Found by running codespell on the bpf implementation. Signed-off-by: Stephen Hemminger <step...@networkplumber.org> Acked-by: Konstantin Ananyev <konstantin.anan...@intel.com> --- lib/bpf/bpf_jit_x86.c | 2 +- lib/bpf/bpf_load_elf.c | 2 +- lib/bpf/bpf_pkt.c | 2 +- lib/bpf/bpf_validate.c | 8 ++++---- 4 files changed, 7 insertions(+), 7 deletions(-)
diff --git a/lib/bpf/bpf_jit_x86.c b/lib/bpf/bpf_jit_x86.c index aa22ea78a01d..518513376a67 100644 --- a/lib/bpf/bpf_jit_x86.c +++ b/lib/bpf/bpf_jit_x86.c @@ -1245,7 +1245,7 @@ emit_epilog(struct bpf_jit_state *st) uint32_t i; int32_t spil, ofs; - /* if we allready have an epilog generate a jump to it */ + /* if we already have an epilog generate a jump to it */ if (st->exit.num++ != 0) { emit_abs_jmp(st, st->exit.off); return; diff --git a/lib/bpf/bpf_load_elf.c b/lib/bpf/bpf_load_elf.c index 2b11adeb5eb1..02a5d8ba0d07 100644 --- a/lib/bpf/bpf_load_elf.c +++ b/lib/bpf/bpf_load_elf.c @@ -80,7 +80,7 @@ resolve_xsym(const char *sn, size_t ofs, struct ebpf_insn *ins, size_t ins_sz, if (type == RTE_BPF_XTYPE_FUNC) { /* we don't support multiple functions per BPF module, - * so treat EBPF_PSEUDO_CALL to extrernal function + * so treat EBPF_PSEUDO_CALL to external function * as an ordinary EBPF_CALL. */ if (ins[idx].src_reg == EBPF_PSEUDO_CALL) { diff --git a/lib/bpf/bpf_pkt.c b/lib/bpf/bpf_pkt.c index 08eebd99b371..af422afc072a 100644 --- a/lib/bpf/bpf_pkt.c +++ b/lib/bpf/bpf_pkt.c @@ -166,7 +166,7 @@ bpf_eth_cbh_add(struct bpf_eth_cbh *cbh, uint16_t port, uint16_t queue) } /* - * BPF packet processing routinies. + * BPF packet processing routines. */ static inline uint32_t diff --git a/lib/bpf/bpf_validate.c b/lib/bpf/bpf_validate.c index 853279fee557..09331258ebf6 100644 --- a/lib/bpf/bpf_validate.c +++ b/lib/bpf/bpf_validate.c @@ -1730,7 +1730,7 @@ static const struct bpf_ins_check ins_chk[UINT8_MAX + 1] = { /* * make sure that instruction syntax is valid, - * and it fields don't violate partciular instrcution type restrictions. + * and its fields don't violate particular instruction type restrictions. */ static const char * check_syntax(const struct ebpf_insn *ins) @@ -1961,7 +1961,7 @@ log_loop(const struct bpf_verifier *bvf) * First pass goes though all instructions in the set, checks that each * instruction is a valid one (correct syntax, valid field values, etc.) * and constructs control flow graph (CFG). - * Then deapth-first search is performed over the constructed graph. + * Then depth-first search is performed over the constructed graph. * Programs with unreachable instructions and/or loops will be rejected. */ static int @@ -1988,7 +1988,7 @@ validate(struct bpf_verifier *bvf) /* * construct CFG, jcc nodes have to outgoing edges, - * 'exit' nodes - none, all others nodes have exaclty one + * 'exit' nodes - none, all other nodes have exactly one * outgoing edge. */ switch (ins->code) { @@ -2258,7 +2258,7 @@ evaluate(struct bpf_verifier *bvf) idx = get_node_idx(bvf, node); op = ins[idx].code; - /* for jcc node make a copy of evaluatoion state */ + /* for jcc node make a copy of evaluation state */ if (node->nb_edge > 1) rc |= save_eval_state(bvf, node); -- 2.30.2