Module Name: src Committed By: andvar Date: Sun Aug 22 20:18:39 UTC 2021
Modified Files: src/lib/libc/sys: _lwp_create.2 src/sbin/newfs_udf: udf_write.c src/sys/arch/hpc/stand/hpcboot/sh3: sh_mmu.cpp src/sys/arch/hppa/hppa: hppa_machdep.c src/tests/lib/libc/sys: t_lwp_create.c src/usr.sbin/isibootd: isibootd.c Log Message: s/priviledge/privilege/ in comments/log messages and fix one typo in descriptor. To generate a diff of this commit: cvs rdiff -u -r1.8 -r1.9 src/lib/libc/sys/_lwp_create.2 cvs rdiff -u -r1.9 -r1.10 src/sbin/newfs_udf/udf_write.c cvs rdiff -u -r1.7 -r1.8 src/sys/arch/hpc/stand/hpcboot/sh3/sh_mmu.cpp cvs rdiff -u -r1.31 -r1.32 src/sys/arch/hppa/hppa/hppa_machdep.c cvs rdiff -u -r1.3 -r1.4 src/tests/lib/libc/sys/t_lwp_create.c cvs rdiff -u -r1.4 -r1.5 src/usr.sbin/isibootd/isibootd.c Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.
Modified files: Index: src/lib/libc/sys/_lwp_create.2 diff -u src/lib/libc/sys/_lwp_create.2:1.8 src/lib/libc/sys/_lwp_create.2:1.9 --- src/lib/libc/sys/_lwp_create.2:1.8 Sat Jul 31 20:51:32 2021 +++ src/lib/libc/sys/_lwp_create.2 Sun Aug 22 20:18:39 2021 @@ -1,4 +1,4 @@ -.\" $NetBSD: _lwp_create.2,v 1.8 2021/07/31 20:51:32 andvar Exp $ +.\" $NetBSD: _lwp_create.2,v 1.9 2021/08/22 20:18:39 andvar Exp $ .\" .\" Copyright (c) 2003 The NetBSD Foundation, Inc. .\" All rights reserved. @@ -49,7 +49,7 @@ argument specifies the initial execution signal mask, stack, and machine registers. The signal stack of the newly created light-weight process is reset to disabled. -If this context specifies invalid register values (for example priviledge +If this context specifies invalid register values (for example privilege escalation by setting machine dependent bits forbidden for user processes), or does not specify cpu register values (uc_flags does not have the _UC_CPU bit set), the call will fail and errno will be set to EINVAL. Index: src/sbin/newfs_udf/udf_write.c diff -u src/sbin/newfs_udf/udf_write.c:1.9 src/sbin/newfs_udf/udf_write.c:1.10 --- src/sbin/newfs_udf/udf_write.c:1.9 Fri Jan 2 21:01:12 2015 +++ src/sbin/newfs_udf/udf_write.c Sun Aug 22 20:18:39 2021 @@ -1,4 +1,4 @@ -/* $NetBSD: udf_write.c,v 1.9 2015/01/02 21:01:12 reinoud Exp $ */ +/* $NetBSD: udf_write.c,v 1.10 2021/08/22 20:18:39 andvar Exp $ */ /* * Copyright (c) 2006, 2008, 2013 Reinoud Zandijk @@ -30,7 +30,7 @@ #endif #include <sys/cdefs.h> -__RCSID("$NetBSD: udf_write.c,v 1.9 2015/01/02 21:01:12 reinoud Exp $"); +__RCSID("$NetBSD: udf_write.c,v 1.10 2021/08/22 20:18:39 andvar Exp $"); #include <stdio.h> #include <stdlib.h> @@ -820,7 +820,7 @@ udf_do_newfs_postfix(void) return error; loc++; - /* mark end of integrity desciptor sequence again */ + /* mark end of integrity descriptor sequence again */ error = udf_write_dscr_phys(terminator_dscr, loc, 1); if (error) return error; Index: src/sys/arch/hpc/stand/hpcboot/sh3/sh_mmu.cpp diff -u src/sys/arch/hpc/stand/hpcboot/sh3/sh_mmu.cpp:1.7 src/sys/arch/hpc/stand/hpcboot/sh3/sh_mmu.cpp:1.8 --- src/sys/arch/hpc/stand/hpcboot/sh3/sh_mmu.cpp:1.7 Mon Apr 28 20:23:20 2008 +++ src/sys/arch/hpc/stand/hpcboot/sh3/sh_mmu.cpp Sun Aug 22 20:18:39 2021 @@ -1,4 +1,4 @@ -/* $NetBSD: sh_mmu.cpp,v 1.7 2008/04/28 20:23:20 martin Exp $ */ +/* $NetBSD: sh_mmu.cpp,v 1.8 2021/08/22 20:18:39 andvar Exp $ */ /*- * Copyright (c) 2001, 2002 The NetBSD Foundation, Inc. @@ -202,7 +202,7 @@ MemoryManager_SHMMU::MMUDump() goto disabled; DPRINTF((TEXT("%s virtual storage mode,"), r & SH3_MMUCR_SV ? TEXT("single") : TEXT("multiple"))); - DPRINTF((TEXT(" SQ access: (priviledge%S)"), + DPRINTF((TEXT(" SQ access: (privilege%S)"), r & SH4_MMUCR_SQMD ? "" : "/user")); DPRINTF((TEXT("\n"))); #if sample_code Index: src/sys/arch/hppa/hppa/hppa_machdep.c diff -u src/sys/arch/hppa/hppa/hppa_machdep.c:1.31 src/sys/arch/hppa/hppa/hppa_machdep.c:1.32 --- src/sys/arch/hppa/hppa/hppa_machdep.c:1.31 Thu Apr 16 09:28:52 2020 +++ src/sys/arch/hppa/hppa/hppa_machdep.c Sun Aug 22 20:18:39 2021 @@ -1,4 +1,4 @@ -/* $NetBSD: hppa_machdep.c,v 1.31 2020/04/16 09:28:52 skrll Exp $ */ +/* $NetBSD: hppa_machdep.c,v 1.32 2021/08/22 20:18:39 andvar Exp $ */ /*- * Copyright (c) 1997, 2019 The NetBSD Foundation, Inc. @@ -27,7 +27,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: hppa_machdep.c,v 1.31 2020/04/16 09:28:52 skrll Exp $"); +__KERNEL_RCSID(0, "$NetBSD: hppa_machdep.c,v 1.32 2021/08/22 20:18:39 andvar Exp $"); #include <sys/param.h> #include <sys/systm.h> @@ -141,7 +141,7 @@ cpu_mcontext_validate(struct lwp *l, con #if 0 /* * XXX - * Force the space regs and priviledge bits to + * Force the space regs and privilege bits to * the right values in the trapframe for now. */ Index: src/tests/lib/libc/sys/t_lwp_create.c diff -u src/tests/lib/libc/sys/t_lwp_create.c:1.3 src/tests/lib/libc/sys/t_lwp_create.c:1.4 --- src/tests/lib/libc/sys/t_lwp_create.c:1.3 Sat Jun 6 18:11:21 2020 +++ src/tests/lib/libc/sys/t_lwp_create.c Sun Aug 22 20:18:39 2021 @@ -1,4 +1,4 @@ -/* $NetBSD: t_lwp_create.c,v 1.3 2020/06/06 18:11:21 thorpej Exp $ */ +/* $NetBSD: t_lwp_create.c,v 1.4 2021/08/22 20:18:39 andvar Exp $ */ /*- * Copyright (c) 2012 The NetBSD Foundation, Inc. @@ -185,7 +185,7 @@ INVALID_UCONTEXT(hppa, invalid_0, "clear INVALID_UCONTEXT(i386, untouchable_eflags, "changing forbidden eflags") uc->uc_mcontext.__gregs[_REG_EFL] |= PSL_IOPL; } -INVALID_UCONTEXT(i386, priv_escalation, "modifying priviledge level") +INVALID_UCONTEXT(i386, priv_escalation, "modifying privilege level") uc->uc_mcontext.__gregs[_REG_CS] &= ~SEL_RPL; } #endif Index: src/usr.sbin/isibootd/isibootd.c diff -u src/usr.sbin/isibootd/isibootd.c:1.4 src/usr.sbin/isibootd/isibootd.c:1.5 --- src/usr.sbin/isibootd/isibootd.c:1.4 Sat Jan 30 11:34:28 2021 +++ src/usr.sbin/isibootd/isibootd.c Sun Aug 22 20:18:39 2021 @@ -1,4 +1,4 @@ -/* $NetBSD: isibootd.c,v 1.4 2021/01/30 11:34:28 tsutsui Exp $ */ +/* $NetBSD: isibootd.c,v 1.5 2021/08/22 20:18:39 andvar Exp $ */ /* Id: isiboot.c,v 1.2 1999/12/26 14:33:33 nisimura Exp */ /*- @@ -157,7 +157,7 @@ main(int argc, char *argv[]) argc -= optind; if (geteuid() != 0) - warnx("WARNING: run by non root priviledge"); + warnx("WARNING: run by non root privilege"); memset(station.name, 0, sizeof(station.name)); gethostname(station.name, sizeof(station.name) - 1);