[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <gqrtcqx6yggzox5ze3eodz6vgzdatjyiuadigptvguamon4p2b@znmbdpruwqil>
Date: Mon, 29 Sep 2025 10:42:55 -0400
From: "Liam R. Howlett" <Liam.Howlett@...cle.com>
To: "jianyun.gao" <jianyungao89@...il.com>
Cc: linux-mm@...ck.org, SeongJae Park <sj@...nel.org>,
Andrew Morton <akpm@...ux-foundation.org>,
David Hildenbrand <david@...hat.com>, Jason Gunthorpe <jgg@...pe.ca>,
John Hubbard <jhubbard@...dia.com>, Peter Xu <peterx@...hat.com>,
Alexander Potapenko <glider@...gle.com>,
Marco Elver <elver@...gle.com>, Dmitry Vyukov <dvyukov@...gle.com>,
Xu Xin <xu.xin16@....com.cn>,
Chengming Zhou <chengming.zhou@...ux.dev>,
Lorenzo Stoakes <lorenzo.stoakes@...cle.com>,
Vlastimil Babka <vbabka@...e.cz>, Mike Rapoport <rppt@...nel.org>,
Suren Baghdasaryan <surenb@...gle.com>, Michal Hocko <mhocko@...e.com>,
Christoph Lameter <cl@...two.org>,
David Rientjes <rientjes@...gle.com>,
Roman Gushchin <roman.gushchin@...ux.dev>,
Harry Yoo <harry.yoo@...cle.com>,
Kemeng Shi <shikemeng@...weicloud.com>,
Kairui Song <kasong@...cent.com>, Nhat Pham <nphamcs@...il.com>,
Baoquan He <bhe@...hat.com>, Barry Song <baohua@...nel.org>,
Chris Li <chrisl@...nel.org>, Jann Horn <jannh@...gle.com>,
Pedro Falcato <pfalcato@...e.de>,
"open list:DATA ACCESS MONITOR" <damon@...ts.linux.dev>,
open list <linux-kernel@...r.kernel.org>,
"open list:KMSAN" <kasan-dev@...glegroups.com>
Subject: Re: [PATCH] mm: Fix some typos in mm module
* jianyun.gao <jianyungao89@...il.com> [250927 04:08]:
> Below are some typos in the code comments:
>
> intevals ==> intervals
> addesses ==> addresses
> unavaliable ==> unavailable
> facor ==> factor
> droping ==> dropping
> exlusive ==> exclusive
> decription ==> description
> confict ==> conflict
> desriptions ==> descriptions
> otherwize ==> otherwise
> vlaue ==> value
> cheching ==> checking
> exisitng ==> existing
> modifed ==> modified
>
> Just fix it.
>
> Signed-off-by: jianyun.gao <jianyungao89@...il.com>
Reviewed-by: Liam R. Howlett <Liam.Howlett@...cle.com>
> ---
> mm/damon/sysfs.c | 2 +-
> mm/gup.c | 2 +-
> mm/kmsan/core.c | 2 +-
> mm/ksm.c | 2 +-
> mm/memory-tiers.c | 2 +-
> mm/memory.c | 4 ++--
> mm/secretmem.c | 2 +-
> mm/slab_common.c | 2 +-
> mm/slub.c | 2 +-
> mm/swapfile.c | 2 +-
> mm/userfaultfd.c | 2 +-
> mm/vma.c | 4 ++--
> 12 files changed, 14 insertions(+), 14 deletions(-)
>
> diff --git a/mm/damon/sysfs.c b/mm/damon/sysfs.c
> index c96c2154128f..25ff8bd17e9c 100644
> --- a/mm/damon/sysfs.c
> +++ b/mm/damon/sysfs.c
> @@ -1232,7 +1232,7 @@ enum damon_sysfs_cmd {
> DAMON_SYSFS_CMD_UPDATE_SCHEMES_EFFECTIVE_QUOTAS,
> /*
> * @DAMON_SYSFS_CMD_UPDATE_TUNED_INTERVALS: Update the tuned monitoring
> - * intevals.
> + * intervals.
> */
> DAMON_SYSFS_CMD_UPDATE_TUNED_INTERVALS,
> /*
> diff --git a/mm/gup.c b/mm/gup.c
> index 0bc4d140fc07..6ed50811da8f 100644
> --- a/mm/gup.c
> +++ b/mm/gup.c
> @@ -2730,7 +2730,7 @@ EXPORT_SYMBOL(get_user_pages_unlocked);
> *
> * *) ptes can be read atomically by the architecture.
> *
> - * *) valid user addesses are below TASK_MAX_SIZE
> + * *) valid user addresses are below TASK_MAX_SIZE
> *
> * The last two assumptions can be relaxed by the addition of helper functions.
> *
> diff --git a/mm/kmsan/core.c b/mm/kmsan/core.c
> index 1ea711786c52..1bb0e741936b 100644
> --- a/mm/kmsan/core.c
> +++ b/mm/kmsan/core.c
> @@ -33,7 +33,7 @@ bool kmsan_enabled __read_mostly;
>
> /*
> * Per-CPU KMSAN context to be used in interrupts, where current->kmsan is
> - * unavaliable.
> + * unavailable.
> */
> DEFINE_PER_CPU(struct kmsan_ctx, kmsan_percpu_ctx);
>
> diff --git a/mm/ksm.c b/mm/ksm.c
> index 160787bb121c..edd6484577d7 100644
> --- a/mm/ksm.c
> +++ b/mm/ksm.c
> @@ -389,7 +389,7 @@ static unsigned long ewma(unsigned long prev, unsigned long curr)
> * exponentially weighted moving average. The new pages_to_scan value is
> * multiplied with that change factor:
> *
> - * new_pages_to_scan *= change facor
> + * new_pages_to_scan *= change factor
> *
> * The new_pages_to_scan value is limited by the cpu min and max values. It
> * calculates the cpu percent for the last scan and calculates the new
> diff --git a/mm/memory-tiers.c b/mm/memory-tiers.c
> index 0382b6942b8b..f97aa5497040 100644
> --- a/mm/memory-tiers.c
> +++ b/mm/memory-tiers.c
> @@ -519,7 +519,7 @@ static inline void __init_node_memory_type(int node, struct memory_dev_type *mem
> * for each device getting added in the same NUMA node
> * with this specific memtype, bump the map count. We
> * Only take memtype device reference once, so that
> - * changing a node memtype can be done by droping the
> + * changing a node memtype can be done by dropping the
> * only reference count taken here.
> */
>
> diff --git a/mm/memory.c b/mm/memory.c
> index 0ba4f6b71847..d6b0318df951 100644
> --- a/mm/memory.c
> +++ b/mm/memory.c
> @@ -4200,7 +4200,7 @@ static inline bool should_try_to_free_swap(struct folio *folio,
> * If we want to map a page that's in the swapcache writable, we
> * have to detect via the refcount if we're really the exclusive
> * user. Try freeing the swapcache to get rid of the swapcache
> - * reference only in case it's likely that we'll be the exlusive user.
> + * reference only in case it's likely that we'll be the exclusive user.
> */
> return (fault_flags & FAULT_FLAG_WRITE) && !folio_test_ksm(folio) &&
> folio_ref_count(folio) == (1 + folio_nr_pages(folio));
> @@ -5274,7 +5274,7 @@ vm_fault_t do_set_pmd(struct vm_fault *vmf, struct folio *folio, struct page *pa
>
> /**
> * set_pte_range - Set a range of PTEs to point to pages in a folio.
> - * @vmf: Fault decription.
> + * @vmf: Fault description.
> * @folio: The folio that contains @page.
> * @page: The first page to create a PTE for.
> * @nr: The number of PTEs to create.
> diff --git a/mm/secretmem.c b/mm/secretmem.c
> index 60137305bc20..a350ca20ca56 100644
> --- a/mm/secretmem.c
> +++ b/mm/secretmem.c
> @@ -227,7 +227,7 @@ SYSCALL_DEFINE1(memfd_secret, unsigned int, flags)
> struct file *file;
> int fd, err;
>
> - /* make sure local flags do not confict with global fcntl.h */
> + /* make sure local flags do not conflict with global fcntl.h */
> BUILD_BUG_ON(SECRETMEM_FLAGS_MASK & O_CLOEXEC);
>
> if (!secretmem_enable || !can_set_direct_map())
> diff --git a/mm/slab_common.c b/mm/slab_common.c
> index bfe7c40eeee1..9ab116156444 100644
> --- a/mm/slab_common.c
> +++ b/mm/slab_common.c
> @@ -256,7 +256,7 @@ static struct kmem_cache *create_cache(const char *name,
> * @object_size: The size of objects to be created in this cache.
> * @args: Additional arguments for the cache creation (see
> * &struct kmem_cache_args).
> - * @flags: See the desriptions of individual flags. The common ones are listed
> + * @flags: See the descriptions of individual flags. The common ones are listed
> * in the description below.
> *
> * Not to be called directly, use the kmem_cache_create() wrapper with the same
> diff --git a/mm/slub.c b/mm/slub.c
> index d257141896c9..5f2622c370cc 100644
> --- a/mm/slub.c
> +++ b/mm/slub.c
> @@ -2412,7 +2412,7 @@ bool slab_free_hook(struct kmem_cache *s, void *x, bool init,
> memset((char *)kasan_reset_tag(x) + inuse, 0,
> s->size - inuse - rsize);
> /*
> - * Restore orig_size, otherwize kmalloc redzone overwritten
> + * Restore orig_size, otherwise kmalloc redzone overwritten
> * would be reported
> */
> set_orig_size(s, x, orig_size);
> diff --git a/mm/swapfile.c b/mm/swapfile.c
> index b4f3cc712580..b55f10ec1f3f 100644
> --- a/mm/swapfile.c
> +++ b/mm/swapfile.c
> @@ -1545,7 +1545,7 @@ static bool swap_entries_put_map_nr(struct swap_info_struct *si,
>
> /*
> * Check if it's the last ref of swap entry in the freeing path.
> - * Qualified vlaue includes 1, SWAP_HAS_CACHE or SWAP_MAP_SHMEM.
> + * Qualified value includes 1, SWAP_HAS_CACHE or SWAP_MAP_SHMEM.
> */
> static inline bool __maybe_unused swap_is_last_ref(unsigned char count)
> {
> diff --git a/mm/userfaultfd.c b/mm/userfaultfd.c
> index aefdf3a812a1..333f4b8bc810 100644
> --- a/mm/userfaultfd.c
> +++ b/mm/userfaultfd.c
> @@ -1508,7 +1508,7 @@ static int validate_move_areas(struct userfaultfd_ctx *ctx,
>
> /*
> * For now, we keep it simple and only move between writable VMAs.
> - * Access flags are equal, therefore cheching only the source is enough.
> + * Access flags are equal, therefore checking only the source is enough.
> */
> if (!(src_vma->vm_flags & VM_WRITE))
> return -EINVAL;
> diff --git a/mm/vma.c b/mm/vma.c
> index 3b12c7579831..2e127fa97475 100644
> --- a/mm/vma.c
> +++ b/mm/vma.c
> @@ -109,7 +109,7 @@ static inline bool is_mergeable_vma(struct vma_merge_struct *vmg, bool merge_nex
> static bool is_mergeable_anon_vma(struct vma_merge_struct *vmg, bool merge_next)
> {
> struct vm_area_struct *tgt = merge_next ? vmg->next : vmg->prev;
> - struct vm_area_struct *src = vmg->middle; /* exisitng merge case. */
> + struct vm_area_struct *src = vmg->middle; /* existing merge case. */
> struct anon_vma *tgt_anon = tgt->anon_vma;
> struct anon_vma *src_anon = vmg->anon_vma;
>
> @@ -798,7 +798,7 @@ static bool can_merge_remove_vma(struct vm_area_struct *vma)
> * Returns: The merged VMA if merge succeeds, or NULL otherwise.
> *
> * ASSUMPTIONS:
> - * - The caller must assign the VMA to be modifed to @vmg->middle.
> + * - The caller must assign the VMA to be modified to @vmg->middle.
> * - The caller must have set @vmg->prev to the previous VMA, if there is one.
> * - The caller must not set @vmg->next, as we determine this.
> * - The caller must hold a WRITE lock on the mm_struct->mmap_lock.
> --
> 2.34.1
>
>
Powered by blists - more mailing lists