From patchwork Mon Sep 13 16:10:13 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Stephen Hemminger X-Patchwork-Id: 98758 X-Patchwork-Delegate: thomas@monjalon.net Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 06E4BA0C45; Mon, 13 Sep 2021 18:11:20 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 64B1841123; Mon, 13 Sep 2021 18:10:39 +0200 (CEST) Received: from mail-pf1-f176.google.com (mail-pf1-f176.google.com [209.85.210.176]) by mails.dpdk.org (Postfix) with ESMTP id 76BB041104 for ; Mon, 13 Sep 2021 18:10:37 +0200 (CEST) Received: by mail-pf1-f176.google.com with SMTP id g14so9325473pfm.1 for ; Mon, 13 Sep 2021 09:10:37 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=networkplumber-org.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=YWnzziaHjpfPA44YSeyMtHjAl3pGkFQ1zd3PspGrYfk=; b=UDIy6ok8a5DGAczGghmAvSFQlGMQzKPoNjELqqD7N58w3mMOffIb2vbw/jBUi3FtyM UVGGIhwS/XyqLOtgLghsawnT+sXdRVBVvQULG6WsbAa/bjV9vwO1CSg1MHhe1nTw84YT 8BlZ2Yea3p4Ofyh8u9zDAmHs/XAS5JndkTpL/9n2Du41GeJ64IsxUcblM9LUNdNlCE9n ljGdNeImF973rrJ9xXWpYxvBSnUHkjXIzu1XNNU5yglHGHICH6CUweVfmu5klKkMWD3t QGsQi3xXkgHV+y0fm6heehPTAk3arDLvxX3weUoUByyTuh+QL5MIxcWcQ1vhwYKmiTRM Fq8A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=YWnzziaHjpfPA44YSeyMtHjAl3pGkFQ1zd3PspGrYfk=; b=uDPKL82JmQRecdj15Z+1zIr6/O0d+Jcvt3qQb2GB+cC31/caARpTvLnjQfRL4yNbbl y5NuECeKwF9uuNL3cvFGtzW5v38gjSvWDH1rnY9+Dq1s9yhxj2eRqkHNaCXeHFzTkeB8 shsJ3MirZGgF139AE1SEYlMwveoMTnAiA3bwN+b9JiGUGQ+D+Z6kGAq3GWPDjawdJwQh W4JS4Zaxv+9/bqvjwilp51T/UpbZEgCXy3pNKyAZ62z2xMAJqOCeyILFbJ+UTO5cWg7p 8Fw4r2LSDRlWazV20RepkRhxV/InO7YPapDeh/o8nzVBzbYZPgeeen51JJnQ/I34Gxzh lrQw== X-Gm-Message-State: AOAM5317dNAM2hs8fHfAj5PYnrTFdm8aasC/tiH50nV+rK5uuUFlCwly jdgso/+SOQXC8Hp/m5usiX2prYtcuYxzLQ== X-Google-Smtp-Source: ABdhPJyBn+JlCzXTt6oAuhNhUdr7ETOhvmL9ygWKTclijGJx5Hhliv9cIUd88sJ9UjwcL9d83SnxYw== X-Received: by 2002:a63:1717:: with SMTP id x23mr11819572pgl.182.1631549436251; Mon, 13 Sep 2021 09:10:36 -0700 (PDT) Received: from hermes.local (204-195-33-123.wavecable.com. [204.195.33.123]) by smtp.gmail.com with ESMTPSA id i5sm7070851pjk.47.2021.09.13.09.10.35 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 13 Sep 2021 09:10:35 -0700 (PDT) From: Stephen Hemminger To: dev@dpdk.org Cc: Stephen Hemminger Date: Mon, 13 Sep 2021 09:10:13 -0700 Message-Id: <20210913161025.10490-7-stephen@networkplumber.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20210913161025.10490-1-stephen@networkplumber.org> References: <20210909175648.174258-1-stephen@networkplumber.org> <20210913161025.10490-1-stephen@networkplumber.org> MIME-Version: 1.0 Subject: [dpdk-dev] [PATCH v2 06/18] bpf: fix spelling in comments X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" Found by running codespell on the bpf implementation. Signed-off-by: Stephen Hemminger Acked-by: Konstantin Ananyev --- lib/bpf/bpf_jit_x86.c | 2 +- lib/bpf/bpf_load_elf.c | 2 +- lib/bpf/bpf_pkt.c | 2 +- lib/bpf/bpf_validate.c | 8 ++++---- 4 files changed, 7 insertions(+), 7 deletions(-) diff --git a/lib/bpf/bpf_jit_x86.c b/lib/bpf/bpf_jit_x86.c index aa22ea78a01d..518513376a67 100644 --- a/lib/bpf/bpf_jit_x86.c +++ b/lib/bpf/bpf_jit_x86.c @@ -1245,7 +1245,7 @@ emit_epilog(struct bpf_jit_state *st) uint32_t i; int32_t spil, ofs; - /* if we allready have an epilog generate a jump to it */ + /* if we already have an epilog generate a jump to it */ if (st->exit.num++ != 0) { emit_abs_jmp(st, st->exit.off); return; diff --git a/lib/bpf/bpf_load_elf.c b/lib/bpf/bpf_load_elf.c index 2b11adeb5eb1..02a5d8ba0d07 100644 --- a/lib/bpf/bpf_load_elf.c +++ b/lib/bpf/bpf_load_elf.c @@ -80,7 +80,7 @@ resolve_xsym(const char *sn, size_t ofs, struct ebpf_insn *ins, size_t ins_sz, if (type == RTE_BPF_XTYPE_FUNC) { /* we don't support multiple functions per BPF module, - * so treat EBPF_PSEUDO_CALL to extrernal function + * so treat EBPF_PSEUDO_CALL to external function * as an ordinary EBPF_CALL. */ if (ins[idx].src_reg == EBPF_PSEUDO_CALL) { diff --git a/lib/bpf/bpf_pkt.c b/lib/bpf/bpf_pkt.c index 6e8248f0d6e4..701e8e2c62a9 100644 --- a/lib/bpf/bpf_pkt.c +++ b/lib/bpf/bpf_pkt.c @@ -169,7 +169,7 @@ bpf_eth_cbh_add(struct bpf_eth_cbh *cbh, uint16_t port, uint16_t queue) } /* - * BPF packet processing routinies. + * BPF packet processing routines. */ static inline uint32_t diff --git a/lib/bpf/bpf_validate.c b/lib/bpf/bpf_validate.c index 7b1291b382e9..eb8016ef196c 100644 --- a/lib/bpf/bpf_validate.c +++ b/lib/bpf/bpf_validate.c @@ -1723,7 +1723,7 @@ static const struct bpf_ins_check ins_chk[UINT8_MAX + 1] = { /* * make sure that instruction syntax is valid, - * and it fields don't violate partciular instrcution type restrictions. + * and its fields don't violate particular instruction type restrictions. */ static const char * check_syntax(const struct ebpf_insn *ins) @@ -1954,7 +1954,7 @@ log_loop(const struct bpf_verifier *bvf) * First pass goes though all instructions in the set, checks that each * instruction is a valid one (correct syntax, valid field values, etc.) * and constructs control flow graph (CFG). - * Then deapth-first search is performed over the constructed graph. + * Then depth-first search is performed over the constructed graph. * Programs with unreachable instructions and/or loops will be rejected. */ static int @@ -1981,7 +1981,7 @@ validate(struct bpf_verifier *bvf) /* * construct CFG, jcc nodes have to outgoing edges, - * 'exit' nodes - none, all others nodes have exaclty one + * 'exit' nodes - none, all other nodes have exactly one * outgoing edge. */ switch (ins->code) { @@ -2251,7 +2251,7 @@ evaluate(struct bpf_verifier *bvf) idx = get_node_idx(bvf, node); op = ins[idx].code; - /* for jcc node make a copy of evaluatoion state */ + /* for jcc node make a copy of evaluation state */ if (node->nb_edge > 1) rc |= save_eval_state(bvf, node);