[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20210526175524.aa909f09fd80b2051c2e58e3@kernel.org>
Date: Wed, 26 May 2021 17:55:24 +0900
From: Masami Hiramatsu <mhiramat@...nel.org>
To: Zhen Lei <thunder.leizhen@...wei.com>
Cc: Jason Wessel <jason.wessel@...driver.com>,
Daniel Thompson <daniel.thompson@...aro.org>,
Douglas Anderson <dianders@...omium.org>,
Balbir Singh <bsingharora@...il.com>,
Barry Song <song.bao.hua@...ilicon.com>,
Christoph Hellwig <hch@....de>,
"Marek Szyprowski" <m.szyprowski@...sung.com>,
Robin Murphy <robin.murphy@....com>,
Konrad Rzeszutek Wilk <konrad.wilk@...cle.com>,
Thomas Gleixner <tglx@...utronix.de>,
Ingo Molnar <mingo@...hat.com>,
Peter Zijlstra <peterz@...radead.org>,
Darren Hart <dvhart@...radead.org>,
Davidlohr Bueso <dave@...olabs.net>,
Eric Biederman <ebiederm@...ssion.com>,
"Naveen N . Rao" <naveen.n.rao@...ux.ibm.com>,
Anil S Keshavamurthy <anil.s.keshavamurthy@...el.com>,
"David S . Miller" <davem@...emloft.net>,
Jessica Yu <jeyu@...nel.org>,
"Steffen Klassert" <steffen.klassert@...unet.com>,
Daniel Jordan <daniel.m.jordan@...cle.com>,
Oleg Nesterov <oleg@...hat.com>,
John Stultz <john.stultz@...aro.org>,
Stephen Boyd <sboyd@...nel.org>,
Luis Chamberlain <mcgrof@...nel.org>,
Tejun Heo <tj@...nel.org>,
Lai Jiangshan <jiangshanlai@...il.com>,
kgdb-bugreport <kgdb-bugreport@...ts.sourceforge.net>,
kexec <kexec@...ts.infradead.org>,
linux-crypto <linux-crypto@...r.kernel.org>,
linux-kernel <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH 1/1] kernel: fix numerous spelling mistakes
On Wed, 26 May 2021 11:53:45 +0800
Zhen Lei <thunder.leizhen@...wei.com> wrote:
> Fix some spelling mistakes in comments:
> suspeneded ==> suspended
> occuring ==> occurring
> wont ==> won't
> detatch ==> detach
> represntation ==> representation
> hexidecimal ==> hexadecimal
> delimeter ==> delimiter
> architecure ==> architecture
> accumalator ==> accumulator
> evertything ==> everything
> contingous ==> contiguous
> useable ==> usable
> musn't ==> mustn't
> alloed ==> allowed
> immmediately ==> immediately
> Allocted ==> Allocated
> noone ==> no one
> unparseable ==> unparsable
> dependend ==> dependent
> callled ==> called
> alreay ==> already
> childs ==> children
> implemention ==> implementation
> situration ==> situation
> overriden ==> overridden
> asynchonous ==> asynchronous
> accumalate ==> accumulate
> syncrhonized ==> synchronized
> therefor ==> therefore
> ther ==> their
> capabilites ==> capabilities
> lentgh ==> length
> watchog ==> watchdog
> assing ==> assign
> Retun ==> Return
Looks good to me for kprobes.c.
Reviewed-by: Masami Hiramatsu <mhiramat@...nel.org>
Thanks!
>
> Signed-off-by: Zhen Lei <thunder.leizhen@...wei.com>
> ---
> kernel/acct.c | 2 +-
> kernel/context_tracking.c | 2 +-
> kernel/cpu.c | 2 +-
> kernel/debug/debug_core.c | 2 +-
> kernel/debug/kdb/kdb_main.c | 8 ++++----
> kernel/debug/kdb/kdb_private.h | 2 +-
> kernel/delayacct.c | 2 +-
> kernel/dma/map_benchmark.c | 2 +-
> kernel/dma/swiotlb.c | 2 +-
> kernel/exit.c | 2 +-
> kernel/hung_task.c | 2 +-
> kernel/kexec_core.c | 2 +-
> kernel/kprobes.c | 2 +-
> kernel/latencytop.c | 2 +-
> kernel/module.c | 4 ++--
> kernel/notifier.c | 2 +-
> kernel/padata.c | 2 +-
> kernel/panic.c | 2 +-
> kernel/pid.c | 2 +-
> kernel/ptrace.c | 2 +-
> kernel/relay.c | 2 +-
> kernel/signal.c | 4 ++--
> kernel/smp.c | 2 +-
> kernel/taskstats.c | 2 +-
> kernel/time/alarmtimer.c | 2 +-
> kernel/time/timer.c | 4 ++--
> kernel/umh.c | 2 +-
> kernel/user_namespace.c | 2 +-
> kernel/usermode_driver.c | 2 +-
> kernel/watchdog.c | 2 +-
> kernel/workqueue.c | 4 ++--
> 31 files changed, 38 insertions(+), 38 deletions(-)
>
> diff --git a/kernel/acct.c b/kernel/acct.c
> index a64102be2bb0..5ace865b6176 100644
> --- a/kernel/acct.c
> +++ b/kernel/acct.c
> @@ -26,7 +26,7 @@
> * XTerms and EMACS are manifestations of pure evil. 21/10/98, AV.
> *
> * Fixed a nasty interaction with sys_umount(). If the accounting
> - * was suspeneded we failed to stop it on umount(). Messy.
> + * was suspended we failed to stop it on umount(). Messy.
> * Another one: remount to readonly didn't stop accounting.
> * Question: what should we do if we have CAP_SYS_ADMIN but not
> * CAP_SYS_PACCT? Current code does the following: umount returns -EBUSY
> diff --git a/kernel/context_tracking.c b/kernel/context_tracking.c
> index 36a98c48aedc..53f525604ce8 100644
> --- a/kernel/context_tracking.c
> +++ b/kernel/context_tracking.c
> @@ -108,7 +108,7 @@ void context_tracking_enter(enum ctx_state state)
> unsigned long flags;
>
> /*
> - * Some contexts may involve an exception occuring in an irq,
> + * Some contexts may involve an exception occurring in an irq,
> * leading to that nesting:
> * rcu_irq_enter() rcu_user_exit() rcu_user_exit() rcu_irq_exit()
> * This would mess up the dyntick_nesting count though. And rcu_irq_*()
> diff --git a/kernel/cpu.c b/kernel/cpu.c
> index e538518556f4..f6f6613a4c04 100644
> --- a/kernel/cpu.c
> +++ b/kernel/cpu.c
> @@ -832,7 +832,7 @@ cpuhp_invoke_ap_callback(int cpu, enum cpuhp_state state, bool bringup,
> }
>
> /*
> - * Clean up the leftovers so the next hotplug operation wont use stale
> + * Clean up the leftovers so the next hotplug operation won't use stale
> * data.
> */
> st->node = st->last = NULL;
> diff --git a/kernel/debug/debug_core.c b/kernel/debug/debug_core.c
> index 4708aec492df..a1f26766eb90 100644
> --- a/kernel/debug/debug_core.c
> +++ b/kernel/debug/debug_core.c
> @@ -1032,7 +1032,7 @@ dbg_notify_reboot(struct notifier_block *this, unsigned long code, void *x)
> /*
> * Take the following action on reboot notify depending on value:
> * 1 == Enter debugger
> - * 0 == [the default] detatch debug client
> + * 0 == [the default] detach debug client
> * -1 == Do nothing... and use this until the board resets
> */
> switch (kgdbreboot) {
> diff --git a/kernel/debug/kdb/kdb_main.c b/kernel/debug/kdb/kdb_main.c
> index 622410c45da1..d8ee5647b732 100644
> --- a/kernel/debug/kdb/kdb_main.c
> +++ b/kernel/debug/kdb/kdb_main.c
> @@ -253,7 +253,7 @@ static char *kdballocenv(size_t bytes)
> * Parameters:
> * match A character string representing a numeric value
> * Outputs:
> - * *value the unsigned long represntation of the env variable 'match'
> + * *value the unsigned long representation of the env variable 'match'
> * Returns:
> * Zero on success, a kdb diagnostic on failure.
> */
> @@ -356,7 +356,7 @@ static void kdb_printenv(void)
> * Parameters:
> * arg A character string representing a numeric value
> * Outputs:
> - * *value the unsigned long represntation of arg.
> + * *value the unsigned long representation of arg.
> * Returns:
> * Zero on success, a kdb diagnostic on failure.
> */
> @@ -470,7 +470,7 @@ static int kdb_check_regs(void)
> * symbol name, and offset to the caller.
> *
> * The argument may consist of a numeric value (decimal or
> - * hexidecimal), a symbol name, a register name (preceded by the
> + * hexadecimal), a symbol name, a register name (preceded by the
> * percent sign), an environment variable with a numeric value
> * (preceded by a dollar sign) or a simple arithmetic expression
> * consisting of a symbol name, +/-, and a numeric constant value
> @@ -894,7 +894,7 @@ static void parse_grep(const char *str)
> * Limited to 20 tokens.
> *
> * Real rudimentary tokenization. Basically only whitespace
> - * is considered a token delimeter (but special consideration
> + * is considered a token delimiter (but special consideration
> * is taken of the '=' sign as used by the 'set' command).
> *
> * The algorithm used to tokenize the input string relies on
> diff --git a/kernel/debug/kdb/kdb_private.h b/kernel/debug/kdb/kdb_private.h
> index ccbed9089808..170c69aedebb 100644
> --- a/kernel/debug/kdb/kdb_private.h
> +++ b/kernel/debug/kdb/kdb_private.h
> @@ -64,7 +64,7 @@
>
> /*
> * KDB_MAXBPT describes the total number of breakpoints
> - * supported by this architecure.
> + * supported by this architecture.
> */
> #define KDB_MAXBPT 16
>
> diff --git a/kernel/delayacct.c b/kernel/delayacct.c
> index 51530d5b15a8..79bb5658f171 100644
> --- a/kernel/delayacct.c
> +++ b/kernel/delayacct.c
> @@ -74,7 +74,7 @@ void __delayacct_tsk_init(struct task_struct *tsk)
>
> /*
> * Finish delay accounting for a statistic using its timestamps (@start),
> - * accumalator (@total) and @count
> + * accumulator (@total) and @count
> */
> static void delayacct_end(raw_spinlock_t *lock, u64 *start, u64 *total, u32 *count)
> {
> diff --git a/kernel/dma/map_benchmark.c b/kernel/dma/map_benchmark.c
> index 9b9af1bd6be3..e165d4997bfd 100644
> --- a/kernel/dma/map_benchmark.c
> +++ b/kernel/dma/map_benchmark.c
> @@ -76,7 +76,7 @@ static int map_benchmark_thread(void *data)
> * for a non-coherent device, if we don't stain them in the
> * cache, this will give an underestimate of the real-world
> * overhead of BIDIRECTIONAL or TO_DEVICE mappings;
> - * 66 means evertything goes well! 66 is lucky.
> + * 66 means everything goes well! 66 is lucky.
> */
> if (map->dir != DMA_FROM_DEVICE)
> memset(buf, 0x66, size);
> diff --git a/kernel/dma/swiotlb.c b/kernel/dma/swiotlb.c
> index 8ca7d505d61c..58bf3f96d92f 100644
> --- a/kernel/dma/swiotlb.c
> +++ b/kernel/dma/swiotlb.c
> @@ -66,7 +66,7 @@ enum swiotlb_force swiotlb_force;
> struct io_tlb_mem *io_tlb_default_mem;
>
> /*
> - * Max segment that we can provide which (if pages are contingous) will
> + * Max segment that we can provide which (if pages are contiguous) will
> * not be bounced (unless SWIOTLB_FORCE is set).
> */
> static unsigned int max_segment;
> diff --git a/kernel/exit.c b/kernel/exit.c
> index fd1c04193e18..b6d7d67cc117 100644
> --- a/kernel/exit.c
> +++ b/kernel/exit.c
> @@ -789,7 +789,7 @@ void __noreturn do_exit(long code)
> if (group_dead) {
> /*
> * If the last thread of global init has exited, panic
> - * immediately to get a useable coredump.
> + * immediately to get a usable coredump.
> */
> if (unlikely(is_global_init(tsk)))
> panic("Attempted to kill init! exitcode=0x%08x\n",
> diff --git a/kernel/hung_task.c b/kernel/hung_task.c
> index 396ebaebea3f..04f2538369d3 100644
> --- a/kernel/hung_task.c
> +++ b/kernel/hung_task.c
> @@ -98,7 +98,7 @@ static void check_hung_task(struct task_struct *t, unsigned long timeout)
> /*
> * When a freshly created task is scheduled once, changes its state to
> * TASK_UNINTERRUPTIBLE without having ever been switched out once, it
> - * musn't be checked.
> + * mustn't be checked.
> */
> if (unlikely(!switch_count))
> return;
> diff --git a/kernel/kexec_core.c b/kernel/kexec_core.c
> index f099baee3578..003fa141466b 100644
> --- a/kernel/kexec_core.c
> +++ b/kernel/kexec_core.c
> @@ -179,7 +179,7 @@ int sanity_check_segment_list(struct kimage *image)
> }
>
> /* Verify our destination addresses do not overlap.
> - * If we alloed overlapping destination addresses
> + * If we allowed overlapping destination addresses
> * through very weird things can happen with no
> * easy explanation as one segment stops on another.
> */
> diff --git a/kernel/kprobes.c b/kernel/kprobes.c
> index 745f08fdd7a6..b56ba9ecdc65 100644
> --- a/kernel/kprobes.c
> +++ b/kernel/kprobes.c
> @@ -631,7 +631,7 @@ void wait_for_kprobe_optimizer(void)
> while (!list_empty(&optimizing_list) || !list_empty(&unoptimizing_list)) {
> mutex_unlock(&kprobe_mutex);
>
> - /* this will also make optimizing_work execute immmediately */
> + /* this will also make optimizing_work execute immediately */
> flush_delayed_work(&optimizing_work);
> /* @optimizing_work might not have been queued yet, relax */
> cpu_relax();
> diff --git a/kernel/latencytop.c b/kernel/latencytop.c
> index 166d7bf49666..61baf936a52d 100644
> --- a/kernel/latencytop.c
> +++ b/kernel/latencytop.c
> @@ -127,7 +127,7 @@ account_global_scheduler_latency(struct task_struct *tsk,
> if (i >= MAXLR - 1)
> return;
>
> - /* Allocted a new one: */
> + /* Allocated a new one: */
> memcpy(&latency_record[i], lat, sizeof(struct latency_record));
> }
>
> diff --git a/kernel/module.c b/kernel/module.c
> index 1d0e59f95a9a..e99df21490b4 100644
> --- a/kernel/module.c
> +++ b/kernel/module.c
> @@ -2156,7 +2156,7 @@ static void free_module(struct module *mod)
>
> /*
> * We leave it in list to prevent duplicate loads, but make sure
> - * that noone uses it while it's being deconstructed.
> + * that no one uses it while it's being deconstructed.
> */
> mutex_lock(&module_mutex);
> mod->state = MODULE_STATE_UNFORMED;
> @@ -2893,7 +2893,7 @@ static int module_sig_check(struct load_info *info, int flags)
> default:
> /*
> * All other errors are fatal, including lack of memory,
> - * unparseable signatures, and signature check failures --
> + * unparsable signatures, and signature check failures --
> * even if signatures aren't required.
> */
> return err;
> diff --git a/kernel/notifier.c b/kernel/notifier.c
> index 1b019cbca594..f4b952e19031 100644
> --- a/kernel/notifier.c
> +++ b/kernel/notifier.c
> @@ -179,7 +179,7 @@ int atomic_notifier_call_chain_robust(struct atomic_notifier_head *nh,
> int ret;
>
> /*
> - * Musn't use RCU; because then the notifier list can
> + * Mustn't use RCU; because then the notifier list can
> * change between the up and down traversal.
> */
> spin_lock_irqsave(&nh->lock, flags);
> diff --git a/kernel/padata.c b/kernel/padata.c
> index d4d3ba6e1728..a5dae323566d 100644
> --- a/kernel/padata.c
> +++ b/kernel/padata.c
> @@ -562,7 +562,7 @@ static void padata_init_reorder_list(struct parallel_data *pd)
> }
> }
>
> -/* Allocate and initialize the internal cpumask dependend resources. */
> +/* Allocate and initialize the internal cpumask dependent resources. */
> static struct parallel_data *padata_alloc_pd(struct padata_shell *ps)
> {
> struct padata_instance *pinst = ps->pinst;
> diff --git a/kernel/panic.c b/kernel/panic.c
> index 332736a72a58..598bb0affdb0 100644
> --- a/kernel/panic.c
> +++ b/kernel/panic.c
> @@ -298,7 +298,7 @@ void panic(const char *fmt, ...)
> * buffer. Try to acquire the lock then release it regardless of the
> * result. The release will also print the buffers out. Locks debug
> * should be disabled to avoid reporting bad unlock balance when
> - * panic() is not being callled from OOPS.
> + * panic() is not being called from OOPS.
> */
> debug_locks_off();
> console_flush_on_panic(CONSOLE_FLUSH_PENDING);
> diff --git a/kernel/pid.c b/kernel/pid.c
> index ebdf9c60cd0b..798d41271da2 100644
> --- a/kernel/pid.c
> +++ b/kernel/pid.c
> @@ -213,7 +213,7 @@ struct pid *alloc_pid(struct pid_namespace *ns, pid_t *set_tid,
> tid + 1, GFP_ATOMIC);
> /*
> * If ENOSPC is returned it means that the PID is
> - * alreay in use. Return EEXIST in that case.
> + * already in use. Return EEXIST in that case.
> */
> if (nr == -ENOSPC)
> nr = -EEXIST;
> diff --git a/kernel/ptrace.c b/kernel/ptrace.c
> index 2997ca600d18..c51f31c74bf1 100644
> --- a/kernel/ptrace.c
> +++ b/kernel/ptrace.c
> @@ -505,7 +505,7 @@ static int ptrace_traceme(void)
> }
>
> /*
> - * Called with irqs disabled, returns true if childs should reap themselves.
> + * Called with irqs disabled, returns true if children should reap themselves.
> */
> static int ignoring_children(struct sighand_struct *sigh)
> {
> diff --git a/kernel/relay.c b/kernel/relay.c
> index d1a67fbb819d..4a5e58be9731 100644
> --- a/kernel/relay.c
> +++ b/kernel/relay.c
> @@ -840,7 +840,7 @@ static int relay_file_mmap(struct file *filp, struct vm_area_struct *vma)
> * @filp: the file
> * @wait: poll table
> *
> - * Poll implemention.
> + * Poll implementation.
> */
> static __poll_t relay_file_poll(struct file *filp, poll_table *wait)
> {
> diff --git a/kernel/signal.c b/kernel/signal.c
> index f7c6ffcbd044..da759ef4c3c6 100644
> --- a/kernel/signal.c
> +++ b/kernel/signal.c
> @@ -1541,7 +1541,7 @@ static inline bool kill_as_cred_perm(const struct cred *cred,
> * There is nothing in the encoding that can allow
> * copy_siginfo_to_user32 to detect this confusion of formats, so
> * handle this by requiring the caller of kill_pid_usb_asyncio to
> - * notice when this situration takes place and to store the 32bit
> + * notice when this situation takes place and to store the 32bit
> * pointer in sival_int, instead of sival_addr of the sigval_t addr
> * parameter.
> */
> @@ -3348,7 +3348,7 @@ int copy_siginfo_from_user(kernel_siginfo_t *to, const siginfo_t __user *from)
> *
> * Note: This function does not work properly for the SIGCHLD on x32, but
> * fortunately it doesn't have to. The only valid callers for this function are
> - * copy_siginfo_to_user32, which is overriden for x32 and the coredump code.
> + * copy_siginfo_to_user32, which is overridden for x32 and the coredump code.
> * The latter does not care because SIGCHLD will never cause a coredump.
> */
> void copy_siginfo_to_external32(struct compat_siginfo *to,
> diff --git a/kernel/smp.c b/kernel/smp.c
> index 52bf159ec400..0634bf6f1492 100644
> --- a/kernel/smp.c
> +++ b/kernel/smp.c
> @@ -769,7 +769,7 @@ EXPORT_SYMBOL(smp_call_function_single);
> * @cpu: The CPU to run on.
> * @csd: Pre-allocated and setup data structure
> *
> - * Like smp_call_function_single(), but the call is asynchonous and
> + * Like smp_call_function_single(), but the call is asynchronous and
> * can thus be done from contexts with disabled interrupts.
> *
> * The caller passes his own pre-allocated data structure
> diff --git a/kernel/taskstats.c b/kernel/taskstats.c
> index 2b4898b4752e..19665a32ad42 100644
> --- a/kernel/taskstats.c
> +++ b/kernel/taskstats.c
> @@ -261,7 +261,7 @@ static void fill_tgid_exit(struct task_struct *tsk)
>
> /*
> * Each accounting subsystem calls its functions here to
> - * accumalate its per-task stats for tsk, into the per-tgid structure
> + * accumulate its per-task stats for tsk, into the per-tgid structure
> *
> * per-task-foo(tsk->signal->stats, tsk);
> */
> diff --git a/kernel/time/alarmtimer.c b/kernel/time/alarmtimer.c
> index 5897828b9d7e..a400139b9a9c 100644
> --- a/kernel/time/alarmtimer.c
> +++ b/kernel/time/alarmtimer.c
> @@ -35,7 +35,7 @@
>
> /**
> * struct alarm_base - Alarm timer bases
> - * @lock: Lock for syncrhonized access to the base
> + * @lock: Lock for synchronized access to the base
> * @timerqueue: Timerqueue head managing the list of events
> * @get_ktime: Function to read the time correlating to the base
> * @get_timespec: Function to read the namespace time correlating to the base
> diff --git a/kernel/time/timer.c b/kernel/time/timer.c
> index 84332f01dc57..df6585281713 100644
> --- a/kernel/time/timer.c
> +++ b/kernel/time/timer.c
> @@ -62,7 +62,7 @@ EXPORT_SYMBOL(jiffies_64);
>
> /*
> * The timer wheel has LVL_DEPTH array levels. Each level provides an array of
> - * LVL_SIZE buckets. Each level is driven by its own clock and therefor each
> + * LVL_SIZE buckets. Each level is driven by its own clock and therefore each
> * level has a different granularity.
> *
> * The level granularity is: LVL_CLK_DIV ^ lvl
> @@ -70,7 +70,7 @@ EXPORT_SYMBOL(jiffies_64);
> *
> * The array level of a newly armed timer depends on the relative expiry
> * time. The farther the expiry time is away the higher the array level and
> - * therefor the granularity becomes.
> + * therefore the granularity becomes.
> *
> * Contrary to the original timer wheel implementation, which aims for 'exact'
> * expiry of the timers, this implementation removes the need for recascading
> diff --git a/kernel/umh.c b/kernel/umh.c
> index 36c123360ab8..3c805dbf9fd9 100644
> --- a/kernel/umh.c
> +++ b/kernel/umh.c
> @@ -74,7 +74,7 @@ static int call_usermodehelper_exec_async(void *data)
> spin_unlock_irq(¤t->sighand->siglock);
>
> /*
> - * Initial kernel threads share ther FS with init, in order to
> + * Initial kernel threads share their FS with init, in order to
> * get the init root directory. But we've now created a new
> * thread that is going to execve a user process and has its own
> * 'struct fs_struct'. Reset umask to the default.
> diff --git a/kernel/user_namespace.c b/kernel/user_namespace.c
> index 8d62863721b0..42131f7f1e94 100644
> --- a/kernel/user_namespace.c
> +++ b/kernel/user_namespace.c
> @@ -878,7 +878,7 @@ static bool verify_root_map(const struct file *file,
>
> if (map_ns == file_ns) {
> /* The process unshared its ns and is writing to its own
> - * /proc/self/uid_map. User already has full capabilites in
> + * /proc/self/uid_map. User already has full capabilities in
> * the new namespace. Verify that the parent had CAP_SETFCAP
> * when it unshared.
> * */
> diff --git a/kernel/usermode_driver.c b/kernel/usermode_driver.c
> index bb7bb3b478ab..d26cfb66bb59 100644
> --- a/kernel/usermode_driver.c
> +++ b/kernel/usermode_driver.c
> @@ -54,7 +54,7 @@ static struct vfsmount *blob_to_mnt(const void *data, size_t len, const char *na
> * umd_load_blob - Remember a blob of bytes for fork_usermode_driver
> * @info: information about usermode driver
> * @data: a blob of bytes that can be executed as a file
> - * @len: The lentgh of the blob
> + * @len: The length of the blob
> *
> */
> int umd_load_blob(struct umd_info *info, const void *data, size_t len)
> diff --git a/kernel/watchdog.c b/kernel/watchdog.c
> index 92d3bcc5a5e0..41fcb8a6f4e4 100644
> --- a/kernel/watchdog.c
> +++ b/kernel/watchdog.c
> @@ -377,7 +377,7 @@ static enum hrtimer_restart watchdog_timer_fn(struct hrtimer *hrtimer)
>
> /*
> * Read the current timestamp first. It might become invalid anytime
> - * when a virtual machine is stopped by the host or when the watchog
> + * when a virtual machine is stopped by the host or when the watchdog
> * is touched from NMI.
> */
> now = get_timestamp();
> diff --git a/kernel/workqueue.c b/kernel/workqueue.c
> index 50142fc08902..825d461208cc 100644
> --- a/kernel/workqueue.c
> +++ b/kernel/workqueue.c
> @@ -524,7 +524,7 @@ static inline void debug_work_deactivate(struct work_struct *work) { }
> #endif
>
> /**
> - * worker_pool_assign_id - allocate ID and assing it to @pool
> + * worker_pool_assign_id - allocate ID and assign it to @pool
> * @pool: the pool pointer of interest
> *
> * Returns 0 if ID in [0, WORK_OFFQ_POOL_NONE) is allocated and assigned
> @@ -5325,7 +5325,7 @@ static int workqueue_apply_unbound_cpumask(void)
> * the affinity of all unbound workqueues. This function check the @cpumask
> * and apply it to all unbound workqueues and updates all pwqs of them.
> *
> - * Retun: 0 - Success
> + * Return: 0 - Success
> * -EINVAL - Invalid @cpumask
> * -ENOMEM - Failed to allocate memory for attrs or pwqs.
> */
> --
> 2.25.1
>
>
--
Masami Hiramatsu <mhiramat@...nel.org>
Powered by blists - more mailing lists