Received: by 2002:a05:6a10:7420:0:0:0:0 with SMTP id hk32csp3585000pxb; Mon, 21 Feb 2022 01:03:38 -0800 (PST) X-Google-Smtp-Source: ABdhPJyVHL8K/07DK+3FuourASRimQe8xBYaMq9SvGsQ4bM0vAZ72TkgKtreu8k4HAo/2qq1Uma9 X-Received: by 2002:a63:ff01:0:b0:34a:d500:c77a with SMTP id k1-20020a63ff01000000b0034ad500c77amr15217517pgi.320.1645434218113; Mon, 21 Feb 2022 01:03:38 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1645434218; cv=none; d=google.com; s=arc-20160816; b=Toidd5nZAcNL/c3oCf8auwzLk6RmcfXFo+bfiMjU12hs8hYkNzAu45wqAVy2LXger2 8vgVI14+HAfp3Gx8AGBFXiqAQWY3LwxOpalHoYeIUN0rsQDzBjlK2tEnJ38gvlBYPbLW NBlep78vY/mAG+DZwZ5fGHWunjpzQ3mmCw4chR3qpV6jW7E9HynHQNj5bnUrYSlL2XFL 5N+TF9RrkSciOVk5ys8L8ByhpyMHli0VkQDcyIHWmaJm8KzBKJPtpsH8WQeOSFaj4VWc y5q5jOeAMpdvYOpqHB97cPZxCfUiVzF7YxmS8ILM15I3jz7ICBkb7giQkD1hO9Un7WGI r3zw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=u9wFN1OhvJJ9qPyhnyKnWvWSIZB4hNTwLidVvqGcOC4=; b=H4Cd2ogXBbO9dOa8TA8b4jL6koyg+/xJUnYgpHteYZ9vk3CDiS+kf8XCI5wlACHTM2 2DXN+/rmeuDmpXPigl1eClPHNSOkM/CbaBSiir44eWL7/Q5qZ47bFqe+hPEVl0eDgqFY p3+2T03zUPJJDvRymVs1ub2N9JfsJOoq3C7TA4B4+76tvzzbi7dNmPxwJEusCMiZ9HNq 37UCiYQpPeVVxKB+aizAMpZtJC6Rh5Ydlq6nUL1rTDzsqdlR8RTIq+bejb3zYt7s6QPP tl9+1zx0vjjixTpRqSN3a0Z9hgjIt8DVtNQl93cSFfirDlH+jR7BsckZuWswn3EbzYAK 7glQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Ml0qqkXp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id z13si9276229pfj.107.2022.02.21.01.03.24; Mon, 21 Feb 2022 01:03:38 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Ml0qqkXp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S244541AbiBTSlf (ORCPT + 99 others); Sun, 20 Feb 2022 13:41:35 -0500 Received: from mxb-00190b01.gslb.pphosted.com ([23.128.96.19]:44830 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S244523AbiBTSlc (ORCPT ); Sun, 20 Feb 2022 13:41:32 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 13C964550B for ; Sun, 20 Feb 2022 10:41:11 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1645382470; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=u9wFN1OhvJJ9qPyhnyKnWvWSIZB4hNTwLidVvqGcOC4=; b=Ml0qqkXpBMRnnRvPXOYqcc+f4ev+8k2OsnfQByU4Hj61VsEWlUSLblywE39qPDeVv59dj6 z9QJwEiWwjOrKAPokk8JiAsDICYe+kkioaoLtlqFRkfXacX0qZbTMdt2ESukMGlsM4+mPi bRvOBrZyONOJIEzbdRvlzCXfRj/3n6Y= Received: from mail-qk1-f198.google.com (mail-qk1-f198.google.com [209.85.222.198]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-554-TZkJXAHCPFeQRioum0Bfjg-1; Sun, 20 Feb 2022 13:41:09 -0500 X-MC-Unique: TZkJXAHCPFeQRioum0Bfjg-1 Received: by mail-qk1-f198.google.com with SMTP id p67-20020a378d46000000b0062adb7627edso7192909qkd.8 for ; Sun, 20 Feb 2022 10:41:08 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=u9wFN1OhvJJ9qPyhnyKnWvWSIZB4hNTwLidVvqGcOC4=; b=ZVmZVkP/VDulG7bXznwK9lZqfsci+ILHQDOySUibxNzebMepgwSzkZkCw6GzcxVOyc K4cLwWBEhjQusZ6tHh+Vih8c1rpve2DpsjWXbT5v8qxm48x2bMg1Cl4ACgEtllItr0Zy LnymRktm05od542nyN1xuBQ8cyfSDLAqarwT4596cO+inThju+PRZeMbkQb18YZOhwA3 W4SgfkDdgtFfNqLFdDEHdwta9YGp91EXPUEgbRe86iP0mHXvwYXnhbYohI9RkHe/rUOk Ziqk0qp+kRHKJsHqwZ/mVjoMuQPfb1pnsmb4g8M2uQ7QnFZQ4HCteSQfjFBE6va16ap/ IPxw== X-Gm-Message-State: AOAM5318GKppZjwHNI7IMMszxZX4tq34ziYyXvmpOvTAkQL6UKyDA5fo oMep3o8sNHk4vzqg2un9dcqOwvtgLCYAed+ceGPds2pBAGVJYGSiW4h3ZVC+b+D0fONT80WxgKs gMoUOo6b2grEvNFzb0U85o0MQ X-Received: by 2002:a05:6214:9c1:b0:42d:b2b8:f760 with SMTP id dp1-20020a05621409c100b0042db2b8f760mr12658525qvb.123.1645382467162; Sun, 20 Feb 2022 10:41:07 -0800 (PST) X-Received: by 2002:a05:6214:9c1:b0:42d:b2b8:f760 with SMTP id dp1-20020a05621409c100b0042db2b8f760mr12658513qvb.123.1645382466857; Sun, 20 Feb 2022 10:41:06 -0800 (PST) Received: from localhost.localdomain.com (024-205-208-113.res.spectrum.com. [24.205.208.113]) by smtp.gmail.com with ESMTPSA id 16sm29631702qty.86.2022.02.20.10.41.04 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 20 Feb 2022 10:41:06 -0800 (PST) From: trix@redhat.com To: ast@kernel.org, daniel@iogearbox.net, andrii@kernel.org, kafai@fb.com, songliubraving@fb.com, yhs@fb.com, john.fastabend@gmail.com, kpsingh@kernel.org Cc: netdev@vger.kernel.org, bpf@vger.kernel.org, linux-kernel@vger.kernel.org, Tom Rix Subject: [PATCH] bpf: cleanup comments Date: Sun, 20 Feb 2022 10:40:55 -0800 Message-Id: <20220220184055.3608317-1-trix@redhat.com> X-Mailer: git-send-email 2.26.3 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Tom Rix Add leading space to spdx tag Use // for spdx c file comment Replacements resereved to reserved inbetween to in between everytime to every time intutivie to intuitive currenct to current encontered to encountered referenceing to referencing upto to up to exectuted to executed Signed-off-by: Tom Rix --- kernel/bpf/bpf_local_storage.c | 2 +- kernel/bpf/btf.c | 6 +++--- kernel/bpf/cgroup.c | 8 ++++---- kernel/bpf/hashtab.c | 2 +- kernel/bpf/helpers.c | 2 +- kernel/bpf/local_storage.c | 2 +- kernel/bpf/reuseport_array.c | 2 +- kernel/bpf/syscall.c | 2 +- kernel/bpf/trampoline.c | 2 +- 9 files changed, 14 insertions(+), 14 deletions(-) diff --git a/kernel/bpf/bpf_local_storage.c b/kernel/bpf/bpf_local_storage.c index 71de2a89869c..092a1ac772d7 100644 --- a/kernel/bpf/bpf_local_storage.c +++ b/kernel/bpf/bpf_local_storage.c @@ -136,7 +136,7 @@ bool bpf_selem_unlink_storage_nolock(struct bpf_local_storage *local_storage, * will be done by the caller. * * Although the unlock will be done under - * rcu_read_lock(), it is more intutivie to + * rcu_read_lock(), it is more intuitive to * read if the freeing of the storage is done * after the raw_spin_unlock_bh(&local_storage->lock). * diff --git a/kernel/bpf/btf.c b/kernel/bpf/btf.c index 02d7014417a0..8b11d1a9bee1 100644 --- a/kernel/bpf/btf.c +++ b/kernel/bpf/btf.c @@ -1,4 +1,4 @@ -/* SPDX-License-Identifier: GPL-2.0 */ +// SPDX-License-Identifier: GPL-2.0 /* Copyright (c) 2018 Facebook */ #include @@ -2547,7 +2547,7 @@ static int btf_ptr_resolve(struct btf_verifier_env *env, * * We now need to continue from the last-resolved-ptr to * ensure the last-resolved-ptr will not referring back to - * the currenct ptr (t). + * the current ptr (t). */ if (btf_type_is_modifier(next_type)) { const struct btf_type *resolved_type; @@ -6148,7 +6148,7 @@ int btf_type_snprintf_show(const struct btf *btf, u32 type_id, void *obj, btf_type_show(btf, type_id, obj, (struct btf_show *)&ssnprintf); - /* If we encontered an error, return it. */ + /* If we encountered an error, return it. */ if (ssnprintf.show.state.status) return ssnprintf.show.state.status; diff --git a/kernel/bpf/cgroup.c b/kernel/bpf/cgroup.c index 098632fdbc45..128028efda64 100644 --- a/kernel/bpf/cgroup.c +++ b/kernel/bpf/cgroup.c @@ -1031,7 +1031,7 @@ int cgroup_bpf_prog_query(const union bpf_attr *attr, * __cgroup_bpf_run_filter_skb() - Run a program for packet filtering * @sk: The socket sending or receiving traffic * @skb: The skb that is being sent or received - * @type: The type of program to be exectuted + * @type: The type of program to be executed * * If no socket is passed, or the socket is not of type INET or INET6, * this function does nothing and returns 0. @@ -1094,7 +1094,7 @@ EXPORT_SYMBOL(__cgroup_bpf_run_filter_skb); /** * __cgroup_bpf_run_filter_sk() - Run a program on a sock * @sk: sock structure to manipulate - * @type: The type of program to be exectuted + * @type: The type of program to be executed * * socket is passed is expected to be of type INET or INET6. * @@ -1119,7 +1119,7 @@ EXPORT_SYMBOL(__cgroup_bpf_run_filter_sk); * provided by user sockaddr * @sk: sock struct that will use sockaddr * @uaddr: sockaddr struct provided by user - * @type: The type of program to be exectuted + * @type: The type of program to be executed * @t_ctx: Pointer to attach type specific context * @flags: Pointer to u32 which contains higher bits of BPF program * return value (OR'ed together). @@ -1166,7 +1166,7 @@ EXPORT_SYMBOL(__cgroup_bpf_run_filter_sock_addr); * @sock_ops: bpf_sock_ops_kern struct to pass to program. Contains * sk with connection information (IP addresses, etc.) May not contain * cgroup info if it is a req sock. - * @type: The type of program to be exectuted + * @type: The type of program to be executed * * socket passed is expected to be of type INET or INET6. * diff --git a/kernel/bpf/hashtab.c b/kernel/bpf/hashtab.c index d29af9988f37..65877967f414 100644 --- a/kernel/bpf/hashtab.c +++ b/kernel/bpf/hashtab.c @@ -1636,7 +1636,7 @@ __htab_map_lookup_and_delete_batch(struct bpf_map *map, value_size = size * num_possible_cpus(); total = 0; /* while experimenting with hash tables with sizes ranging from 10 to - * 1000, it was observed that a bucket can have upto 5 entries. + * 1000, it was observed that a bucket can have up to 5 entries. */ bucket_size = 5; diff --git a/kernel/bpf/helpers.c b/kernel/bpf/helpers.c index 49817755b8c3..ae64110a98b5 100644 --- a/kernel/bpf/helpers.c +++ b/kernel/bpf/helpers.c @@ -1093,7 +1093,7 @@ struct bpf_hrtimer { struct bpf_timer_kern { struct bpf_hrtimer *timer; /* bpf_spin_lock is used here instead of spinlock_t to make - * sure that it always fits into space resereved by struct bpf_timer + * sure that it always fits into space reserved by struct bpf_timer * regardless of LOCKDEP and spinlock debug flags. */ struct bpf_spin_lock lock; diff --git a/kernel/bpf/local_storage.c b/kernel/bpf/local_storage.c index 23f7f9d08a62..497916060ac7 100644 --- a/kernel/bpf/local_storage.c +++ b/kernel/bpf/local_storage.c @@ -1,4 +1,4 @@ -//SPDX-License-Identifier: GPL-2.0 +// SPDX-License-Identifier: GPL-2.0 #include #include #include diff --git a/kernel/bpf/reuseport_array.c b/kernel/bpf/reuseport_array.c index 556a769b5b80..962556917c4d 100644 --- a/kernel/bpf/reuseport_array.c +++ b/kernel/bpf/reuseport_array.c @@ -143,7 +143,7 @@ static void reuseport_array_free(struct bpf_map *map) /* * Once reaching here, all sk->sk_user_data is not - * referenceing this "array". "array" can be freed now. + * referencing this "array". "array" can be freed now. */ bpf_map_area_free(array); } diff --git a/kernel/bpf/syscall.c b/kernel/bpf/syscall.c index 35646db3d950..ce4657a00dae 100644 --- a/kernel/bpf/syscall.c +++ b/kernel/bpf/syscall.c @@ -2562,7 +2562,7 @@ static int bpf_link_alloc_id(struct bpf_link *link) * pre-allocated resources are to be freed with bpf_cleanup() call. All the * transient state is passed around in struct bpf_link_primer. * This is preferred way to create and initialize bpf_link, especially when - * there are complicated and expensive operations inbetween creating bpf_link + * there are complicated and expensive operations in between creating bpf_link * itself and attaching it to BPF hook. By using bpf_link_prime() and * bpf_link_settle() kernel code using bpf_link doesn't have to perform * expensive (and potentially failing) roll back operations in a rare case diff --git a/kernel/bpf/trampoline.c b/kernel/bpf/trampoline.c index 7224691df2ec..0b41fa993825 100644 --- a/kernel/bpf/trampoline.c +++ b/kernel/bpf/trampoline.c @@ -45,7 +45,7 @@ void *bpf_jit_alloc_exec_page(void) set_vm_flush_reset_perms(image); /* Keep image as writeable. The alternative is to keep flipping ro/rw - * everytime new program is attached or detached. + * every time new program is attached or detached. */ set_memory_x((long)image, 1); return image; -- 2.26.3