Source-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[src/trunk]: src/sys/dev/pci/voyager fix some comments
details: https://anonhg.NetBSD.org/src/rev/09aa85675311
branches: trunk
changeset: 779467:09aa85675311
user: macallan <macallan%NetBSD.org@localhost>
date: Wed May 30 08:05:12 2012 +0000
description:
fix some comments
diffstat:
sys/dev/pci/voyager/voyagerfb.c | 13 ++++++-------
1 files changed, 6 insertions(+), 7 deletions(-)
diffs (55 lines):
diff -r 963a190e5657 -r 09aa85675311 sys/dev/pci/voyager/voyagerfb.c
--- a/sys/dev/pci/voyager/voyagerfb.c Wed May 30 06:01:22 2012 +0000
+++ b/sys/dev/pci/voyager/voyagerfb.c Wed May 30 08:05:12 2012 +0000
@@ -1,4 +1,4 @@
-/* $NetBSD: voyagerfb.c,v 1.21 2012/05/23 18:39:30 macallan Exp $ */
+/* $NetBSD: voyagerfb.c,v 1.22 2012/05/30 08:05:12 macallan Exp $ */
/*
* Copyright (c) 2009, 2011 Michael Lorenz
@@ -31,7 +31,7 @@
*/
#include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: voyagerfb.c,v 1.21 2012/05/23 18:39:30 macallan Exp $");
+__KERNEL_RCSID(0, "$NetBSD: voyagerfb.c,v 1.22 2012/05/30 08:05:12 macallan Exp $");
#include <sys/param.h>
#include <sys/systm.h>
@@ -68,7 +68,7 @@
#define DPRINTF while (0) printf
#endif
-/* there are probably gdium-specific */
+/* XXX these are gdium-specific */
#define GPIO_BACKLIGHT 0x20000000
struct voyagerfb_softc {
@@ -291,7 +291,7 @@
sc->sc_defaultscreen_descr.ncols = ri->ri_cols;
} else {
if (sc->sc_console_screen.scr_ri.ri_rows == 0) {
- /* do some minimal setup to avoid weirdnesses later */
+ /* do some minimal setup to avoid weirdness later */
vcons_init_screen(&sc->vd, &sc->sc_console_screen, 1, &defattr);
}
}
@@ -347,7 +347,7 @@
*(u_int *)data = WSDISPLAY_TYPE_PCIMISC;
return 0;
- /* PCI config read/write passthrough. */
+ /* PCI config read/write pass through. */
case PCI_IOC_CFGREAD:
case PCI_IOC_CFGWRITE:
return pci_devioctl(sc->sc_pc, sc->sc_pcitag,
@@ -504,8 +504,7 @@
}
/*
- * restrict all other mappings to processes with superuser privileges
- * or the kernel itself
+ * restrict all other mappings to processes with privileges
*/
if (kauth_authorize_machdep(kauth_cred_get(), KAUTH_MACHDEP_UNMANAGEDMEM,
NULL, NULL, NULL, NULL) != 0) {
Home |
Main Index |
Thread Index |
Old Index