Module Name: src
Committed By: andvar
Date: Sun Aug 22 20:18:39 UTC 2021
Modified Files:
src/lib/libc/sys: _lwp_create.2
src/sbin/newfs_udf: udf_write.c
src/sys/arch/hpc/stand/hpcboot/sh3: sh_mmu.cpp
src/sys/arch/hppa/hppa: hppa_machdep.c
src/tests/lib/libc/sys: t_lwp_create.c
src/usr.sbin/isibootd: isibootd.c
Log Message:
s/priviledge/privilege/ in comments/log messages and fix one typo in descriptor.
To generate a diff of this commit:
cvs rdiff -u -r1.8 -r1.9 src/lib/libc/sys/_lwp_create.2
cvs rdiff -u -r1.9 -r1.10 src/sbin/newfs_udf/udf_write.c
cvs rdiff -u -r1.7 -r1.8 src/sys/arch/hpc/stand/hpcboot/sh3/sh_mmu.cpp
cvs rdiff -u -r1.31 -r1.32 src/sys/arch/hppa/hppa/hppa_machdep.c
cvs rdiff -u -r1.3 -r1.4 src/tests/lib/libc/sys/t_lwp_create.c
cvs rdiff -u -r1.4 -r1.5 src/usr.sbin/isibootd/isibootd.c
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
Modified files:
Index: src/lib/libc/sys/_lwp_create.2
diff -u src/lib/libc/sys/_lwp_create.2:1.8 src/lib/libc/sys/_lwp_create.2:1.9
--- src/lib/libc/sys/_lwp_create.2:1.8 Sat Jul 31 20:51:32 2021
+++ src/lib/libc/sys/_lwp_create.2 Sun Aug 22 20:18:39 2021
@@ -1,4 +1,4 @@
-.\" $NetBSD: _lwp_create.2,v 1.8 2021/07/31 20:51:32 andvar Exp $
+.\" $NetBSD: _lwp_create.2,v 1.9 2021/08/22 20:18:39 andvar Exp $
.\"
.\" Copyright (c) 2003 The NetBSD Foundation, Inc.
.\" All rights reserved.
@@ -49,7 +49,7 @@ argument specifies the initial execution
signal mask, stack, and machine registers.
The signal stack of the newly created light-weight process is reset to
disabled.
-If this context specifies invalid register values (for example priviledge
+If this context specifies invalid register values (for example privilege
escalation by setting machine dependent bits forbidden for user processes),
or does not specify cpu register values (uc_flags does not have the
_UC_CPU bit set), the call will fail and errno will be set to EINVAL.
Index: src/sbin/newfs_udf/udf_write.c
diff -u src/sbin/newfs_udf/udf_write.c:1.9 src/sbin/newfs_udf/udf_write.c:1.10
--- src/sbin/newfs_udf/udf_write.c:1.9 Fri Jan 2 21:01:12 2015
+++ src/sbin/newfs_udf/udf_write.c Sun Aug 22 20:18:39 2021
@@ -1,4 +1,4 @@
-/* $NetBSD: udf_write.c,v 1.9 2015/01/02 21:01:12 reinoud Exp $ */
+/* $NetBSD: udf_write.c,v 1.10 2021/08/22 20:18:39 andvar Exp $ */
/*
* Copyright (c) 2006, 2008, 2013 Reinoud Zandijk
@@ -30,7 +30,7 @@
#endif
#include <sys/cdefs.h>
-__RCSID("$NetBSD: udf_write.c,v 1.9 2015/01/02 21:01:12 reinoud Exp $");
+__RCSID("$NetBSD: udf_write.c,v 1.10 2021/08/22 20:18:39 andvar Exp $");
#include <stdio.h>
#include <stdlib.h>
@@ -820,7 +820,7 @@ udf_do_newfs_postfix(void)
return error;
loc++;
- /* mark end of integrity desciptor sequence again */
+ /* mark end of integrity descriptor sequence again */
error = udf_write_dscr_phys(terminator_dscr, loc, 1);
if (error)
return error;
Index: src/sys/arch/hpc/stand/hpcboot/sh3/sh_mmu.cpp
diff -u src/sys/arch/hpc/stand/hpcboot/sh3/sh_mmu.cpp:1.7 src/sys/arch/hpc/stand/hpcboot/sh3/sh_mmu.cpp:1.8
--- src/sys/arch/hpc/stand/hpcboot/sh3/sh_mmu.cpp:1.7 Mon Apr 28 20:23:20 2008
+++ src/sys/arch/hpc/stand/hpcboot/sh3/sh_mmu.cpp Sun Aug 22 20:18:39 2021
@@ -1,4 +1,4 @@
-/* $NetBSD: sh_mmu.cpp,v 1.7 2008/04/28 20:23:20 martin Exp $ */
+/* $NetBSD: sh_mmu.cpp,v 1.8 2021/08/22 20:18:39 andvar Exp $ */
/*-
* Copyright (c) 2001, 2002 The NetBSD Foundation, Inc.
@@ -202,7 +202,7 @@ MemoryManager_SHMMU::MMUDump()
goto disabled;
DPRINTF((TEXT("%s virtual storage mode,"),
r & SH3_MMUCR_SV ? TEXT("single") : TEXT("multiple")));
- DPRINTF((TEXT(" SQ access: (priviledge%S)"),
+ DPRINTF((TEXT(" SQ access: (privilege%S)"),
r & SH4_MMUCR_SQMD ? "" : "/user"));
DPRINTF((TEXT("\n")));
#if sample_code
Index: src/sys/arch/hppa/hppa/hppa_machdep.c
diff -u src/sys/arch/hppa/hppa/hppa_machdep.c:1.31 src/sys/arch/hppa/hppa/hppa_machdep.c:1.32
--- src/sys/arch/hppa/hppa/hppa_machdep.c:1.31 Thu Apr 16 09:28:52 2020
+++ src/sys/arch/hppa/hppa/hppa_machdep.c Sun Aug 22 20:18:39 2021
@@ -1,4 +1,4 @@
-/* $NetBSD: hppa_machdep.c,v 1.31 2020/04/16 09:28:52 skrll Exp $ */
+/* $NetBSD: hppa_machdep.c,v 1.32 2021/08/22 20:18:39 andvar Exp $ */
/*-
* Copyright (c) 1997, 2019 The NetBSD Foundation, Inc.
@@ -27,7 +27,7 @@
*/
#include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: hppa_machdep.c,v 1.31 2020/04/16 09:28:52 skrll Exp $");
+__KERNEL_RCSID(0, "$NetBSD: hppa_machdep.c,v 1.32 2021/08/22 20:18:39 andvar Exp $");
#include <sys/param.h>
#include <sys/systm.h>
@@ -141,7 +141,7 @@ cpu_mcontext_validate(struct lwp *l, con
#if 0
/*
* XXX
- * Force the space regs and priviledge bits to
+ * Force the space regs and privilege bits to
* the right values in the trapframe for now.
*/
Index: src/tests/lib/libc/sys/t_lwp_create.c
diff -u src/tests/lib/libc/sys/t_lwp_create.c:1.3 src/tests/lib/libc/sys/t_lwp_create.c:1.4
--- src/tests/lib/libc/sys/t_lwp_create.c:1.3 Sat Jun 6 18:11:21 2020
+++ src/tests/lib/libc/sys/t_lwp_create.c Sun Aug 22 20:18:39 2021
@@ -1,4 +1,4 @@
-/* $NetBSD: t_lwp_create.c,v 1.3 2020/06/06 18:11:21 thorpej Exp $ */
+/* $NetBSD: t_lwp_create.c,v 1.4 2021/08/22 20:18:39 andvar Exp $ */
/*-
* Copyright (c) 2012 The NetBSD Foundation, Inc.
@@ -185,7 +185,7 @@ INVALID_UCONTEXT(hppa, invalid_0, "clear
INVALID_UCONTEXT(i386, untouchable_eflags, "changing forbidden eflags")
uc->uc_mcontext.__gregs[_REG_EFL] |= PSL_IOPL;
}
-INVALID_UCONTEXT(i386, priv_escalation, "modifying priviledge level")
+INVALID_UCONTEXT(i386, priv_escalation, "modifying privilege level")
uc->uc_mcontext.__gregs[_REG_CS] &= ~SEL_RPL;
}
#endif
Index: src/usr.sbin/isibootd/isibootd.c
diff -u src/usr.sbin/isibootd/isibootd.c:1.4 src/usr.sbin/isibootd/isibootd.c:1.5
--- src/usr.sbin/isibootd/isibootd.c:1.4 Sat Jan 30 11:34:28 2021
+++ src/usr.sbin/isibootd/isibootd.c Sun Aug 22 20:18:39 2021
@@ -1,4 +1,4 @@
-/* $NetBSD: isibootd.c,v 1.4 2021/01/30 11:34:28 tsutsui Exp $ */
+/* $NetBSD: isibootd.c,v 1.5 2021/08/22 20:18:39 andvar Exp $ */
/* Id: isiboot.c,v 1.2 1999/12/26 14:33:33 nisimura Exp */
/*-
@@ -157,7 +157,7 @@ main(int argc, char *argv[])
argc -= optind;
if (geteuid() != 0)
- warnx("WARNING: run by non root priviledge");
+ warnx("WARNING: run by non root privilege");
memset(station.name, 0, sizeof(station.name));
gethostname(station.name, sizeof(station.name) - 1);