Commit 8e3bff96afa67369008153f3326fa5ce985cabab

Authored by stephen hemminger
Committed by David S. Miller
1 parent 22a9321614

net: more spelling fixes

Various spelling fixes in networking stack

Signed-off-by: Stephen Hemminger <stephen@networkplumber.org>
Signed-off-by: David S. Miller <davem@davemloft.net>

Showing 5 changed files with 11 additions and 11 deletions Side-by-side Diff

net/bridge/br_netlink.c
... ... @@ -373,7 +373,7 @@
373 373  
374 374 p = br_port_get_rtnl(dev);
375 375 /* We want to accept dev as bridge itself if the AF_SPEC
376   - * is set to see if someone is setting vlan info on the brigde
  376 + * is set to see if someone is setting vlan info on the bridge
377 377 */
378 378 if (!p && !afspec)
379 379 return -EINVAL;
... ... @@ -389,7 +389,7 @@
389 389 err = br_setport(p, tb);
390 390 spin_unlock_bh(&p->br->lock);
391 391 } else {
392   - /* Binary compatability with old RSTP */
  392 + /* Binary compatibility with old RSTP */
393 393 if (nla_len(protinfo) < sizeof(u8))
394 394 return -EINVAL;
395 395  
net/core/net-sysfs.c
... ... @@ -676,8 +676,8 @@
676 676 while ((mask | (mask >> 1)) != mask)
677 677 mask |= (mask >> 1);
678 678 /* On 64 bit arches, must check mask fits in table->mask (u32),
679   - * and on 32bit arches, must check RPS_DEV_FLOW_TABLE_SIZE(mask + 1)
680   - * doesnt overflow.
  679 + * and on 32bit arches, must check
  680 + * RPS_DEV_FLOW_TABLE_SIZE(mask + 1) doesn't overflow.
681 681 */
682 682 #if BITS_PER_LONG > 32
683 683 if (mask > (unsigned long)(u32)mask)
net/core/netprio_cgroup.c
... ... @@ -30,7 +30,7 @@
30 30 #define PRIOMAP_MIN_SZ 128
31 31  
32 32 /*
33   - * Extend @dev->priomap so that it's large enough to accomodate
  33 + * Extend @dev->priomap so that it's large enough to accommodate
34 34 * @target_idx. @dev->priomap.priomap_len > @target_idx after successful
35 35 * return. Must be called under rtnl lock.
36 36 */
net/ipv4/ip_sockglue.c
... ... @@ -1051,7 +1051,7 @@
1051 1051 *
1052 1052 * To support IP_CMSG_PKTINFO option, we store rt_iif and specific
1053 1053 * destination in skb->cb[] before dst drop.
1054   - * This way, receiver doesnt make cache line misses to read rtable.
  1054 + * This way, receiver doesn't make cache line misses to read rtable.
1055 1055 */
1056 1056 void ipv4_pktinfo_prepare(const struct sock *sk, struct sk_buff *skb)
1057 1057 {
net/ipv4/tcp_output.c
... ... @@ -408,7 +408,7 @@
408 408 * Beware: Something in the Internet is very sensitive to the ordering of
409 409 * TCP options, we learned this through the hard way, so be careful here.
410 410 * Luckily we can at least blame others for their non-compliance but from
411   - * inter-operatibility perspective it seems that we're somewhat stuck with
  411 + * inter-operability perspective it seems that we're somewhat stuck with
412 412 * the ordering which we have been using if we want to keep working with
413 413 * those broken things (not that it currently hurts anybody as there isn't
414 414 * particular reason why the ordering would need to be changed).
... ... @@ -681,7 +681,7 @@
681 681 *
682 682 * Its important tcp_wfree() can be replaced by sock_wfree() in the event skb
683 683 * needs to be reallocated in a driver.
684   - * The invariant being skb->truesize substracted from sk->sk_wmem_alloc
  684 + * The invariant being skb->truesize subtracted from sk->sk_wmem_alloc
685 685 *
686 686 * Since transmit from skb destructor is forbidden, we use a tasklet
687 687 * to process all sockets that eventually need to send more skbs.
688 688  
... ... @@ -701,9 +701,9 @@
701 701 tcp_write_xmit(sk, tcp_current_mss(sk), 0, 0, GFP_ATOMIC);
702 702 }
703 703 /*
704   - * One tasklest per cpu tries to send more skbs.
  704 + * One tasklet per cpu tries to send more skbs.
705 705 * We run in tasklet context but need to disable irqs when
706   - * transfering tsq->head because tcp_wfree() might
  706 + * transferring tsq->head because tcp_wfree() might
707 707 * interrupt us (non NAPI drivers)
708 708 */
709 709 static void tcp_tasklet_func(unsigned long data)
... ... @@ -797,7 +797,7 @@
797 797  
798 798 /*
799 799 * Write buffer destructor automatically called from kfree_skb.
800   - * We cant xmit new skbs from this context, as we might already
  800 + * We can't xmit new skbs from this context, as we might already
801 801 * hold qdisc lock.
802 802 */
803 803 void tcp_wfree(struct sk_buff *skb)