From patchwork Thu Aug 22 12:57:22 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Simon Horman X-Patchwork-Id: 13773322 X-Patchwork-Delegate: kuba@kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id C85571C9DFF; Thu, 22 Aug 2024 12:57:45 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1724331465; cv=none; b=WovCziQBnhh6SMOe8g6ZjLa0mxWSuOHzlQWGfC5zut7SMZ8VsHkYak5gXYLW3rPqtoLdYE6vUIui3rGDqwHqUuS70GWgJ1ERKtdu07WIFk88cTiz8B+VriEPmiXCJqrzeyJ1A29/Qz4/zH6hUKzY39TlHJ6Fg7qNRe6LjUBwDzs= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1724331465; c=relaxed/simple; bh=pKA20mRHOill2RPBrIrjr2Lzm3Jcy0YVTmc95F6IBM4=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=Z/Jqj5HloNengc5fIGychpqJO0DS0n1B3+mOUgPZX8Cd5qZ1fz/ooxw7YRLTip1SOHCZNVFSfZZYJVijX5CQVkkpNZASsOAqdfJfzmbQH7T4v/HVt9jQpbrRc5WTRSJYeM7SAus6Vs/K4Ize7BfHjQ9lZoFcdEBdBUIFCn7BjOU= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=PXk0gCdF; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="PXk0gCdF" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 2ED20C4AF09; Thu, 22 Aug 2024 12:57:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1724331465; bh=pKA20mRHOill2RPBrIrjr2Lzm3Jcy0YVTmc95F6IBM4=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=PXk0gCdFa9CBQ0Si0bWSGlYykhlx+9GVgzQ3wzYDB6MAwryHt4gfl1Sc3Jn9rGFZ0 ci3AgiFO8YwnEQEboXWYc1UCmCDU0VIUmmQMAEahckH9R5ul14YmufT+NR4W3KjJD+ m5LrcMBNdUMNTuW1lQubN9Ctwak66TGQs3doVnk3GrZhkg6Bmx5pV/yK6dQtnWh9yV H7KvMVEtUd42AJAylwY76vwY0onpO8GOMSr8iMRHMYyJF6tQa4XMQ7JD7hbqe2yn/E hxZ26ZPXgy79ua2gq10bNmjxF1OqBvmflPz6iXieMWWQbIJrGqFO0ZkZ5Z6LGFL2ho kbzgwU1qf4QAA== From: Simon Horman Date: Thu, 22 Aug 2024 13:57:22 +0100 Subject: [PATCH net-next 01/13] packet: Correct spelling in if_packet.h Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Message-Id: <20240822-net-spell-v1-1-3a98971ce2d2@kernel.org> References: <20240822-net-spell-v1-0-3a98971ce2d2@kernel.org> In-Reply-To: <20240822-net-spell-v1-0-3a98971ce2d2@kernel.org> To: Willem de Bruijn , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Alexandra Winter , Thorsten Winkler , David Ahern , Jay Vosburgh , Andy Gospodarek , Subash Abhinov Kasiviswanathan , Sean Tranchetti , Paul Moore , Krzysztof Kozlowski , Jamal Hadi Salim , Cong Wang , Jiri Pirko , Marcelo Ricardo Leitner , Xin Long , Martin Schiller Cc: netdev@vger.kernel.org, linux-s390@vger.kernel.org, linux-security-module@vger.kernel.org, linux-sctp@vger.kernel.org, linux-x25@vger.kernel.org X-Mailer: b4 0.14.0 X-Patchwork-Delegate: kuba@kernel.org Correct spelling in if_packet.h As reported by codespell. Cc: Willem de Bruijn Signed-off-by: Simon Horman Acked-by: Willem de Bruijn --- include/uapi/linux/if_packet.h | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/include/uapi/linux/if_packet.h b/include/uapi/linux/if_packet.h index 9efc42382fdb..1d2718dd9647 100644 --- a/include/uapi/linux/if_packet.h +++ b/include/uapi/linux/if_packet.h @@ -230,8 +230,8 @@ struct tpacket_hdr_v1 { * ts_first_pkt: * Is always the time-stamp when the block was opened. * Case a) ZERO packets - * No packets to deal with but atleast you know the - * time-interval of this block. + * No packets to deal with but at least you know + * the time-interval of this block. * Case b) Non-zero packets * Use the ts of the first packet in the block. * @@ -265,7 +265,8 @@ enum tpacket_versions { - struct tpacket_hdr - pad to TPACKET_ALIGNMENT=16 - struct sockaddr_ll - - Gap, chosen so that packet data (Start+tp_net) alignes to TPACKET_ALIGNMENT=16 + - Gap, chosen so that packet data (Start+tp_net) aligns to + TPACKET_ALIGNMENT=16 - Start+tp_mac: [ Optional MAC header ] - Start+tp_net: Packet data, aligned to TPACKET_ALIGNMENT=16. - Pad to align to TPACKET_ALIGNMENT=16 From patchwork Thu Aug 22 12:57:23 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Simon Horman X-Patchwork-Id: 13773323 X-Patchwork-Delegate: kuba@kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 9EB431C9448; Thu, 22 Aug 2024 12:57:50 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1724331470; cv=none; b=DqJiRDu7F7jLd/9AvsyGjKH3/3z0KBG3R4akDUltSKw04RCKeLl6nUc3pugk7Akud3MKRQhEbPIJGY+Sx5WcC3Q+A43N5eP/4v7qRO1nLDzlEgCn+3UtnjYEb3gGQSVOD1/jKdUEw3udbyh18QuUYM5mIOtPpz4xiv9ZZEV69QA= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1724331470; c=relaxed/simple; bh=RfMnoN83QYSzQG/5G/Ri5kUvD/SCmIdTg0pXZbH985s=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=LLpNPQNfFXWOFhS5UJzYz5ytcOjuPJpNfiKQVz9PFWdO7VOcKmVpJN1khh/k/ZbcXKTBIvWrzSIyEXojsjtqtQOK+Vevos9hhZboLsSCYg+Ywc3x7uKr+E8HbAlYszU2ZDPmIGEDtBAc+m1zfxPmso8K02JVhSzDUMAPx4EhHXs= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=TJhdhdUi; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="TJhdhdUi" Received: by smtp.kernel.org (Postfix) with ESMTPSA id D6DE4C4AF0C; Thu, 22 Aug 2024 12:57:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1724331470; bh=RfMnoN83QYSzQG/5G/Ri5kUvD/SCmIdTg0pXZbH985s=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=TJhdhdUi0Fct0qVhqIV9lQbSfv8okiRX99reNhxM5kaAaluYN2Q0dy2OGwRjxpHpT FC4kNkpbqbBIiJZ34gk3Gen7PT7hfgRqt1d0z+aR244HPopimye5uT+5mplcGIk00U 65yPXABbjv2tAFqPmfh0kWWW+tPklt/Nz883Ba1ExDzpqqNjLw1I03yt84EFRMGdyl 9nR8Q0U0hlYH2IcXK41t+xWc+QZJ3yvIWfHhwg6N2gSQ+BnfCPyMvmOesKX4Tvtlnj CdBIudhfBg3c3ssP31nkkB+4fs6C8qhEHdqBLw42XMlyAv83U1wc9rgvkDLNgCvPHh mZ6wFQnT1epiQ== From: Simon Horman Date: Thu, 22 Aug 2024 13:57:23 +0100 Subject: [PATCH net-next 02/13] s390/iucv: Correct spelling in iucv.h Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Message-Id: <20240822-net-spell-v1-2-3a98971ce2d2@kernel.org> References: <20240822-net-spell-v1-0-3a98971ce2d2@kernel.org> In-Reply-To: <20240822-net-spell-v1-0-3a98971ce2d2@kernel.org> To: Willem de Bruijn , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Alexandra Winter , Thorsten Winkler , David Ahern , Jay Vosburgh , Andy Gospodarek , Subash Abhinov Kasiviswanathan , Sean Tranchetti , Paul Moore , Krzysztof Kozlowski , Jamal Hadi Salim , Cong Wang , Jiri Pirko , Marcelo Ricardo Leitner , Xin Long , Martin Schiller Cc: netdev@vger.kernel.org, linux-s390@vger.kernel.org, linux-security-module@vger.kernel.org, linux-sctp@vger.kernel.org, linux-x25@vger.kernel.org X-Mailer: b4 0.14.0 X-Patchwork-Delegate: kuba@kernel.org Correct spelling in iucv.h As reported by codespell. Cc: Alexandra Winter Cc: Thorsten Winkler Cc: linux-s390@vger.kernel.org Signed-off-by: Simon Horman --- include/net/iucv/iucv.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/include/net/iucv/iucv.h b/include/net/iucv/iucv.h index 4d114e6d6d23..dd9e93c12260 100644 --- a/include/net/iucv/iucv.h +++ b/include/net/iucv/iucv.h @@ -15,7 +15,7 @@ * To explore any of the IUCV functions, one must first register their * program using iucv_register(). Once your program has successfully * completed a register, it can exploit the other functions. - * For furthur reference on all IUCV functionality, refer to the + * For further reference on all IUCV functionality, refer to the * CP Programming Services book, also available on the web thru * www.vm.ibm.com/pubs, manual # SC24-6084 * From patchwork Thu Aug 22 12:57:24 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Simon Horman X-Patchwork-Id: 13773324 X-Patchwork-Delegate: kuba@kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 343841C9DE6; Thu, 22 Aug 2024 12:57:54 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1724331475; cv=none; b=RP9KkyuC1ni28bF2v7X3Mq0nmrhiYMPvTG3UzoKJO3fKxoImnO0GexHEXAZXK1m69l60OH3GmFR50/6gJ+5I2PUpDRWFVVSD37Q749uOj5ADH2ysgXhZnv/zieGWw+FUusd+rwYK0tI0s1SLYx7XQsgelwNAEDdsjVoa4O1ll44= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1724331475; c=relaxed/simple; bh=aoDmRguQsPBl3mfUQ7HyZo4oxrUzK2ttranhJ6ZLxN0=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=iPKIMVwzHbRXHXvwBbya2fbZdri3K5gDeivenZE2u85liB8UlxcdefxsGUqdgNdPzEVfesDVbnX535tI+ckSOKLzoRFSF1Mr25opUy5dJxvYKCqMOWHEe1cE9BE0LjQeauao2wKovA/AB+crgZt31oIsojOqCxTRF/MGLtF0ogw= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=aFFIqqIz; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="aFFIqqIz" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 83BCBC4AF09; Thu, 22 Aug 2024 12:57:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1724331474; bh=aoDmRguQsPBl3mfUQ7HyZo4oxrUzK2ttranhJ6ZLxN0=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=aFFIqqIzWjVF5OBcXMtTxl/Ig7NLPEuUvBWz0VIYkZZSJVaz4ma6sPEYWt+101UJ2 mkbIQZXe+EsQipq/TpBcZJ47zI5W1pkGfX0L5BCCvmJelju2QH+FUFdpjGOvjvshtA uNnitf2p0JN9zp6QJ8VPsFxzElmVXakEFATGwNE2R+d3dAHli/n2Xy7X/2osxmFb4S uIytClNKvJiX/FxiRHF78EYdoxmW/Ua/s4sEaOAqDbucB5QGKXdq2lBazGDnw1nC7c m81iN+2bEZrnefRvy9aV5/nlXvmiWgSHsX6UpHnBgdHM6FZG4s9NDlyjGAIGrarWtq 5DTJBUWhZjiYg== From: Simon Horman Date: Thu, 22 Aug 2024 13:57:24 +0100 Subject: [PATCH net-next 03/13] ip_tunnel: Correct spelling in ip_tunnels.h Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Message-Id: <20240822-net-spell-v1-3-3a98971ce2d2@kernel.org> References: <20240822-net-spell-v1-0-3a98971ce2d2@kernel.org> In-Reply-To: <20240822-net-spell-v1-0-3a98971ce2d2@kernel.org> To: Willem de Bruijn , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Alexandra Winter , Thorsten Winkler , David Ahern , Jay Vosburgh , Andy Gospodarek , Subash Abhinov Kasiviswanathan , Sean Tranchetti , Paul Moore , Krzysztof Kozlowski , Jamal Hadi Salim , Cong Wang , Jiri Pirko , Marcelo Ricardo Leitner , Xin Long , Martin Schiller Cc: netdev@vger.kernel.org, linux-s390@vger.kernel.org, linux-security-module@vger.kernel.org, linux-sctp@vger.kernel.org, linux-x25@vger.kernel.org X-Mailer: b4 0.14.0 X-Patchwork-Delegate: kuba@kernel.org Correct spelling in ip_tunnels.h As reported by codespell. Cc: David Ahern Signed-off-by: Simon Horman --- include/net/ip_tunnels.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/include/net/ip_tunnels.h b/include/net/ip_tunnels.h index 1db2417b8ff5..6194fbb564c6 100644 --- a/include/net/ip_tunnels.h +++ b/include/net/ip_tunnels.h @@ -573,7 +573,7 @@ static inline u8 ip_tunnel_get_ttl(const struct iphdr *iph, return 0; } -/* Propogate ECN bits out */ +/* Propagate ECN bits out */ static inline u8 ip_tunnel_ecn_encap(u8 tos, const struct iphdr *iph, const struct sk_buff *skb) { From patchwork Thu Aug 22 12:57:25 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Simon Horman X-Patchwork-Id: 13773325 X-Patchwork-Delegate: kuba@kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id CB8D318452D; Thu, 22 Aug 2024 12:57:59 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1724331479; cv=none; b=skR8m4raVHMJvMM60UIbvUYfzVAXZl0Ljs2OvdugXBPKxvRzOazqeJZfnecso3pweyq7zoyOBeXRdHJ1FXMeGbtUYQLrJ733kTQsuWPd1267B7bfggs5x5oigbXSJMis1Wk2Y4F9r81xhq18EIUgNsXwLCMu9UPSMeaPxN01QkQ= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1724331479; c=relaxed/simple; bh=8i+z42JB2yg0vXt5In+j5y887Xpzvf3HKmKMTvgBK0Q=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=IP9AURRcQg+1PJ74ZrT9Q0Q0VJEj0JWZL7RYRy+u687dqj6UOj7bkQ+49udNM+ZwMLlhjenGSFeKYf91Dp+EAZnidILmen2eF9nMTakYp2Qkz5wESVcwPv8f+Avzp7Trg1U37wJH28++fCPB0rc9MQorseqKqL1t0S/keXfOcWU= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=XPuzq8iz; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="XPuzq8iz" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 3150EC32782; Thu, 22 Aug 2024 12:57:55 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1724331479; bh=8i+z42JB2yg0vXt5In+j5y887Xpzvf3HKmKMTvgBK0Q=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=XPuzq8izDGuDD73+S4V8YF84CDmyoR+GS0hIrx0GM3DxbobxYQwKGr+Lncgj0z0Fb PyestM1qM9U48pzmUgqH12IvM0vm0wTRiF0UKx82waxMoDmOTvJ8SZMXfjHqbU7cc2 NofMgoxXk6zYa2AsNI+F3kucM/63sfdaTCgEQJfGuhxLc35y7ssOcAyXk1mY6MZoLw O+XSZ3+0lXMde0frjyFcUp9YWCxinM2MG+8EhgGI7+d8phfCmp0P8ZOwsljx5UZvw4 4ciqZ369pbzmAyb1EuLZAE8AW0qJziJ/r6lKm7a0I/3RvrVWFOyYUTKVhtuinQhyd/ gYvQcEQPpPuBw== From: Simon Horman Date: Thu, 22 Aug 2024 13:57:25 +0100 Subject: [PATCH net-next 04/13] ipv6: Correct spelling in ipv6.h Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Message-Id: <20240822-net-spell-v1-4-3a98971ce2d2@kernel.org> References: <20240822-net-spell-v1-0-3a98971ce2d2@kernel.org> In-Reply-To: <20240822-net-spell-v1-0-3a98971ce2d2@kernel.org> To: Willem de Bruijn , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Alexandra Winter , Thorsten Winkler , David Ahern , Jay Vosburgh , Andy Gospodarek , Subash Abhinov Kasiviswanathan , Sean Tranchetti , Paul Moore , Krzysztof Kozlowski , Jamal Hadi Salim , Cong Wang , Jiri Pirko , Marcelo Ricardo Leitner , Xin Long , Martin Schiller Cc: netdev@vger.kernel.org, linux-s390@vger.kernel.org, linux-security-module@vger.kernel.org, linux-sctp@vger.kernel.org, linux-x25@vger.kernel.org X-Mailer: b4 0.14.0 X-Patchwork-Delegate: kuba@kernel.org Correct spelling in ip_tunnels.h As reported by codespell. Cc: David Ahern Signed-off-by: Simon Horman --- include/net/ipv6.h | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/include/net/ipv6.h b/include/net/ipv6.h index e7113855a10f..248bfb26e2af 100644 --- a/include/net/ipv6.h +++ b/include/net/ipv6.h @@ -851,7 +851,7 @@ static inline int __ipv6_addr_diff32(const void *token1, const void *token2, int * we should *never* get to this point since that * would mean the addrs are equal * - * However, we do get to it 8) And exacly, when + * However, we do get to it 8) And exactly, when * addresses are equal 8) * * ip route add 1111::/128 via ... @@ -973,7 +973,7 @@ static inline __be32 ip6_make_flowlabel(struct net *net, struct sk_buff *skb, hash = skb_get_hash_flowi6(skb, fl6); /* Since this is being sent on the wire obfuscate hash a bit - * to minimize possbility that any useful information to an + * to minimize possibility that any useful information to an * attacker is leaked. Only lower 20 bits are relevant. */ hash = rol32(hash, 16); From patchwork Thu Aug 22 12:57:26 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Simon Horman X-Patchwork-Id: 13773326 X-Patchwork-Delegate: kuba@kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 2EDC91C9DFF; Thu, 22 Aug 2024 12:58:04 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1724331484; cv=none; b=SpU1imSWZ64vZxhbOaP4SZ4idRSPElOXNiifQgXL/tNDxCc2q35H3fxX3xkqiK2RqlT6lp2LRNgihNzuMhsqpD+XTFo7Vb93U08fHJUpgbaA4XD2PQCTlOzwOPDcaqWTN1qKgxKFB9cNmQXg2dmlMYJxWSIttw5z9bCpQ3pCvLE= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1724331484; c=relaxed/simple; bh=mOChusB6cjD3IP4W23e2AcjRdNTClAGuLDf5cynThUU=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=gQduZnwLqHsNEzVEb5dFmFk9F/zDiIOA+7fCKpzgMBbwNxkb/cPi4cH2kfLh9DuqMiGKMavMzpA7QImRjDWAbusiK0fjjZ870lXqR1YGCfOR6B0A3dselqwSYtagSrjezDw5vxIVXOd2rn0SWzPlzV2kecT38Kr8I/33z3bMaUw= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=eslZwG4K; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="eslZwG4K" Received: by smtp.kernel.org (Postfix) with ESMTPSA id CDDCFC4AF0B; Thu, 22 Aug 2024 12:57:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1724331484; bh=mOChusB6cjD3IP4W23e2AcjRdNTClAGuLDf5cynThUU=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=eslZwG4KBeAY16U1Kd0k4cQ2OoynMg6zc8sw2ramG6P6+nZgEpWAdutUHzc8nnLk5 gSJR2Fe31hn/MEG4uCjIs0QWidYOU+f88RjsE7osolwK+BEpeMXxtZCx2P7/mzVZgp /P8jO10q33nLMEezB2KjxuKR01Fx+LZhDI3S6Fs9Zm6AaTmctadyKd+CvnolZw/zIx EKvuLdvI9d5nqNiSDFuVEU7P9Ojy6MZpPFFmxR6KJz+8ABrbtconHBaM56vZ+FxJb3 pmGIGzCsTv6EEOdxSQMlNuycWKe4G6m0+jjdH8ipxcDdLeHzAJ0wPXzy20dvzbATe1 4fVK5NMWUevwQ== From: Simon Horman Date: Thu, 22 Aug 2024 13:57:26 +0100 Subject: [PATCH net-next 05/13] bonding: Correct spelling in headers Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Message-Id: <20240822-net-spell-v1-5-3a98971ce2d2@kernel.org> References: <20240822-net-spell-v1-0-3a98971ce2d2@kernel.org> In-Reply-To: <20240822-net-spell-v1-0-3a98971ce2d2@kernel.org> To: Willem de Bruijn , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Alexandra Winter , Thorsten Winkler , David Ahern , Jay Vosburgh , Andy Gospodarek , Subash Abhinov Kasiviswanathan , Sean Tranchetti , Paul Moore , Krzysztof Kozlowski , Jamal Hadi Salim , Cong Wang , Jiri Pirko , Marcelo Ricardo Leitner , Xin Long , Martin Schiller Cc: netdev@vger.kernel.org, linux-s390@vger.kernel.org, linux-security-module@vger.kernel.org, linux-sctp@vger.kernel.org, linux-x25@vger.kernel.org X-Mailer: b4 0.14.0 X-Patchwork-Delegate: kuba@kernel.org Correct spelling in bond_3ad.h and bond_alb.h. As reported by codespell. Cc: Jay Vosburgh Cc: Andy Gospodarek Signed-off-by: Simon Horman --- include/net/bond_3ad.h | 5 ++++- include/net/bond_alb.h | 2 +- 2 files changed, 5 insertions(+), 2 deletions(-) diff --git a/include/net/bond_3ad.h b/include/net/bond_3ad.h index 9ce5ac2bfbad..2053cd8e788a 100644 --- a/include/net/bond_3ad.h +++ b/include/net/bond_3ad.h @@ -231,7 +231,10 @@ typedef struct port { mux_states_t sm_mux_state; /* state machine mux state */ u16 sm_mux_timer_counter; /* state machine mux timer counter */ tx_states_t sm_tx_state; /* state machine tx state */ - u16 sm_tx_timer_counter; /* state machine tx timer counter(allways on - enter to transmit state 3 time per second) */ + u16 sm_tx_timer_counter; /* state machine tx timer counter + * (always on - enter to transmit + * state 3 time per second) + */ u16 sm_churn_actor_timer_counter; u16 sm_churn_partner_timer_counter; u32 churn_actor_count; diff --git a/include/net/bond_alb.h b/include/net/bond_alb.h index 9dc082b2d543..e5945427f38d 100644 --- a/include/net/bond_alb.h +++ b/include/net/bond_alb.h @@ -53,7 +53,7 @@ struct slave; struct tlb_client_info { - struct slave *tx_slave; /* A pointer to slave used for transmiting + struct slave *tx_slave; /* A pointer to slave used for transmitting * packets to a Client that the Hash function * gave this entry index. */ From patchwork Thu Aug 22 12:57:27 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Simon Horman X-Patchwork-Id: 13773327 X-Patchwork-Delegate: kuba@kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id CE4F91C9DF6; Thu, 22 Aug 2024 12:58:08 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1724331488; cv=none; b=oq/hcOekZq/lHYSg4hic5HBj5c/+WZJYoqJ4SSlm+UNjS0rxSSHhhzQcUA1LuOXe4DXCMhqq25AR7JMt9b+2LojYnvqFBxLcWKYmmyuzNNu4B1WG9L9KiNLQv0mm4Qo2obLhHRu40e5ELZG2mysMBKK663rBNx110jOsjMsIqF8= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1724331488; c=relaxed/simple; bh=994WLKmvIF8xySmU7VNKz8/rwajRzqjreyZvyk6dhmI=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=aYMvW4G3+0rzQdhutirG+FRxPb2yBbzlFlqEpg5xQ+7Cw6yyf6ANoDWcdwFL/2BisIgIXeJmS74TAmLDIkBygldN3bzZWUUd/PXyDelbRTjZ6UftLrgHSshXaVxkOrHaFUtsxny6t1J9R6ZvsrmyZZxkouHBKtCCFRnmghr3SlQ= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=nGnrM9QY; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="nGnrM9QY" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 7675DC32782; Thu, 22 Aug 2024 12:58:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1724331488; bh=994WLKmvIF8xySmU7VNKz8/rwajRzqjreyZvyk6dhmI=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=nGnrM9QY2bde9uSx08ThyByjUoYOAUeZZ+7zP2x08+66ZhLXGzg1wduKUxf3gtq5s kZscS/jAlAhafMFaBU6FNb8y4hIJG249cgQXOgApECR3oNXifon2XcJuaEiTgsEJah MDQq3dWLFYrrxc/ecmktUcKxc1Xlvt8EAdgUN60NQfgwd3phQ823vRBWKymkyEcusy FIumvtI7PYTOj50NTb6AKcillut+IvVghz18LmFXetaQ7dQUZQCjMysZajXQEtFu0B JY0WxXAJQ3IS0XTGfmi+M6vM1lI308EgRxqERx6Ls09ZIc6waU88OaK5UqGKT2f1C1 qu2L5To2rgs5A== From: Simon Horman Date: Thu, 22 Aug 2024 13:57:27 +0100 Subject: [PATCH net-next 06/13] net: qualcomm: rmnet: Correct spelling in if_rmnet.h Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Message-Id: <20240822-net-spell-v1-6-3a98971ce2d2@kernel.org> References: <20240822-net-spell-v1-0-3a98971ce2d2@kernel.org> In-Reply-To: <20240822-net-spell-v1-0-3a98971ce2d2@kernel.org> To: Willem de Bruijn , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Alexandra Winter , Thorsten Winkler , David Ahern , Jay Vosburgh , Andy Gospodarek , Subash Abhinov Kasiviswanathan , Sean Tranchetti , Paul Moore , Krzysztof Kozlowski , Jamal Hadi Salim , Cong Wang , Jiri Pirko , Marcelo Ricardo Leitner , Xin Long , Martin Schiller Cc: netdev@vger.kernel.org, linux-s390@vger.kernel.org, linux-security-module@vger.kernel.org, linux-sctp@vger.kernel.org, linux-x25@vger.kernel.org X-Mailer: b4 0.14.0 X-Patchwork-Delegate: kuba@kernel.org Correct spelling in if_rmnet.h As reported by codespell. Cc: Subash Abhinov Kasiviswanathan Cc: Sean Tranchetti Signed-off-by: Simon Horman Reviewed-by: Subash Abhinov Kasiviswanathan --- include/linux/if_rmnet.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/include/linux/if_rmnet.h b/include/linux/if_rmnet.h index 839d1e48b85e..c44bf6e80ecb 100644 --- a/include/linux/if_rmnet.h +++ b/include/linux/if_rmnet.h @@ -42,7 +42,7 @@ struct rmnet_map_ul_csum_header { /* csum_info field: * OFFSET: where (offset in bytes) to insert computed checksum - * UDP: 1 = UDP checksum (zero checkum means no checksum) + * UDP: 1 = UDP checksum (zero checksum means no checksum) * ENABLED: 1 = checksum computation requested */ #define MAP_CSUM_UL_OFFSET_MASK GENMASK(13, 0) From patchwork Thu Aug 22 12:57:28 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Simon Horman X-Patchwork-Id: 13773328 X-Patchwork-Delegate: kuba@kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id C7EAD1CB13A; Thu, 22 Aug 2024 12:58:13 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1724331493; cv=none; b=pBpPupRjvmfXPhQ+TPZ/wJCvoh0X45OYt2M4rDOpoKEyP2NHzcNfgBXRQ+iMHyacxmSEerNfB2Kzhpigk1B2q6BFZmNGztqoO3jfiLXjlFsJDIR1LeQ7KQWWZbrJFks+h5AI2uXIayXfLIkpYrK9ekRcLG7LjSdwnhXWFWF8kGM= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1724331493; c=relaxed/simple; bh=KluiLPbgmkvpDmtfXvkcGmfgCPWUHv5loNG5U9w0TUU=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=ZW7uxMEvYKN8nFSz4Y9lgf8fzozwNHauxqiYgF2z7KkS46kvCVfcJy3pvKHfFAi1MVFuG+2CoFYXY7+jiZdZa/zwztMlBVIs2A8KTbQM9YVpN/EN/v0pTv/K7c+Fj+wK3ex1gJF3yYR37kQc99rtHr/MBsU6vE65stonVbKMqho= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=IMjZ1P/E; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="IMjZ1P/E" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 1F1D3C32782; Thu, 22 Aug 2024 12:58:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1724331493; bh=KluiLPbgmkvpDmtfXvkcGmfgCPWUHv5loNG5U9w0TUU=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=IMjZ1P/ED9gJirWs6BoFguB3nZDbzGBUeKdL6oHEy89eLwqXaFafqsla/CxZkEPyW TemiZtFqBVMW6v1cYrJfJk7B8+Ebz0gzh3NWpGb573sphAeUODiIXEIMxScA8Xb2z+ m8+XFKsQXKuDoBcgO5oUrikoTNn9V7HQxAlmSNh43GDM75wPM+DpYMoigwfjGz2SZQ cnoMbkYzICKvJj/SffQzHfGuZ3ozFdL74J8EkoqpwMM3AP7h3Ipourh5tFUNWXq/Bd H0x3u+HLOYRY5GASx9nddaCKnyxztew4bRDKCYQuLuvLcqmxUUJ7CJLjsd0EWdgPF/ JPF0qW3vdFHkw== From: Simon Horman Date: Thu, 22 Aug 2024 13:57:28 +0100 Subject: [PATCH net-next 07/13] netlabel: Correct spelling in netlabel.h Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Message-Id: <20240822-net-spell-v1-7-3a98971ce2d2@kernel.org> References: <20240822-net-spell-v1-0-3a98971ce2d2@kernel.org> In-Reply-To: <20240822-net-spell-v1-0-3a98971ce2d2@kernel.org> To: Willem de Bruijn , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Alexandra Winter , Thorsten Winkler , David Ahern , Jay Vosburgh , Andy Gospodarek , Subash Abhinov Kasiviswanathan , Sean Tranchetti , Paul Moore , Krzysztof Kozlowski , Jamal Hadi Salim , Cong Wang , Jiri Pirko , Marcelo Ricardo Leitner , Xin Long , Martin Schiller Cc: netdev@vger.kernel.org, linux-s390@vger.kernel.org, linux-security-module@vger.kernel.org, linux-sctp@vger.kernel.org, linux-x25@vger.kernel.org X-Mailer: b4 0.14.0 X-Patchwork-Delegate: kuba@kernel.org Correct spelling in netlabel.h. As reported by codespell. Cc: Paul Moore Cc: linux-security-module@vger.kernel.org Signed-off-by: Simon Horman --- include/net/netlabel.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/include/net/netlabel.h b/include/net/netlabel.h index 654bc777d2a7..529160f76cac 100644 --- a/include/net/netlabel.h +++ b/include/net/netlabel.h @@ -30,7 +30,7 @@ struct calipso_doi; /* * NetLabel - A management interface for maintaining network packet label - * mapping tables for explicit packet labling protocols. + * mapping tables for explicit packet labeling protocols. * * Network protocols such as CIPSO and RIPSO require a label translation layer * to convert the label on the packet into something meaningful on the host From patchwork Thu Aug 22 12:57:29 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Simon Horman X-Patchwork-Id: 13773329 X-Patchwork-Delegate: kuba@kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 6E6AB1C9EAF; Thu, 22 Aug 2024 12:58:18 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1724331498; cv=none; b=UpTgaKl35xz+Btp0VAW0xUifNa0yOvVHrUiulT++F5G3Us/DfZatpKwuDSD5UiNQDYoKf2Qo6CmQ95C0sAA7HY27hIObexHuv87iZr+G51mecfpUqaOVwReSZ49NvPRWq7FfOX7u0XjeXJIYr49eTyaexL7d4Q0Ej94kt5buz0g= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1724331498; c=relaxed/simple; bh=YDvZmFYAizPriWxQVuMB4neFv3KPn+mi3kSktdBTF6g=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=Vzn3SIzurHUKtUz/AdyUe8h0AMN6UlNErYa9NymojsCtZosgJn3m8YDGOX0rozIURU4HXwdodkvMJEF5qAKV7uy9+lcyF9z5k64XmTK5uiSC7qt1V5P7pA5KtXjxxVN3rcZ2wK1cbOfjkLjWnAjc0MfPAAnJ6DZepczoeoNZFFI= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=Gm7wIYWi; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="Gm7wIYWi" Received: by smtp.kernel.org (Postfix) with ESMTPSA id C174DC4AF0E; Thu, 22 Aug 2024 12:58:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1724331498; bh=YDvZmFYAizPriWxQVuMB4neFv3KPn+mi3kSktdBTF6g=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=Gm7wIYWiBQ91o2k7KotMrTVXZxZsv7NJhblbjtiieLJQwX5ydvh7t7BDQYRACAtbj K08hcx3kBdZIxRRI1eZ3CcidGVhFHbZ41KxDciTCZXQV4BXbbUWKblyLAnEYqF7njZ dQuWfHDXRNbGlwcXD3rFYzOEFcf9lQqCv+4HuZ87ZC4FNkhLfWqqwOn0xBufv2hZX1 zlPoSrnK5yj3l2rBj30HUUgi+Jth0z4XfXr+0tKe/4sGZ2AzmGk7z5W1ASJtjcN0hL lWv779kgFeU4YCb4dSExwaqCnlilbequDM2ORh89RESudr+wC3hsWxQKEh9sOZuTaQ yvGzgpkhvfBGw== From: Simon Horman Date: Thu, 22 Aug 2024 13:57:29 +0100 Subject: [PATCH net-next 08/13] NFC: Correct spelling in headers Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Message-Id: <20240822-net-spell-v1-8-3a98971ce2d2@kernel.org> References: <20240822-net-spell-v1-0-3a98971ce2d2@kernel.org> In-Reply-To: <20240822-net-spell-v1-0-3a98971ce2d2@kernel.org> To: Willem de Bruijn , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Alexandra Winter , Thorsten Winkler , David Ahern , Jay Vosburgh , Andy Gospodarek , Subash Abhinov Kasiviswanathan , Sean Tranchetti , Paul Moore , Krzysztof Kozlowski , Jamal Hadi Salim , Cong Wang , Jiri Pirko , Marcelo Ricardo Leitner , Xin Long , Martin Schiller Cc: netdev@vger.kernel.org, linux-s390@vger.kernel.org, linux-security-module@vger.kernel.org, linux-sctp@vger.kernel.org, linux-x25@vger.kernel.org X-Mailer: b4 0.14.0 X-Patchwork-Delegate: kuba@kernel.org Correct spelling in NFC headers. As reported by codespell. Cc: Krzysztof Kozlowski Signed-off-by: Simon Horman Reviewed-by: Krzysztof Kozlowski --- include/net/nfc/nci.h | 2 +- include/net/nfc/nfc.h | 8 ++++---- 2 files changed, 5 insertions(+), 5 deletions(-) diff --git a/include/net/nfc/nci.h b/include/net/nfc/nci.h index e82f55f543bb..dc36519d16aa 100644 --- a/include/net/nfc/nci.h +++ b/include/net/nfc/nci.h @@ -332,7 +332,7 @@ struct nci_core_init_rsp_1 { __le32 nfcc_features; __u8 num_supported_rf_interfaces; __u8 supported_rf_interfaces[]; /* variable size array */ - /* continuted in nci_core_init_rsp_2 */ + /* continued in nci_core_init_rsp_2 */ } __packed; struct nci_core_init_rsp_2 { diff --git a/include/net/nfc/nfc.h b/include/net/nfc/nfc.h index 3d07abacf08b..3a3781838c67 100644 --- a/include/net/nfc/nfc.h +++ b/include/net/nfc/nfc.h @@ -80,7 +80,7 @@ struct nfc_ops { #define NFC_ATR_REQ_GT_OFFSET 14 /** - * struct nfc_target - NFC target descriptiom + * struct nfc_target - NFC target description * * @sens_res: 2 bytes describing the target SENS_RES response, if the target * is a type A one. The %sens_res most significant byte must be byte 2 @@ -230,10 +230,10 @@ static inline void nfc_set_parent_dev(struct nfc_dev *nfc_dev, } /** - * nfc_set_drvdata - set driver specifc data + * nfc_set_drvdata - set driver specific data * * @dev: The nfc device - * @data: Pointer to driver specifc data + * @data: Pointer to driver specific data */ static inline void nfc_set_drvdata(struct nfc_dev *dev, void *data) { @@ -241,7 +241,7 @@ static inline void nfc_set_drvdata(struct nfc_dev *dev, void *data) } /** - * nfc_get_drvdata - get driver specifc data + * nfc_get_drvdata - get driver specific data * * @dev: The nfc device */ From patchwork Thu Aug 22 12:57:30 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Simon Horman X-Patchwork-Id: 13773330 X-Patchwork-Delegate: kuba@kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 1CA8A1C9EB0; Thu, 22 Aug 2024 12:58:22 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1724331503; cv=none; b=tRqhtVkWBwLaLikffC0cwJLqV6RGlbr878015azXxo8ryORPxUdHyaEwR7TnF6Yz6+4poaxHQ3udWqdqKhNY7UWqWE4hsqBerdgeM7sChgLnSIp9k/o5OTmjgBwd4hcSLZXIGI/evZFvTFuvVul6cxMsTx3dZzwt6fa8d5XTqOs= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1724331503; c=relaxed/simple; bh=kF0i1MzJsWLy9CcYYmy/E6kuWuGGi+D7KzvUyYUw16E=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=NSxrzdlCy0MDqw5MxK7omILLAUjQctT7yt6enKVD/7KTkWyfGMgBvr2C3CAtWsbf4cjPJ6NtKcdC52+IEiUMD044lKechpdpI9jkuBgUSn74S7S4xWbuELjWO9nI0qm+vZ7jOnh/5MwjoLVca77oTKL0dVPwSf2DvbA7MN8NOK8= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=WAUoSl74; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="WAUoSl74" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 69DE1C4AF0B; Thu, 22 Aug 2024 12:58:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1724331502; bh=kF0i1MzJsWLy9CcYYmy/E6kuWuGGi+D7KzvUyYUw16E=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=WAUoSl74zSKjlj2L1lDabL9bhIHhUs4r7GzQi6cFn0UDKjjG2oITFIqfPyhTRQFNi lrQwEanNo5gFHoqOmuReFrDBKIxZSyqNypWmL43YdPCSCKQek8ENnXvNuJczw6DBVq DkliPUDGTOGBe+K47yC/CZy/vIzlIkPnks9g3facJ3WIGPu3TMbVl2zBbQmDBPALzQ hdrZTVy9WcV4NtjDW/zcZEvA9rSh6nzU9y7Xf5lU3D1Xt1DCCnqIIVHJmpqlCWELae z2zgPjQ5UkvRWfrtUtNnG4QstGK8uDheXrH/ACrOahPv6Lgl3T3BeCB1Sn4nF1MmWX GcUejg0P3ABcw== From: Simon Horman Date: Thu, 22 Aug 2024 13:57:30 +0100 Subject: [PATCH net-next 09/13] net: sched: Correct spelling in headers Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Message-Id: <20240822-net-spell-v1-9-3a98971ce2d2@kernel.org> References: <20240822-net-spell-v1-0-3a98971ce2d2@kernel.org> In-Reply-To: <20240822-net-spell-v1-0-3a98971ce2d2@kernel.org> To: Willem de Bruijn , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Alexandra Winter , Thorsten Winkler , David Ahern , Jay Vosburgh , Andy Gospodarek , Subash Abhinov Kasiviswanathan , Sean Tranchetti , Paul Moore , Krzysztof Kozlowski , Jamal Hadi Salim , Cong Wang , Jiri Pirko , Marcelo Ricardo Leitner , Xin Long , Martin Schiller Cc: netdev@vger.kernel.org, linux-s390@vger.kernel.org, linux-security-module@vger.kernel.org, linux-sctp@vger.kernel.org, linux-x25@vger.kernel.org X-Mailer: b4 0.14.0 X-Patchwork-Delegate: kuba@kernel.org Correct spelling in pkt_cls.h and red.h. As reported by codespell. Cc: Krzysztof Kozlowski Signed-off-by: Simon Horman --- include/net/pkt_cls.h | 2 +- include/net/red.h | 8 ++++---- 2 files changed, 5 insertions(+), 5 deletions(-) diff --git a/include/net/pkt_cls.h b/include/net/pkt_cls.h index 41297bd38dff..4880b3a7aced 100644 --- a/include/net/pkt_cls.h +++ b/include/net/pkt_cls.h @@ -491,7 +491,7 @@ int __tcf_em_tree_match(struct sk_buff *, struct tcf_ematch_tree *, struct tcf_pkt_info *); /** - * tcf_em_tree_match - evaulate an ematch tree + * tcf_em_tree_match - evaluate an ematch tree * * @skb: socket buffer of the packet in question * @tree: ematch tree to be used for evaluation diff --git a/include/net/red.h b/include/net/red.h index 802287d52c9e..159a09359fc0 100644 --- a/include/net/red.h +++ b/include/net/red.h @@ -40,7 +40,7 @@ max_P should be small (not 1), usually 0.01..0.02 is good value. max_P is chosen as a number, so that max_P/(th_max-th_min) - is a negative power of two in order arithmetics to contain + is a negative power of two in order arithmetic to contain only shifts. @@ -159,7 +159,7 @@ static inline u32 red_maxp(u8 Plog) static inline void red_set_vars(struct red_vars *v) { /* Reset average queue length, the value is strictly bound - * to the parameters below, reseting hurts a bit but leaving + * to the parameters below, resetting hurts a bit but leaving * it might result in an unreasonable qavg for a while. --TGR */ v->qavg = 0; @@ -340,7 +340,7 @@ static inline unsigned long red_calc_qavg_no_idle_time(const struct red_parms *p { /* * NOTE: v->qavg is fixed point number with point at Wlog. - * The formula below is equvalent to floating point + * The formula below is equivalent to floating point * version: * * qavg = qavg*(1-W) + backlog*W; @@ -375,7 +375,7 @@ static inline int red_mark_probability(const struct red_parms *p, OK. qR is random number in the interval (0..1/max_P)*(qth_max-qth_min) i.e. 0..(2^Plog). If we used floating point - arithmetics, it would be: (2^Plog)*rnd_num, + arithmetic, it would be: (2^Plog)*rnd_num, where rnd_num is less 1. Taking into account, that qavg have fixed From patchwork Thu Aug 22 12:57:31 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Simon Horman X-Patchwork-Id: 13773331 X-Patchwork-Delegate: kuba@kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 7BAB41C9DED; Thu, 22 Aug 2024 12:58:27 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1724331507; cv=none; b=vAO9MSzrFhGgtOy9U7Zp05GxhDLZxH2UuBQhYvPX+q6EFXTnybR/AmIcdVZkNQIa82XgoO+3ofGyDsuVZ9W3Kadc09EzYyUksdWu1rNPhZDfD+di2LbW6lSxnSypxYzLYrvck9LANFSp2c/rPpdf+lIPmhBCnRkFZt+f/Wr1Vf0= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1724331507; c=relaxed/simple; bh=kZ/PsmLBGx4oLQb2HsOSwDrGbJh1eBk6BO9es46bP8c=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=qIdQwGh26pdLnDkYxBJynMM6OAZD4w4fPh5ulIYa6+2CbaKvy2rtKQEiNYiLuYqweK+s9QFbD1OMAGBkcb0nF2S8GODuWdk7+CzF/TuJPxaBJepin4uWv+17ev+i+tCAR6+Avf6l/vk3NreSquz0QTKhPfUmsehnvMWSdx/YfMo= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=sWXn8p7I; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="sWXn8p7I" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 188B9C4AF0C; Thu, 22 Aug 2024 12:58:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1724331507; bh=kZ/PsmLBGx4oLQb2HsOSwDrGbJh1eBk6BO9es46bP8c=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=sWXn8p7I6D62t20NpFeuvQ+MWdGjCKNIxWUYfQWuEfKQ7bPauBgRNNmdsyYQSimyf VSjmMyPig/FE1Et/uw1cCOZ6YUBYv1181/4bfzr38xQaSV5+m1sNFrg/qXKC49KJsg 8tANB7V4+yeSYY64xwhK86jk0YD3tvJV2EQD4w3tJIJUiap1CDMqZw+rkyBXu/iNjy 69jR8Obok49edwEy7RHoIcjTaOniGeWElrAHi/qoVN4+9f6FgM4Tn48hTjgCIYFv5f ykqPcXWzhYdHCC4PPkFM6Yzefw5J8ue3JwwjipNo3Lov+ZYUNte10aSJMSBjlK+hHj eg+wvNSdUWC7w== From: Simon Horman Date: Thu, 22 Aug 2024 13:57:31 +0100 Subject: [PATCH net-next 10/13] sctp: Correct spelling in headers Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Message-Id: <20240822-net-spell-v1-10-3a98971ce2d2@kernel.org> References: <20240822-net-spell-v1-0-3a98971ce2d2@kernel.org> In-Reply-To: <20240822-net-spell-v1-0-3a98971ce2d2@kernel.org> To: Willem de Bruijn , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Alexandra Winter , Thorsten Winkler , David Ahern , Jay Vosburgh , Andy Gospodarek , Subash Abhinov Kasiviswanathan , Sean Tranchetti , Paul Moore , Krzysztof Kozlowski , Jamal Hadi Salim , Cong Wang , Jiri Pirko , Marcelo Ricardo Leitner , Xin Long , Martin Schiller Cc: netdev@vger.kernel.org, linux-s390@vger.kernel.org, linux-security-module@vger.kernel.org, linux-sctp@vger.kernel.org, linux-x25@vger.kernel.org X-Mailer: b4 0.14.0 X-Patchwork-Delegate: kuba@kernel.org Correct spelling in sctp.h and structs.h. As reported by codespell. Cc: Marcelo Ricardo Leitner Cc: Xin Long Cc: linux-sctp@vger.kernel.org Signed-off-by: Simon Horman Acked-by: Xin Long --- include/net/sctp/sctp.h | 2 +- include/net/sctp/structs.h | 20 ++++++++++---------- 2 files changed, 11 insertions(+), 11 deletions(-) diff --git a/include/net/sctp/sctp.h b/include/net/sctp/sctp.h index a2310fa995f6..84e6b9fd5610 100644 --- a/include/net/sctp/sctp.h +++ b/include/net/sctp/sctp.h @@ -28,7 +28,7 @@ #define __net_sctp_h__ /* Header Strategy. - * Start getting some control over the header file depencies: + * Start getting some control over the header file dependencies: * includes * constants * structs diff --git a/include/net/sctp/structs.h b/include/net/sctp/structs.h index f24a1bbcb3ef..31248cfdfb23 100644 --- a/include/net/sctp/structs.h +++ b/include/net/sctp/structs.h @@ -521,7 +521,7 @@ struct sctp_datamsg { refcount_t refcnt; /* When is this message no longer interesting to the peer? */ unsigned long expires_at; - /* Did the messenge fail to send? */ + /* Did the message fail to send? */ int send_error; u8 send_failed:1, can_delay:1, /* should this message be Nagle delayed */ @@ -792,7 +792,7 @@ struct sctp_transport { */ hb_sent:1, - /* Is the Path MTU update pending on this tranport */ + /* Is the Path MTU update pending on this transport */ pmtu_pending:1, dst_pending_confirm:1, /* need to confirm neighbour */ @@ -1223,7 +1223,7 @@ enum sctp_endpoint_type { }; /* - * A common base class to bridge the implmentation view of a + * A common base class to bridge the implementation view of a * socket (usually listening) endpoint versus an association's * local endpoint. * This common structure is useful for several purposes: @@ -1353,7 +1353,7 @@ struct sctp_endpoint { struct rcu_head rcu; }; -/* Recover the outter endpoint structure. */ +/* Recover the outer endpoint structure. */ static inline struct sctp_endpoint *sctp_ep(struct sctp_ep_common *base) { struct sctp_endpoint *ep; @@ -1906,7 +1906,7 @@ struct sctp_association { __u32 rwnd_over; /* Keeps treack of rwnd pressure. This happens when we have - * a window, but not recevie buffer (i.e small packets). This one + * a window, but not receive buffer (i.e small packets). This one * is releases slowly (1 PMTU at a time ). */ __u32 rwnd_press; @@ -1994,7 +1994,7 @@ struct sctp_association { /* ADDIP Section 5.2 Upon reception of an ASCONF Chunk. * - * This is needed to implement itmes E1 - E4 of the updated + * This is needed to implement items E1 - E4 of the updated * spec. Here is the justification: * * Since the peer may bundle multiple ASCONF chunks toward us, @@ -2005,7 +2005,7 @@ struct sctp_association { /* These ASCONF chunks are waiting to be sent. * - * These chunaks can't be pushed to outqueue until receiving + * These chunks can't be pushed to outqueue until receiving * ASCONF_ACK for the previous ASCONF indicated by * addip_last_asconf, so as to guarantee that only one ASCONF * is in flight at any time. @@ -2059,13 +2059,13 @@ struct sctp_association { struct sctp_transport *new_transport; /* SCTP AUTH: list of the endpoint shared keys. These - * keys are provided out of band by the user applicaton + * keys are provided out of band by the user application * and can't change during the lifetime of the association */ struct list_head endpoint_shared_keys; /* SCTP AUTH: - * The current generated assocaition shared key (secret) + * The current generated association shared key (secret) */ struct sctp_auth_bytes *asoc_shared_key; struct sctp_shared_key *shkey; @@ -2121,7 +2121,7 @@ enum { SCTP_ASSOC_EYECATCHER = 0xa550c123, }; -/* Recover the outter association structure. */ +/* Recover the outer association structure. */ static inline struct sctp_association *sctp_assoc(struct sctp_ep_common *base) { struct sctp_association *asoc; From patchwork Thu Aug 22 12:57:32 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Simon Horman X-Patchwork-Id: 13773332 X-Patchwork-Delegate: kuba@kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 2D47C1C9DF8; Thu, 22 Aug 2024 12:58:32 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1724331512; cv=none; b=ZVOsS4INadhN/67D8V7gpwdHiHAR8dSdfNnVbxCHeb+FYOnacnW2BjpadJDlcRGCuywGPsOpBFPzZmoTPmDDBRmuILBna3QTH5/Of0F8BxgATYJ8a07vmI9xG85JY1/KAEGOodun2gY8pBQwKD2Ytkpw+cbAlbYyd2hpCwrdD8E= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1724331512; c=relaxed/simple; bh=bP6X9S/zzyvosLaDMQbLpcIvi+6Smhxy03E6rOislg0=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=R0wIY6jQbs0baNIOb9I289gFg7Ena9f87//zlDQk6O/003PNdLVLUa4COWgo+hq6IgOy4nc5ihAf2YRqHKpS6VQG0yJKmALfkQMqx36bWxjmQbae+fdixAgsM2IWM5kYCrG1odyWgTRpGENm0wDC4zerCoqsvg0fAJgHIYw05AY= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=gS3CgNf5; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="gS3CgNf5" Received: by smtp.kernel.org (Postfix) with ESMTPSA id BC2D6C4AF10; Thu, 22 Aug 2024 12:58:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1724331512; bh=bP6X9S/zzyvosLaDMQbLpcIvi+6Smhxy03E6rOislg0=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=gS3CgNf5v87AA62IAwlLeVbxQXp7ymoD07KgZ1z/7RWN/wQXOOb3eAPnm2pVm/ag/ jtc9SFKpj3qiGP1crxfAtaZ5mlD0fitQ/Ve5kJiRQTWgn9AtV5aQJ3s4ClxRb2nwgb jMOXv05xsx/xd3VNN7tetKROuscyQ2a4NpHocKSIVLPi3zmm+IdLALLVimuhq9RddH mQfR11vgP8QzxqDb9UFGxJka3cUKRAm3LM1KajryN9yk5lWYxQ/NMVzG/FFlZSMb2J JwvcxTT+Q3wIQmbkTL5xhFns6b+WlWSJkuOP35qLC4QpuBypens4sczolwHb90sE4r vR0Qm5hmb+hXw== From: Simon Horman Date: Thu, 22 Aug 2024 13:57:32 +0100 Subject: [PATCH net-next 11/13] x25: Correct spelling in x25.h Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Message-Id: <20240822-net-spell-v1-11-3a98971ce2d2@kernel.org> References: <20240822-net-spell-v1-0-3a98971ce2d2@kernel.org> In-Reply-To: <20240822-net-spell-v1-0-3a98971ce2d2@kernel.org> To: Willem de Bruijn , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Alexandra Winter , Thorsten Winkler , David Ahern , Jay Vosburgh , Andy Gospodarek , Subash Abhinov Kasiviswanathan , Sean Tranchetti , Paul Moore , Krzysztof Kozlowski , Jamal Hadi Salim , Cong Wang , Jiri Pirko , Marcelo Ricardo Leitner , Xin Long , Martin Schiller Cc: netdev@vger.kernel.org, linux-s390@vger.kernel.org, linux-security-module@vger.kernel.org, linux-sctp@vger.kernel.org, linux-x25@vger.kernel.org X-Mailer: b4 0.14.0 X-Patchwork-Delegate: kuba@kernel.org Correct spelling in x25.h As reported by codespell. Cc: Martin Schiller Cc: linux-x25@vger.kernel.org Signed-off-by: Simon Horman Reviewed-by: Martin Schiller --- include/net/x25.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/include/net/x25.h b/include/net/x25.h index 597eb53c471e..5e833cfc864e 100644 --- a/include/net/x25.h +++ b/include/net/x25.h @@ -81,7 +81,7 @@ enum { #define X25_DEFAULT_WINDOW_SIZE 2 /* Default Window Size */ #define X25_DEFAULT_PACKET_SIZE X25_PS128 /* Default Packet Size */ -#define X25_DEFAULT_THROUGHPUT 0x0A /* Deafult Throughput */ +#define X25_DEFAULT_THROUGHPUT 0x0A /* Default Throughput */ #define X25_DEFAULT_REVERSE 0x00 /* Default Reverse Charging */ #define X25_SMODULUS 8 From patchwork Thu Aug 22 12:57:33 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Simon Horman X-Patchwork-Id: 13773333 X-Patchwork-Delegate: kuba@kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 077421C9DF6; Thu, 22 Aug 2024 12:58:37 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1724331517; cv=none; b=b8OH2+2bEBkJECip0ZFlQeQaccZd19o/iBAI7EoMco3RloN8/Dtxe0g+TY/ElXMZFG4f6lLIc+MHtzl9Glv2yrCg/DtHcC0eP9k+p4ZbogGXvsCpUxAHuk/sAiX7I4vpOlNI+jkfW5+cmkhaYeuO2jatOB6db0J+ihUOy0Rn7gc= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1724331517; c=relaxed/simple; bh=24AETjKMzbddM6Bj/d+KJAowW7w2tX1dFCwIySqVgC8=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=tnPxBOVoCCaLCvJ2uDPcYDwIpKvz6m1E3rBmhXyZFjDvmTXd+QPRE6rvjjCIM5xkMoO4bRaEeGgUkwc0TKzF/DXb0V0mYvu5HI+/PKJuvq+RTIb7Oms7QJKCVWQksnocMsldWCmUO7vuxGimM+lAqDoRmoWC9Xa0Uc6W8rVmq84= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=IgsDS9MU; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="IgsDS9MU" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 73295C4AF0E; Thu, 22 Aug 2024 12:58:32 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1724331516; bh=24AETjKMzbddM6Bj/d+KJAowW7w2tX1dFCwIySqVgC8=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=IgsDS9MUoGnZC8npO2YMZC2DDPg8NhndlLlIYSNQH37UtFM6IttOMIlNNHB3Vm6EZ /ibB40vsl/ZKqVWhAq4DIGWLsIAHLvIbzbMy0jq8NZJQ7WIkQiuScheERMS8KEtHV6 7Ybk87fi7+lvECmy/4LNL5oa/fV9gNeAGIlkG0yj2FISDzPNSijaryGc/NkGEUjo+N +CqpGXVDWkbrxvHlNyU5CHikYwSEcaere5hNIi31HBm1FzG9IXBO7pP8edgC4QrfZf TqSNWntdNVLOMdN0GKzXcSFT6XodhYoDbVu7o15SL4UdfUbchtbwRL4Hfq56mzbwsb w7CvhtE6RrqSg== From: Simon Horman Date: Thu, 22 Aug 2024 13:57:33 +0100 Subject: [PATCH net-next 12/13] net: Correct spelling in headers Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Message-Id: <20240822-net-spell-v1-12-3a98971ce2d2@kernel.org> References: <20240822-net-spell-v1-0-3a98971ce2d2@kernel.org> In-Reply-To: <20240822-net-spell-v1-0-3a98971ce2d2@kernel.org> To: Willem de Bruijn , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Alexandra Winter , Thorsten Winkler , David Ahern , Jay Vosburgh , Andy Gospodarek , Subash Abhinov Kasiviswanathan , Sean Tranchetti , Paul Moore , Krzysztof Kozlowski , Jamal Hadi Salim , Cong Wang , Jiri Pirko , Marcelo Ricardo Leitner , Xin Long , Martin Schiller Cc: netdev@vger.kernel.org, linux-s390@vger.kernel.org, linux-security-module@vger.kernel.org, linux-sctp@vger.kernel.org, linux-x25@vger.kernel.org X-Mailer: b4 0.14.0 X-Patchwork-Delegate: kuba@kernel.org Correct spelling in Networking headers. As reported by codespell. Signed-off-by: Simon Horman --- include/linux/etherdevice.h | 2 +- include/linux/netdevice.h | 8 ++++---- include/net/addrconf.h | 2 +- include/net/busy_poll.h | 2 +- include/net/caif/caif_layer.h | 4 ++-- include/net/caif/cfpkt.h | 2 +- include/net/dropreason-core.h | 6 +++--- include/net/dst.h | 2 +- include/net/dst_cache.h | 2 +- include/net/erspan.h | 4 ++-- include/net/hwbm.h | 4 ++-- include/net/llc_pdu.h | 2 +- include/net/netlink.h | 16 ++++++++-------- include/net/netns/sctp.h | 4 ++-- include/net/regulatory.h | 2 +- include/net/sock.h | 4 ++-- include/net/udp.h | 2 +- include/uapi/linux/in.h | 2 +- include/uapi/linux/inet_diag.h | 2 +- 19 files changed, 36 insertions(+), 36 deletions(-) diff --git a/include/linux/etherdevice.h b/include/linux/etherdevice.h index 0ed47d00549b..30114c25ad12 100644 --- a/include/linux/etherdevice.h +++ b/include/linux/etherdevice.h @@ -645,7 +645,7 @@ static inline struct ethhdr *eth_skb_pull_mac(struct sk_buff *skb) } /** - * eth_skb_pad - Pad buffer to mininum number of octets for Ethernet frame + * eth_skb_pad - Pad buffer to minimum number of octets for Ethernet frame * @skb: Buffer to pad * * An Ethernet frame should have a minimum size of 60 bytes. This function diff --git a/include/linux/netdevice.h b/include/linux/netdevice.h index 614ec5d3d75b..c7822380281b 100644 --- a/include/linux/netdevice.h +++ b/include/linux/netdevice.h @@ -1237,7 +1237,7 @@ struct netdev_net_notifier { * int (*ndo_fdb_del)(struct ndmsg *ndm, struct nlattr *tb[], * struct net_device *dev, * const unsigned char *addr, u16 vid) - * Deletes the FDB entry from dev coresponding to addr. + * Deletes the FDB entry from dev corresponding to addr. * int (*ndo_fdb_del_bulk)(struct nlmsghdr *nlh, struct net_device *dev, * struct netlink_ext_ack *extack); * int (*ndo_fdb_dump)(struct sk_buff *skb, struct netlink_callback *cb, @@ -3512,7 +3512,7 @@ static inline void netdev_tx_completed_queue(struct netdev_queue *dev_queue, dql_completed(&dev_queue->dql, bytes); /* - * Without the memory barrier there is a small possiblity that + * Without the memory barrier there is a small possibility that * netdev_tx_sent_queue will miss the update and cause the queue to * be stopped forever */ @@ -4580,7 +4580,7 @@ void dev_uc_flush(struct net_device *dev); void dev_uc_init(struct net_device *dev); /** - * __dev_uc_sync - Synchonize device's unicast list + * __dev_uc_sync - Synchronize device's unicast list * @dev: device to sync * @sync: function to call if address should be added * @unsync: function to call if address should be removed @@ -4624,7 +4624,7 @@ void dev_mc_flush(struct net_device *dev); void dev_mc_init(struct net_device *dev); /** - * __dev_mc_sync - Synchonize device's multicast list + * __dev_mc_sync - Synchronize device's multicast list * @dev: device to sync * @sync: function to call if address should be added * @unsync: function to call if address should be removed diff --git a/include/net/addrconf.h b/include/net/addrconf.h index c8ed31828db3..363dd63babe7 100644 --- a/include/net/addrconf.h +++ b/include/net/addrconf.h @@ -333,7 +333,7 @@ static inline struct inet6_dev *__in6_dev_get(const struct net_device *dev) /** * __in6_dev_stats_get - get inet6_dev pointer for stats * @dev: network device - * @skb: skb for original incoming interface if neeeded + * @skb: skb for original incoming interface if needed * * Caller must hold rcu_read_lock or RTNL, because this function * does not take a reference on the inet6_dev. diff --git a/include/net/busy_poll.h b/include/net/busy_poll.h index 9b09acac538e..5e3b5703e4ab 100644 --- a/include/net/busy_poll.h +++ b/include/net/busy_poll.h @@ -131,7 +131,7 @@ static inline void skb_mark_napi_id(struct sk_buff *skb, #endif } -/* used in the protocol hanlder to propagate the napi_id to the socket */ +/* used in the protocol handler to propagate the napi_id to the socket */ static inline void sk_mark_napi_id(struct sock *sk, const struct sk_buff *skb) { #ifdef CONFIG_NET_RX_BUSY_POLL diff --git a/include/net/caif/caif_layer.h b/include/net/caif/caif_layer.h index 0f45d875905f..053e7c6a6a66 100644 --- a/include/net/caif/caif_layer.h +++ b/include/net/caif/caif_layer.h @@ -20,7 +20,7 @@ struct caif_payload_info; * @assert: expression to evaluate. * * This function will print a error message and a do WARN_ON if the - * assertion failes. Normally this will do a stack up at the current location. + * assertion fails. Normally this will do a stack up at the current location. */ #define caif_assert(assert) \ do { \ @@ -116,7 +116,7 @@ enum caif_direction { * @dn: Pointer down to the layer below. * @node: List node used when layer participate in a list. * @receive: Packet receive function. - * @transmit: Packet transmit funciton. + * @transmit: Packet transmit function. * @ctrlcmd: Used for control signalling upwards in the stack. * @modemcmd: Used for control signaling downwards in the stack. * @id: The identity of this layer diff --git a/include/net/caif/cfpkt.h b/include/net/caif/cfpkt.h index 44d914a50369..acf664227d96 100644 --- a/include/net/caif/cfpkt.h +++ b/include/net/caif/cfpkt.h @@ -18,7 +18,7 @@ struct cfpkt *cfpkt_create(u16 len); /* * Destroy a CAIF Packet. - * pkt Packet to be destoyed. + * pkt Packet to be destroyed. */ void cfpkt_destroy(struct cfpkt *pkt); diff --git a/include/net/dropreason-core.h b/include/net/dropreason-core.h index 9707ab54fdd5..4748680e8c88 100644 --- a/include/net/dropreason-core.h +++ b/include/net/dropreason-core.h @@ -155,8 +155,8 @@ enum skb_drop_reason { /** @SKB_DROP_REASON_SOCKET_RCVBUFF: socket receive buff is full */ SKB_DROP_REASON_SOCKET_RCVBUFF, /** - * @SKB_DROP_REASON_PROTO_MEM: proto memory limition, such as udp packet - * drop out of udp_memory_allocated. + * @SKB_DROP_REASON_PROTO_MEM: proto memory limitation, such as + * udp packet drop out of udp_memory_allocated. */ SKB_DROP_REASON_PROTO_MEM, /** @@ -217,7 +217,7 @@ enum skb_drop_reason { */ SKB_DROP_REASON_TCP_ZEROWINDOW, /** - * @SKB_DROP_REASON_TCP_OLD_DATA: the TCP data reveived is already + * @SKB_DROP_REASON_TCP_OLD_DATA: the TCP data received is already * received before (spurious retrans may happened), see * LINUX_MIB_DELAYEDACKLOST */ diff --git a/include/net/dst.h b/include/net/dst.h index 0aa331bd2fdb..0f303cc60252 100644 --- a/include/net/dst.h +++ b/include/net/dst.h @@ -341,7 +341,7 @@ static inline void __skb_tunnel_rx(struct sk_buff *skb, struct net_device *dev, skb->dev = dev; /* - * Clear hash so that we can recalulate the hash for the + * Clear hash so that we can recalculate the hash for the * encapsulated packet, unless we have already determine the hash * over the L4 4-tuple. */ diff --git a/include/net/dst_cache.h b/include/net/dst_cache.h index b4a55d2d5e71..1961699598e2 100644 --- a/include/net/dst_cache.h +++ b/include/net/dst_cache.h @@ -102,7 +102,7 @@ int dst_cache_init(struct dst_cache *dst_cache, gfp_t gfp); * @dst_cache: the cache * * No synchronization is enforced: it must be called only when the cache - * is unsed. + * is unused. */ void dst_cache_destroy(struct dst_cache *dst_cache); diff --git a/include/net/erspan.h b/include/net/erspan.h index 6cb4cbd6a48f..c6209e7b6c96 100644 --- a/include/net/erspan.h +++ b/include/net/erspan.h @@ -89,7 +89,7 @@ enum erspan_encap_type { ERSPAN_ENCAP_NOVLAN = 0x0, /* originally without VLAN tag */ ERSPAN_ENCAP_ISL = 0x1, /* originally ISL encapsulated */ ERSPAN_ENCAP_8021Q = 0x2, /* originally 802.1Q encapsulated */ - ERSPAN_ENCAP_INFRAME = 0x3, /* VLAN tag perserved in frame */ + ERSPAN_ENCAP_INFRAME = 0x3, /* VLAN tag preserved in frame */ }; #define ERSPAN_V1_MDSIZE 4 @@ -192,7 +192,7 @@ static inline void erspan_build_header(struct sk_buff *skb, enc_type = ERSPAN_ENCAP_NOVLAN; /* If mirrored packet has vlan tag, extract tci and - * perserve vlan header in the mirrored frame. + * preserve vlan header in the mirrored frame. */ if (eth->h_proto == htons(ETH_P_8021Q)) { qp = (struct qtag_prefix *)(skb->data + 2 * ETH_ALEN); diff --git a/include/net/hwbm.h b/include/net/hwbm.h index aa495decec35..bdbe91c609ff 100644 --- a/include/net/hwbm.h +++ b/include/net/hwbm.h @@ -11,9 +11,9 @@ struct hwbm_pool { int frag_size; /* Number of buffers currently used by this pool */ int buf_num; - /* constructor called during alocation */ + /* constructor called during allocation */ int (*construct)(struct hwbm_pool *bm_pool, void *buf); - /* protect acces to the buffer counter*/ + /* protect access to the buffer counter*/ struct mutex buf_lock; /* private data */ void *priv; diff --git a/include/net/llc_pdu.h b/include/net/llc_pdu.h index 1d55ba7c45be..86681f29bda7 100644 --- a/include/net/llc_pdu.h +++ b/include/net/llc_pdu.h @@ -254,7 +254,7 @@ static inline void llc_pdu_header_init(struct sk_buff *skb, u8 type, } /** - * llc_pdu_decode_sa - extracs source address (MAC) of input frame + * llc_pdu_decode_sa - extracts, source address (MAC) of input frame * @skb: input skb that source address must be extracted from it. * @sa: pointer to source address (6 byte array). * diff --git a/include/net/netlink.h b/include/net/netlink.h index e78ce008e07c..db6af207287c 100644 --- a/include/net/netlink.h +++ b/include/net/netlink.h @@ -827,7 +827,7 @@ nlmsg_parse_deprecated_strict(const struct nlmsghdr *nlh, int hdrlen, /** * nlmsg_find_attr - find a specific attribute in a netlink message * @nlh: netlink message header - * @hdrlen: length of familiy specific header + * @hdrlen: length of family specific header * @attrtype: type of attribute to look for * * Returns the first attribute which matches the specified type. @@ -849,7 +849,7 @@ static inline struct nlattr *nlmsg_find_attr(const struct nlmsghdr *nlh, * * Validates all attributes in the specified attribute stream against the * specified policy. Validation is done in liberal mode. - * See documenation of struct nla_policy for more details. + * See documentation of struct nla_policy for more details. * * Returns 0 on success or a negative error code. */ @@ -872,7 +872,7 @@ static inline int nla_validate_deprecated(const struct nlattr *head, int len, * * Validates all attributes in the specified attribute stream against the * specified policy. Validation is done in strict mode. - * See documenation of struct nla_policy for more details. + * See documentation of struct nla_policy for more details. * * Returns 0 on success or a negative error code. */ @@ -887,7 +887,7 @@ static inline int nla_validate(const struct nlattr *head, int len, int maxtype, /** * nlmsg_validate_deprecated - validate a netlink message including attributes * @nlh: netlinket message header - * @hdrlen: length of familiy specific header + * @hdrlen: length of family specific header * @maxtype: maximum attribute type to be expected * @policy: validation policy * @extack: extended ACK report struct @@ -933,7 +933,7 @@ static inline u32 nlmsg_seq(const struct nlmsghdr *nlh) * nlmsg_for_each_attr - iterate over a stream of attributes * @pos: loop counter, set to current attribute * @nlh: netlink message header - * @hdrlen: length of familiy specific header + * @hdrlen: length of family specific header * @rem: initialized to len, holds bytes currently remaining in stream */ #define nlmsg_for_each_attr(pos, nlh, hdrlen, rem) \ @@ -1034,7 +1034,7 @@ static inline struct sk_buff *nlmsg_new_large(size_t payload) * @skb: socket buffer the message is stored in * @nlh: netlink message header * - * Corrects the netlink message header to include the appeneded + * Corrects the netlink message header to include the appended * attributes. Only necessary if attributes have been added to * the message. */ @@ -1954,7 +1954,7 @@ static inline struct nlattr *nla_nest_start(struct sk_buff *skb, int attrtype) * @start: container attribute * * Corrects the container attribute header to include the all - * appeneded attributes. + * appended attributes. * * Returns the total data length of the skb. */ @@ -1987,7 +1987,7 @@ static inline void nla_nest_cancel(struct sk_buff *skb, struct nlattr *start) * * Validates all attributes in the nested attribute stream against the * specified policy. Attributes with a type exceeding maxtype will be - * ignored. See documenation of struct nla_policy for more details. + * ignored. See documentation of struct nla_policy for more details. * * Returns 0 on success or a negative error code. */ diff --git a/include/net/netns/sctp.h b/include/net/netns/sctp.h index 7eff3d981b89..d25cd7a9c5ff 100644 --- a/include/net/netns/sctp.h +++ b/include/net/netns/sctp.h @@ -125,14 +125,14 @@ struct netns_sctp { int pf_expose; /* - * Policy for preforming sctp/socket accounting + * Policy for performing sctp/socket accounting * 0 - do socket level accounting, all assocs share sk_sndbuf * 1 - do sctp accounting, each asoc may use sk_sndbuf bytes */ int sndbuf_policy; /* - * Policy for preforming sctp/socket accounting + * Policy for performing sctp/socket accounting * 0 - do socket level accounting, all assocs share sk_rcvbuf * 1 - do sctp accounting, each asoc may use sk_rcvbuf bytes */ diff --git a/include/net/regulatory.h b/include/net/regulatory.h index a103f4c8cf75..6633627f6e76 100644 --- a/include/net/regulatory.h +++ b/include/net/regulatory.h @@ -121,7 +121,7 @@ struct regulatory_request { * @REGULATORY_DISABLE_BEACON_HINTS: enable this if your driver needs to * ensure that passive scan flags and beaconing flags may not be lifted by * cfg80211 due to regulatory beacon hints. For more information on beacon - * hints read the documenation for regulatory_hint_found_beacon() + * hints read the documentation for regulatory_hint_found_beacon() * @REGULATORY_COUNTRY_IE_FOLLOW_POWER: for devices that have a preference * that even though they may have programmed their own custom power * setting prior to wiphy registration, they want to ensure their channel diff --git a/include/net/sock.h b/include/net/sock.h index cce23ac4d514..f51d61fab059 100644 --- a/include/net/sock.h +++ b/include/net/sock.h @@ -1624,7 +1624,7 @@ bool __lock_sock_fast(struct sock *sk) __acquires(&sk->sk_lock.slock); * lock_sock_fast - fast version of lock_sock * @sk: socket * - * This version should be used for very small section, where process wont block + * This version should be used for very small section, where process won't block * return false if fast path is taken: * * sk_lock.slock locked, owned = 0, BH disabled @@ -2546,7 +2546,7 @@ struct sock_skb_cb { /* Store sock_skb_cb at the end of skb->cb[] so protocol families * using skb->cb[] would keep using it directly and utilize its - * alignement guarantee. + * alignment guarantee. */ #define SOCK_SKB_CB_OFFSET ((sizeof_field(struct sk_buff, cb) - \ sizeof(struct sock_skb_cb))) diff --git a/include/net/udp.h b/include/net/udp.h index 5ca53b1cec67..61222545ab1c 100644 --- a/include/net/udp.h +++ b/include/net/udp.h @@ -232,7 +232,7 @@ static inline __be16 udp_flow_src_port(struct net *net, struct sk_buff *skb, } /* Since this is being sent on the wire obfuscate hash a bit - * to minimize possbility that any useful information to an + * to minimize possibility that any useful information to an * attacker is leaked. Only upper 16 bits are relevant in the * computation for 16 bit port value. */ diff --git a/include/uapi/linux/in.h b/include/uapi/linux/in.h index d358add1611c..5d32d53508d9 100644 --- a/include/uapi/linux/in.h +++ b/include/uapi/linux/in.h @@ -141,7 +141,7 @@ struct in_addr { */ #define IP_PMTUDISC_INTERFACE 4 /* weaker version of IP_PMTUDISC_INTERFACE, which allows packets to get - * fragmented if they exeed the interface mtu + * fragmented if they exceed the interface mtu */ #define IP_PMTUDISC_OMIT 5 diff --git a/include/uapi/linux/inet_diag.h b/include/uapi/linux/inet_diag.h index 50655de04c9b..86bb2e8b17c9 100644 --- a/include/uapi/linux/inet_diag.h +++ b/include/uapi/linux/inet_diag.h @@ -143,7 +143,7 @@ enum { INET_DIAG_SHUTDOWN, /* - * Next extenstions cannot be requested in struct inet_diag_req_v2: + * Next extensions cannot be requested in struct inet_diag_req_v2: * its field idiag_ext has only 8 bits. */ From patchwork Thu Aug 22 12:57:34 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Simon Horman X-Patchwork-Id: 13773334 X-Patchwork-Delegate: kuba@kernel.org Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id A4CDF1C9EAC; Thu, 22 Aug 2024 12:58:41 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1724331521; cv=none; b=C0PqwQcdSTYP3JD8yADiQbSaFXllv70FpJy8vETdkNixaSocrHVE/pPfRUBhYBJn0sQaze4hvjUAB7sduCjO2eOIABwdYJev1koeBUhTVGbUC82WVRdGAgCRRn7+1YzdkuLP76YIIuAPK85m2w9fkWa0dA0XpILSNIoB0GdhM5M= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1724331521; c=relaxed/simple; bh=qqHphxwn2qWHWhPAByHe6TETHqJld8jq2S4guezpHtY=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:References: In-Reply-To:To:Cc; b=JzJy2EhlTeYUuRaIovwzkcTnNd4YsVUfcNDXSqy+Kswkir2Jz5xuNf8gXUI9HK7m5IAqs1ClOftP+AQhEg5lVKWYsYjuDLhBh7iccRgseo3Uj1EfZJB2ky2L02GNbPH0gBtn7gvpap0qiXa78Xwy5aMDS6PuqikIcQ7NguUHmpU= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=IVZIRYC1; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="IVZIRYC1" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 4C705C4AF10; Thu, 22 Aug 2024 12:58:37 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1724331521; bh=qqHphxwn2qWHWhPAByHe6TETHqJld8jq2S4guezpHtY=; h=From:Date:Subject:References:In-Reply-To:To:Cc:From; b=IVZIRYC1SXikCt6YX9RXFUr40kg1Ow9GbNopwC+COZy44oJhREgi+E0gE8ESH07w+ FVlKU27sXkg//XfKvMWWHdLG1nfSpjP4BCg5GvqZviH8oR2tJoSuG6yihG8j+uQTKn v6R8HIHZuehlqxUhyzc/rKNWTYjpQC7ZisZ/skfbmERmsSJvvtLqnLDPC1hN6bTTly QSrvV5owdJxsS3FYP57WO+VXLmY6of94Tu4ulUWgyf9I7CK/65odm63P44lwrS1nJy W/SGzOSFB5QM+pOApcPdnQ/MH5izgqQbVmC3AOZCA7XCUBY4rE3vgbPpfL+CZgcXCD aXt+63HXdWxIw== From: Simon Horman Date: Thu, 22 Aug 2024 13:57:34 +0100 Subject: [PATCH net-next 13/13] net: Correct spelling in net/core Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Message-Id: <20240822-net-spell-v1-13-3a98971ce2d2@kernel.org> References: <20240822-net-spell-v1-0-3a98971ce2d2@kernel.org> In-Reply-To: <20240822-net-spell-v1-0-3a98971ce2d2@kernel.org> To: Willem de Bruijn , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Alexandra Winter , Thorsten Winkler , David Ahern , Jay Vosburgh , Andy Gospodarek , Subash Abhinov Kasiviswanathan , Sean Tranchetti , Paul Moore , Krzysztof Kozlowski , Jamal Hadi Salim , Cong Wang , Jiri Pirko , Marcelo Ricardo Leitner , Xin Long , Martin Schiller Cc: netdev@vger.kernel.org, linux-s390@vger.kernel.org, linux-security-module@vger.kernel.org, linux-sctp@vger.kernel.org, linux-x25@vger.kernel.org X-Mailer: b4 0.14.0 X-Patchwork-Delegate: kuba@kernel.org Correct spelling in net/core. As reported by codespell. Signed-off-by: Simon Horman --- net/core/dev.c | 6 +++--- net/core/dev_addr_lists.c | 6 +++--- net/core/fib_rules.c | 2 +- net/core/gro.c | 2 +- net/core/netpoll.c | 2 +- net/core/pktgen.c | 10 +++++----- net/core/skbuff.c | 4 ++-- net/core/sock.c | 6 +++--- net/core/utils.c | 2 +- 9 files changed, 20 insertions(+), 20 deletions(-) diff --git a/net/core/dev.c b/net/core/dev.c index e7260889d4cb..2a7381e5cf88 100644 --- a/net/core/dev.c +++ b/net/core/dev.c @@ -3705,7 +3705,7 @@ struct sk_buff *validate_xmit_skb_list(struct sk_buff *skb, struct net_device *d next = skb->next; skb_mark_not_on_list(skb); - /* in case skb wont be segmented, point to itself */ + /* in case skb won't be segmented, point to itself */ skb->prev = skb; skb = validate_xmit_skb(skb, dev, again); @@ -11407,7 +11407,7 @@ void unregister_netdevice_many_notify(struct list_head *head, * @head: list of devices * * Note: As most callers use a stack allocated list_head, - * we force a list_del() to make sure stack wont be corrupted later. + * we force a list_del() to make sure stack won't be corrupted later. */ void unregister_netdevice_many(struct list_head *head) { @@ -11465,7 +11465,7 @@ int __dev_change_net_namespace(struct net_device *dev, struct net *net, if (dev->features & NETIF_F_NETNS_LOCAL) goto out; - /* Ensure the device has been registrered */ + /* Ensure the device has been registered */ if (dev->reg_state != NETREG_REGISTERED) goto out; diff --git a/net/core/dev_addr_lists.c b/net/core/dev_addr_lists.c index baa63dee2829..166e404f7c03 100644 --- a/net/core/dev_addr_lists.c +++ b/net/core/dev_addr_lists.c @@ -262,7 +262,7 @@ static int __hw_addr_sync_multiple(struct netdev_hw_addr_list *to_list, } /* This function only works where there is a strict 1-1 relationship - * between source and destionation of they synch. If you ever need to + * between source and destination of they synch. If you ever need to * sync addresses to more then 1 destination, you need to use * __hw_addr_sync_multiple(). */ @@ -299,8 +299,8 @@ void __hw_addr_unsync(struct netdev_hw_addr_list *to_list, EXPORT_SYMBOL(__hw_addr_unsync); /** - * __hw_addr_sync_dev - Synchonize device's multicast list - * @list: address list to syncronize + * __hw_addr_sync_dev - Synchronize device's multicast list + * @list: address list to synchronize * @dev: device to sync * @sync: function to call if address should be added * @unsync: function to call if address should be removed diff --git a/net/core/fib_rules.c b/net/core/fib_rules.c index 6ebffbc63236..644c49079bb1 100644 --- a/net/core/fib_rules.c +++ b/net/core/fib_rules.c @@ -72,7 +72,7 @@ int fib_default_rule_add(struct fib_rules_ops *ops, r->suppress_prefixlen = -1; r->suppress_ifgroup = -1; - /* The lock is not required here, the list in unreacheable + /* The lock is not required here, the list in unreachable * at the moment this function is called */ list_add_tail(&r->list, &ops->rules_list); return 0; diff --git a/net/core/gro.c b/net/core/gro.c index b3b43de1a650..3abad1b567dd 100644 --- a/net/core/gro.c +++ b/net/core/gro.c @@ -374,7 +374,7 @@ static void gro_list_prepare(const struct list_head *head, skb_mac_header(skb), maclen); - /* in most common scenarions 'slow_gro' is 0 + /* in most common scenarios 'slow_gro' is 0 * otherwise we are already on some slower paths * either skip all the infrequent tests altogether or * avoid trying too hard to skip each of them individually diff --git a/net/core/netpoll.c b/net/core/netpoll.c index a58ea724790c..8debf27f383b 100644 --- a/net/core/netpoll.c +++ b/net/core/netpoll.c @@ -162,7 +162,7 @@ static void poll_one_napi(struct napi_struct *napi) if (test_and_set_bit(NAPI_STATE_NPSVC, &napi->state)) return; - /* We explicilty pass the polling call a budget of 0 to + /* We explicitly pass the polling call a budget of 0 to * indicate that we are clearing the Tx path only. */ work = napi->poll(napi, 0); diff --git a/net/core/pktgen.c b/net/core/pktgen.c index ea55a758a475..4baf02db1f6a 100644 --- a/net/core/pktgen.c +++ b/net/core/pktgen.c @@ -69,7 +69,7 @@ * * By design there should only be *one* "controlling" process. In practice * multiple write accesses gives unpredictable result. Understood by "write" - * to /proc gives result code thats should be read be the "writer". + * to /proc gives result code that should be read be the "writer". * For practical use this should be no problem. * * Note when adding devices to a specific CPU there good idea to also assign @@ -2371,11 +2371,11 @@ static void get_ipsec_sa(struct pktgen_dev *pkt_dev, int flow) if (pkt_dev->spi) { /* We need as quick as possible to find the right SA - * Searching with minimum criteria to archieve this. + * Searching with minimum criteria to achieve, this. */ x = xfrm_state_lookup_byspi(pn->net, htonl(pkt_dev->spi), AF_INET); } else { - /* slow path: we dont already have xfrm_state */ + /* slow path: we don't already have xfrm_state */ x = xfrm_stateonly_find(pn->net, DUMMY_MARK, 0, (xfrm_address_t *)&pkt_dev->cur_daddr, (xfrm_address_t *)&pkt_dev->cur_saddr, @@ -3838,8 +3838,8 @@ static int pktgen_add_device(struct pktgen_thread *t, const char *ifname) pkt_dev->ipsmode = XFRM_MODE_TRANSPORT; pkt_dev->ipsproto = IPPROTO_ESP; - /* xfrm tunnel mode needs additional dst to extract outter - * ip header protocol/ttl/id field, here creat a phony one. + /* xfrm tunnel mode needs additional dst to extract outer + * ip header protocol/ttl/id field, here create a phony one. * instead of looking for a valid rt, which definitely hurting * performance under such circumstance. */ diff --git a/net/core/skbuff.c b/net/core/skbuff.c index 1748673e1fe0..6022c7359385 100644 --- a/net/core/skbuff.c +++ b/net/core/skbuff.c @@ -5163,7 +5163,7 @@ EXPORT_SYMBOL_GPL(skb_to_sgvec); * 3. sg_unmark_end * 4. skb_to_sgvec(payload2) * - * When mapping mutilple payload conditionally, skb_to_sgvec_nomark + * When mapping multiple payload conditionally, skb_to_sgvec_nomark * is more preferable. */ int skb_to_sgvec_nomark(struct sk_buff *skb, struct scatterlist *sg, @@ -6021,7 +6021,7 @@ EXPORT_SYMBOL(skb_try_coalesce); * @skb: buffer to clean * @xnet: packet is crossing netns * - * skb_scrub_packet can be used after encapsulating or decapsulting a packet + * skb_scrub_packet can be used after encapsulating or decapsulating a packet * into/from a tunnel. Some information have to be cleared during these * operations. * skb_scrub_packet can also be used to clean a skb before injecting it in diff --git a/net/core/sock.c b/net/core/sock.c index 9abc4fe25953..468b1239606c 100644 --- a/net/core/sock.c +++ b/net/core/sock.c @@ -2048,7 +2048,7 @@ static inline void sock_lock_init(struct sock *sk) /* * Copy all fields from osk to nsk but nsk->sk_refcnt must not change yet, - * even temporarly, because of RCU lookups. sk_node should also be left as is. + * even temporarily, because of RCU lookups. sk_node should also be left as is. * We must not copy fields between sk_dontcopy_begin and sk_dontcopy_end */ static void sock_copy(struct sock *nsk, const struct sock *osk) @@ -2538,7 +2538,7 @@ void skb_set_owner_w(struct sk_buff *skb, struct sock *sk) skb_set_hash_from_sk(skb, sk); /* * We used to take a refcount on sk, but following operation - * is enough to guarantee sk_free() wont free this sock until + * is enough to guarantee sk_free() won't free this sock until * all in-flight packets are completed */ refcount_add(skb->truesize, &sk->sk_wmem_alloc); @@ -3697,7 +3697,7 @@ EXPORT_SYMBOL(sock_recv_errqueue); * * FIX: POSIX 1003.1g is very ambiguous here. It states that * asynchronous errors should be reported by getsockopt. We assume - * this means if you specify SO_ERROR (otherwise whats the point of it). + * this means if you specify SO_ERROR (otherwise what is the point of it). */ int sock_common_getsockopt(struct socket *sock, int level, int optname, char __user *optval, int __user *optlen) diff --git a/net/core/utils.c b/net/core/utils.c index c994e95172ac..27f4cffaae05 100644 --- a/net/core/utils.c +++ b/net/core/utils.c @@ -1,6 +1,6 @@ // SPDX-License-Identifier: GPL-2.0-or-later /* - * Generic address resultion entity + * Generic address resolution entity * * Authors: * net_random Alan Cox