diff options
author | Bernhard Reutner-Fischer <rep.dot.nop@gmail.com> | 2008-07-21 13:46:54 +0000 |
---|---|---|
committer | Bernhard Reutner-Fischer <rep.dot.nop@gmail.com> | 2008-07-21 13:46:54 +0000 |
commit | a53de7f7c2cd3ac46b26642aafb1a573a096a80d (patch) | |
tree | 76b95b7a441628b3495f744bec5d862b5250f562 /init | |
parent | e1e5174942d4624e3abb8b98fe404afdbb4edad1 (diff) | |
download | busybox-w32-a53de7f7c2cd3ac46b26642aafb1a573a096a80d.tar.gz busybox-w32-a53de7f7c2cd3ac46b26642aafb1a573a096a80d.tar.bz2 busybox-w32-a53de7f7c2cd3ac46b26642aafb1a573a096a80d.zip |
- fix spelling
Diffstat (limited to 'init')
-rw-r--r-- | init/init.c | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/init/init.c b/init/init.c index e88b88262..9923558f4 100644 --- a/init/init.c +++ b/init/init.c | |||
@@ -276,7 +276,7 @@ static void open_stdio_to_tty(const char* tty_name, int exit_on_failure) | |||
276 | /* fd can be only < 0 or 0: */ | 276 | /* fd can be only < 0 or 0: */ |
277 | fd = device_open(tty_name, O_RDWR); | 277 | fd = device_open(tty_name, O_RDWR); |
278 | if (fd) { | 278 | if (fd) { |
279 | message(L_LOG | L_CONSOLE, "Can't open %s: %s", | 279 | message(L_LOG | L_CONSOLE, "can't open %s: %s", |
280 | tty_name, strerror(errno)); | 280 | tty_name, strerror(errno)); |
281 | if (exit_on_failure) | 281 | if (exit_on_failure) |
282 | _exit(EXIT_FAILURE); | 282 | _exit(EXIT_FAILURE); |
@@ -336,7 +336,7 @@ static void init_exec(const char *command) | |||
336 | ioctl(STDIN_FILENO, TIOCSCTTY, 0 /*only try, don't steal*/); | 336 | ioctl(STDIN_FILENO, TIOCSCTTY, 0 /*only try, don't steal*/); |
337 | } | 337 | } |
338 | BB_EXECVP(cmd[0] + dash, cmd); | 338 | BB_EXECVP(cmd[0] + dash, cmd); |
339 | message(L_LOG | L_CONSOLE, "Cannot run '%s': %s", cmd[0], strerror(errno)); | 339 | message(L_LOG | L_CONSOLE, "cannot run '%s': %s", cmd[0], strerror(errno)); |
340 | /* returns if execvp fails */ | 340 | /* returns if execvp fails */ |
341 | } | 341 | } |
342 | 342 | ||
@@ -357,7 +357,7 @@ static pid_t run(const struct init_action *a) | |||
357 | sigprocmask(SIG_SETMASK, &omask, NULL); | 357 | sigprocmask(SIG_SETMASK, &omask, NULL); |
358 | 358 | ||
359 | if (pid < 0) | 359 | if (pid < 0) |
360 | message(L_LOG | L_CONSOLE, "Can't fork"); | 360 | message(L_LOG | L_CONSOLE, "can't fork"); |
361 | if (pid) | 361 | if (pid) |
362 | return pid; | 362 | return pid; |
363 | 363 | ||
@@ -391,7 +391,7 @@ static pid_t run(const struct init_action *a) | |||
391 | /* Now fork off another process to just hang around */ | 391 | /* Now fork off another process to just hang around */ |
392 | pid = fork(); | 392 | pid = fork(); |
393 | if (pid < 0) { | 393 | if (pid < 0) { |
394 | message(L_LOG | L_CONSOLE, "Can't fork"); | 394 | message(L_LOG | L_CONSOLE, "can't fork"); |
395 | _exit(EXIT_FAILURE); | 395 | _exit(EXIT_FAILURE); |
396 | } | 396 | } |
397 | 397 | ||
@@ -412,7 +412,7 @@ static pid_t run(const struct init_action *a) | |||
412 | /* Use a temporary process to steal the controlling tty. */ | 412 | /* Use a temporary process to steal the controlling tty. */ |
413 | pid = fork(); | 413 | pid = fork(); |
414 | if (pid < 0) { | 414 | if (pid < 0) { |
415 | message(L_LOG | L_CONSOLE, "Can't fork"); | 415 | message(L_LOG | L_CONSOLE, "can't fork"); |
416 | _exit(EXIT_FAILURE); | 416 | _exit(EXIT_FAILURE); |
417 | } | 417 | } |
418 | if (pid == 0) { | 418 | if (pid == 0) { |
@@ -879,7 +879,7 @@ int init_main(int argc UNUSED_PARAM, char **argv) | |||
879 | BB_EXECVP(argv[0], argv); | 879 | BB_EXECVP(argv[0], argv); |
880 | } else if (enforce > 0) { | 880 | } else if (enforce > 0) { |
881 | /* SELinux in enforcing mode but load_policy failed */ | 881 | /* SELinux in enforcing mode but load_policy failed */ |
882 | message(L_CONSOLE, "Cannot load SELinux Policy. " | 882 | message(L_CONSOLE, "cannot load SELinux Policy. " |
883 | "Machine is in enforcing mode. Halting now."); | 883 | "Machine is in enforcing mode. Halting now."); |
884 | exit(EXIT_FAILURE); | 884 | exit(EXIT_FAILURE); |
885 | } | 885 | } |