilityBoundingSet, config_parse_bounding_set, 0, offsetof($1, exec_context.capability_bounding_set_drop)
$1.TimerSlackNSec, config_parse_nsec, 0, offsetof($1, exec_context.timer_slack_nsec)
-$1.NoNewPrivileges, config_parse_no_new_priviliges, 0, offsetof($1, exec_context)
+$1.NoNewPrivileges, config_parse_no_new_privileges, 0, offsetof($1, exec_context)
m4_ifdef(`HAVE_SECCOMP',
`$1.SystemCallFilter, config_parse_syscall_filter, 0, offsetof($1, exec_context)
$1.SystemCallArchitectures, config_parse_syscall_archs, 0, offsetof($1, exec_context.syscall_archs)
diff --git a/src/core/load-fragment.c b/src/core/load-fragment.c
index 14c194bf96..25a3905591 100644
--- a/src/core/load-fragment.c
+++ b/src/core/load-fragment.c
@@ -3029,7 +3029,7 @@ int config_parse_namespace_path_strv(
return 0;
}
-int config_parse_no_new_priviliges(
+int config_parse_no_new_privileges(
const char* unit,
const char *filename,
unsigned line,
diff --git a/src/core/load-fragment.h b/src/core/load-fragment.h
index 242fd271b7..9ef9caa999 100644
--- a/src/core/load-fragment.h
+++ b/src/core/load-fragment.h
@@ -95,7 +95,7 @@ int config_parse_address_families(const char *unit, const char *filename, unsign
int config_parse_runtime_directory(const char *unit, const char *filename, unsigned line, const char *section, unsigned section_line, const char *lvalue, int ltype, const char *rvalue, void *data, void *userdata);
int config_parse_set_status(const char *unit, const char *filename, unsigned line, const char *section, unsigned section_line, const char *lvalue, int ltype, const char *rvalue, void *data, void *userdata);
int config_parse_namespace_path_strv(const char *unit, const char *filename, unsigned line, const char *section, unsigned section_line, const char *lvalue, int ltype, const char *rvalue, void *data, void *userdata);
-int config_parse_no_new_priviliges(const char *unit, const char *filename, unsigned line, const char *section, unsigned section_line, const char *lvalue, int ltype, const char *rvalue, void *data, void *userdata);
+int config_parse_no_new_privileges(const char *unit, const char *filename, unsigned line, const char *section, unsigned section_line, const char *lvalue, int ltype, const char *rvalue, void *data, void *userdata);
int config_parse_cpu_quota(const char *unit, const char *filename, unsigned line, const char *section, unsigned section_line, const char *lvalue, int ltype, const char *rvalue, void *data, void *userdata);
/* gperf prototypes */
diff --git a/src/nspawn/nspawn.c b/src/nspawn/nspawn.c
index 6be4dcae59..9d9238fdb5 100644
--- a/src/nspawn/nspawn.c
+++ b/src/nspawn/nspawn.c
@@ -3057,7 +3057,7 @@ int main(int argc, char *argv[]) {
fds = NULL;
/* Wait until the child reported that it is ready with
- * all it needs to do with priviliges. After we got
+ * all it needs to do with privileges. After we got
* the notification we can make the process join its
* cgroup which might limit what it can do */
eventfd_read(child_ready_fd, &x);
diff --git a/src/systemctl/systemctl.c b/src/systemctl/systemctl.c
index 6e98c05152..a99759f2dd 100644
--- a/src/systemctl/systemctl.c
+++ b/src/systemctl/systemctl.c
@@ -5923,7 +5923,7 @@ static int systemctl_parse_argv(int argc, char *argv[]) {
case 'r':
if (geteuid() != 0) {
- log_error("--recursive requires root priviliges.");
+ log_error("--recursive requires root privileges.");
return -EPERM;
}
diff --git a/src/timesync/timesyncd.c b/src/timesync/timesyncd.c
index 19e6d67c63..6e63e34d87 100644
--- a/src/timesync/timesyncd.c
+++ b/src/timesync/timesyncd.c
@@ -1141,7 +1141,7 @@ static int manager_network_monitor_listen(Manager *m) {
return 0;
}
-static int drop_priviliges(void) {
+static int drop_privileges(void) {
static const cap_value_t bits[] = {
CAP_SYS_TIME,
};
@@ -1152,7 +1152,7 @@ static int drop_priviliges(void) {
gid_t gid;
int r;
- /* Unfortunately we cannot leave privilige dropping to PID 1
+ /* Unfortunately we cannot leave privilege dropping to PID 1
* here, since we want to run as user but want to keep te
* CAP_SYS_TIME capability. Since file capabilities have been
* introduced this cannot be done across exec() anymore,
@@ -1231,7 +1231,7 @@ int main(int argc, char *argv[]) {
umask(0022);
- r = drop_priviliges();
+ r = drop_privileges();
if (r < 0)
goto out;