49 lines
1.7 KiB
Diff
49 lines
1.7 KiB
Diff
|
|
From c30406b2b6f0e9c23b7b0e4b9c2024d871b01557 Mon Sep 17 00:00:00 2001
|
||
|
|
From: Paride Legovini <pl@ninthfloor.org>
|
||
|
|
Date: Thu, 4 Jul 2019 23:53:37 +0200
|
||
|
|
Subject: [PATCH 01/53] Fix spelling errors
|
||
|
|
|
||
|
|
---
|
||
|
|
irqbalance.1 | 4 ++--
|
||
|
|
ui/irqbalance-ui.c | 2 +-
|
||
|
|
2 files changed, 3 insertions(+), 3 deletions(-)
|
||
|
|
|
||
|
|
diff --git a/irqbalance.1 b/irqbalance.1
|
||
|
|
index 07f47d8..aad27bc 100644
|
||
|
|
--- a/irqbalance.1
|
||
|
|
+++ b/irqbalance.1
|
||
|
|
@@ -68,7 +68,7 @@ example to ban IRQs 43 and 44 from balancing, use the following command line:
|
||
|
|
|
||
|
|
.TP
|
||
|
|
.B -m, --banmod=<module_name>
|
||
|
|
-Add the specified module to the set of banned modules, similiar to --banirq.
|
||
|
|
+Add the specified module to the set of banned modules, similar to --banirq.
|
||
|
|
irqbalance will not affect the affinity of any IRQs of given modules, allowing
|
||
|
|
them to be specified manually. This option is additive and can be specified
|
||
|
|
multiple times. For example to ban all IRQs of module foo and module bar from
|
||
|
|
@@ -131,7 +131,7 @@ This indicates that the script has no policy for the referenced irq, and that
|
||
|
|
script processing should continue
|
||
|
|
.TP
|
||
|
|
.I 2
|
||
|
|
-This indicates that an error has occured in the script, and it should be skipped
|
||
|
|
+This indicates that an error has occurred in the script, and it should be skipped
|
||
|
|
(further processing to continue)
|
||
|
|
|
||
|
|
.TP
|
||
|
|
diff --git a/ui/irqbalance-ui.c b/ui/irqbalance-ui.c
|
||
|
|
index 1119665..fe00e94 100644
|
||
|
|
--- a/ui/irqbalance-ui.c
|
||
|
|
+++ b/ui/irqbalance-ui.c
|
||
|
|
@@ -390,7 +390,7 @@ gboolean key_loop(gpointer data __attribute__((unused)))
|
||
|
|
int main(int argc, char **argv)
|
||
|
|
{
|
||
|
|
if(getuid() != 0) {
|
||
|
|
- printf("This program needs to be executed with root priviledges\n");
|
||
|
|
+ printf("This program needs to be executed with root privileges\n");
|
||
|
|
return EACCES;
|
||
|
|
}
|
||
|
|
if(argc > 1) {
|
||
|
|
--
|
||
|
|
2.23.0
|
||
|
|
|