Message ID | 20241115131156.1398147-1-dmantipov@yandex.ru (mailing list archive) |
---|---|
State | New |
Headers | show |
Series | ceph: miscellaneous spelling fixes | expand |
On Fri, Nov 15, 2024 at 2:11 PM Dmitry Antipov <dmantipov@yandex.ru> wrote: > > Correct spelling here and there as suggested by codespell. > > Signed-off-by: Dmitry Antipov <dmantipov@yandex.ru> > --- > fs/ceph/addr.c | 2 +- > fs/ceph/caps.c | 2 +- > fs/ceph/crypto.h | 2 +- > fs/ceph/dir.c | 4 ++-- > fs/ceph/export.c | 4 ++-- > fs/ceph/inode.c | 2 +- > fs/ceph/mds_client.c | 10 +++++----- > fs/ceph/super.h | 2 +- > fs/ceph/xattr.c | 2 +- > 9 files changed, 15 insertions(+), 15 deletions(-) > > diff --git a/fs/ceph/addr.c b/fs/ceph/addr.c > index c2a9e2cc03de..4514b285e771 100644 > --- a/fs/ceph/addr.c > +++ b/fs/ceph/addr.c > @@ -2195,7 +2195,7 @@ int ceph_pool_perm_check(struct inode *inode, int need) > if (ci->i_vino.snap != CEPH_NOSNAP) { > /* > * Pool permission check needs to write to the first object. > - * But for snapshot, head of the first object may have alread > + * But for snapshot, head of the first object may have already > * been deleted. Skip check to avoid creating orphan object. > */ > return 0; > diff --git a/fs/ceph/caps.c b/fs/ceph/caps.c > index bed34fc11c91..4ac260c98c8c 100644 > --- a/fs/ceph/caps.c > +++ b/fs/ceph/caps.c > @@ -2813,7 +2813,7 @@ void ceph_take_cap_refs(struct ceph_inode_info *ci, int got, > * requested from the MDS. > * > * Returns 0 if caps were not able to be acquired (yet), 1 if succeed, > - * or a negative error code. There are 3 speical error codes: > + * or a negative error code. There are 3 special error codes: > * -EAGAIN: need to sleep but non-blocking is specified > * -EFBIG: ask caller to call check_max_size() and try again. > * -EUCLEAN: ask caller to call ceph_renew_caps() and try again. > diff --git a/fs/ceph/crypto.h b/fs/ceph/crypto.h > index 47e0c319fc68..d0768239a1c9 100644 > --- a/fs/ceph/crypto.h > +++ b/fs/ceph/crypto.h > @@ -27,7 +27,7 @@ struct ceph_fname { > }; > > /* > - * Header for the crypted file when truncating the size, this > + * Header for the encrypted file when truncating the size, this > * will be sent to MDS, and the MDS will update the encrypted > * last block and then truncate the size. > */ > diff --git a/fs/ceph/dir.c b/fs/ceph/dir.c > index 952109292d69..0bf388e07a02 100644 > --- a/fs/ceph/dir.c > +++ b/fs/ceph/dir.c > @@ -207,7 +207,7 @@ static int __dcache_readdir(struct file *file, struct dir_context *ctx, > dentry = __dcache_find_get_entry(parent, idx + step, > &cache_ctl); > if (!dentry) { > - /* use linar search */ > + /* use linear search */ > idx = 0; > break; > } > @@ -659,7 +659,7 @@ static bool need_reset_readdir(struct ceph_dir_file_info *dfi, loff_t new_pos) > return true; > if (is_hash_order(new_pos)) { > /* no need to reset last_name for a forward seek when > - * dentries are sotred in hash order */ > + * dentries are sorted in hash order */ > } else if (dfi->frag != fpos_frag(new_pos)) { > return true; > } > diff --git a/fs/ceph/export.c b/fs/ceph/export.c > index 44451749c544..719125822f12 100644 > --- a/fs/ceph/export.c > +++ b/fs/ceph/export.c > @@ -393,9 +393,9 @@ static struct dentry *ceph_get_parent(struct dentry *child) > } > dir = snapdir; > } > - /* If directory has already been deleted, futher get_parent > + /* If directory has already been deleted, further get_parent > * will fail. Do not mark snapdir dentry as disconnected, > - * this prevent exportfs from doing futher get_parent. */ > + * this prevent exportfs from doing further get_parent. */ prevent -> prevents > if (unlinked) > dn = d_obtain_root(dir); > else > diff --git a/fs/ceph/inode.c b/fs/ceph/inode.c > index 315ef02f9a3f..7dd6c2275085 100644 > --- a/fs/ceph/inode.c > +++ b/fs/ceph/inode.c > @@ -160,7 +160,7 @@ struct inode *ceph_get_inode(struct super_block *sb, struct ceph_vino vino, > } > > /* > - * get/constuct snapdir inode for a given directory > + * get/construct snapdir inode for a given directory > */ > struct inode *ceph_get_snapdir(struct inode *parent) > { > diff --git a/fs/ceph/mds_client.c b/fs/ceph/mds_client.c > index c4a5fd94bbbb..a4dd600d319e 100644 > --- a/fs/ceph/mds_client.c > +++ b/fs/ceph/mds_client.c > @@ -827,7 +827,7 @@ static void destroy_reply_info(struct ceph_mds_reply_info_parsed *info) > * And the worst case is that for the none async openc request it will > * successfully open the file if the CDentry hasn't been unlinked yet, > * but later the previous delayed async unlink request will remove the > - * CDenty. That means the just created file is possiblly deleted later > + * CDenty. That means the just created file is possibly deleted later CDenty -> CDentry > * by accident. > * > * We need to wait for the inflight async unlink requests to finish > @@ -3269,7 +3269,7 @@ static int __prepare_send_request(struct ceph_mds_session *session, > &session->s_features); > > /* > - * Avoid inifinite retrying after overflow. The client will > + * Avoid infinite retrying after overflow. The client will > * increase the retry count and if the MDS is old version, > * so we limit to retry at most 256 times. > */ > @@ -3522,7 +3522,7 @@ static void __do_request(struct ceph_mds_client *mdsc, > > /* > * For async create we will choose the auth MDS of frag in parent > - * directory to send the request and ususally this works fine, but > + * directory to send the request and usually this works fine, but > * if the migrated the dirtory to another MDS before it could handle > * it the request will be forwarded. > * > @@ -4033,7 +4033,7 @@ static void handle_forward(struct ceph_mds_client *mdsc, > __unregister_request(mdsc, req); > } else if (fwd_seq <= req->r_num_fwd || (uint32_t)fwd_seq >= U32_MAX) { > /* > - * Avoid inifinite retrying after overflow. > + * Avoid infinite retrying after overflow. > * > * The MDS will increase the fwd count and in client side > * if the num_fwd is less than the one saved in request > @@ -5738,7 +5738,7 @@ int ceph_mds_check_access(struct ceph_mds_client *mdsc, char *tpath, int mask) > if (err < 0) { > return err; > } else if (err > 0) { > - /* always follow the last auth caps' permision */ > + /* always follow the last auth caps' permission */ > root_squash_perms = true; > rw_perms_s = NULL; > if ((mask & MAY_WRITE) && s->writeable && > diff --git a/fs/ceph/super.h b/fs/ceph/super.h > index 037eac35a9e0..de7912b274ad 100644 > --- a/fs/ceph/super.h > +++ b/fs/ceph/super.h > @@ -60,7 +60,7 @@ > > /* max size of osd read request, limited by libceph */ > #define CEPH_MAX_READ_SIZE CEPH_MSG_MAX_DATA_LEN > -/* osd has a configurable limitaion of max write size. > +/* osd has a configurable limitation of max write size. > * CEPH_MSG_MAX_DATA_LEN should be small enough. */ > #define CEPH_MAX_WRITE_SIZE CEPH_MSG_MAX_DATA_LEN > #define CEPH_RASIZE_DEFAULT (8192*1024) /* max readahead */ > diff --git a/fs/ceph/xattr.c b/fs/ceph/xattr.c > index e066a556eccb..1a9f12204666 100644 > --- a/fs/ceph/xattr.c > +++ b/fs/ceph/xattr.c > @@ -899,7 +899,7 @@ static int __get_required_blob_size(struct ceph_inode_info *ci, int name_size, > } > > /* > - * If there are dirty xattrs, reencode xattrs into the prealloc_blob > + * If there are dirty xattrs, re-encode xattrs into the prealloc_blob > * and swap into place. It returns the old i_xattrs.blob (or NULL) so > * that it can be freed by the caller as the i_ceph_lock is likely to be > * held. > -- > 2.47.0 > Applied with above fixups. Thanks, Ilya
diff --git a/fs/ceph/addr.c b/fs/ceph/addr.c index c2a9e2cc03de..4514b285e771 100644 --- a/fs/ceph/addr.c +++ b/fs/ceph/addr.c @@ -2195,7 +2195,7 @@ int ceph_pool_perm_check(struct inode *inode, int need) if (ci->i_vino.snap != CEPH_NOSNAP) { /* * Pool permission check needs to write to the first object. - * But for snapshot, head of the first object may have alread + * But for snapshot, head of the first object may have already * been deleted. Skip check to avoid creating orphan object. */ return 0; diff --git a/fs/ceph/caps.c b/fs/ceph/caps.c index bed34fc11c91..4ac260c98c8c 100644 --- a/fs/ceph/caps.c +++ b/fs/ceph/caps.c @@ -2813,7 +2813,7 @@ void ceph_take_cap_refs(struct ceph_inode_info *ci, int got, * requested from the MDS. * * Returns 0 if caps were not able to be acquired (yet), 1 if succeed, - * or a negative error code. There are 3 speical error codes: + * or a negative error code. There are 3 special error codes: * -EAGAIN: need to sleep but non-blocking is specified * -EFBIG: ask caller to call check_max_size() and try again. * -EUCLEAN: ask caller to call ceph_renew_caps() and try again. diff --git a/fs/ceph/crypto.h b/fs/ceph/crypto.h index 47e0c319fc68..d0768239a1c9 100644 --- a/fs/ceph/crypto.h +++ b/fs/ceph/crypto.h @@ -27,7 +27,7 @@ struct ceph_fname { }; /* - * Header for the crypted file when truncating the size, this + * Header for the encrypted file when truncating the size, this * will be sent to MDS, and the MDS will update the encrypted * last block and then truncate the size. */ diff --git a/fs/ceph/dir.c b/fs/ceph/dir.c index 952109292d69..0bf388e07a02 100644 --- a/fs/ceph/dir.c +++ b/fs/ceph/dir.c @@ -207,7 +207,7 @@ static int __dcache_readdir(struct file *file, struct dir_context *ctx, dentry = __dcache_find_get_entry(parent, idx + step, &cache_ctl); if (!dentry) { - /* use linar search */ + /* use linear search */ idx = 0; break; } @@ -659,7 +659,7 @@ static bool need_reset_readdir(struct ceph_dir_file_info *dfi, loff_t new_pos) return true; if (is_hash_order(new_pos)) { /* no need to reset last_name for a forward seek when - * dentries are sotred in hash order */ + * dentries are sorted in hash order */ } else if (dfi->frag != fpos_frag(new_pos)) { return true; } diff --git a/fs/ceph/export.c b/fs/ceph/export.c index 44451749c544..719125822f12 100644 --- a/fs/ceph/export.c +++ b/fs/ceph/export.c @@ -393,9 +393,9 @@ static struct dentry *ceph_get_parent(struct dentry *child) } dir = snapdir; } - /* If directory has already been deleted, futher get_parent + /* If directory has already been deleted, further get_parent * will fail. Do not mark snapdir dentry as disconnected, - * this prevent exportfs from doing futher get_parent. */ + * this prevent exportfs from doing further get_parent. */ if (unlinked) dn = d_obtain_root(dir); else diff --git a/fs/ceph/inode.c b/fs/ceph/inode.c index 315ef02f9a3f..7dd6c2275085 100644 --- a/fs/ceph/inode.c +++ b/fs/ceph/inode.c @@ -160,7 +160,7 @@ struct inode *ceph_get_inode(struct super_block *sb, struct ceph_vino vino, } /* - * get/constuct snapdir inode for a given directory + * get/construct snapdir inode for a given directory */ struct inode *ceph_get_snapdir(struct inode *parent) { diff --git a/fs/ceph/mds_client.c b/fs/ceph/mds_client.c index c4a5fd94bbbb..a4dd600d319e 100644 --- a/fs/ceph/mds_client.c +++ b/fs/ceph/mds_client.c @@ -827,7 +827,7 @@ static void destroy_reply_info(struct ceph_mds_reply_info_parsed *info) * And the worst case is that for the none async openc request it will * successfully open the file if the CDentry hasn't been unlinked yet, * but later the previous delayed async unlink request will remove the - * CDenty. That means the just created file is possiblly deleted later + * CDenty. That means the just created file is possibly deleted later * by accident. * * We need to wait for the inflight async unlink requests to finish @@ -3269,7 +3269,7 @@ static int __prepare_send_request(struct ceph_mds_session *session, &session->s_features); /* - * Avoid inifinite retrying after overflow. The client will + * Avoid infinite retrying after overflow. The client will * increase the retry count and if the MDS is old version, * so we limit to retry at most 256 times. */ @@ -3522,7 +3522,7 @@ static void __do_request(struct ceph_mds_client *mdsc, /* * For async create we will choose the auth MDS of frag in parent - * directory to send the request and ususally this works fine, but + * directory to send the request and usually this works fine, but * if the migrated the dirtory to another MDS before it could handle * it the request will be forwarded. * @@ -4033,7 +4033,7 @@ static void handle_forward(struct ceph_mds_client *mdsc, __unregister_request(mdsc, req); } else if (fwd_seq <= req->r_num_fwd || (uint32_t)fwd_seq >= U32_MAX) { /* - * Avoid inifinite retrying after overflow. + * Avoid infinite retrying after overflow. * * The MDS will increase the fwd count and in client side * if the num_fwd is less than the one saved in request @@ -5738,7 +5738,7 @@ int ceph_mds_check_access(struct ceph_mds_client *mdsc, char *tpath, int mask) if (err < 0) { return err; } else if (err > 0) { - /* always follow the last auth caps' permision */ + /* always follow the last auth caps' permission */ root_squash_perms = true; rw_perms_s = NULL; if ((mask & MAY_WRITE) && s->writeable && diff --git a/fs/ceph/super.h b/fs/ceph/super.h index 037eac35a9e0..de7912b274ad 100644 --- a/fs/ceph/super.h +++ b/fs/ceph/super.h @@ -60,7 +60,7 @@ /* max size of osd read request, limited by libceph */ #define CEPH_MAX_READ_SIZE CEPH_MSG_MAX_DATA_LEN -/* osd has a configurable limitaion of max write size. +/* osd has a configurable limitation of max write size. * CEPH_MSG_MAX_DATA_LEN should be small enough. */ #define CEPH_MAX_WRITE_SIZE CEPH_MSG_MAX_DATA_LEN #define CEPH_RASIZE_DEFAULT (8192*1024) /* max readahead */ diff --git a/fs/ceph/xattr.c b/fs/ceph/xattr.c index e066a556eccb..1a9f12204666 100644 --- a/fs/ceph/xattr.c +++ b/fs/ceph/xattr.c @@ -899,7 +899,7 @@ static int __get_required_blob_size(struct ceph_inode_info *ci, int name_size, } /* - * If there are dirty xattrs, reencode xattrs into the prealloc_blob + * If there are dirty xattrs, re-encode xattrs into the prealloc_blob * and swap into place. It returns the old i_xattrs.blob (or NULL) so * that it can be freed by the caller as the i_ceph_lock is likely to be * held.
Correct spelling here and there as suggested by codespell. Signed-off-by: Dmitry Antipov <dmantipov@yandex.ru> --- fs/ceph/addr.c | 2 +- fs/ceph/caps.c | 2 +- fs/ceph/crypto.h | 2 +- fs/ceph/dir.c | 4 ++-- fs/ceph/export.c | 4 ++-- fs/ceph/inode.c | 2 +- fs/ceph/mds_client.c | 10 +++++----- fs/ceph/super.h | 2 +- fs/ceph/xattr.c | 2 +- 9 files changed, 15 insertions(+), 15 deletions(-)