Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp835332pxj; Fri, 28 May 2021 17:41:08 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwXdrGSSPtdb9uR+wEPRG8uImE1NAmtyZu9h35VcYKvJ7XgW/NU5VEQAxd5GLUll8fH+XL1 X-Received: by 2002:a92:bf10:: with SMTP id z16mr9912875ilh.304.1622248868135; Fri, 28 May 2021 17:41:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1622248868; cv=none; d=google.com; s=arc-20160816; b=ipq1+t5wdwt53dnhRck5UwgvHbUgrLK91lZ4/HC7PGSXvCVTHGRp73/U7unm8zRlST 6v4gkj9qspuJBYhE9NkuoJO5AjOVooPCKWguByXAJRJIYIe3PtYcBhY+aOb5oLHxvV1u iyUudG0xGmsAnaR2VuZqL7NRGiWwzR7mZTEtGWzdKaY58VVHv0vEvJoRp3fXqTiNa/Dn qgzKhfu9x2hcUNrJZFUc2y+QafF9Xm5BB9JrBzBe2AqHdV0StIfBG3+Ks6L4efVIg5S5 D8+feCL9xHWs39ddaaKinjSiUBMcxP9NxY4VGo4Ht9NX7qF6JJ79ZGN6rUT5g592CToM Bigg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=EQI1BUwV8MiJHyXqZ0nT3t2UCpL0npi3LF2jNqY6Brs=; b=VTdruYlMtx2GH5w8m4BBWQ3eMBA7ADgGvWhE1kJxJArLvYc1fpX5dgmnosuc6DcGeS nrWxx7GImPCxnuyvqDD0S2U4B/5aGQkqop1InKj5pXBEdSLs4hTlRMatcQbBjAhp+Ykb OIX9+dH0NyQy8z7/21cc1Df2tskzChtl/OpMD2AtXndA04e7piCDSKLPlD6hfoG400/u xUR7z+xvOHGjDdmGqmBJIqrNQL22hSpUgDPc5BdsxLcuNEeShOA4qt5EjgZvTab2BI2n 34H7yjWq65OgFRiQ6kvMNS8jc2aJ3/RKBKFKsCSIJxrz46ovHyAInEnVUx7/DoNiUjzm sp9Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m20si7589601ioy.69.2021.05.28.17.40.34; Fri, 28 May 2021 17:41:08 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229559AbhE2Aku (ORCPT + 99 others); Fri, 28 May 2021 20:40:50 -0400 Received: from szxga03-in.huawei.com ([45.249.212.189]:2398 "EHLO szxga03-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229541AbhE2Aku (ORCPT ); Fri, 28 May 2021 20:40:50 -0400 Received: from dggemv703-chm.china.huawei.com (unknown [172.30.72.53]) by szxga03-in.huawei.com (SkyGuard) with ESMTP id 4FsMz81Hcfz669l; Sat, 29 May 2021 08:35:32 +0800 (CST) Received: from dggpemm500006.china.huawei.com (7.185.36.236) by dggemv703-chm.china.huawei.com (10.3.19.46) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2176.2; Sat, 29 May 2021 08:39:11 +0800 Received: from [127.0.0.1] (10.174.177.72) by dggpemm500006.china.huawei.com (7.185.36.236) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2176.2; Sat, 29 May 2021 08:39:10 +0800 Subject: Re: [PATCH 1/1] kernel: fix numerous spelling mistakes To: "Eric W. Biederman" CC: Jason Wessel , Daniel Thompson , Douglas Anderson , Balbir Singh , Barry Song , Christoph Hellwig , "Marek Szyprowski" , Robin Murphy , Konrad Rzeszutek Wilk , Thomas Gleixner , Ingo Molnar , Peter Zijlstra , Darren Hart , Davidlohr Bueso , "Naveen N . Rao" , "Anil S Keshavamurthy" , "David S . Miller" , Masami Hiramatsu , Jessica Yu , Steffen Klassert , "Daniel Jordan" , Oleg Nesterov , "John Stultz" , Stephen Boyd , "Luis Chamberlain" , Tejun Heo , Lai Jiangshan , kgdb-bugreport , Kexec Mailing List , linux-crypto , linux-kernel References: <20210526035345.9113-1-thunder.leizhen@huawei.com> <20210526035345.9113-2-thunder.leizhen@huawei.com> From: "Leizhen (ThunderTown)" Message-ID: <8a26b691-53ce-abdc-c0a0-46c0d7b38af5@huawei.com> Date: Sat, 29 May 2021 08:39:08 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.7.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="utf-8" Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [10.174.177.72] X-ClientProxiedBy: dggems704-chm.china.huawei.com (10.3.19.181) To dggpemm500006.china.huawei.com (7.185.36.236) X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On 2021/5/29 7:18, Eric W. Biederman wrote: > Zhen Lei writes: > >> Fix some spelling mistakes in comments: >> suspeneded ==> suspended >> occuring ==> occurring >> wont ==> won't >> detatch ==> detach >> represntation ==> representation >> hexidecimal ==> hexadecimal >> delimeter ==> delimiter >> architecure ==> architecture >> accumalator ==> accumulator >> evertything ==> everything >> contingous ==> contiguous >> useable ==> usable >> musn't ==> mustn't >> alloed ==> allowed >> immmediately ==> immediately >> Allocted ==> Allocated >> noone ==> no one >> unparseable ==> unparsable >> dependend ==> dependent >> callled ==> called >> alreay ==> already >> childs ==> children >> implemention ==> implementation >> situration ==> situation >> overriden ==> overridden >> asynchonous ==> asynchronous >> accumalate ==> accumulate >> syncrhonized ==> synchronized >> therefor ==> therefore >> ther ==> their >> capabilites ==> capabilities >> lentgh ==> length >> watchog ==> watchdog >> assing ==> assign >> Retun ==> Return > > I took a quick read through and everything looks like a good spelling > correction, and on top of that this looks safe as it just comments being > changed? Yes, all changes are in the comments. > > How were you thinking of getting this merged? > > Do we have a misc maintainer? If the individual maintainers need to > merge this than this patch should probably get split as these files > cover lot areas that different people take care of. Okay, I'm thinking of splitting it up. However, this leads to more patches. > > Acked-by: "Eric W. Biederman" > >> >> Signed-off-by: Zhen Lei >> --- >> kernel/acct.c | 2 +- >> kernel/context_tracking.c | 2 +- >> kernel/cpu.c | 2 +- >> kernel/debug/debug_core.c | 2 +- >> kernel/debug/kdb/kdb_main.c | 8 ++++---- >> kernel/debug/kdb/kdb_private.h | 2 +- >> kernel/delayacct.c | 2 +- >> kernel/dma/map_benchmark.c | 2 +- >> kernel/dma/swiotlb.c | 2 +- >> kernel/exit.c | 2 +- >> kernel/hung_task.c | 2 +- >> kernel/kexec_core.c | 2 +- >> kernel/kprobes.c | 2 +- >> kernel/latencytop.c | 2 +- >> kernel/module.c | 4 ++-- >> kernel/notifier.c | 2 +- >> kernel/padata.c | 2 +- >> kernel/panic.c | 2 +- >> kernel/pid.c | 2 +- >> kernel/ptrace.c | 2 +- >> kernel/relay.c | 2 +- >> kernel/signal.c | 4 ++-- >> kernel/smp.c | 2 +- >> kernel/taskstats.c | 2 +- >> kernel/time/alarmtimer.c | 2 +- >> kernel/time/timer.c | 4 ++-- >> kernel/umh.c | 2 +- >> kernel/user_namespace.c | 2 +- >> kernel/usermode_driver.c | 2 +- >> kernel/watchdog.c | 2 +- >> kernel/workqueue.c | 4 ++-- >> 31 files changed, 38 insertions(+), 38 deletions(-) >> >> diff --git a/kernel/acct.c b/kernel/acct.c >> index a64102be2bb0..5ace865b6176 100644 >> --- a/kernel/acct.c >> +++ b/kernel/acct.c >> @@ -26,7 +26,7 @@ >> * XTerms and EMACS are manifestations of pure evil. 21/10/98, AV. >> * >> * Fixed a nasty interaction with sys_umount(). If the accounting >> - * was suspeneded we failed to stop it on umount(). Messy. >> + * was suspended we failed to stop it on umount(). Messy. >> * Another one: remount to readonly didn't stop accounting. >> * Question: what should we do if we have CAP_SYS_ADMIN but not >> * CAP_SYS_PACCT? Current code does the following: umount returns -EBUSY >> diff --git a/kernel/context_tracking.c b/kernel/context_tracking.c >> index 36a98c48aedc..53f525604ce8 100644 >> --- a/kernel/context_tracking.c >> +++ b/kernel/context_tracking.c >> @@ -108,7 +108,7 @@ void context_tracking_enter(enum ctx_state state) >> unsigned long flags; >> >> /* >> - * Some contexts may involve an exception occuring in an irq, >> + * Some contexts may involve an exception occurring in an irq, >> * leading to that nesting: >> * rcu_irq_enter() rcu_user_exit() rcu_user_exit() rcu_irq_exit() >> * This would mess up the dyntick_nesting count though. And rcu_irq_*() >> diff --git a/kernel/cpu.c b/kernel/cpu.c >> index e538518556f4..f6f6613a4c04 100644 >> --- a/kernel/cpu.c >> +++ b/kernel/cpu.c >> @@ -832,7 +832,7 @@ cpuhp_invoke_ap_callback(int cpu, enum cpuhp_state state, bool bringup, >> } >> >> /* >> - * Clean up the leftovers so the next hotplug operation wont use stale >> + * Clean up the leftovers so the next hotplug operation won't use stale >> * data. >> */ >> st->node = st->last = NULL; >> diff --git a/kernel/debug/debug_core.c b/kernel/debug/debug_core.c >> index 4708aec492df..a1f26766eb90 100644 >> --- a/kernel/debug/debug_core.c >> +++ b/kernel/debug/debug_core.c >> @@ -1032,7 +1032,7 @@ dbg_notify_reboot(struct notifier_block *this, unsigned long code, void *x) >> /* >> * Take the following action on reboot notify depending on value: >> * 1 == Enter debugger >> - * 0 == [the default] detatch debug client >> + * 0 == [the default] detach debug client >> * -1 == Do nothing... and use this until the board resets >> */ >> switch (kgdbreboot) { >> diff --git a/kernel/debug/kdb/kdb_main.c b/kernel/debug/kdb/kdb_main.c >> index 622410c45da1..d8ee5647b732 100644 >> --- a/kernel/debug/kdb/kdb_main.c >> +++ b/kernel/debug/kdb/kdb_main.c >> @@ -253,7 +253,7 @@ static char *kdballocenv(size_t bytes) >> * Parameters: >> * match A character string representing a numeric value >> * Outputs: >> - * *value the unsigned long represntation of the env variable 'match' >> + * *value the unsigned long representation of the env variable 'match' >> * Returns: >> * Zero on success, a kdb diagnostic on failure. >> */ >> @@ -356,7 +356,7 @@ static void kdb_printenv(void) >> * Parameters: >> * arg A character string representing a numeric value >> * Outputs: >> - * *value the unsigned long represntation of arg. >> + * *value the unsigned long representation of arg. >> * Returns: >> * Zero on success, a kdb diagnostic on failure. >> */ >> @@ -470,7 +470,7 @@ static int kdb_check_regs(void) >> * symbol name, and offset to the caller. >> * >> * The argument may consist of a numeric value (decimal or >> - * hexidecimal), a symbol name, a register name (preceded by the >> + * hexadecimal), a symbol name, a register name (preceded by the >> * percent sign), an environment variable with a numeric value >> * (preceded by a dollar sign) or a simple arithmetic expression >> * consisting of a symbol name, +/-, and a numeric constant value >> @@ -894,7 +894,7 @@ static void parse_grep(const char *str) >> * Limited to 20 tokens. >> * >> * Real rudimentary tokenization. Basically only whitespace >> - * is considered a token delimeter (but special consideration >> + * is considered a token delimiter (but special consideration >> * is taken of the '=' sign as used by the 'set' command). >> * >> * The algorithm used to tokenize the input string relies on >> diff --git a/kernel/debug/kdb/kdb_private.h b/kernel/debug/kdb/kdb_private.h >> index ccbed9089808..170c69aedebb 100644 >> --- a/kernel/debug/kdb/kdb_private.h >> +++ b/kernel/debug/kdb/kdb_private.h >> @@ -64,7 +64,7 @@ >> >> /* >> * KDB_MAXBPT describes the total number of breakpoints >> - * supported by this architecure. >> + * supported by this architecture. >> */ >> #define KDB_MAXBPT 16 >> >> diff --git a/kernel/delayacct.c b/kernel/delayacct.c >> index 51530d5b15a8..79bb5658f171 100644 >> --- a/kernel/delayacct.c >> +++ b/kernel/delayacct.c >> @@ -74,7 +74,7 @@ void __delayacct_tsk_init(struct task_struct *tsk) >> >> /* >> * Finish delay accounting for a statistic using its timestamps (@start), >> - * accumalator (@total) and @count >> + * accumulator (@total) and @count >> */ >> static void delayacct_end(raw_spinlock_t *lock, u64 *start, u64 *total, u32 *count) >> { >> diff --git a/kernel/dma/map_benchmark.c b/kernel/dma/map_benchmark.c >> index 9b9af1bd6be3..e165d4997bfd 100644 >> --- a/kernel/dma/map_benchmark.c >> +++ b/kernel/dma/map_benchmark.c >> @@ -76,7 +76,7 @@ static int map_benchmark_thread(void *data) >> * for a non-coherent device, if we don't stain them in the >> * cache, this will give an underestimate of the real-world >> * overhead of BIDIRECTIONAL or TO_DEVICE mappings; >> - * 66 means evertything goes well! 66 is lucky. >> + * 66 means everything goes well! 66 is lucky. >> */ >> if (map->dir != DMA_FROM_DEVICE) >> memset(buf, 0x66, size); >> diff --git a/kernel/dma/swiotlb.c b/kernel/dma/swiotlb.c >> index 8ca7d505d61c..58bf3f96d92f 100644 >> --- a/kernel/dma/swiotlb.c >> +++ b/kernel/dma/swiotlb.c >> @@ -66,7 +66,7 @@ enum swiotlb_force swiotlb_force; >> struct io_tlb_mem *io_tlb_default_mem; >> >> /* >> - * Max segment that we can provide which (if pages are contingous) will >> + * Max segment that we can provide which (if pages are contiguous) will >> * not be bounced (unless SWIOTLB_FORCE is set). >> */ >> static unsigned int max_segment; >> diff --git a/kernel/exit.c b/kernel/exit.c >> index fd1c04193e18..b6d7d67cc117 100644 >> --- a/kernel/exit.c >> +++ b/kernel/exit.c >> @@ -789,7 +789,7 @@ void __noreturn do_exit(long code) >> if (group_dead) { >> /* >> * If the last thread of global init has exited, panic >> - * immediately to get a useable coredump. >> + * immediately to get a usable coredump. >> */ >> if (unlikely(is_global_init(tsk))) >> panic("Attempted to kill init! exitcode=0x%08x\n", >> diff --git a/kernel/hung_task.c b/kernel/hung_task.c >> index 396ebaebea3f..04f2538369d3 100644 >> --- a/kernel/hung_task.c >> +++ b/kernel/hung_task.c >> @@ -98,7 +98,7 @@ static void check_hung_task(struct task_struct *t, unsigned long timeout) >> /* >> * When a freshly created task is scheduled once, changes its state to >> * TASK_UNINTERRUPTIBLE without having ever been switched out once, it >> - * musn't be checked. >> + * mustn't be checked. >> */ >> if (unlikely(!switch_count)) >> return; >> diff --git a/kernel/kexec_core.c b/kernel/kexec_core.c >> index f099baee3578..003fa141466b 100644 >> --- a/kernel/kexec_core.c >> +++ b/kernel/kexec_core.c >> @@ -179,7 +179,7 @@ int sanity_check_segment_list(struct kimage *image) >> } >> >> /* Verify our destination addresses do not overlap. >> - * If we alloed overlapping destination addresses >> + * If we allowed overlapping destination addresses >> * through very weird things can happen with no >> * easy explanation as one segment stops on another. >> */ >> diff --git a/kernel/kprobes.c b/kernel/kprobes.c >> index 745f08fdd7a6..b56ba9ecdc65 100644 >> --- a/kernel/kprobes.c >> +++ b/kernel/kprobes.c >> @@ -631,7 +631,7 @@ void wait_for_kprobe_optimizer(void) >> while (!list_empty(&optimizing_list) || !list_empty(&unoptimizing_list)) { >> mutex_unlock(&kprobe_mutex); >> >> - /* this will also make optimizing_work execute immmediately */ >> + /* this will also make optimizing_work execute immediately */ >> flush_delayed_work(&optimizing_work); >> /* @optimizing_work might not have been queued yet, relax */ >> cpu_relax(); >> diff --git a/kernel/latencytop.c b/kernel/latencytop.c >> index 166d7bf49666..61baf936a52d 100644 >> --- a/kernel/latencytop.c >> +++ b/kernel/latencytop.c >> @@ -127,7 +127,7 @@ account_global_scheduler_latency(struct task_struct *tsk, >> if (i >= MAXLR - 1) >> return; >> >> - /* Allocted a new one: */ >> + /* Allocated a new one: */ >> memcpy(&latency_record[i], lat, sizeof(struct latency_record)); >> } >> >> diff --git a/kernel/module.c b/kernel/module.c >> index 1d0e59f95a9a..e99df21490b4 100644 >> --- a/kernel/module.c >> +++ b/kernel/module.c >> @@ -2156,7 +2156,7 @@ static void free_module(struct module *mod) >> >> /* >> * We leave it in list to prevent duplicate loads, but make sure >> - * that noone uses it while it's being deconstructed. >> + * that no one uses it while it's being deconstructed. >> */ >> mutex_lock(&module_mutex); >> mod->state = MODULE_STATE_UNFORMED; >> @@ -2893,7 +2893,7 @@ static int module_sig_check(struct load_info *info, int flags) >> default: >> /* >> * All other errors are fatal, including lack of memory, >> - * unparseable signatures, and signature check failures -- >> + * unparsable signatures, and signature check failures -- >> * even if signatures aren't required. >> */ >> return err; >> diff --git a/kernel/notifier.c b/kernel/notifier.c >> index 1b019cbca594..f4b952e19031 100644 >> --- a/kernel/notifier.c >> +++ b/kernel/notifier.c >> @@ -179,7 +179,7 @@ int atomic_notifier_call_chain_robust(struct atomic_notifier_head *nh, >> int ret; >> >> /* >> - * Musn't use RCU; because then the notifier list can >> + * Mustn't use RCU; because then the notifier list can >> * change between the up and down traversal. >> */ >> spin_lock_irqsave(&nh->lock, flags); >> diff --git a/kernel/padata.c b/kernel/padata.c >> index d4d3ba6e1728..a5dae323566d 100644 >> --- a/kernel/padata.c >> +++ b/kernel/padata.c >> @@ -562,7 +562,7 @@ static void padata_init_reorder_list(struct parallel_data *pd) >> } >> } >> >> -/* Allocate and initialize the internal cpumask dependend resources. */ >> +/* Allocate and initialize the internal cpumask dependent resources. */ >> static struct parallel_data *padata_alloc_pd(struct padata_shell *ps) >> { >> struct padata_instance *pinst = ps->pinst; >> diff --git a/kernel/panic.c b/kernel/panic.c >> index 332736a72a58..598bb0affdb0 100644 >> --- a/kernel/panic.c >> +++ b/kernel/panic.c >> @@ -298,7 +298,7 @@ void panic(const char *fmt, ...) >> * buffer. Try to acquire the lock then release it regardless of the >> * result. The release will also print the buffers out. Locks debug >> * should be disabled to avoid reporting bad unlock balance when >> - * panic() is not being callled from OOPS. >> + * panic() is not being called from OOPS. >> */ >> debug_locks_off(); >> console_flush_on_panic(CONSOLE_FLUSH_PENDING); >> diff --git a/kernel/pid.c b/kernel/pid.c >> index ebdf9c60cd0b..798d41271da2 100644 >> --- a/kernel/pid.c >> +++ b/kernel/pid.c >> @@ -213,7 +213,7 @@ struct pid *alloc_pid(struct pid_namespace *ns, pid_t *set_tid, >> tid + 1, GFP_ATOMIC); >> /* >> * If ENOSPC is returned it means that the PID is >> - * alreay in use. Return EEXIST in that case. >> + * already in use. Return EEXIST in that case. >> */ >> if (nr == -ENOSPC) >> nr = -EEXIST; >> diff --git a/kernel/ptrace.c b/kernel/ptrace.c >> index 2997ca600d18..c51f31c74bf1 100644 >> --- a/kernel/ptrace.c >> +++ b/kernel/ptrace.c >> @@ -505,7 +505,7 @@ static int ptrace_traceme(void) >> } >> >> /* >> - * Called with irqs disabled, returns true if childs should reap themselves. >> + * Called with irqs disabled, returns true if children should reap themselves. >> */ >> static int ignoring_children(struct sighand_struct *sigh) >> { >> diff --git a/kernel/relay.c b/kernel/relay.c >> index d1a67fbb819d..4a5e58be9731 100644 >> --- a/kernel/relay.c >> +++ b/kernel/relay.c >> @@ -840,7 +840,7 @@ static int relay_file_mmap(struct file *filp, struct vm_area_struct *vma) >> * @filp: the file >> * @wait: poll table >> * >> - * Poll implemention. >> + * Poll implementation. >> */ >> static __poll_t relay_file_poll(struct file *filp, poll_table *wait) >> { >> diff --git a/kernel/signal.c b/kernel/signal.c >> index f7c6ffcbd044..da759ef4c3c6 100644 >> --- a/kernel/signal.c >> +++ b/kernel/signal.c >> @@ -1541,7 +1541,7 @@ static inline bool kill_as_cred_perm(const struct cred *cred, >> * There is nothing in the encoding that can allow >> * copy_siginfo_to_user32 to detect this confusion of formats, so >> * handle this by requiring the caller of kill_pid_usb_asyncio to >> - * notice when this situration takes place and to store the 32bit >> + * notice when this situation takes place and to store the 32bit >> * pointer in sival_int, instead of sival_addr of the sigval_t addr >> * parameter. >> */ >> @@ -3348,7 +3348,7 @@ int copy_siginfo_from_user(kernel_siginfo_t *to, const siginfo_t __user *from) >> * >> * Note: This function does not work properly for the SIGCHLD on x32, but >> * fortunately it doesn't have to. The only valid callers for this function are >> - * copy_siginfo_to_user32, which is overriden for x32 and the coredump code. >> + * copy_siginfo_to_user32, which is overridden for x32 and the coredump code. >> * The latter does not care because SIGCHLD will never cause a coredump. >> */ >> void copy_siginfo_to_external32(struct compat_siginfo *to, >> diff --git a/kernel/smp.c b/kernel/smp.c >> index 52bf159ec400..0634bf6f1492 100644 >> --- a/kernel/smp.c >> +++ b/kernel/smp.c >> @@ -769,7 +769,7 @@ EXPORT_SYMBOL(smp_call_function_single); >> * @cpu: The CPU to run on. >> * @csd: Pre-allocated and setup data structure >> * >> - * Like smp_call_function_single(), but the call is asynchonous and >> + * Like smp_call_function_single(), but the call is asynchronous and >> * can thus be done from contexts with disabled interrupts. >> * >> * The caller passes his own pre-allocated data structure >> diff --git a/kernel/taskstats.c b/kernel/taskstats.c >> index 2b4898b4752e..19665a32ad42 100644 >> --- a/kernel/taskstats.c >> +++ b/kernel/taskstats.c >> @@ -261,7 +261,7 @@ static void fill_tgid_exit(struct task_struct *tsk) >> >> /* >> * Each accounting subsystem calls its functions here to >> - * accumalate its per-task stats for tsk, into the per-tgid structure >> + * accumulate its per-task stats for tsk, into the per-tgid structure >> * >> * per-task-foo(tsk->signal->stats, tsk); >> */ >> diff --git a/kernel/time/alarmtimer.c b/kernel/time/alarmtimer.c >> index 5897828b9d7e..a400139b9a9c 100644 >> --- a/kernel/time/alarmtimer.c >> +++ b/kernel/time/alarmtimer.c >> @@ -35,7 +35,7 @@ >> >> /** >> * struct alarm_base - Alarm timer bases >> - * @lock: Lock for syncrhonized access to the base >> + * @lock: Lock for synchronized access to the base >> * @timerqueue: Timerqueue head managing the list of events >> * @get_ktime: Function to read the time correlating to the base >> * @get_timespec: Function to read the namespace time correlating to the base >> diff --git a/kernel/time/timer.c b/kernel/time/timer.c >> index 84332f01dc57..df6585281713 100644 >> --- a/kernel/time/timer.c >> +++ b/kernel/time/timer.c >> @@ -62,7 +62,7 @@ EXPORT_SYMBOL(jiffies_64); >> >> /* >> * The timer wheel has LVL_DEPTH array levels. Each level provides an array of >> - * LVL_SIZE buckets. Each level is driven by its own clock and therefor each >> + * LVL_SIZE buckets. Each level is driven by its own clock and therefore each >> * level has a different granularity. >> * >> * The level granularity is: LVL_CLK_DIV ^ lvl >> @@ -70,7 +70,7 @@ EXPORT_SYMBOL(jiffies_64); >> * >> * The array level of a newly armed timer depends on the relative expiry >> * time. The farther the expiry time is away the higher the array level and >> - * therefor the granularity becomes. >> + * therefore the granularity becomes. >> * >> * Contrary to the original timer wheel implementation, which aims for 'exact' >> * expiry of the timers, this implementation removes the need for recascading >> diff --git a/kernel/umh.c b/kernel/umh.c >> index 36c123360ab8..3c805dbf9fd9 100644 >> --- a/kernel/umh.c >> +++ b/kernel/umh.c >> @@ -74,7 +74,7 @@ static int call_usermodehelper_exec_async(void *data) >> spin_unlock_irq(¤t->sighand->siglock); >> >> /* >> - * Initial kernel threads share ther FS with init, in order to >> + * Initial kernel threads share their FS with init, in order to >> * get the init root directory. But we've now created a new >> * thread that is going to execve a user process and has its own >> * 'struct fs_struct'. Reset umask to the default. >> diff --git a/kernel/user_namespace.c b/kernel/user_namespace.c >> index 8d62863721b0..42131f7f1e94 100644 >> --- a/kernel/user_namespace.c >> +++ b/kernel/user_namespace.c >> @@ -878,7 +878,7 @@ static bool verify_root_map(const struct file *file, >> >> if (map_ns == file_ns) { >> /* The process unshared its ns and is writing to its own >> - * /proc/self/uid_map. User already has full capabilites in >> + * /proc/self/uid_map. User already has full capabilities in >> * the new namespace. Verify that the parent had CAP_SETFCAP >> * when it unshared. >> * */ >> diff --git a/kernel/usermode_driver.c b/kernel/usermode_driver.c >> index bb7bb3b478ab..d26cfb66bb59 100644 >> --- a/kernel/usermode_driver.c >> +++ b/kernel/usermode_driver.c >> @@ -54,7 +54,7 @@ static struct vfsmount *blob_to_mnt(const void *data, size_t len, const char *na >> * umd_load_blob - Remember a blob of bytes for fork_usermode_driver >> * @info: information about usermode driver >> * @data: a blob of bytes that can be executed as a file >> - * @len: The lentgh of the blob >> + * @len: The length of the blob >> * >> */ >> int umd_load_blob(struct umd_info *info, const void *data, size_t len) >> diff --git a/kernel/watchdog.c b/kernel/watchdog.c >> index 92d3bcc5a5e0..41fcb8a6f4e4 100644 >> --- a/kernel/watchdog.c >> +++ b/kernel/watchdog.c >> @@ -377,7 +377,7 @@ static enum hrtimer_restart watchdog_timer_fn(struct hrtimer *hrtimer) >> >> /* >> * Read the current timestamp first. It might become invalid anytime >> - * when a virtual machine is stopped by the host or when the watchog >> + * when a virtual machine is stopped by the host or when the watchdog >> * is touched from NMI. >> */ >> now = get_timestamp(); >> diff --git a/kernel/workqueue.c b/kernel/workqueue.c >> index 50142fc08902..825d461208cc 100644 >> --- a/kernel/workqueue.c >> +++ b/kernel/workqueue.c >> @@ -524,7 +524,7 @@ static inline void debug_work_deactivate(struct work_struct *work) { } >> #endif >> >> /** >> - * worker_pool_assign_id - allocate ID and assing it to @pool >> + * worker_pool_assign_id - allocate ID and assign it to @pool >> * @pool: the pool pointer of interest >> * >> * Returns 0 if ID in [0, WORK_OFFQ_POOL_NONE) is allocated and assigned >> @@ -5325,7 +5325,7 @@ static int workqueue_apply_unbound_cpumask(void) >> * the affinity of all unbound workqueues. This function check the @cpumask >> * and apply it to all unbound workqueues and updates all pwqs of them. >> * >> - * Retun: 0 - Success >> + * Return: 0 - Success >> * -EINVAL - Invalid @cpumask >> * -ENOMEM - Failed to allocate memory for attrs or pwqs. >> */ > > . >