From 5142f0296136d74a7facfc851453f2223c3a725d Mon Sep 17 00:00:00 2001 From: msaitoh Date: Mon, 13 May 2024 00:12:33 +0000 Subject: [PATCH] s/priviliged/privileged/ --- sys/arch/sparc64/sparc64/trap.c | 8 ++++---- sys/netipsec/ipsec.c | 6 +++--- 2 files changed, 7 insertions(+), 7 deletions(-) diff --git a/sys/arch/sparc64/sparc64/trap.c b/sys/arch/sparc64/sparc64/trap.c index eec0e9f50185..a6e271b4e241 100644 --- a/sys/arch/sparc64/sparc64/trap.c +++ b/sys/arch/sparc64/sparc64/trap.c @@ -1,4 +1,4 @@ -/* $NetBSD: trap.c,v 1.197 2024/01/15 08:13:45 andvar Exp $ */ +/* $NetBSD: trap.c,v 1.198 2024/05/13 00:12:33 msaitoh Exp $ */ /* * Copyright (c) 1996-2002 Eduardo Horvath. All rights reserved. @@ -50,7 +50,7 @@ */ #include -__KERNEL_RCSID(0, "$NetBSD: trap.c,v 1.197 2024/01/15 08:13:45 andvar Exp $"); +__KERNEL_RCSID(0, "$NetBSD: trap.c,v 1.198 2024/05/13 00:12:33 msaitoh Exp $"); #include "opt_ddb.h" #include "opt_multiprocessor.h" @@ -520,7 +520,7 @@ trap(struct trapframe64 *tf, unsigned int type, vaddr_t pc, long tstate) #endif /* * The kernel needs to use FPU registers for block - * load/store. If we trap in priviliged code, save + * load/store. If we trap in privileged code, save * the FPU state if there is any and enable the FPU. * * We rely on the kernel code properly enabling the FPU @@ -1386,7 +1386,7 @@ data_access_error(struct trapframe64 *tf, unsigned int type, vaddr_t afva, } /* - * If this was a priviliged error but not a probe, we + * If this was a privileged error but not a probe, we * cannot recover, so panic. */ if (afsr & ASFR_PRIV) { diff --git a/sys/netipsec/ipsec.c b/sys/netipsec/ipsec.c index ccae46dd26f0..1ae455065f7d 100644 --- a/sys/netipsec/ipsec.c +++ b/sys/netipsec/ipsec.c @@ -1,4 +1,4 @@ -/* $NetBSD: ipsec.c,v 1.178 2023/01/27 09:33:43 ozaki-r Exp $ */ +/* $NetBSD: ipsec.c,v 1.179 2024/05/13 00:12:33 msaitoh Exp $ */ /* $FreeBSD: ipsec.c,v 1.2.2.2 2003/07/01 01:38:13 sam Exp $ */ /* $KAME: ipsec.c,v 1.103 2001/05/24 07:14:18 sakane Exp $ */ @@ -32,7 +32,7 @@ */ #include -__KERNEL_RCSID(0, "$NetBSD: ipsec.c,v 1.178 2023/01/27 09:33:43 ozaki-r Exp $"); +__KERNEL_RCSID(0, "$NetBSD: ipsec.c,v 1.179 2024/05/13 00:12:33 msaitoh Exp $"); /* * IPsec controller part. @@ -489,7 +489,7 @@ ipsec_getpolicybysock(struct mbuf *m, u_int dir, struct inpcb *inp, switch (currsp->policy) { case IPSEC_POLICY_BYPASS: IPSECLOG(LOG_ERR, "Illegal policy for " - "non-priviliged defined %d\n", + "non-privileged defined %d\n", currsp->policy); *error = EINVAL; return NULL;