aboutsummaryrefslogtreecommitdiffstats
path: root/src/plugins/acl
diff options
context:
space:
mode:
Diffstat (limited to 'src/plugins/acl')
-rw-r--r--src/plugins/acl/acl.c4
-rw-r--r--src/plugins/acl/acl.h2
-rw-r--r--src/plugins/acl/acl_lookup_context.md6
-rw-r--r--src/plugins/acl/acl_multicore_doc.md2
-rw-r--r--src/plugins/acl/exported_types.h2
-rw-r--r--src/plugins/acl/hash_lookup.c4
-rw-r--r--src/plugins/acl/lookup_context.c2
-rw-r--r--src/plugins/acl/manual_fns.h4
-rw-r--r--src/plugins/acl/session_inlines.h2
9 files changed, 14 insertions, 14 deletions
diff --git a/src/plugins/acl/acl.c b/src/plugins/acl/acl.c
index 8f2be5d197b..b6e491cf897 100644
--- a/src/plugins/acl/acl.c
+++ b/src/plugins/acl/acl.c
@@ -472,7 +472,7 @@ acl_del_list (u32 acl_list_index)
return VNET_API_ERROR_ACL_IN_USE_INBOUND;
if (acl_is_used_by (acl_list_index, am->output_sw_if_index_vec_by_acl))
return VNET_API_ERROR_ACL_IN_USE_OUTBOUND;
- /* lookup contexts cover other cases, not just inbound/oubound, so check that */
+ /* lookup contexts cover other cases, not just inbound/outbound, so check that */
if (acl_is_used_by (acl_list_index, am->lc_index_vec_by_acl))
return VNET_API_ERROR_ACL_IN_USE_BY_LOOKUP_CONTEXT;
@@ -2239,7 +2239,7 @@ macip_acl_add_list (u32 count, vl_api_macip_acl_rule_t rules[],
a->count = count;
memcpy (a->tag, tag, sizeof (a->tag));
- /* Create and populate the classifer tables */
+ /* Create and populate the classifier tables */
macip_create_classify_tables (am, *acl_list_index);
clib_mem_set_heap (oldheap);
/* If the ACL was already applied somewhere, reapply the newly created tables */
diff --git a/src/plugins/acl/acl.h b/src/plugins/acl/acl.h
index d030681ac3a..310f80bfddc 100644
--- a/src/plugins/acl/acl.h
+++ b/src/plugins/acl/acl.h
@@ -241,7 +241,7 @@ typedef struct {
int fa_sessions_hash_is_initialized;
clib_bihash_40_8_t fa_ip6_sessions_hash;
clib_bihash_16_8_t fa_ip4_sessions_hash;
- /* The process node which orcherstrates the cleanup */
+ /* The process node which orchestrates the cleanup */
u32 fa_cleaner_node_index;
/* FA session timeouts, in seconds */
u32 session_timeout_sec[ACL_N_TIMEOUTS];
diff --git a/src/plugins/acl/acl_lookup_context.md b/src/plugins/acl/acl_lookup_context.md
index 53ad1ef0e46..e95f82043f9 100644
--- a/src/plugins/acl/acl_lookup_context.md
+++ b/src/plugins/acl/acl_lookup_context.md
@@ -8,7 +8,7 @@ However, some uses outside of pure traffic control have appeared, for example,
ACL-based forwarding, etc. Also, improved algorithms of the ACL lookup
could benefit of the more abstract representation, not coupled to the interfaces.
-This describes a way to accomodate these use cases by generalizing the ACL
+This describes a way to accommodate these use cases by generalizing the ACL
lookups into "ACL lookup contexts", not tied to specific interfaces, usable
by other portions of the code by utilizing the exports.h header file,
which provides the necessary interface.
@@ -21,7 +21,7 @@ The first reason is the logical grouping of multiple ACLs.
The interface matching code currently allows for matching multiple ACLs
in a 'first-match' fashion. Some other use cases also fall into a similar
-pattern: they attemt to match a sequence of ACLs, and the first matched ACL
+pattern: they attempt to match a sequence of ACLs, and the first matched ACL
determines what the outcome is, e.g. where to forward traffic. Thus,
a match never happens on an ACL in isolation, but always on a group of
ACLs.
@@ -79,7 +79,7 @@ in the "show acl lookup context" command.
To set the vector of ACL numbers to be looked up within the context, use the function
acl_plugin.set_acl_vec_for_context(lc_index, acl_list). The first parameter specifies the context
that you have created, the second parameter is a vector of u32s, each u32 being the index of the ACL
-which we should be looking up within this context. The comand is idempotent, i.e.
+which we should be looking up within this context. The command is idempotent, i.e.
it unapplies the previously applied list of ACLs, and then sets the new list of ACLs.
Subsequent ACL updates for the already applied ACLs will cause the re-application
diff --git a/src/plugins/acl/acl_multicore_doc.md b/src/plugins/acl/acl_multicore_doc.md
index b2cf7b9c6d4..deec5e9d566 100644
--- a/src/plugins/acl/acl_multicore_doc.md
+++ b/src/plugins/acl/acl_multicore_doc.md
@@ -93,7 +93,7 @@ of the existing connections was done in the datapath,
by periodically calling the aging function.
This decision to use the existing components,
-with its attrativeness, did bring a few limitations as well:
+with its attractiveness, did bring a few limitations as well:
* L2 classifier is a simple mask-and-value match, with
a fixed mask across the table. So, sanely supporting IPv6
diff --git a/src/plugins/acl/exported_types.h b/src/plugins/acl/exported_types.h
index cdd1a166eac..a5b1c349772 100644
--- a/src/plugins/acl/exported_types.h
+++ b/src/plugins/acl/exported_types.h
@@ -51,7 +51,7 @@ typedef int (*acl_plugin_get_lookup_context_index_fn_t) (u32 acl_user_id, u32 va
/*
* Release the lookup context index and destroy
- * any asssociated data structures.
+ * any associated data structures.
*/
typedef void (*acl_plugin_put_lookup_context_index_fn_t) (u32 lc_index);
diff --git a/src/plugins/acl/hash_lookup.c b/src/plugins/acl/hash_lookup.c
index 82df45ea304..f2913a933d0 100644
--- a/src/plugins/acl/hash_lookup.c
+++ b/src/plugins/acl/hash_lookup.c
@@ -578,7 +578,7 @@ activate_applied_ace_hash_entry(acl_main_t *am,
ASSERT(last_index != ~0);
applied_hash_ace_entry_t *last_pae = vec_elt_at_index((*applied_hash_aces), last_index);
DBG("...advance to chained entry index: %d", last_index);
- /* link ourseves in */
+ /* link ourselves in */
last_pae->next_applied_entry_index = new_index;
pae->prev_applied_entry_index = last_index;
/* adjust the pointer to the new tail */
@@ -1207,7 +1207,7 @@ void hash_acl_delete(acl_main_t *am, int acl_index)
* should not be possible to delete, and the change adding this also adds
* the safeguards to that respect, so this is not a problem.
*
- * The part to rememeber is that this routine is called in process of reapplication
+ * The part to remember is that this routine is called in process of reapplication
* during the acl_add_replace() API call - the old acl ruleset is deleted, then
* the new one is added, without the change in the applied ACLs - so this case
* has to be handled.
diff --git a/src/plugins/acl/lookup_context.c b/src/plugins/acl/lookup_context.c
index ef46592edd2..904e8ad945b 100644
--- a/src/plugins/acl/lookup_context.c
+++ b/src/plugins/acl/lookup_context.c
@@ -179,7 +179,7 @@ unapply_acl_vec(u32 lc_index, u32 *acls)
/*
* Release the lookup context index and destroy
- * any asssociated data structures.
+ * any associated data structures.
*/
static void acl_plugin_put_lookup_context_index (u32 lc_index)
{
diff --git a/src/plugins/acl/manual_fns.h b/src/plugins/acl/manual_fns.h
index 6ab014caf8d..c592f892272 100644
--- a/src/plugins/acl/manual_fns.h
+++ b/src/plugins/acl/manual_fns.h
@@ -227,7 +227,7 @@ vl_api_acl_details_t_print (vl_api_acl_details_t * a, void *handle)
u32 count = clib_net_to_host_u32 (a->count);
if (count > 0x100000)
{
- s = format (s, "WARN: acl_defails count endianness wrong? Fixup to avoid long loop.\n");
+ s = format (s, "WARN: acl_details count endianness wrong? Fixup to avoid long loop.\n");
count = a->count;
}
@@ -256,7 +256,7 @@ vl_api_macip_acl_details_t_print (vl_api_macip_acl_details_t * a,
u32 count = clib_net_to_host_u32 (a->count);
if (count > 0x100000)
{
- s = format (s, "WARN: macip_acl_defails count endianness wrong? Fixup to avoid long loop.\n");
+ s = format (s, "WARN: macip_acl_details count endianness wrong? Fixup to avoid long loop.\n");
count = a->count;
}
diff --git a/src/plugins/acl/session_inlines.h b/src/plugins/acl/session_inlines.h
index cab4d7d4cc9..db878c003e2 100644
--- a/src/plugins/acl/session_inlines.h
+++ b/src/plugins/acl/session_inlines.h
@@ -70,7 +70,7 @@ acl_fa_ifc_has_out_acl (acl_main_t * am, int sw_if_index0)
always_inline int
fa_session_get_timeout_type (acl_main_t * am, fa_session_t * sess)
{
- /* seen both SYNs and ACKs but not FINs means we are in establshed state */
+ /* seen both SYNs and ACKs but not FINs means we are in established state */
u16 masked_flags =
sess->tcp_flags_seen.as_u16 & ((TCP_FLAGS_RSTFINACKSYN << 8) +
TCP_FLAGS_RSTFINACKSYN);