Module Name:    src
Committed By:   andvar
Date:           Sun Aug 22 20:18:39 UTC 2021

Modified Files:
        src/lib/libc/sys: _lwp_create.2
        src/sbin/newfs_udf: udf_write.c
        src/sys/arch/hpc/stand/hpcboot/sh3: sh_mmu.cpp
        src/sys/arch/hppa/hppa: hppa_machdep.c
        src/tests/lib/libc/sys: t_lwp_create.c
        src/usr.sbin/isibootd: isibootd.c

Log Message:
s/priviledge/privilege/ in comments/log messages and fix one typo in descriptor.


To generate a diff of this commit:
cvs rdiff -u -r1.8 -r1.9 src/lib/libc/sys/_lwp_create.2
cvs rdiff -u -r1.9 -r1.10 src/sbin/newfs_udf/udf_write.c
cvs rdiff -u -r1.7 -r1.8 src/sys/arch/hpc/stand/hpcboot/sh3/sh_mmu.cpp
cvs rdiff -u -r1.31 -r1.32 src/sys/arch/hppa/hppa/hppa_machdep.c
cvs rdiff -u -r1.3 -r1.4 src/tests/lib/libc/sys/t_lwp_create.c
cvs rdiff -u -r1.4 -r1.5 src/usr.sbin/isibootd/isibootd.c

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/lib/libc/sys/_lwp_create.2
diff -u src/lib/libc/sys/_lwp_create.2:1.8 src/lib/libc/sys/_lwp_create.2:1.9
--- src/lib/libc/sys/_lwp_create.2:1.8	Sat Jul 31 20:51:32 2021
+++ src/lib/libc/sys/_lwp_create.2	Sun Aug 22 20:18:39 2021
@@ -1,4 +1,4 @@
-.\"	$NetBSD: _lwp_create.2,v 1.8 2021/07/31 20:51:32 andvar Exp $
+.\"	$NetBSD: _lwp_create.2,v 1.9 2021/08/22 20:18:39 andvar Exp $
 .\"
 .\" Copyright (c) 2003 The NetBSD Foundation, Inc.
 .\" All rights reserved.
@@ -49,7 +49,7 @@ argument specifies the initial execution
 signal mask, stack, and machine registers.
 The signal stack of the newly created light-weight process is reset to
 disabled.
-If this context specifies invalid register values (for example priviledge
+If this context specifies invalid register values (for example privilege
 escalation by setting machine dependent bits forbidden for user processes),
 or does not specify cpu register values (uc_flags does not have the
 _UC_CPU bit set), the call will fail and errno will be set to EINVAL.

Index: src/sbin/newfs_udf/udf_write.c
diff -u src/sbin/newfs_udf/udf_write.c:1.9 src/sbin/newfs_udf/udf_write.c:1.10
--- src/sbin/newfs_udf/udf_write.c:1.9	Fri Jan  2 21:01:12 2015
+++ src/sbin/newfs_udf/udf_write.c	Sun Aug 22 20:18:39 2021
@@ -1,4 +1,4 @@
-/* $NetBSD: udf_write.c,v 1.9 2015/01/02 21:01:12 reinoud Exp $ */
+/* $NetBSD: udf_write.c,v 1.10 2021/08/22 20:18:39 andvar Exp $ */
 
 /*
  * Copyright (c) 2006, 2008, 2013 Reinoud Zandijk
@@ -30,7 +30,7 @@
 #endif
 
 #include <sys/cdefs.h>
-__RCSID("$NetBSD: udf_write.c,v 1.9 2015/01/02 21:01:12 reinoud Exp $");
+__RCSID("$NetBSD: udf_write.c,v 1.10 2021/08/22 20:18:39 andvar Exp $");
 
 #include <stdio.h>
 #include <stdlib.h>
@@ -820,7 +820,7 @@ udf_do_newfs_postfix(void)
 			return error;
 		loc++;
 	
-		/* mark end of integrity desciptor sequence again */
+		/* mark end of integrity descriptor sequence again */
 		error = udf_write_dscr_phys(terminator_dscr, loc, 1);
 		if (error)
 			return error;

Index: src/sys/arch/hpc/stand/hpcboot/sh3/sh_mmu.cpp
diff -u src/sys/arch/hpc/stand/hpcboot/sh3/sh_mmu.cpp:1.7 src/sys/arch/hpc/stand/hpcboot/sh3/sh_mmu.cpp:1.8
--- src/sys/arch/hpc/stand/hpcboot/sh3/sh_mmu.cpp:1.7	Mon Apr 28 20:23:20 2008
+++ src/sys/arch/hpc/stand/hpcboot/sh3/sh_mmu.cpp	Sun Aug 22 20:18:39 2021
@@ -1,4 +1,4 @@
-/*	$NetBSD: sh_mmu.cpp,v 1.7 2008/04/28 20:23:20 martin Exp $	*/
+/*	$NetBSD: sh_mmu.cpp,v 1.8 2021/08/22 20:18:39 andvar Exp $	*/
 
 /*-
  * Copyright (c) 2001, 2002 The NetBSD Foundation, Inc.
@@ -202,7 +202,7 @@ MemoryManager_SHMMU::MMUDump()
 			goto disabled;
 		DPRINTF((TEXT("%s virtual storage mode,"),
 		    r & SH3_MMUCR_SV ? TEXT("single") : TEXT("multiple")));
-		DPRINTF((TEXT(" SQ access: (priviledge%S)"),
+		DPRINTF((TEXT(" SQ access: (privilege%S)"),
 		    r & SH4_MMUCR_SQMD ? "" : "/user"));
 		DPRINTF((TEXT("\n")));
 #if sample_code

Index: src/sys/arch/hppa/hppa/hppa_machdep.c
diff -u src/sys/arch/hppa/hppa/hppa_machdep.c:1.31 src/sys/arch/hppa/hppa/hppa_machdep.c:1.32
--- src/sys/arch/hppa/hppa/hppa_machdep.c:1.31	Thu Apr 16 09:28:52 2020
+++ src/sys/arch/hppa/hppa/hppa_machdep.c	Sun Aug 22 20:18:39 2021
@@ -1,4 +1,4 @@
-/*	$NetBSD: hppa_machdep.c,v 1.31 2020/04/16 09:28:52 skrll Exp $	*/
+/*	$NetBSD: hppa_machdep.c,v 1.32 2021/08/22 20:18:39 andvar Exp $	*/
 
 /*-
  * Copyright (c) 1997, 2019 The NetBSD Foundation, Inc.
@@ -27,7 +27,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: hppa_machdep.c,v 1.31 2020/04/16 09:28:52 skrll Exp $");
+__KERNEL_RCSID(0, "$NetBSD: hppa_machdep.c,v 1.32 2021/08/22 20:18:39 andvar Exp $");
 
 #include <sys/param.h>
 #include <sys/systm.h>
@@ -141,7 +141,7 @@ cpu_mcontext_validate(struct lwp *l, con
 #if 0
 	/*
 	 * XXX
-	 * Force the space regs and priviledge bits to
+	 * Force the space regs and privilege bits to
 	 * the right values in the trapframe for now.
 	 */
 

Index: src/tests/lib/libc/sys/t_lwp_create.c
diff -u src/tests/lib/libc/sys/t_lwp_create.c:1.3 src/tests/lib/libc/sys/t_lwp_create.c:1.4
--- src/tests/lib/libc/sys/t_lwp_create.c:1.3	Sat Jun  6 18:11:21 2020
+++ src/tests/lib/libc/sys/t_lwp_create.c	Sun Aug 22 20:18:39 2021
@@ -1,4 +1,4 @@
-/* $NetBSD: t_lwp_create.c,v 1.3 2020/06/06 18:11:21 thorpej Exp $ */
+/* $NetBSD: t_lwp_create.c,v 1.4 2021/08/22 20:18:39 andvar Exp $ */
 
 /*-
  * Copyright (c) 2012 The NetBSD Foundation, Inc.
@@ -185,7 +185,7 @@ INVALID_UCONTEXT(hppa, invalid_0, "clear
 INVALID_UCONTEXT(i386, untouchable_eflags, "changing forbidden eflags")
 	uc->uc_mcontext.__gregs[_REG_EFL] |= PSL_IOPL;
 }
-INVALID_UCONTEXT(i386, priv_escalation, "modifying priviledge level")
+INVALID_UCONTEXT(i386, priv_escalation, "modifying privilege level")
 	uc->uc_mcontext.__gregs[_REG_CS] &= ~SEL_RPL;
 }
 #endif

Index: src/usr.sbin/isibootd/isibootd.c
diff -u src/usr.sbin/isibootd/isibootd.c:1.4 src/usr.sbin/isibootd/isibootd.c:1.5
--- src/usr.sbin/isibootd/isibootd.c:1.4	Sat Jan 30 11:34:28 2021
+++ src/usr.sbin/isibootd/isibootd.c	Sun Aug 22 20:18:39 2021
@@ -1,4 +1,4 @@
-/*	$NetBSD: isibootd.c,v 1.4 2021/01/30 11:34:28 tsutsui Exp $	*/
+/*	$NetBSD: isibootd.c,v 1.5 2021/08/22 20:18:39 andvar Exp $	*/
 /*	Id: isiboot.c,v 1.2 1999/12/26 14:33:33 nisimura Exp 	*/
 
 /*-
@@ -157,7 +157,7 @@ main(int argc, char *argv[])
 	argc -= optind;
 
 	if (geteuid() != 0)
-		warnx("WARNING: run by non root priviledge");
+		warnx("WARNING: run by non root privilege");
 
 	memset(station.name, 0, sizeof(station.name));
 	gethostname(station.name, sizeof(station.name) - 1);

Reply via email to