From 626fac18a1370d3613b437c24b097937177fa959 Mon Sep 17 00:00:00 2001 From: andvar Date: Sun, 22 Aug 2021 20:18:39 +0000 Subject: [PATCH] s/priviledge/privilege/ in comments/log messages and fix one typo in descriptor. --- lib/libc/sys/_lwp_create.2 | 4 ++-- sbin/newfs_udf/udf_write.c | 6 +++--- sys/arch/hpc/stand/hpcboot/sh3/sh_mmu.cpp | 4 ++-- sys/arch/hppa/hppa/hppa_machdep.c | 6 +++--- tests/lib/libc/sys/t_lwp_create.c | 4 ++-- usr.sbin/isibootd/isibootd.c | 4 ++-- 6 files changed, 14 insertions(+), 14 deletions(-) diff --git a/lib/libc/sys/_lwp_create.2 b/lib/libc/sys/_lwp_create.2 index 2bba297007be..2bf2a3eeccc7 100644 --- a/lib/libc/sys/_lwp_create.2 +++ b/lib/libc/sys/_lwp_create.2 @@ -1,4 +1,4 @@ -.\" $NetBSD: _lwp_create.2,v 1.8 2021/07/31 20:51:32 andvar Exp $ +.\" $NetBSD: _lwp_create.2,v 1.9 2021/08/22 20:18:39 andvar Exp $ .\" .\" Copyright (c) 2003 The NetBSD Foundation, Inc. .\" All rights reserved. @@ -49,7 +49,7 @@ argument specifies the initial execution context for the new LWP including signal mask, stack, and machine registers. The signal stack of the newly created light-weight process is reset to disabled. -If this context specifies invalid register values (for example priviledge +If this context specifies invalid register values (for example privilege escalation by setting machine dependent bits forbidden for user processes), or does not specify cpu register values (uc_flags does not have the _UC_CPU bit set), the call will fail and errno will be set to EINVAL. diff --git a/sbin/newfs_udf/udf_write.c b/sbin/newfs_udf/udf_write.c index b287eaa82d69..09a38f0451ac 100644 --- a/sbin/newfs_udf/udf_write.c +++ b/sbin/newfs_udf/udf_write.c @@ -1,4 +1,4 @@ -/* $NetBSD: udf_write.c,v 1.9 2015/01/02 21:01:12 reinoud Exp $ */ +/* $NetBSD: udf_write.c,v 1.10 2021/08/22 20:18:39 andvar Exp $ */ /* * Copyright (c) 2006, 2008, 2013 Reinoud Zandijk @@ -30,7 +30,7 @@ #endif #include -__RCSID("$NetBSD: udf_write.c,v 1.9 2015/01/02 21:01:12 reinoud Exp $"); +__RCSID("$NetBSD: udf_write.c,v 1.10 2021/08/22 20:18:39 andvar Exp $"); #include #include @@ -820,7 +820,7 @@ udf_do_newfs_postfix(void) return error; loc++; - /* mark end of integrity desciptor sequence again */ + /* mark end of integrity descriptor sequence again */ error = udf_write_dscr_phys(terminator_dscr, loc, 1); if (error) return error; diff --git a/sys/arch/hpc/stand/hpcboot/sh3/sh_mmu.cpp b/sys/arch/hpc/stand/hpcboot/sh3/sh_mmu.cpp index 6ecf0b4fa009..771543e028bc 100644 --- a/sys/arch/hpc/stand/hpcboot/sh3/sh_mmu.cpp +++ b/sys/arch/hpc/stand/hpcboot/sh3/sh_mmu.cpp @@ -1,4 +1,4 @@ -/* $NetBSD: sh_mmu.cpp,v 1.7 2008/04/28 20:23:20 martin Exp $ */ +/* $NetBSD: sh_mmu.cpp,v 1.8 2021/08/22 20:18:39 andvar Exp $ */ /*- * Copyright (c) 2001, 2002 The NetBSD Foundation, Inc. @@ -202,7 +202,7 @@ MemoryManager_SHMMU::MMUDump() goto disabled; DPRINTF((TEXT("%s virtual storage mode,"), r & SH3_MMUCR_SV ? TEXT("single") : TEXT("multiple"))); - DPRINTF((TEXT(" SQ access: (priviledge%S)"), + DPRINTF((TEXT(" SQ access: (privilege%S)"), r & SH4_MMUCR_SQMD ? "" : "/user")); DPRINTF((TEXT("\n"))); #if sample_code diff --git a/sys/arch/hppa/hppa/hppa_machdep.c b/sys/arch/hppa/hppa/hppa_machdep.c index e72c5a302f3a..54f4a0e49c61 100644 --- a/sys/arch/hppa/hppa/hppa_machdep.c +++ b/sys/arch/hppa/hppa/hppa_machdep.c @@ -1,4 +1,4 @@ -/* $NetBSD: hppa_machdep.c,v 1.31 2020/04/16 09:28:52 skrll Exp $ */ +/* $NetBSD: hppa_machdep.c,v 1.32 2021/08/22 20:18:39 andvar Exp $ */ /*- * Copyright (c) 1997, 2019 The NetBSD Foundation, Inc. @@ -27,7 +27,7 @@ */ #include -__KERNEL_RCSID(0, "$NetBSD: hppa_machdep.c,v 1.31 2020/04/16 09:28:52 skrll Exp $"); +__KERNEL_RCSID(0, "$NetBSD: hppa_machdep.c,v 1.32 2021/08/22 20:18:39 andvar Exp $"); #include #include @@ -141,7 +141,7 @@ cpu_mcontext_validate(struct lwp *l, const mcontext_t *mcp) #if 0 /* * XXX - * Force the space regs and priviledge bits to + * Force the space regs and privilege bits to * the right values in the trapframe for now. */ diff --git a/tests/lib/libc/sys/t_lwp_create.c b/tests/lib/libc/sys/t_lwp_create.c index fa00fa764ea3..ae91a94625df 100644 --- a/tests/lib/libc/sys/t_lwp_create.c +++ b/tests/lib/libc/sys/t_lwp_create.c @@ -1,4 +1,4 @@ -/* $NetBSD: t_lwp_create.c,v 1.3 2020/06/06 18:11:21 thorpej Exp $ */ +/* $NetBSD: t_lwp_create.c,v 1.4 2021/08/22 20:18:39 andvar Exp $ */ /*- * Copyright (c) 2012 The NetBSD Foundation, Inc. @@ -185,7 +185,7 @@ INVALID_UCONTEXT(hppa, invalid_0, "clear illegal bits in psw") INVALID_UCONTEXT(i386, untouchable_eflags, "changing forbidden eflags") uc->uc_mcontext.__gregs[_REG_EFL] |= PSL_IOPL; } -INVALID_UCONTEXT(i386, priv_escalation, "modifying priviledge level") +INVALID_UCONTEXT(i386, priv_escalation, "modifying privilege level") uc->uc_mcontext.__gregs[_REG_CS] &= ~SEL_RPL; } #endif diff --git a/usr.sbin/isibootd/isibootd.c b/usr.sbin/isibootd/isibootd.c index 932363864ae5..fbaf6c2601b0 100644 --- a/usr.sbin/isibootd/isibootd.c +++ b/usr.sbin/isibootd/isibootd.c @@ -1,4 +1,4 @@ -/* $NetBSD: isibootd.c,v 1.4 2021/01/30 11:34:28 tsutsui Exp $ */ +/* $NetBSD: isibootd.c,v 1.5 2021/08/22 20:18:39 andvar Exp $ */ /* Id: isiboot.c,v 1.2 1999/12/26 14:33:33 nisimura Exp */ /*- @@ -157,7 +157,7 @@ main(int argc, char *argv[]) argc -= optind; if (geteuid() != 0) - warnx("WARNING: run by non root priviledge"); + warnx("WARNING: run by non root privilege"); memset(station.name, 0, sizeof(station.name)); gethostname(station.name, sizeof(station.name) - 1);