Found by running codespell on the bpf implementation.

Signed-off-by: Stephen Hemminger <step...@networkplumber.org>
Acked-by: Konstantin Ananyev <konstantin.anan...@intel.com>
---
 lib/bpf/bpf_jit_x86.c  | 2 +-
 lib/bpf/bpf_load_elf.c | 2 +-
 lib/bpf/bpf_pkt.c      | 2 +-
 lib/bpf/bpf_validate.c | 8 ++++----
 4 files changed, 7 insertions(+), 7 deletions(-)

diff --git a/lib/bpf/bpf_jit_x86.c b/lib/bpf/bpf_jit_x86.c
index aa22ea78a01d..518513376a67 100644
--- a/lib/bpf/bpf_jit_x86.c
+++ b/lib/bpf/bpf_jit_x86.c
@@ -1245,7 +1245,7 @@ emit_epilog(struct bpf_jit_state *st)
        uint32_t i;
        int32_t spil, ofs;
 
-       /* if we allready have an epilog generate a jump to it */
+       /* if we already have an epilog generate a jump to it */
        if (st->exit.num++ != 0) {
                emit_abs_jmp(st, st->exit.off);
                return;
diff --git a/lib/bpf/bpf_load_elf.c b/lib/bpf/bpf_load_elf.c
index 2b11adeb5eb1..02a5d8ba0d07 100644
--- a/lib/bpf/bpf_load_elf.c
+++ b/lib/bpf/bpf_load_elf.c
@@ -80,7 +80,7 @@ resolve_xsym(const char *sn, size_t ofs, struct ebpf_insn 
*ins, size_t ins_sz,
        if (type == RTE_BPF_XTYPE_FUNC) {
 
                /* we don't support multiple functions per BPF module,
-                * so treat EBPF_PSEUDO_CALL to extrernal function
+                * so treat EBPF_PSEUDO_CALL to external function
                 * as an ordinary EBPF_CALL.
                 */
                if (ins[idx].src_reg == EBPF_PSEUDO_CALL) {
diff --git a/lib/bpf/bpf_pkt.c b/lib/bpf/bpf_pkt.c
index 08eebd99b371..af422afc072a 100644
--- a/lib/bpf/bpf_pkt.c
+++ b/lib/bpf/bpf_pkt.c
@@ -166,7 +166,7 @@ bpf_eth_cbh_add(struct bpf_eth_cbh *cbh, uint16_t port, 
uint16_t queue)
 }
 
 /*
- * BPF packet processing routinies.
+ * BPF packet processing routines.
  */
 
 static inline uint32_t
diff --git a/lib/bpf/bpf_validate.c b/lib/bpf/bpf_validate.c
index 853279fee557..09331258ebf6 100644
--- a/lib/bpf/bpf_validate.c
+++ b/lib/bpf/bpf_validate.c
@@ -1730,7 +1730,7 @@ static const struct bpf_ins_check ins_chk[UINT8_MAX + 1] 
= {
 
 /*
  * make sure that instruction syntax is valid,
- * and it fields don't violate partciular instrcution type restrictions.
+ * and its fields don't violate particular instruction type restrictions.
  */
 static const char *
 check_syntax(const struct ebpf_insn *ins)
@@ -1961,7 +1961,7 @@ log_loop(const struct bpf_verifier *bvf)
  * First pass goes though all instructions in the set, checks that each
  * instruction is a valid one (correct syntax, valid field values, etc.)
  * and constructs control flow graph (CFG).
- * Then deapth-first search is performed over the constructed graph.
+ * Then depth-first search is performed over the constructed graph.
  * Programs with unreachable instructions and/or loops will be rejected.
  */
 static int
@@ -1988,7 +1988,7 @@ validate(struct bpf_verifier *bvf)
 
                /*
                 * construct CFG, jcc nodes have to outgoing edges,
-                * 'exit' nodes - none, all others nodes have exaclty one
+                * 'exit' nodes - none, all other nodes have exactly one
                 * outgoing edge.
                 */
                switch (ins->code) {
@@ -2258,7 +2258,7 @@ evaluate(struct bpf_verifier *bvf)
                        idx = get_node_idx(bvf, node);
                        op = ins[idx].code;
 
-                       /* for jcc node make a copy of evaluatoion state */
+                       /* for jcc node make a copy of evaluation state */
                        if (node->nb_edge > 1)
                                rc |= save_eval_state(bvf, node);
 
-- 
2.30.2

Reply via email to