spelling fixes for 4.18 (errror implemenation proces Controler)
authorMichael Tokarev <mjt@tls.msk.ru>
Fri, 20 Jan 2023 18:12:54 +0000 (21:12 +0300)
committerJeremy Allison <jra@samba.org>
Thu, 26 Jan 2023 20:46:11 +0000 (20:46 +0000)
One of changes is somewhat interesting, it is "tfork waiter proces"
process title in tfork.c. I wonder why no one noticed this before.
There's another similar process title in there, "tfork waiter process(%d)".
Hopefully no one does grep for "proces$" (and there's no reason to).

Signed-off-by: Michael Tokarev <mjt@tls.msk.ru>
Reviewed-by: Volker Lendecke <vl@samba.org>
Reviewed-by: Rowland Penny <rpenny@samba.org>
Autobuild-User(master): Jeremy Allison <jra@samba.org>
Autobuild-Date(master): Thu Jan 26 20:46:11 UTC 2023 on atb-devel-224

ctdb/server/ctdb_recoverd.c
lib/smbconf/pysmbconf.c
lib/util/tfork.c
nsswitch/wbinfo.c
source4/torture/smb2/acls.c

index bf3a66b0aaff8cfc0cbdbb6cc03e74116773aea1..9d2cb6af9c91dd601715b7d3b728be294ba79eb7 100644 (file)
@@ -395,7 +395,7 @@ static void ctdb_set_culprit_count(struct ctdb_recoverd *rec,
                                   struct ctdb_banning_state,
                                   len);
                if (t == NULL) {
-                       DBG_WARNING("Memory allocation errror");
+                       DBG_WARNING("Memory allocation error");
                        return;
                }
                rec->banning_state = t;
index 1b3c101005ab98858d68032f7eb81844df0c6e55..465876684cae5c5a1b944cac478d897e6d73fb42 100644 (file)
@@ -747,7 +747,7 @@ PyDoc_STRVAR(py_smbconf_doc,
 "types. Future, write based functions need a writable backend (registry).\n"
 "\n"
 "Note that the registry backend will be provided by a different\n"
-"library module from the source3 tree (implemenation TBD).\n");
+"library module from the source3 tree (implementation TBD).\n");
 
 static struct PyModuleDef moduledef = {
        PyModuleDef_HEAD_INIT,
index 57a4e18638bc919962d4537ab876cd09969d4d01..e3eaa199db535af31106a9dc417b5de9039030fe 100644 (file)
@@ -572,7 +572,7 @@ static pid_t tfork_start_waiter_and_worker(struct tfork_state *state,
        /*
         * The "waiter" child.
         */
-       process_set_title("tfork waiter", "tfork waiter proces");
+       process_set_title("tfork waiter", "tfork waiter process");
 
        CatchSignal(SIGCHLD, SIG_DFL);
 
index de54373afe8ba09b7842fbceaed07566b9f994ab..6148b204043b8a72c87cd63e3072e55e8b81bd8b 100644 (file)
@@ -2551,7 +2551,7 @@ int main(int argc, const char **argv, char **envp)
                        .argInfo    = POPT_ARG_STRING,
                        .arg        = &string_arg,
                        .val        = OPT_CHANGE_SECRET_AT,
-                       .descrip    = "Change shared secret at Domain Controler" },
+                       .descrip    = "Change shared secret at Domain Controller" },
                {
                        .longName   = "ping-dc",
                        .shortName  = 'P',
index a5df9da3b4546f6ab6b7d644167618ddf709e8a0..2f15ad27e48ba40a6ec2cfd7530e4d98dd39bc3f 100644 (file)
@@ -2918,7 +2918,7 @@ done:
  * test SEC_FLAG_MAXIMUM_ALLOWED with not-granted access
  *
  * When access_mask contains SEC_FLAG_MAXIMUM_ALLOWED, the server must still
- * proces other bits from access_mask. Eg if access_mask contains a right that
+ * process other bits from access_mask. Eg if access_mask contains a right that
  * the requester doesn't have, the function must validate that against the
  * effective permissions.
  */