Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp2691104yba; Mon, 6 May 2019 10:03:11 -0700 (PDT) X-Google-Smtp-Source: APXvYqxr3BAxl2UOBIZ7iLfTGYXVY/Gx5rhygcmYsfl8/1gmKI1CcgOeKEk1lCSSkLIcZAROsBC2 X-Received: by 2002:aa7:91cb:: with SMTP id z11mr35882472pfa.64.1557162191271; Mon, 06 May 2019 10:03:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1557162191; cv=none; d=google.com; s=arc-20160816; b=ZQYIvGnWRJq7sQNr7JjCiAsLwzdtex5g2Haj5QCyCv2kzJOhsjcX9KR0mW+21aerVf 1GixcX2k6O9bpLhLdx8VMf7Wq2gQTK/9jOjhgk3i3XeW2gu3lCZzN2eAeMaGGGtk2BgX gvjhszIwg8aoa17/fkM/vJX9o0DcXqnnnNxTW6wSYKeba2PkkbWw5d7j8KFaYLaCzPJw oo08HqYXtN9lot9hmXHMBfdZ31J3GmOdYXlL3g1ZxHIqfhCaRzGmHBFyefQgOu5oH1vI nITjNBSBGmSQMNg0AKuAs5vqQjuBE+jxCadZRIhTvKaPA2/ug5Lu20eGQyh+1atfE3DN l3yg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=B9Hdl/lW2rFgeDWjR4h3OyUPzBWJ0PsRS5bVYf6AXEM=; b=uoUraFmvCfXAPhCOREM+5SAA/UCnT2s4kNqq3XXgLRzAyJXWtlTA8HDhA4C/rUCIzg NuRY4/qWOv2lLg2Dp9nXGnQ+TtUy5akonCXr0n4vI/PveSW9nr09LfJ6fVO1CKhz/83e EjJyjlMZafCmhrhcPUVtCJrv3VObyPxadgrTi9EHEi0C2TtMqYcShU0dDhbW5/kT5/Df 54aiPlihNw4fRorhDP3yNEUcaNB5/GvBZJiv52ocSGy+ZX6ul4dP6GmnvzW09BTW9FpO YYVdScYT+N3ozTkcjhSlrW7cTszIM/241VPhVY5mEEjr7DYcsPq9gYrr9sxWeDKZNavA 9hWA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h94si16656801plb.261.2019.05.06.10.02.55; Mon, 06 May 2019 10:03:11 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726888AbfEFRAe (ORCPT + 99 others); Mon, 6 May 2019 13:00:34 -0400 Received: from smtp1.cloudbase.it ([46.107.15.2]:52602 "EHLO smtp1.cloudbase.it" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726287AbfEFRAc (ORCPT ); Mon, 6 May 2019 13:00:32 -0400 Received: from ader1990.cloudbase.it (unknown [89.46.161.178]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp1.cloudbase.it (Postfix) with ESMTPSA id 301C350881; Mon, 6 May 2019 18:56:30 +0300 (EEST) From: Adrian Vladu To: linux-kernel@vger.kernel.org Cc: Adrian Vladu , "K. Y. Srinivasan" , Haiyang Zhang , Stephen Hemminger , Sasha Levin , Alessandro Pilotti Subject: [PATCH] hv: tools: fix typos in toolchain Date: Mon, 6 May 2019 16:51:24 +0000 Message-Id: <20190506165124.6865-1-avladu@cloudbasesolutions.com> X-Mailer: git-send-email 2.19.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Fix typos in the HyperV toolchain. Signed-off-by: Adrian Vladu Cc: "K. Y. Srinivasan" Cc: Haiyang Zhang Cc: Stephen Hemminger Cc: Sasha Levin Cc: Alessandro Pilotti --- tools/hv/hv_get_dhcp_info.sh | 2 +- tools/hv/hv_kvp_daemon.c | 6 +++--- tools/hv/hv_set_ifconfig.sh | 2 +- tools/hv/hv_vss_daemon.c | 2 +- 4 files changed, 6 insertions(+), 6 deletions(-) diff --git a/tools/hv/hv_get_dhcp_info.sh b/tools/hv/hv_get_dhcp_info.sh index c38686c44656..2f2a3c7df3de 100755 --- a/tools/hv/hv_get_dhcp_info.sh +++ b/tools/hv/hv_get_dhcp_info.sh @@ -13,7 +13,7 @@ # the script prints the string "Disabled" to stdout. # # Each Distro is expected to implement this script in a distro specific -# fashion. For instance on Distros that ship with Network Manager enabled, +# fashion. For instance, on Distros that ship with Network Manager enabled, # this script can be based on the Network Manager APIs for retrieving DHCP # information. diff --git a/tools/hv/hv_kvp_daemon.c b/tools/hv/hv_kvp_daemon.c index 0ce50c319cfd..f5597503c771 100644 --- a/tools/hv/hv_kvp_daemon.c +++ b/tools/hv/hv_kvp_daemon.c @@ -700,7 +700,7 @@ static void kvp_get_ipconfig_info(char *if_name, /* - * Gather the DNS state. + * Gather the DNS state. * Since there is no standard way to get this information * across various distributions of interest; we just invoke * an external script that needs to be ported across distros @@ -1051,7 +1051,7 @@ static int parse_ip_val_buffer(char *in_buf, int *offset, char *start; /* - * in_buf has sequence of characters that are seperated by + * in_buf has sequence of characters that are separated by * the character ';'. The last sequence does not have the * terminating ";" character. */ @@ -1492,7 +1492,7 @@ int main(int argc, char *argv[]) case KVP_OP_GET_IP_INFO: kvp_ip_val = &hv_msg->body.kvp_ip_val; - error = kvp_mac_to_ip(kvp_ip_val); + error = kvp_mac_to_ip(kvp_ip_val); if (error) hv_msg->error = error; diff --git a/tools/hv/hv_set_ifconfig.sh b/tools/hv/hv_set_ifconfig.sh index 7ed9f85ef908..d10fe35b7f25 100755 --- a/tools/hv/hv_set_ifconfig.sh +++ b/tools/hv/hv_set_ifconfig.sh @@ -12,7 +12,7 @@ # be used to configure the interface. # # Each Distro is expected to implement this script in a distro specific -# fashion. For instance on Distros that ship with Network Manager enabled, +# fashion. For instance, on Distros that ship with Network Manager enabled, # this script can be based on the Network Manager APIs for configuring the # interface. # diff --git a/tools/hv/hv_vss_daemon.c b/tools/hv/hv_vss_daemon.c index c2bb8a360177..b58c4bbc0a26 100644 --- a/tools/hv/hv_vss_daemon.c +++ b/tools/hv/hv_vss_daemon.c @@ -53,7 +53,7 @@ static int vss_do_freeze(char *dir, unsigned int cmd) * If a partition is mounted more than once, only the first * FREEZE/THAW can succeed and the later ones will get * EBUSY/EINVAL respectively: there could be 2 cases: - * 1) a user may mount the same partition to differnt directories + * 1) a user may mount the same partition to different directories * by mistake or on purpose; * 2) The subvolume of btrfs appears to have the same partition * mounted more than once. -- 2.19.1