Module Name:    src
Committed By:   msaitoh
Date:           Mon May 13 00:12:33 UTC 2024

Modified Files:
        src/sys/arch/sparc64/sparc64: trap.c
        src/sys/netipsec: ipsec.c

Log Message:
s/priviliged/privileged/


To generate a diff of this commit:
cvs rdiff -u -r1.197 -r1.198 src/sys/arch/sparc64/sparc64/trap.c
cvs rdiff -u -r1.178 -r1.179 src/sys/netipsec/ipsec.c

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/sys/arch/sparc64/sparc64/trap.c
diff -u src/sys/arch/sparc64/sparc64/trap.c:1.197 src/sys/arch/sparc64/sparc64/trap.c:1.198
--- src/sys/arch/sparc64/sparc64/trap.c:1.197	Mon Jan 15 08:13:45 2024
+++ src/sys/arch/sparc64/sparc64/trap.c	Mon May 13 00:12:33 2024
@@ -1,4 +1,4 @@
-/*	$NetBSD: trap.c,v 1.197 2024/01/15 08:13:45 andvar Exp $ */
+/*	$NetBSD: trap.c,v 1.198 2024/05/13 00:12:33 msaitoh Exp $ */
 
 /*
  * Copyright (c) 1996-2002 Eduardo Horvath.  All rights reserved.
@@ -50,7 +50,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: trap.c,v 1.197 2024/01/15 08:13:45 andvar Exp $");
+__KERNEL_RCSID(0, "$NetBSD: trap.c,v 1.198 2024/05/13 00:12:33 msaitoh Exp $");
 
 #include "opt_ddb.h"
 #include "opt_multiprocessor.h"
@@ -520,7 +520,7 @@ trap(struct trapframe64 *tf, unsigned in
 #endif
 		/*
 		 * The kernel needs to use FPU registers for block
-		 * load/store.  If we trap in priviliged code, save
+		 * load/store.  If we trap in privileged code, save
 		 * the FPU state if there is any and enable the FPU.
 		 *
 		 * We rely on the kernel code properly enabling the FPU
@@ -1386,7 +1386,7 @@ data_access_error(struct trapframe64 *tf
 		}
 
 		/*
-		 * If this was a priviliged error but not a probe, we
+		 * If this was a privileged error but not a probe, we
 		 * cannot recover, so panic.
 		 */
 		if (afsr & ASFR_PRIV) {

Index: src/sys/netipsec/ipsec.c
diff -u src/sys/netipsec/ipsec.c:1.178 src/sys/netipsec/ipsec.c:1.179
--- src/sys/netipsec/ipsec.c:1.178	Fri Jan 27 09:33:43 2023
+++ src/sys/netipsec/ipsec.c	Mon May 13 00:12:33 2024
@@ -1,4 +1,4 @@
-/* $NetBSD: ipsec.c,v 1.178 2023/01/27 09:33:43 ozaki-r Exp $ */
+/* $NetBSD: ipsec.c,v 1.179 2024/05/13 00:12:33 msaitoh Exp $ */
 /* $FreeBSD: ipsec.c,v 1.2.2.2 2003/07/01 01:38:13 sam Exp $ */
 /* $KAME: ipsec.c,v 1.103 2001/05/24 07:14:18 sakane Exp $ */
 
@@ -32,7 +32,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: ipsec.c,v 1.178 2023/01/27 09:33:43 ozaki-r Exp $");
+__KERNEL_RCSID(0, "$NetBSD: ipsec.c,v 1.179 2024/05/13 00:12:33 msaitoh Exp $");
 
 /*
  * IPsec controller part.
@@ -489,7 +489,7 @@ ipsec_getpolicybysock(struct mbuf *m, u_
 			switch (currsp->policy) {
 			case IPSEC_POLICY_BYPASS:
 				IPSECLOG(LOG_ERR, "Illegal policy for "
-				    "non-priviliged defined %d\n",
+				    "non-privileged defined %d\n",
 				    currsp->policy);
 				*error = EINVAL;
 				return NULL;

Reply via email to