Hi, The following diff fixes EACCESS typos (EACCESS -> EACCES) in the man pages for crypt_checkpass(3), execve(2) and pledge(2), and also in a comment in sys/kern/kern_unveil.c.
This diff does not mess with tftp stuff (which actually does use its own EACCESS). Cheers, Kris Katterjohn Index: lib/libc/crypt/crypt_checkpass.3 =================================================================== RCS file: /cvs/src/lib/libc/crypt/crypt_checkpass.3,v retrieving revision 1.11 diff -u -p -r1.11 crypt_checkpass.3 --- lib/libc/crypt/crypt_checkpass.3 22 Jul 2017 06:39:54 -0000 1.11 +++ lib/libc/crypt/crypt_checkpass.3 29 Jul 2019 22:20:38 -0000 @@ -83,7 +83,7 @@ The function sets .Va errno to -.Er EACCESS +.Er EACCES when authentication fails. .Pp The Index: lib/libc/sys/execve.2 =================================================================== RCS file: /cvs/src/lib/libc/sys/execve.2,v retrieving revision 1.51 diff -u -p -r1.51 execve.2 --- lib/libc/sys/execve.2 12 Dec 2017 01:12:34 -0000 1.51 +++ lib/libc/sys/execve.2 29 Jul 2019 22:20:38 -0000 @@ -273,7 +273,7 @@ system not allowing such operations, bei .Xr mount 8 .Fl o Cm wxallowed flag. -.It Bq Er EACCESS +.It Bq Er EACCES The parent used .Xr pledge 2 to declare an Index: lib/libc/sys/pledge.2 =================================================================== RCS file: /cvs/src/lib/libc/sys/pledge.2,v retrieving revision 1.56 diff -u -p -r1.56 pledge.2 --- lib/libc/sys/pledge.2 25 Jul 2019 14:18:01 -0000 1.56 +++ lib/libc/sys/pledge.2 29 Jul 2019 22:20:38 -0000 @@ -466,7 +466,7 @@ If .Ar execpromises has been previously set the new program begins with those promises, unless setuid/setgid bits are set in which case execution is blocked with -.Er EACCESS . +.Er EACCES . Otherwise the new program starts running without pledge active, and hopefully makes a new pledge soon. .It Va prot_exec Index: sys/kern/kern_unveil.c =================================================================== RCS file: /cvs/src/sys/kern/kern_unveil.c,v retrieving revision 1.28 diff -u -p -r1.28 kern_unveil.c --- sys/kern/kern_unveil.c 25 Jul 2019 09:37:32 -0000 1.28 +++ sys/kern/kern_unveil.c 29 Jul 2019 22:20:38 -0000 @@ -864,7 +864,7 @@ unveil_check_final(struct proc *p, struc #endif /* * If dir has user set restrictions fail with - * EACCESS. Otherwise, use any covering match + * EACCES. Otherwise, use any covering match * that we found above this dir. */ if (uv->uv_flags & UNVEIL_USERSET) {