From patchwork Mon Jun 7 13:30:36 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Leizhen \(ThunderTown\)" X-Patchwork-Id: 455289 Delivered-To: patch@linaro.org Received: by 2002:a02:735a:0:0:0:0:0 with SMTP id a26csp2752177jae; Mon, 7 Jun 2021 06:31:51 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzhiTYPKsrERvrb8MKD8632V475sYJDlYoc4szuMUx2Z2Hm0NlPnBq0IS+KpRdCVcEuGnOt X-Received: by 2002:aa7:cd83:: with SMTP id x3mr19705918edv.373.1623072711288; Mon, 07 Jun 2021 06:31:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623072711; cv=none; d=google.com; s=arc-20160816; b=WQfb1Qh20VGU3MKr3ORikuKfEUKfiOYaheu4dVjIxyLC4JH2Tdg5pyL9zkLpYhEv3d Pt50u+JZBLPxMS9WCV3SPrCyFSXHtJxAzz4JcspX0BcxtZMraVNmMPM6bHS7BEUuAaeQ HCrGBGgsz1nHLZrqp4pCJjQup91wF2HXvNtaeAeoisYPPAeKoMPW/yzq4zSiZoIBOCOt tc9ehgvy10EGpSVkBKjGGiFfNomo7lItxh6WVV3Mv7zES3z9z2brnrgNDvG5inEv4Tu4 O0ZhSehqxio0LYpOlG2FPYL03wZiWZcm3XWL5cpOIUe2ois2HWg3HEjk8Pkg62yFvW2v CROg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=q9zou71Zr62E01YXL0PQ03EtQaCxMmruIKr4sDj3qIo=; b=k34U5Es02/abEy/FGmmsiyYIcKihV2+7+SExuG2Th4lzymsohYn7Q2GaJhmSO9p/RM WtiyLVET6xIshSDAAMmo5TV5jUNV64GlUOhGlDZHc/dvUSp/tr6U7wfZ+itYB67fjaUj Jx1nqG12jiNn7CMOCTFswbLDcaUUh1+5bftFreOzlWTIBu9XGWQWItSXiOUKbuOZR+H3 /sZ748i/Jvwz5ld5fG3YQezbA2JRBmh8bIeW0fTDwOlXrg3E9cruKbRVMcUZDzTir+JM ok9oXCGMSndJjL8gJpn1DngyGEWUQNFha5Kez5ph/YkXEw6GDViK2UbeB56tIZpYCvXo OnqA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of netdev-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=netdev-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i19si6818777edb.180.2021.06.07.06.31.51; Mon, 07 Jun 2021 06:31:51 -0700 (PDT) Received-SPF: pass (google.com: domain of netdev-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of netdev-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=netdev-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230410AbhFGNcx (ORCPT + 8 others); Mon, 7 Jun 2021 09:32:53 -0400 Received: from szxga08-in.huawei.com ([45.249.212.255]:4341 "EHLO szxga08-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230258AbhFGNcu (ORCPT ); Mon, 7 Jun 2021 09:32:50 -0400 Received: from dggemv703-chm.china.huawei.com (unknown [172.30.72.56]) by szxga08-in.huawei.com (SkyGuard) with ESMTP id 4FzDf55tkzz1BKP0; Mon, 7 Jun 2021 21:26:05 +0800 (CST) Received: from dggpemm500006.china.huawei.com (7.185.36.236) by dggemv703-chm.china.huawei.com (10.3.19.46) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2176.2; Mon, 7 Jun 2021 21:30:55 +0800 Received: from thunder-town.china.huawei.com (10.174.177.72) by dggpemm500006.china.huawei.com (7.185.36.236) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2176.2; Mon, 7 Jun 2021 21:30:54 +0800 From: Zhen Lei To: Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Song Liu , Yonghong Song , John Fastabend , KP Singh , Andrey Ryabinin , Alexander Potapenko , Andrey Konovalov , Dmitry Vyukov , Luis Chamberlain , Petr Mladek , Steven Rostedt , Sergey Senozhatsky , Andy Shevchenko , Rasmus Villemoes , Andrew Morton , netdev , bpf , kasan-dev , linux-kernel CC: Zhen Lei Subject: [PATCH v2 1/1] lib/test: Fix spelling mistakes Date: Mon, 7 Jun 2021 21:30:36 +0800 Message-ID: <20210607133036.12525-2-thunder.leizhen@huawei.com> X-Mailer: git-send-email 2.26.0.windows.1 In-Reply-To: <20210607133036.12525-1-thunder.leizhen@huawei.com> References: <20210607133036.12525-1-thunder.leizhen@huawei.com> MIME-Version: 1.0 X-Originating-IP: [10.174.177.72] X-ClientProxiedBy: dggems703-chm.china.huawei.com (10.3.19.180) To dggpemm500006.china.huawei.com (7.185.36.236) X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org Fix some spelling mistakes in comments found by "codespell": thats ==> that's unitialized ==> uninitialized panicing ==> panicking sucess ==> success possitive ==> positive intepreted ==> interpreted Signed-off-by: Zhen Lei --- lib/test_bitops.c | 2 +- lib/test_bpf.c | 2 +- lib/test_kasan.c | 2 +- lib/test_kmod.c | 6 +++--- lib/test_scanf.c | 2 +- 5 files changed, 7 insertions(+), 7 deletions(-) -- 2.25.1 Acked-by: Yonghong Song diff --git a/lib/test_bitops.c b/lib/test_bitops.c index 471141ddd691..3b7bcbee84db 100644 --- a/lib/test_bitops.c +++ b/lib/test_bitops.c @@ -15,7 +15,7 @@ * get_count_order/long */ -/* use an enum because thats the most common BITMAP usage */ +/* use an enum because that's the most common BITMAP usage */ enum bitops_fun { BITOPS_4 = 4, BITOPS_7 = 7, diff --git a/lib/test_bpf.c b/lib/test_bpf.c index 4dc4dcbecd12..d500320778c7 100644 --- a/lib/test_bpf.c +++ b/lib/test_bpf.c @@ -1095,7 +1095,7 @@ static struct bpf_test tests[] = { { "RET_A", .u.insns = { - /* check that unitialized X and A contain zeros */ + /* check that uninitialized X and A contain zeros */ BPF_STMT(BPF_MISC | BPF_TXA, 0), BPF_STMT(BPF_RET | BPF_A, 0) }, diff --git a/lib/test_kasan.c b/lib/test_kasan.c index cacbbbdef768..72b8e808c39c 100644 --- a/lib/test_kasan.c +++ b/lib/test_kasan.c @@ -656,7 +656,7 @@ static void kasan_global_oob(struct kunit *test) { /* * Deliberate out-of-bounds access. To prevent CONFIG_UBSAN_LOCAL_BOUNDS - * from failing here and panicing the kernel, access the array via a + * from failing here and panicking the kernel, access the array via a * volatile pointer, which will prevent the compiler from being able to * determine the array bounds. * diff --git a/lib/test_kmod.c b/lib/test_kmod.c index 38c250fbace3..ce1589391413 100644 --- a/lib/test_kmod.c +++ b/lib/test_kmod.c @@ -286,7 +286,7 @@ static int tally_work_test(struct kmod_test_device_info *info) * If this ran it means *all* tasks were created fine and we * are now just collecting results. * - * Only propagate errors, do not override with a subsequent sucess case. + * Only propagate errors, do not override with a subsequent success case. */ static void tally_up_work(struct kmod_test_device *test_dev) { @@ -543,7 +543,7 @@ static int trigger_config_run(struct kmod_test_device *test_dev) * wrong with the setup of the test. If the test setup went fine * then userspace must just check the result of config->test_result. * One issue with relying on the return from a call in the kernel - * is if the kernel returns a possitive value using this trigger + * is if the kernel returns a positive value using this trigger * will not return the value to userspace, it would be lost. * * By not relying on capturing the return value of tests we are using @@ -585,7 +585,7 @@ trigger_config_store(struct device *dev, * Note: any return > 0 will be treated as success * and the error value will not be available to userspace. * Do not rely on trying to send to userspace a test value - * return value as possitive return errors will be lost. + * return value as positive return errors will be lost. */ if (WARN_ON(ret > 0)) return -EINVAL; diff --git a/lib/test_scanf.c b/lib/test_scanf.c index 48ff5747a4da..84fe09eaf55e 100644 --- a/lib/test_scanf.c +++ b/lib/test_scanf.c @@ -600,7 +600,7 @@ static void __init numbers_prefix_overflow(void) /* * 0x prefix in a field of width 2 using %i conversion: first field * converts to 0. Next field scan starts at the character after "0x", - * which will convert if can be intepreted as decimal but will fail + * which will convert if can be interpreted as decimal but will fail * if it contains any hex digits (since no 0x prefix). */ test_number_prefix(long long, "0x67", "%2lli%lli", 0, 67, 2, check_ll);