lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Tue,  4 Oct 2022 17:32:35 +0100
From:   Colin Ian King <colin.i.king@...il.com>
To:     Ariel Elior <aelior@...vell.com>,
        Sudarsana Kalluru <skalluru@...vell.com>,
        Manish Chopra <manishc@...vell.com>,
        "David S . Miller" <davem@...emloft.net>,
        Eric Dumazet <edumazet@...gle.com>,
        Jakub Kicinski <kuba@...nel.org>,
        Paolo Abeni <pabeni@...hat.com>,
        Christoph Hellwig <hch@...radead.org>, netdev@...r.kernel.org
Cc:     kernel-janitors@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: [PATCH] net: bnx2x: Fix spelling mistake "tupple" -> "tuple"

There are several spelling mistakes of tuple in comments and messages.
Fix them.

Signed-off-by: Colin Ian King <colin.i.king@...il.com>
---
 drivers/net/ethernet/broadcom/bnx2x/bnx2x_ethtool.c | 10 +++++-----
 fs/freevxfs/vxfs_olt.c                              |  2 +-
 2 files changed, 6 insertions(+), 6 deletions(-)

diff --git a/drivers/net/ethernet/broadcom/bnx2x/bnx2x_ethtool.c b/drivers/net/ethernet/broadcom/bnx2x/bnx2x_ethtool.c
index bda3ccc28eca..49f2a0b45b20 100644
--- a/drivers/net/ethernet/broadcom/bnx2x/bnx2x_ethtool.c
+++ b/drivers/net/ethernet/broadcom/bnx2x/bnx2x_ethtool.c
@@ -3388,7 +3388,7 @@ static int bnx2x_set_rss_flags(struct bnx2x *bp, struct ethtool_rxnfc *info)
 	switch (info->flow_type) {
 	case TCP_V4_FLOW:
 	case TCP_V6_FLOW:
-		/* For TCP only 4-tupple hash is supported */
+		/* For TCP only 4-tuple hash is supported */
 		if (info->data ^ (RXH_IP_SRC | RXH_IP_DST |
 				  RXH_L4_B_0_1 | RXH_L4_B_2_3)) {
 			DP(BNX2X_MSG_ETHTOOL,
@@ -3399,7 +3399,7 @@ static int bnx2x_set_rss_flags(struct bnx2x *bp, struct ethtool_rxnfc *info)
 
 	case UDP_V4_FLOW:
 	case UDP_V6_FLOW:
-		/* For UDP either 2-tupple hash or 4-tupple hash is supported */
+		/* For UDP either 2-tuple hash or 4-tuple hash is supported */
 		if (info->data == (RXH_IP_SRC | RXH_IP_DST |
 				   RXH_L4_B_0_1 | RXH_L4_B_2_3))
 			udp_rss_requested = 1;
@@ -3418,7 +3418,7 @@ static int bnx2x_set_rss_flags(struct bnx2x *bp, struct ethtool_rxnfc *info)
 		    (bp->rss_conf_obj.udp_rss_v4 != udp_rss_requested)) {
 			bp->rss_conf_obj.udp_rss_v4 = udp_rss_requested;
 			DP(BNX2X_MSG_ETHTOOL,
-			   "rss re-configured, UDP 4-tupple %s\n",
+			   "rss re-configured, UDP 4-tuple %s\n",
 			   udp_rss_requested ? "enabled" : "disabled");
 			if (bp->state == BNX2X_STATE_OPEN)
 				return bnx2x_rss(bp, &bp->rss_conf_obj, false,
@@ -3427,7 +3427,7 @@ static int bnx2x_set_rss_flags(struct bnx2x *bp, struct ethtool_rxnfc *info)
 			   (bp->rss_conf_obj.udp_rss_v6 != udp_rss_requested)) {
 			bp->rss_conf_obj.udp_rss_v6 = udp_rss_requested;
 			DP(BNX2X_MSG_ETHTOOL,
-			   "rss re-configured, UDP 4-tupple %s\n",
+			   "rss re-configured, UDP 4-tuple %s\n",
 			   udp_rss_requested ? "enabled" : "disabled");
 			if (bp->state == BNX2X_STATE_OPEN)
 				return bnx2x_rss(bp, &bp->rss_conf_obj, false,
@@ -3437,7 +3437,7 @@ static int bnx2x_set_rss_flags(struct bnx2x *bp, struct ethtool_rxnfc *info)
 
 	case IPV4_FLOW:
 	case IPV6_FLOW:
-		/* For IP only 2-tupple hash is supported */
+		/* For IP only 2-tuple hash is supported */
 		if (info->data ^ (RXH_IP_SRC | RXH_IP_DST)) {
 			DP(BNX2X_MSG_ETHTOOL,
 			   "Command parameters not supported\n");
diff --git a/fs/freevxfs/vxfs_olt.c b/fs/freevxfs/vxfs_olt.c
index 23f35187c289..48027a421fa3 100644
--- a/fs/freevxfs/vxfs_olt.c
+++ b/fs/freevxfs/vxfs_olt.c
@@ -63,7 +63,7 @@ vxfs_read_olt(struct super_block *sbp, u_long bsize)
 
 	op = (struct vxfs_olt *)bp->b_data;
 	if (fs32_to_cpu(infp, op->olt_magic) != VXFS_OLT_MAGIC) {
-		printk(KERN_NOTICE "vxfs: ivalid olt magic number\n");
+		printk(KERN_NOTICE "vxfs: invalid olt magic number\n");
 		goto fail;
 	}
 
-- 
2.37.1

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ