Converted 'vmunix' to 'kernel'.

This commit is contained in:
David Greenman 1994-08-05 09:28:55 +00:00
parent 1e74887068
commit a03460f16e
Notes: svn2git 2020-12-20 02:59:44 +00:00
svn path=/head/; revision=1858
3 changed files with 6 additions and 6 deletions

View File

@ -34,7 +34,7 @@
* SUCH DAMAGE.
*
* @(#)nfsdiskless.h 8.1 (Berkeley) 6/10/93
* $Id$
* $Id: nfsdiskless.h,v 1.2 1994/08/02 07:52:19 davidg Exp $
*/
/*
@ -43,7 +43,7 @@
* vnodes plus do a partial ifconfig(8) and route(8) so that the critical net
* interface can communicate with the server.
* The primary bootstrap is expected to fill in the appropriate fields before
* starting vmunix. Whether or not the swap area is nfs mounted is determined
* starting the kernel. Whether or not the swap area is nfs mounted is determined
* by the value in swdevt[0]. (equal to NODEV --> swap over nfs)
* Currently only works for AF_INET protocols.
* NB: All fields are stored in net byte order to avoid hassles with

View File

@ -34,7 +34,7 @@
* SUCH DAMAGE.
*
* @(#)nfsdiskless.h 8.1 (Berkeley) 6/10/93
* $Id$
* $Id: nfsdiskless.h,v 1.2 1994/08/02 07:52:19 davidg Exp $
*/
/*
@ -43,7 +43,7 @@
* vnodes plus do a partial ifconfig(8) and route(8) so that the critical net
* interface can communicate with the server.
* The primary bootstrap is expected to fill in the appropriate fields before
* starting vmunix. Whether or not the swap area is nfs mounted is determined
* starting the kernel. Whether or not the swap area is nfs mounted is determined
* by the value in swdevt[0]. (equal to NODEV --> swap over nfs)
* Currently only works for AF_INET protocols.
* NB: All fields are stored in net byte order to avoid hassles with

View File

@ -36,7 +36,7 @@
* SUCH DAMAGE.
*
* @(#)systm.h 8.4 (Berkeley) 2/23/94
* $Id: systm.h,v 1.3 1994/08/02 07:53:44 davidg Exp $
* $Id: systm.h,v 1.4 1994/08/04 06:15:10 davidg Exp $
*/
#include <machine/cpufunc.h>
@ -63,7 +63,7 @@
* (/etc/rc.local) using sysctl(1). If it is desired to run the system
* in level 0 mode while multiuser, initialize the variable securelevel
* in /sys/kern/kern_sysctl.c to -1. Note that it is NOT initialized to
* zero as that would allow the vmunix binary to be patched to -1.
* zero as that would allow the kernel binary to be patched to -1.
* Without initialization, securelevel loads in the BSS area which only
* comes into existence when the kernel is loaded and hence cannot be
* patched by a stalking hacker.