comparison src/os/windows/vm/perfMemory_windows.cpp @ 605:98cb887364d3

6810672: Comment typos Summary: I have collected some typos I have found while looking at the code. Reviewed-by: kvn, never
author twisti
date Fri, 27 Feb 2009 13:27:09 -0800
parents a61af66fc99e
children a2ea687fdc7c
comparison
equal deleted inserted replaced
604:ec59443af135 605:98cb887364d3
193 } 193 }
194 194
195 // check if the given path is considered a secure directory for 195 // check if the given path is considered a secure directory for
196 // the backing store files. Returns true if the directory exists 196 // the backing store files. Returns true if the directory exists
197 // and is considered a secure location. Returns false if the path 197 // and is considered a secure location. Returns false if the path
198 // is a symbolic link or if an error occured. 198 // is a symbolic link or if an error occurred.
199 // 199 //
200 static bool is_directory_secure(const char* path) { 200 static bool is_directory_secure(const char* path) {
201 201
202 DWORD fa; 202 DWORD fa;
203 203
992 } 992 }
993 FREE_C_HEAP_ARRAY(char, newACL); 993 FREE_C_HEAP_ARRAY(char, newACL);
994 return false; 994 return false;
995 } 995 }
996 996
997 // if running on windows 2000 or later, set the automatic inheritence 997 // if running on windows 2000 or later, set the automatic inheritance
998 // control flags. 998 // control flags.
999 SetSecurityDescriptorControlFnPtr _SetSecurityDescriptorControl; 999 SetSecurityDescriptorControlFnPtr _SetSecurityDescriptorControl;
1000 _SetSecurityDescriptorControl = (SetSecurityDescriptorControlFnPtr) 1000 _SetSecurityDescriptorControl = (SetSecurityDescriptorControlFnPtr)
1001 GetProcAddress(GetModuleHandle(TEXT("advapi32.dll")), 1001 GetProcAddress(GetModuleHandle(TEXT("advapi32.dll")),
1002 "SetSecurityDescriptorControl"); 1002 "SetSecurityDescriptorControl");
1003 1003
1004 if (_SetSecurityDescriptorControl != NULL) { 1004 if (_SetSecurityDescriptorControl != NULL) {
1005 // We do not want to further propogate inherited DACLs, so making them 1005 // We do not want to further propagate inherited DACLs, so making them
1006 // protected prevents that. 1006 // protected prevents that.
1007 if (!_SetSecurityDescriptorControl(pSD, SE_DACL_PROTECTED, 1007 if (!_SetSecurityDescriptorControl(pSD, SE_DACL_PROTECTED,
1008 SE_DACL_PROTECTED)) { 1008 SE_DACL_PROTECTED)) {
1009 if (PrintMiscellaneous && Verbose) { 1009 if (PrintMiscellaneous && Verbose) {
1010 warning("SetSecurityDescriptorControl failure:" 1010 warning("SetSecurityDescriptorControl failure:"