Index: sys/security/audit/audit.c =================================================================== --- sys/security/audit/audit.c +++ sys/security/audit/audit.c @@ -258,7 +258,7 @@ ar->k_ar.ar_subj_term_addr = cred->cr_audit.ai_termid; /* * If this process is jailed, make sure we capture the name of the - * jail so we can use it to generate a zonename token when we covert + * jail so we can use it to generate a zonename token when we convert * this record to BSM. */ if (jailed(cred)) { Index: sys/security/audit/audit_arg.c =================================================================== --- sys/security/audit/audit_arg.c +++ sys/security/audit/audit_arg.c @@ -61,7 +61,7 @@ /* * Calls to manipulate elements of the audit record structure from system - * call code. Macro wrappers will prevent this functions from being entered + * call code. Macro wrappers will prevent these functions from being entered * if auditing is disabled, avoiding the function call cost. We check the * thread audit record pointer anyway, as the audit condition could change, * and pre-selection may not have allocated an audit record for this event. Index: sys/security/audit/audit_private.h =================================================================== --- sys/security/audit/audit_private.h +++ sys/security/audit/audit_private.h @@ -275,7 +275,7 @@ #define ARG_SADDRINET 0x0000000000100000ULL #define ARG_SADDRINET6 0x0000000000200000ULL #define ARG_SADDRUNIX 0x0000000000400000ULL -#define ARG_TERMID_ADDR 0x0000000000400000ULL +#define ARG_TERMID_ADDR 0x0000000000800000ULL #define ARG_UNUSED2 0x0000000001000000ULL #define ARG_UPATH1 0x0000000002000000ULL #define ARG_UPATH2 0x0000000004000000ULL