From patchwork Mon Jun 7 03:15:37 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Leizhen \(ThunderTown\)" X-Patchwork-Id: 455265 Delivered-To: patch@linaro.org Received: by 2002:a02:735a:0:0:0:0:0 with SMTP id a26csp2403091jae; Sun, 6 Jun 2021 20:18:41 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwNZT8XIpTE/EeuocURvYi9ZSMnvynQ2fSruJyKIOoawojYIbjqS20r/kaUQtM5CBbdL+tD X-Received: by 2002:aa7:dd57:: with SMTP id o23mr17482847edw.98.1623035921150; Sun, 06 Jun 2021 20:18:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623035921; cv=none; d=google.com; s=arc-20160816; b=eKN8Job6ykyx+vgAred23ZgVewOl/pAEjmYzlJt3ERH/Sl5CWEJoibLp/QSWqPfLld UdFueU4YLyMBD9vPgykvWM4GdBnqHnaVxRZlNRZaM3hbXKoaIqXCjSCMpzL7uwfed0wI VPDvu6vEKbQgtolKV3DtflYuBjgdh4eE+f3hisemPKuVnMtR+xBuvHjleXwMfm+POpCp Tg0wMQoGpOgHApTe18HOSEfGJ/b91Ozh79eN93S9yqqU96zM7cy6e5w/Q4EW8ij2xPlQ m7dAV+Y3/VM4BTRVJBz2Hu/ccwticnXgkTqV2xfLIQNxTDocEpbnVSI4Q8eztC3QbbLQ a2Lg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=4LXBEE/CFrOu8vvJsbV46BTqJap3ifJc62mHrbOTLt0=; b=yQyMXq7G/QfTA7hWiXCkkzwfDX1+Q3iC+bk8k6HT3MDdX5o9v3Y/Ocklt1Dy2cA4Jq b9jgo4Dqcq0PQ1/F8vjXvuYq38CbKrqg+JgXRnQkZQnvqg/U7cZ3jE/l/L/W/mv8wU/7 jY8hU2fdNyc7x77w7sJk9gjOYagSbBNnuXJZzr60U32eJ8n+nkYfg6D1H7BznfFLObBZ mbLs1eYh3DXBaa35a+w6TGWmd1RimlnnRHTSC8/grnFKpjVRyYG+v6FQ24KAduEIlP/+ Ch6hr/e1vMOgsUnjguEneUDesnOL1Kptu1aukrtT+ONZSYBpP6JSeHdRGx7W8OfMj0IL evuA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of netdev-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=netdev-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a15si12400190edr.48.2021.06.06.20.18.40; Sun, 06 Jun 2021 20:18:41 -0700 (PDT) Received-SPF: pass (google.com: domain of netdev-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of netdev-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=netdev-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230203AbhFGDUS (ORCPT + 8 others); Sun, 6 Jun 2021 23:20:18 -0400 Received: from szxga01-in.huawei.com ([45.249.212.187]:7122 "EHLO szxga01-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230127AbhFGDUQ (ORCPT ); Sun, 6 Jun 2021 23:20:16 -0400 Received: from dggemv704-chm.china.huawei.com (unknown [172.30.72.53]) by szxga01-in.huawei.com (SkyGuard) with ESMTP id 4Fyz5g1QY7zYrcy; Mon, 7 Jun 2021 11:15:35 +0800 (CST) Received: from dggpemm500006.china.huawei.com (7.185.36.236) by dggemv704-chm.china.huawei.com (10.3.19.47) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2176.2; Mon, 7 Jun 2021 11:18:23 +0800 Received: from thunder-town.china.huawei.com (10.174.177.72) by dggpemm500006.china.huawei.com (7.185.36.236) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2176.2; Mon, 7 Jun 2021 11:18:22 +0800 From: Zhen Lei To: Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Song Liu , Yonghong Song , John Fastabend , KP Singh , Andrey Ryabinin , Alexander Potapenko , Andrey Konovalov , Dmitry Vyukov , Luis Chamberlain , Petr Mladek , Steven Rostedt , Sergey Senozhatsky , Andy Shevchenko , Rasmus Villemoes , Andrew Morton , netdev , bpf , kasan-dev , linux-kernel CC: Zhen Lei Subject: [PATCH 1/1] lib/test: Fix spelling mistakes Date: Mon, 7 Jun 2021 11:15:37 +0800 Message-ID: <20210607031537.12366-1-thunder.leizhen@huawei.com> X-Mailer: git-send-email 2.26.0.windows.1 MIME-Version: 1.0 X-Originating-IP: [10.174.177.72] X-ClientProxiedBy: dggems704-chm.china.huawei.com (10.3.19.181) To dggpemm500006.china.huawei.com (7.185.36.236) X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org Fix some spelling mistakes in comments: thats ==> that's unitialized ==> uninitialized panicing ==> panicking sucess ==> success possitive ==> positive intepreted ==> interpreted Signed-off-by: Zhen Lei --- lib/test_bitops.c | 2 +- lib/test_bpf.c | 2 +- lib/test_kasan.c | 2 +- lib/test_kmod.c | 6 +++--- lib/test_scanf.c | 2 +- 5 files changed, 7 insertions(+), 7 deletions(-) -- 2.25.1 Acked-by: Andrey Konovalov diff --git a/lib/test_bitops.c b/lib/test_bitops.c index 471141ddd691..3b7bcbee84db 100644 --- a/lib/test_bitops.c +++ b/lib/test_bitops.c @@ -15,7 +15,7 @@ * get_count_order/long */ -/* use an enum because thats the most common BITMAP usage */ +/* use an enum because that's the most common BITMAP usage */ enum bitops_fun { BITOPS_4 = 4, BITOPS_7 = 7, diff --git a/lib/test_bpf.c b/lib/test_bpf.c index 4dc4dcbecd12..d500320778c7 100644 --- a/lib/test_bpf.c +++ b/lib/test_bpf.c @@ -1095,7 +1095,7 @@ static struct bpf_test tests[] = { { "RET_A", .u.insns = { - /* check that unitialized X and A contain zeros */ + /* check that uninitialized X and A contain zeros */ BPF_STMT(BPF_MISC | BPF_TXA, 0), BPF_STMT(BPF_RET | BPF_A, 0) }, diff --git a/lib/test_kasan.c b/lib/test_kasan.c index cacbbbdef768..72b8e808c39c 100644 --- a/lib/test_kasan.c +++ b/lib/test_kasan.c @@ -656,7 +656,7 @@ static void kasan_global_oob(struct kunit *test) { /* * Deliberate out-of-bounds access. To prevent CONFIG_UBSAN_LOCAL_BOUNDS - * from failing here and panicing the kernel, access the array via a + * from failing here and panicking the kernel, access the array via a * volatile pointer, which will prevent the compiler from being able to * determine the array bounds. * diff --git a/lib/test_kmod.c b/lib/test_kmod.c index 38c250fbace3..ce1589391413 100644 --- a/lib/test_kmod.c +++ b/lib/test_kmod.c @@ -286,7 +286,7 @@ static int tally_work_test(struct kmod_test_device_info *info) * If this ran it means *all* tasks were created fine and we * are now just collecting results. * - * Only propagate errors, do not override with a subsequent sucess case. + * Only propagate errors, do not override with a subsequent success case. */ static void tally_up_work(struct kmod_test_device *test_dev) { @@ -543,7 +543,7 @@ static int trigger_config_run(struct kmod_test_device *test_dev) * wrong with the setup of the test. If the test setup went fine * then userspace must just check the result of config->test_result. * One issue with relying on the return from a call in the kernel - * is if the kernel returns a possitive value using this trigger + * is if the kernel returns a positive value using this trigger * will not return the value to userspace, it would be lost. * * By not relying on capturing the return value of tests we are using @@ -585,7 +585,7 @@ trigger_config_store(struct device *dev, * Note: any return > 0 will be treated as success * and the error value will not be available to userspace. * Do not rely on trying to send to userspace a test value - * return value as possitive return errors will be lost. + * return value as positive return errors will be lost. */ if (WARN_ON(ret > 0)) return -EINVAL; diff --git a/lib/test_scanf.c b/lib/test_scanf.c index 48ff5747a4da..84fe09eaf55e 100644 --- a/lib/test_scanf.c +++ b/lib/test_scanf.c @@ -600,7 +600,7 @@ static void __init numbers_prefix_overflow(void) /* * 0x prefix in a field of width 2 using %i conversion: first field * converts to 0. Next field scan starts at the character after "0x", - * which will convert if can be intepreted as decimal but will fail + * which will convert if can be interpreted as decimal but will fail * if it contains any hex digits (since no 0x prefix). */ test_number_prefix(long long, "0x67", "%2lli%lli", 0, 67, 2, check_ll);