Module Name: src Committed By: msaitoh Date: Mon May 13 00:12:33 UTC 2024
Modified Files: src/sys/arch/sparc64/sparc64: trap.c src/sys/netipsec: ipsec.c Log Message: s/priviliged/privileged/ To generate a diff of this commit: cvs rdiff -u -r1.197 -r1.198 src/sys/arch/sparc64/sparc64/trap.c cvs rdiff -u -r1.178 -r1.179 src/sys/netipsec/ipsec.c Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.
Modified files: Index: src/sys/arch/sparc64/sparc64/trap.c diff -u src/sys/arch/sparc64/sparc64/trap.c:1.197 src/sys/arch/sparc64/sparc64/trap.c:1.198 --- src/sys/arch/sparc64/sparc64/trap.c:1.197 Mon Jan 15 08:13:45 2024 +++ src/sys/arch/sparc64/sparc64/trap.c Mon May 13 00:12:33 2024 @@ -1,4 +1,4 @@ -/* $NetBSD: trap.c,v 1.197 2024/01/15 08:13:45 andvar Exp $ */ +/* $NetBSD: trap.c,v 1.198 2024/05/13 00:12:33 msaitoh Exp $ */ /* * Copyright (c) 1996-2002 Eduardo Horvath. All rights reserved. @@ -50,7 +50,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: trap.c,v 1.197 2024/01/15 08:13:45 andvar Exp $"); +__KERNEL_RCSID(0, "$NetBSD: trap.c,v 1.198 2024/05/13 00:12:33 msaitoh Exp $"); #include "opt_ddb.h" #include "opt_multiprocessor.h" @@ -520,7 +520,7 @@ trap(struct trapframe64 *tf, unsigned in #endif /* * The kernel needs to use FPU registers for block - * load/store. If we trap in priviliged code, save + * load/store. If we trap in privileged code, save * the FPU state if there is any and enable the FPU. * * We rely on the kernel code properly enabling the FPU @@ -1386,7 +1386,7 @@ data_access_error(struct trapframe64 *tf } /* - * If this was a priviliged error but not a probe, we + * If this was a privileged error but not a probe, we * cannot recover, so panic. */ if (afsr & ASFR_PRIV) { Index: src/sys/netipsec/ipsec.c diff -u src/sys/netipsec/ipsec.c:1.178 src/sys/netipsec/ipsec.c:1.179 --- src/sys/netipsec/ipsec.c:1.178 Fri Jan 27 09:33:43 2023 +++ src/sys/netipsec/ipsec.c Mon May 13 00:12:33 2024 @@ -1,4 +1,4 @@ -/* $NetBSD: ipsec.c,v 1.178 2023/01/27 09:33:43 ozaki-r Exp $ */ +/* $NetBSD: ipsec.c,v 1.179 2024/05/13 00:12:33 msaitoh Exp $ */ /* $FreeBSD: ipsec.c,v 1.2.2.2 2003/07/01 01:38:13 sam Exp $ */ /* $KAME: ipsec.c,v 1.103 2001/05/24 07:14:18 sakane Exp $ */ @@ -32,7 +32,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: ipsec.c,v 1.178 2023/01/27 09:33:43 ozaki-r Exp $"); +__KERNEL_RCSID(0, "$NetBSD: ipsec.c,v 1.179 2024/05/13 00:12:33 msaitoh Exp $"); /* * IPsec controller part. @@ -489,7 +489,7 @@ ipsec_getpolicybysock(struct mbuf *m, u_ switch (currsp->policy) { case IPSEC_POLICY_BYPASS: IPSECLOG(LOG_ERR, "Illegal policy for " - "non-priviliged defined %d\n", + "non-privileged defined %d\n", currsp->policy); *error = EINVAL; return NULL;