Source-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[src/trunk]: src/usr.sbin/isibootd s/priviledge/privilege/ in comments/log me...
details: https://anonhg.NetBSD.org/src/rev/f3f9fc5436d2
branches: trunk
changeset: 1023079:f3f9fc5436d2
user: andvar <andvar%NetBSD.org@localhost>
date: Sun Aug 22 20:18:39 2021 +0000
description:
s/priviledge/privilege/ in comments/log messages and fix one typo in descriptor.
diffstat:
lib/libc/sys/_lwp_create.2 | 4 ++--
sbin/newfs_udf/udf_write.c | 6 +++---
sys/arch/hpc/stand/hpcboot/sh3/sh_mmu.cpp | 4 ++--
sys/arch/hppa/hppa/hppa_machdep.c | 6 +++---
tests/lib/libc/sys/t_lwp_create.c | 4 ++--
usr.sbin/isibootd/isibootd.c | 4 ++--
6 files changed, 14 insertions(+), 14 deletions(-)
diffs (126 lines):
diff -r bdf030432d5a -r f3f9fc5436d2 lib/libc/sys/_lwp_create.2
--- a/lib/libc/sys/_lwp_create.2 Sun Aug 22 20:14:24 2021 +0000
+++ b/lib/libc/sys/_lwp_create.2 Sun Aug 22 20:18:39 2021 +0000
@@ -1,4 +1,4 @@
-.\" $NetBSD: _lwp_create.2,v 1.8 2021/07/31 20:51:32 andvar Exp $
+.\" $NetBSD: _lwp_create.2,v 1.9 2021/08/22 20:18:39 andvar Exp $
.\"
.\" Copyright (c) 2003 The NetBSD Foundation, Inc.
.\" All rights reserved.
@@ -49,7 +49,7 @@
signal mask, stack, and machine registers.
The signal stack of the newly created light-weight process is reset to
disabled.
-If this context specifies invalid register values (for example priviledge
+If this context specifies invalid register values (for example privilege
escalation by setting machine dependent bits forbidden for user processes),
or does not specify cpu register values (uc_flags does not have the
_UC_CPU bit set), the call will fail and errno will be set to EINVAL.
diff -r bdf030432d5a -r f3f9fc5436d2 sbin/newfs_udf/udf_write.c
--- a/sbin/newfs_udf/udf_write.c Sun Aug 22 20:14:24 2021 +0000
+++ b/sbin/newfs_udf/udf_write.c Sun Aug 22 20:18:39 2021 +0000
@@ -1,4 +1,4 @@
-/* $NetBSD: udf_write.c,v 1.9 2015/01/02 21:01:12 reinoud Exp $ */
+/* $NetBSD: udf_write.c,v 1.10 2021/08/22 20:18:39 andvar Exp $ */
/*
* Copyright (c) 2006, 2008, 2013 Reinoud Zandijk
@@ -30,7 +30,7 @@
#endif
#include <sys/cdefs.h>
-__RCSID("$NetBSD: udf_write.c,v 1.9 2015/01/02 21:01:12 reinoud Exp $");
+__RCSID("$NetBSD: udf_write.c,v 1.10 2021/08/22 20:18:39 andvar Exp $");
#include <stdio.h>
#include <stdlib.h>
@@ -820,7 +820,7 @@
return error;
loc++;
- /* mark end of integrity desciptor sequence again */
+ /* mark end of integrity descriptor sequence again */
error = udf_write_dscr_phys(terminator_dscr, loc, 1);
if (error)
return error;
diff -r bdf030432d5a -r f3f9fc5436d2 sys/arch/hpc/stand/hpcboot/sh3/sh_mmu.cpp
--- a/sys/arch/hpc/stand/hpcboot/sh3/sh_mmu.cpp Sun Aug 22 20:14:24 2021 +0000
+++ b/sys/arch/hpc/stand/hpcboot/sh3/sh_mmu.cpp Sun Aug 22 20:18:39 2021 +0000
@@ -1,4 +1,4 @@
-/* $NetBSD: sh_mmu.cpp,v 1.7 2008/04/28 20:23:20 martin Exp $ */
+/* $NetBSD: sh_mmu.cpp,v 1.8 2021/08/22 20:18:39 andvar Exp $ */
/*-
* Copyright (c) 2001, 2002 The NetBSD Foundation, Inc.
@@ -202,7 +202,7 @@
goto disabled;
DPRINTF((TEXT("%s virtual storage mode,"),
r & SH3_MMUCR_SV ? TEXT("single") : TEXT("multiple")));
- DPRINTF((TEXT(" SQ access: (priviledge%S)"),
+ DPRINTF((TEXT(" SQ access: (privilege%S)"),
r & SH4_MMUCR_SQMD ? "" : "/user"));
DPRINTF((TEXT("\n")));
#if sample_code
diff -r bdf030432d5a -r f3f9fc5436d2 sys/arch/hppa/hppa/hppa_machdep.c
--- a/sys/arch/hppa/hppa/hppa_machdep.c Sun Aug 22 20:14:24 2021 +0000
+++ b/sys/arch/hppa/hppa/hppa_machdep.c Sun Aug 22 20:18:39 2021 +0000
@@ -1,4 +1,4 @@
-/* $NetBSD: hppa_machdep.c,v 1.31 2020/04/16 09:28:52 skrll Exp $ */
+/* $NetBSD: hppa_machdep.c,v 1.32 2021/08/22 20:18:39 andvar Exp $ */
/*-
* Copyright (c) 1997, 2019 The NetBSD Foundation, Inc.
@@ -27,7 +27,7 @@
*/
#include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: hppa_machdep.c,v 1.31 2020/04/16 09:28:52 skrll Exp $");
+__KERNEL_RCSID(0, "$NetBSD: hppa_machdep.c,v 1.32 2021/08/22 20:18:39 andvar Exp $");
#include <sys/param.h>
#include <sys/systm.h>
@@ -141,7 +141,7 @@
#if 0
/*
* XXX
- * Force the space regs and priviledge bits to
+ * Force the space regs and privilege bits to
* the right values in the trapframe for now.
*/
diff -r bdf030432d5a -r f3f9fc5436d2 tests/lib/libc/sys/t_lwp_create.c
--- a/tests/lib/libc/sys/t_lwp_create.c Sun Aug 22 20:14:24 2021 +0000
+++ b/tests/lib/libc/sys/t_lwp_create.c Sun Aug 22 20:18:39 2021 +0000
@@ -1,4 +1,4 @@
-/* $NetBSD: t_lwp_create.c,v 1.3 2020/06/06 18:11:21 thorpej Exp $ */
+/* $NetBSD: t_lwp_create.c,v 1.4 2021/08/22 20:18:39 andvar Exp $ */
/*-
* Copyright (c) 2012 The NetBSD Foundation, Inc.
@@ -185,7 +185,7 @@
INVALID_UCONTEXT(i386, untouchable_eflags, "changing forbidden eflags")
uc->uc_mcontext.__gregs[_REG_EFL] |= PSL_IOPL;
}
-INVALID_UCONTEXT(i386, priv_escalation, "modifying priviledge level")
+INVALID_UCONTEXT(i386, priv_escalation, "modifying privilege level")
uc->uc_mcontext.__gregs[_REG_CS] &= ~SEL_RPL;
}
#endif
diff -r bdf030432d5a -r f3f9fc5436d2 usr.sbin/isibootd/isibootd.c
--- a/usr.sbin/isibootd/isibootd.c Sun Aug 22 20:14:24 2021 +0000
+++ b/usr.sbin/isibootd/isibootd.c Sun Aug 22 20:18:39 2021 +0000
@@ -1,4 +1,4 @@
-/* $NetBSD: isibootd.c,v 1.4 2021/01/30 11:34:28 tsutsui Exp $ */
+/* $NetBSD: isibootd.c,v 1.5 2021/08/22 20:18:39 andvar Exp $ */
/* Id: isiboot.c,v 1.2 1999/12/26 14:33:33 nisimura Exp */
/*-
@@ -157,7 +157,7 @@
argc -= optind;
if (geteuid() != 0)
- warnx("WARNING: run by non root priviledge");
+ warnx("WARNING: run by non root privilege");
memset(station.name, 0, sizeof(station.name));
gethostname(station.name, sizeof(station.name) - 1);
Home |
Main Index |
Thread Index |
Old Index