Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 6 May 2016 16:59:05 +0000 (UTC)
From:      "Pedro F. Giffuni" <pfg@FreeBSD.org>
To:        src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-head@freebsd.org
Subject:   svn commit: r299187 - in head/sys/security: mac mac_biba mac_lomac mac_mls
Message-ID:  <201605061659.u46Gx5oM032618@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: pfg
Date: Fri May  6 16:59:04 2016
New Revision: 299187
URL: https://svnweb.freebsd.org/changeset/base/299187

Log:
  sys/security: minor spelling fixes.
  
  No functional change.

Modified:
  head/sys/security/mac/mac_cred.c
  head/sys/security/mac/mac_framework.c
  head/sys/security/mac_biba/mac_biba.h
  head/sys/security/mac_lomac/mac_lomac.c
  head/sys/security/mac_lomac/mac_lomac.h
  head/sys/security/mac_mls/mac_mls.c
  head/sys/security/mac_mls/mac_mls.h

Modified: head/sys/security/mac/mac_cred.c
==============================================================================
--- head/sys/security/mac/mac_cred.c	Fri May  6 16:51:56 2016	(r299186)
+++ head/sys/security/mac/mac_cred.c	Fri May  6 16:59:04 2016	(r299187)
@@ -174,7 +174,7 @@ mac_cred_internalize_label(struct label 
 
 /*
  * When a new process is created, its label must be initialized.  Generally,
- * this involves inheritence from the parent process, modulo possible deltas.
+ * this involves inheritance from the parent process, modulo possible deltas.
  * This function allows that processing to take place.
  */
 void

Modified: head/sys/security/mac/mac_framework.c
==============================================================================
--- head/sys/security/mac/mac_framework.c	Fri May  6 16:51:56 2016	(r299186)
+++ head/sys/security/mac/mac_framework.c	Fri May  6 16:59:04 2016	(r299187)
@@ -437,7 +437,7 @@ mac_policy_register(struct mac_policy_co
 	 * Per-policy initialization.  Currently, this takes place under the
 	 * exclusive lock, so policies must not sleep in their init method.
 	 * In the future, we may want to separate "init" from "start", with
-	 * "init" occuring without the lock held.  Likewise, on tear-down,
+	 * "init" occurring without the lock held.  Likewise, on tear-down,
 	 * breaking out "stop" from "destroy".
 	 */
 	if (mpc->mpc_ops->mpo_init != NULL)

Modified: head/sys/security/mac_biba/mac_biba.h
==============================================================================
--- head/sys/security/mac_biba/mac_biba.h	Fri May  6 16:51:56 2016	(r299186)
+++ head/sys/security/mac_biba/mac_biba.h	Fri May  6 16:59:04 2016	(r299187)
@@ -54,7 +54,7 @@
 					 * MAC_BIBA_TYPE_LABEL. */
 #define	MAC_BIBA_TYPE_HIGH	3	/* Dominates any
 					 * MAC_BIBA_TYPE_LABEL. */
-#define	MAC_BIBA_TYPE_EQUAL	4	/* Equivilent to any
+#define	MAC_BIBA_TYPE_EQUAL	4	/* Equivalent to any
 					 * MAC_BIBA_TYPE_LABEL. */
 
 /*

Modified: head/sys/security/mac_lomac/mac_lomac.c
==============================================================================
--- head/sys/security/mac_lomac/mac_lomac.c	Fri May  6 16:51:56 2016	(r299186)
+++ head/sys/security/mac_lomac/mac_lomac.c	Fri May  6 16:59:04 2016	(r299187)
@@ -1472,7 +1472,7 @@ lomac_netinet_firewall_send(struct mbuf 
 
 	dest = SLOT(mlabel);
 
-	/* XXX: where is the label for the firewall really comming from? */
+	/* XXX: where is the label for the firewall really coming from? */
 	lomac_set_single(dest, MAC_LOMAC_TYPE_EQUAL, 0);
 }
 

Modified: head/sys/security/mac_lomac/mac_lomac.h
==============================================================================
--- head/sys/security/mac_lomac/mac_lomac.h	Fri May  6 16:51:56 2016	(r299186)
+++ head/sys/security/mac_lomac/mac_lomac.h	Fri May  6 16:59:04 2016	(r299187)
@@ -56,7 +56,7 @@
 					 * MAC_LOMAC_TYPE_LABEL. */
 #define	MAC_LOMAC_TYPE_HIGH	3	/* Dominates any
 					 * MAC_LOMAC_TYPE_LABEL. */
-#define	MAC_LOMAC_TYPE_EQUAL	4	/* Equivilent to any
+#define	MAC_LOMAC_TYPE_EQUAL	4	/* Equivalent to any
 					 * MAC_LOMAC_TYPE_LABEL. */
 
 /*

Modified: head/sys/security/mac_mls/mac_mls.c
==============================================================================
--- head/sys/security/mac_mls/mac_mls.c	Fri May  6 16:51:56 2016	(r299186)
+++ head/sys/security/mac_mls/mac_mls.c	Fri May  6 16:59:04 2016	(r299187)
@@ -1276,7 +1276,7 @@ mls_netinet_firewall_send(struct mbuf *m
 
 	dest = SLOT(mlabel);
 
-	/* XXX: where is the label for the firewall really comming from? */
+	/* XXX: where is the label for the firewall really coming from? */
 	mls_set_effective(dest, MAC_MLS_TYPE_EQUAL, 0, NULL);
 }
 

Modified: head/sys/security/mac_mls/mac_mls.h
==============================================================================
--- head/sys/security/mac_mls/mac_mls.h	Fri May  6 16:51:56 2016	(r299186)
+++ head/sys/security/mac_mls/mac_mls.h	Fri May  6 16:59:04 2016	(r299187)
@@ -54,7 +54,7 @@
 					 * MAC_MLS_TYPE_LABEL. */
 #define	MAC_MLS_TYPE_HIGH	3	/* Dominates any
 					 * MAC_MLS_TYPE_LABEL. */
-#define	MAC_MLS_TYPE_EQUAL	4	/* Equivilent to any
+#define	MAC_MLS_TYPE_EQUAL	4	/* Equivalent to any
 					 * MAC_MLS_TYPE_LABEL. */
 
 /*



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201605061659.u46Gx5oM032618>