Module Name: src
Committed By: msaitoh
Date: Mon May 13 00:12:33 UTC 2024
Modified Files:
src/sys/arch/sparc64/sparc64: trap.c
src/sys/netipsec: ipsec.c
Log Message:
s/priviliged/privileged/
To generate a diff of this commit:
cvs rdiff -u -r1.197 -r1.198 src/sys/arch/sparc64/sparc64/trap.c
cvs rdiff -u -r1.178 -r1.179 src/sys/netipsec/ipsec.c
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
Modified files:
Index: src/sys/arch/sparc64/sparc64/trap.c
diff -u src/sys/arch/sparc64/sparc64/trap.c:1.197 src/sys/arch/sparc64/sparc64/trap.c:1.198
--- src/sys/arch/sparc64/sparc64/trap.c:1.197 Mon Jan 15 08:13:45 2024
+++ src/sys/arch/sparc64/sparc64/trap.c Mon May 13 00:12:33 2024
@@ -1,4 +1,4 @@
-/* $NetBSD: trap.c,v 1.197 2024/01/15 08:13:45 andvar Exp $ */
+/* $NetBSD: trap.c,v 1.198 2024/05/13 00:12:33 msaitoh Exp $ */
/*
* Copyright (c) 1996-2002 Eduardo Horvath. All rights reserved.
@@ -50,7 +50,7 @@
*/
#include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: trap.c,v 1.197 2024/01/15 08:13:45 andvar Exp $");
+__KERNEL_RCSID(0, "$NetBSD: trap.c,v 1.198 2024/05/13 00:12:33 msaitoh Exp $");
#include "opt_ddb.h"
#include "opt_multiprocessor.h"
@@ -520,7 +520,7 @@ trap(struct trapframe64 *tf, unsigned in
#endif
/*
* The kernel needs to use FPU registers for block
- * load/store. If we trap in priviliged code, save
+ * load/store. If we trap in privileged code, save
* the FPU state if there is any and enable the FPU.
*
* We rely on the kernel code properly enabling the FPU
@@ -1386,7 +1386,7 @@ data_access_error(struct trapframe64 *tf
}
/*
- * If this was a priviliged error but not a probe, we
+ * If this was a privileged error but not a probe, we
* cannot recover, so panic.
*/
if (afsr & ASFR_PRIV) {
Index: src/sys/netipsec/ipsec.c
diff -u src/sys/netipsec/ipsec.c:1.178 src/sys/netipsec/ipsec.c:1.179
--- src/sys/netipsec/ipsec.c:1.178 Fri Jan 27 09:33:43 2023
+++ src/sys/netipsec/ipsec.c Mon May 13 00:12:33 2024
@@ -1,4 +1,4 @@
-/* $NetBSD: ipsec.c,v 1.178 2023/01/27 09:33:43 ozaki-r Exp $ */
+/* $NetBSD: ipsec.c,v 1.179 2024/05/13 00:12:33 msaitoh Exp $ */
/* $FreeBSD: ipsec.c,v 1.2.2.2 2003/07/01 01:38:13 sam Exp $ */
/* $KAME: ipsec.c,v 1.103 2001/05/24 07:14:18 sakane Exp $ */
@@ -32,7 +32,7 @@
*/
#include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: ipsec.c,v 1.178 2023/01/27 09:33:43 ozaki-r Exp $");
+__KERNEL_RCSID(0, "$NetBSD: ipsec.c,v 1.179 2024/05/13 00:12:33 msaitoh Exp $");
/*
* IPsec controller part.
@@ -489,7 +489,7 @@ ipsec_getpolicybysock(struct mbuf *m, u_
switch (currsp->policy) {
case IPSEC_POLICY_BYPASS:
IPSECLOG(LOG_ERR, "Illegal policy for "
- "non-priviliged defined %d\n",
+ "non-privileged defined %d\n",
currsp->policy);
*error = EINVAL;
return NULL;