Module Name:    src
Committed By:   andvar
Date:           Sun Jan  2 20:28:53 UTC 2022

Modified Files:
        src/sys/arch/x86/x86: pmap.c
        src/sys/netipsec: key.c

Log Message:
fix few more typos in comments.


To generate a diff of this commit:
cvs rdiff -u -r1.412 -r1.413 src/sys/arch/x86/x86/pmap.c
cvs rdiff -u -r1.272 -r1.273 src/sys/netipsec/key.c

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/sys/arch/x86/x86/pmap.c
diff -u src/sys/arch/x86/x86/pmap.c:1.412 src/sys/arch/x86/x86/pmap.c:1.413
--- src/sys/arch/x86/x86/pmap.c:1.412	Thu Oct  7 12:52:27 2021
+++ src/sys/arch/x86/x86/pmap.c	Sun Jan  2 20:28:53 2022
@@ -1,4 +1,4 @@
-/*	$NetBSD: pmap.c,v 1.412 2021/10/07 12:52:27 msaitoh Exp $	*/
+/*	$NetBSD: pmap.c,v 1.413 2022/01/02 20:28:53 andvar Exp $	*/
 
 /*
  * Copyright (c) 2008, 2010, 2016, 2017, 2019, 2020 The NetBSD Foundation, Inc.
@@ -130,7 +130,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: pmap.c,v 1.412 2021/10/07 12:52:27 msaitoh Exp $");
+__KERNEL_RCSID(0, "$NetBSD: pmap.c,v 1.413 2022/01/02 20:28:53 andvar Exp $");
 
 #include "opt_user_ldt.h"
 #include "opt_lockdebug.h"
@@ -4488,7 +4488,7 @@ pmap_test_attrs(struct vm_page *pg, unsi
 		if (pmap_sync_pv(pvpte, pa, 0, &oattrs, NULL)) {
 			/*
 			 * raced with a V->P operation.  wait for the other
-			 * side to finish by acquring pmap's lock.  if no
+			 * side to finish by acquiring pmap's lock.  if no
 			 * wait, updates to pp_attrs by the other side may
 			 * go unseen.
 			 */
@@ -4528,7 +4528,7 @@ startover:
 		if (pmap_sync_pv(pvpte, pa, clearbits, &oattrs, NULL)) {
 			/*
 			 * raced with a V->P operation.  wait for the other
-			 * side to finish by acquring pmap's lock.  it is
+			 * side to finish by acquiring pmap's lock.  it is
 			 * probably unmapping the page, and it will be gone
 			 * when the loop is restarted.
 			 */

Index: src/sys/netipsec/key.c
diff -u src/sys/netipsec/key.c:1.272 src/sys/netipsec/key.c:1.273
--- src/sys/netipsec/key.c:1.272	Fri Dec  3 13:27:39 2021
+++ src/sys/netipsec/key.c	Sun Jan  2 20:28:53 2022
@@ -1,4 +1,4 @@
-/*	$NetBSD: key.c,v 1.272 2021/12/03 13:27:39 andvar Exp $	*/
+/*	$NetBSD: key.c,v 1.273 2022/01/02 20:28:53 andvar Exp $	*/
 /*	$FreeBSD: key.c,v 1.3.2.3 2004/02/14 22:23:23 bms Exp $	*/
 /*	$KAME: key.c,v 1.191 2001/06/27 10:46:49 sakane Exp $	*/
 
@@ -32,7 +32,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: key.c,v 1.272 2021/12/03 13:27:39 andvar Exp $");
+__KERNEL_RCSID(0, "$NetBSD: key.c,v 1.273 2022/01/02 20:28:53 andvar Exp $");
 
 /*
  * This code is referred to RFC 2367
@@ -6751,7 +6751,7 @@ key_acquire(const struct secasindex *sai
 
 #ifndef IPSEC_NONBLOCK_ACQUIRE
 	/*
-	 * We never do anything about acquirng SA.  There is anather
+	 * We never do anything about acquiring SA.  There is another
 	 * solution that kernel blocks to send SADB_ACQUIRE message until
 	 * getting something message from IKEd.  In later case, to be
 	 * managed with ACQUIRING list.

Reply via email to