s/priviledge/privilege/ in comments/log messages and fix one typo in descriptor.
This commit is contained in:
parent
548364535a
commit
626fac18a1
|
@ -1,4 +1,4 @@
|
|||
.\" $NetBSD: _lwp_create.2,v 1.8 2021/07/31 20:51:32 andvar Exp $
|
||||
.\" $NetBSD: _lwp_create.2,v 1.9 2021/08/22 20:18:39 andvar Exp $
|
||||
.\"
|
||||
.\" Copyright (c) 2003 The NetBSD Foundation, Inc.
|
||||
.\" All rights reserved.
|
||||
|
@ -49,7 +49,7 @@ argument specifies the initial execution context for the new LWP including
|
|||
signal mask, stack, and machine registers.
|
||||
The signal stack of the newly created light-weight process is reset to
|
||||
disabled.
|
||||
If this context specifies invalid register values (for example priviledge
|
||||
If this context specifies invalid register values (for example privilege
|
||||
escalation by setting machine dependent bits forbidden for user processes),
|
||||
or does not specify cpu register values (uc_flags does not have the
|
||||
_UC_CPU bit set), the call will fail and errno will be set to EINVAL.
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
/* $NetBSD: udf_write.c,v 1.9 2015/01/02 21:01:12 reinoud Exp $ */
|
||||
/* $NetBSD: udf_write.c,v 1.10 2021/08/22 20:18:39 andvar Exp $ */
|
||||
|
||||
/*
|
||||
* Copyright (c) 2006, 2008, 2013 Reinoud Zandijk
|
||||
|
@ -30,7 +30,7 @@
|
|||
#endif
|
||||
|
||||
#include <sys/cdefs.h>
|
||||
__RCSID("$NetBSD: udf_write.c,v 1.9 2015/01/02 21:01:12 reinoud Exp $");
|
||||
__RCSID("$NetBSD: udf_write.c,v 1.10 2021/08/22 20:18:39 andvar Exp $");
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
|
@ -820,7 +820,7 @@ udf_do_newfs_postfix(void)
|
|||
return error;
|
||||
loc++;
|
||||
|
||||
/* mark end of integrity desciptor sequence again */
|
||||
/* mark end of integrity descriptor sequence again */
|
||||
error = udf_write_dscr_phys(terminator_dscr, loc, 1);
|
||||
if (error)
|
||||
return error;
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
/* $NetBSD: sh_mmu.cpp,v 1.7 2008/04/28 20:23:20 martin Exp $ */
|
||||
/* $NetBSD: sh_mmu.cpp,v 1.8 2021/08/22 20:18:39 andvar Exp $ */
|
||||
|
||||
/*-
|
||||
* Copyright (c) 2001, 2002 The NetBSD Foundation, Inc.
|
||||
|
@ -202,7 +202,7 @@ MemoryManager_SHMMU::MMUDump()
|
|||
goto disabled;
|
||||
DPRINTF((TEXT("%s virtual storage mode,"),
|
||||
r & SH3_MMUCR_SV ? TEXT("single") : TEXT("multiple")));
|
||||
DPRINTF((TEXT(" SQ access: (priviledge%S)"),
|
||||
DPRINTF((TEXT(" SQ access: (privilege%S)"),
|
||||
r & SH4_MMUCR_SQMD ? "" : "/user"));
|
||||
DPRINTF((TEXT("\n")));
|
||||
#if sample_code
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
/* $NetBSD: hppa_machdep.c,v 1.31 2020/04/16 09:28:52 skrll Exp $ */
|
||||
/* $NetBSD: hppa_machdep.c,v 1.32 2021/08/22 20:18:39 andvar Exp $ */
|
||||
|
||||
/*-
|
||||
* Copyright (c) 1997, 2019 The NetBSD Foundation, Inc.
|
||||
|
@ -27,7 +27,7 @@
|
|||
*/
|
||||
|
||||
#include <sys/cdefs.h>
|
||||
__KERNEL_RCSID(0, "$NetBSD: hppa_machdep.c,v 1.31 2020/04/16 09:28:52 skrll Exp $");
|
||||
__KERNEL_RCSID(0, "$NetBSD: hppa_machdep.c,v 1.32 2021/08/22 20:18:39 andvar Exp $");
|
||||
|
||||
#include <sys/param.h>
|
||||
#include <sys/systm.h>
|
||||
|
@ -141,7 +141,7 @@ cpu_mcontext_validate(struct lwp *l, const mcontext_t *mcp)
|
|||
#if 0
|
||||
/*
|
||||
* XXX
|
||||
* Force the space regs and priviledge bits to
|
||||
* Force the space regs and privilege bits to
|
||||
* the right values in the trapframe for now.
|
||||
*/
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
/* $NetBSD: t_lwp_create.c,v 1.3 2020/06/06 18:11:21 thorpej Exp $ */
|
||||
/* $NetBSD: t_lwp_create.c,v 1.4 2021/08/22 20:18:39 andvar Exp $ */
|
||||
|
||||
/*-
|
||||
* Copyright (c) 2012 The NetBSD Foundation, Inc.
|
||||
|
@ -185,7 +185,7 @@ INVALID_UCONTEXT(hppa, invalid_0, "clear illegal bits in psw")
|
|||
INVALID_UCONTEXT(i386, untouchable_eflags, "changing forbidden eflags")
|
||||
uc->uc_mcontext.__gregs[_REG_EFL] |= PSL_IOPL;
|
||||
}
|
||||
INVALID_UCONTEXT(i386, priv_escalation, "modifying priviledge level")
|
||||
INVALID_UCONTEXT(i386, priv_escalation, "modifying privilege level")
|
||||
uc->uc_mcontext.__gregs[_REG_CS] &= ~SEL_RPL;
|
||||
}
|
||||
#endif
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
/* $NetBSD: isibootd.c,v 1.4 2021/01/30 11:34:28 tsutsui Exp $ */
|
||||
/* $NetBSD: isibootd.c,v 1.5 2021/08/22 20:18:39 andvar Exp $ */
|
||||
/* Id: isiboot.c,v 1.2 1999/12/26 14:33:33 nisimura Exp */
|
||||
|
||||
/*-
|
||||
|
@ -157,7 +157,7 @@ main(int argc, char *argv[])
|
|||
argc -= optind;
|
||||
|
||||
if (geteuid() != 0)
|
||||
warnx("WARNING: run by non root priviledge");
|
||||
warnx("WARNING: run by non root privilege");
|
||||
|
||||
memset(station.name, 0, sizeof(station.name));
|
||||
gethostname(station.name, sizeof(station.name) - 1);
|
||||
|
|
Loading…
Reference in New Issue