Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp5093192rdb; Tue, 12 Dec 2023 20:33:43 -0800 (PST) X-Google-Smtp-Source: AGHT+IGbMC0MioBHSH6w5i+DA07rDvYaNm84Q8O5tAVeMdhoF653Pfw70cI+XLOA55O1OSiKalNY X-Received: by 2002:a05:6808:2f14:b0:3ba:57:1a01 with SMTP id gu20-20020a0568082f1400b003ba00571a01mr9427387oib.113.1702442022863; Tue, 12 Dec 2023 20:33:42 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702442022; cv=none; d=google.com; s=arc-20160816; b=ZsV9WLrptZkYjTCoHHYz6FEZJOSsKYC1fviW7c8BXU3OhycTnBhWRwuFpU/f5RZlzo wrIwp07+7SC5dW4E+nzEEMaPFKZs3NB3g8gkcIFWggmkn0sinOkyeEK5qw8Y9hGH63kV 9r5f0YWwNjaTFG7vthrdUsR/w74GPG73gBf8cIGRL82L2eUjulApTWhBI+41IB/DXKJ5 tYs6y6v8QQ82eWZKHFvnHBwsJbauJ9opJCZYL/A4b4uSn1m2LEa+DKofDjzo/yFgaB73 qsP9h65dcL0Bg4Zw+bLF38JExUZ6dSQkLWOgi/S5muKbuhwTwKkpxeHWeiqAjcyfEPG2 MZ8A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=BOGx4vYrU5GrgTY39jAMH2cXZ04K82JMOmcHOoL9elA=; fh=1D+fDv2pStKe+tsEuZ6GxYheW/9bLH2zq8jrLxKLJjA=; b=J72EWtjShbzAD446wATcBiSu7VY2vXI23eXpqDbs08aNAEfRB57/5sj4yW6cydurID tQc5pJlSe1xXuLid3htqq0NTC3Rifvxsxu891DEsz8Bw7HZinXd9rG0OxSJ/v19YP6nP 1Kj8w2bhrSlh22wkufecDSFNMetu1721fJajGvvc3NyJIdMhQEwp2n2ZMXI/QiDelR8T 4llLgTtJkee7RuacADBm+GM4gMTW0ApYlbejwxuXGDS/J3KAaAxZUnNvsduLIJn7DlXR YCi/lzWhwQrGtIHivbfx3JJMdZn5bKkIxtj0eOGDZA+u3MRc80B1QhLC9TnrneBWLMEA BHMQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@infradead.org header.s=bombadil.20210309 header.b=Tv5JkdxA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from agentk.vger.email (agentk.vger.email. [23.128.96.32]) by mx.google.com with ESMTPS id a22-20020a170902b59600b001d0b24ebfc2si8726701pls.586.2023.12.12.20.33.42 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 Dec 2023 20:33:42 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) client-ip=23.128.96.32; Authentication-Results: mx.google.com; dkim=pass header.i=@infradead.org header.s=bombadil.20210309 header.b=Tv5JkdxA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id 6FF238047565; Tue, 12 Dec 2023 20:33:40 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1378466AbjLMEdM (ORCPT + 99 others); Tue, 12 Dec 2023 23:33:12 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39812 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1378403AbjLMEdL (ORCPT ); Tue, 12 Dec 2023 23:33:11 -0500 Received: from bombadil.infradead.org (bombadil.infradead.org [IPv6:2607:7c80:54:3::133]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1B4C4BE for ; Tue, 12 Dec 2023 20:33:18 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding: MIME-Version:Message-ID:Date:Subject:Cc:To:From:Sender:Reply-To:Content-Type: Content-ID:Content-Description:In-Reply-To:References; bh=BOGx4vYrU5GrgTY39jAMH2cXZ04K82JMOmcHOoL9elA=; b=Tv5JkdxAXPxaQF0MZln313Rqdn S2fg7Vhb2qF/gXtG98YEMriApAvbJoyjnQ6ZvdFK0+oytoqo3Sg9rQyG35CBTuh6ivm440AdPq4P/ 7breRZV3iO6rZduAe0uJo/RgHsRJd55DOkkt0YOdoDCVUwDst1aiDJfcth0/N7XGC/KdLznqHobJh VbeiBHvMSTxTQGAjI0sccxKlw0uJkAhNg7KKu4rt31Bk2uNIGn29qF91OY84wbFDJa0Fdg6ukrU5R Gujy3eDqsSfVp5iCSxEsdpWxN0NhqGwwZAY4dn75ZJkTPSFFhlzDyVx6SlhJfpouwpete6jyEKvlZ tu6CfLnw==; Received: from [50.53.46.231] (helo=bombadil.infradead.org) by bombadil.infradead.org with esmtpsa (Exim 4.96 #2 (Red Hat Linux)) id 1rDGvt-00DaF5-0A; Wed, 13 Dec 2023 04:33:17 +0000 From: Randy Dunlap To: linux-kernel@vger.kernel.org Cc: Randy Dunlap , Andrew Morton , linux-mm@kvack.org Subject: [PATCH] gfp: gfp_types.h: fix typos & punctuation Date: Tue, 12 Dec 2023 20:33:16 -0800 Message-ID: <20231213043316.10128-1-rdunlap@infradead.org> X-Mailer: git-send-email 2.43.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Tue, 12 Dec 2023 20:33:40 -0800 (PST) Correct typos/spellos and punctutation. Signed-off-by: Randy Dunlap Cc: Andrew Morton Cc: linux-mm@kvack.org --- include/linux/gfp_types.h | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff -- a/include/linux/gfp_types.h b/include/linux/gfp_types.h --- a/include/linux/gfp_types.h +++ b/include/linux/gfp_types.h @@ -162,25 +162,25 @@ typedef unsigned int __bitwise gfp_t; * %__GFP_RECLAIM is shorthand to allow/forbid both direct and kswapd reclaim. * * The default allocator behavior depends on the request size. We have a concept - * of so called costly allocations (with order > %PAGE_ALLOC_COSTLY_ORDER). + * of so-called costly allocations (with order > %PAGE_ALLOC_COSTLY_ORDER). * !costly allocations are too essential to fail so they are implicitly * non-failing by default (with some exceptions like OOM victims might fail so * the caller still has to check for failures) while costly requests try to be * not disruptive and back off even without invoking the OOM killer. * The following three modifiers might be used to override some of these - * implicit rules + * implicit rules. * * %__GFP_NORETRY: The VM implementation will try only very lightweight * memory direct reclaim to get some memory under memory pressure (thus * it can sleep). It will avoid disruptive actions like OOM killer. The * caller must handle the failure which is quite likely to happen under * heavy memory pressure. The flag is suitable when failure can easily be - * handled at small cost, such as reduced throughput + * handled at small cost, such as reduced throughput. * * %__GFP_RETRY_MAYFAIL: The VM implementation will retry memory reclaim * procedures that have previously failed if there is some indication - * that progress has been made else where. It can wait for other - * tasks to attempt high level approaches to freeing memory such as + * that progress has been made elsewhere. It can wait for other + * tasks to attempt high-level approaches to freeing memory such as * compaction (which removes fragmentation) and page-out. * There is still a definite limit to the number of retries, but it is * a larger limit than with %__GFP_NORETRY. @@ -230,7 +230,7 @@ typedef unsigned int __bitwise gfp_t; * is being zeroed (either via __GFP_ZERO or via init_on_alloc, provided that * __GFP_SKIP_ZERO is not set). This flag is intended for optimization: setting * memory tags at the same time as zeroing memory has minimal additional - * performace impact. + * performance impact. * * %__GFP_SKIP_KASAN makes KASAN skip unpoisoning on page allocation. * Used for userspace and vmalloc pages; the latter are unpoisoned by