Re: [PATCH] ceph: miscellaneous spelling fixes

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, Nov 15, 2024 at 2:11 PM Dmitry Antipov <dmantipov@xxxxxxxxx> wrote:
>
> Correct spelling here and there as suggested by codespell.
>
> Signed-off-by: Dmitry Antipov <dmantipov@xxxxxxxxx>
> ---
>  fs/ceph/addr.c       |  2 +-
>  fs/ceph/caps.c       |  2 +-
>  fs/ceph/crypto.h     |  2 +-
>  fs/ceph/dir.c        |  4 ++--
>  fs/ceph/export.c     |  4 ++--
>  fs/ceph/inode.c      |  2 +-
>  fs/ceph/mds_client.c | 10 +++++-----
>  fs/ceph/super.h      |  2 +-
>  fs/ceph/xattr.c      |  2 +-
>  9 files changed, 15 insertions(+), 15 deletions(-)
>
> diff --git a/fs/ceph/addr.c b/fs/ceph/addr.c
> index c2a9e2cc03de..4514b285e771 100644
> --- a/fs/ceph/addr.c
> +++ b/fs/ceph/addr.c
> @@ -2195,7 +2195,7 @@ int ceph_pool_perm_check(struct inode *inode, int need)
>         if (ci->i_vino.snap != CEPH_NOSNAP) {
>                 /*
>                  * Pool permission check needs to write to the first object.
> -                * But for snapshot, head of the first object may have alread
> +                * But for snapshot, head of the first object may have already
>                  * been deleted. Skip check to avoid creating orphan object.
>                  */
>                 return 0;
> diff --git a/fs/ceph/caps.c b/fs/ceph/caps.c
> index bed34fc11c91..4ac260c98c8c 100644
> --- a/fs/ceph/caps.c
> +++ b/fs/ceph/caps.c
> @@ -2813,7 +2813,7 @@ void ceph_take_cap_refs(struct ceph_inode_info *ci, int got,
>   * requested from the MDS.
>   *
>   * Returns 0 if caps were not able to be acquired (yet), 1 if succeed,
> - * or a negative error code. There are 3 speical error codes:
> + * or a negative error code. There are 3 special error codes:
>   *  -EAGAIN:  need to sleep but non-blocking is specified
>   *  -EFBIG:   ask caller to call check_max_size() and try again.
>   *  -EUCLEAN: ask caller to call ceph_renew_caps() and try again.
> diff --git a/fs/ceph/crypto.h b/fs/ceph/crypto.h
> index 47e0c319fc68..d0768239a1c9 100644
> --- a/fs/ceph/crypto.h
> +++ b/fs/ceph/crypto.h
> @@ -27,7 +27,7 @@ struct ceph_fname {
>  };
>
>  /*
> - * Header for the crypted file when truncating the size, this
> + * Header for the encrypted file when truncating the size, this
>   * will be sent to MDS, and the MDS will update the encrypted
>   * last block and then truncate the size.
>   */
> diff --git a/fs/ceph/dir.c b/fs/ceph/dir.c
> index 952109292d69..0bf388e07a02 100644
> --- a/fs/ceph/dir.c
> +++ b/fs/ceph/dir.c
> @@ -207,7 +207,7 @@ static int __dcache_readdir(struct file *file,  struct dir_context *ctx,
>                         dentry = __dcache_find_get_entry(parent, idx + step,
>                                                          &cache_ctl);
>                         if (!dentry) {
> -                               /* use linar search */
> +                               /* use linear search */
>                                 idx = 0;
>                                 break;
>                         }
> @@ -659,7 +659,7 @@ static bool need_reset_readdir(struct ceph_dir_file_info *dfi, loff_t new_pos)
>                 return true;
>         if (is_hash_order(new_pos)) {
>                 /* no need to reset last_name for a forward seek when
> -                * dentries are sotred in hash order */
> +                * dentries are sorted in hash order */
>         } else if (dfi->frag != fpos_frag(new_pos)) {
>                 return true;
>         }
> diff --git a/fs/ceph/export.c b/fs/ceph/export.c
> index 44451749c544..719125822f12 100644
> --- a/fs/ceph/export.c
> +++ b/fs/ceph/export.c
> @@ -393,9 +393,9 @@ static struct dentry *ceph_get_parent(struct dentry *child)
>                         }
>                         dir = snapdir;
>                 }
> -               /* If directory has already been deleted, futher get_parent
> +               /* If directory has already been deleted, further get_parent
>                  * will fail. Do not mark snapdir dentry as disconnected,
> -                * this prevent exportfs from doing futher get_parent. */
> +                * this prevent exportfs from doing further get_parent. */

prevent -> prevents

>                 if (unlinked)
>                         dn = d_obtain_root(dir);
>                 else
> diff --git a/fs/ceph/inode.c b/fs/ceph/inode.c
> index 315ef02f9a3f..7dd6c2275085 100644
> --- a/fs/ceph/inode.c
> +++ b/fs/ceph/inode.c
> @@ -160,7 +160,7 @@ struct inode *ceph_get_inode(struct super_block *sb, struct ceph_vino vino,
>  }
>
>  /*
> - * get/constuct snapdir inode for a given directory
> + * get/construct snapdir inode for a given directory
>   */
>  struct inode *ceph_get_snapdir(struct inode *parent)
>  {
> diff --git a/fs/ceph/mds_client.c b/fs/ceph/mds_client.c
> index c4a5fd94bbbb..a4dd600d319e 100644
> --- a/fs/ceph/mds_client.c
> +++ b/fs/ceph/mds_client.c
> @@ -827,7 +827,7 @@ static void destroy_reply_info(struct ceph_mds_reply_info_parsed *info)
>   * And the worst case is that for the none async openc request it will
>   * successfully open the file if the CDentry hasn't been unlinked yet,
>   * but later the previous delayed async unlink request will remove the
> - * CDenty. That means the just created file is possiblly deleted later
> + * CDenty. That means the just created file is possibly deleted later

CDenty -> CDentry

>   * by accident.
>   *
>   * We need to wait for the inflight async unlink requests to finish
> @@ -3269,7 +3269,7 @@ static int __prepare_send_request(struct ceph_mds_session *session,
>                                      &session->s_features);
>
>         /*
> -        * Avoid inifinite retrying after overflow. The client will
> +        * Avoid infinite retrying after overflow. The client will
>          * increase the retry count and if the MDS is old version,
>          * so we limit to retry at most 256 times.
>          */
> @@ -3522,7 +3522,7 @@ static void __do_request(struct ceph_mds_client *mdsc,
>
>         /*
>          * For async create we will choose the auth MDS of frag in parent
> -        * directory to send the request and ususally this works fine, but
> +        * directory to send the request and usually this works fine, but
>          * if the migrated the dirtory to another MDS before it could handle
>          * it the request will be forwarded.
>          *
> @@ -4033,7 +4033,7 @@ static void handle_forward(struct ceph_mds_client *mdsc,
>                 __unregister_request(mdsc, req);
>         } else if (fwd_seq <= req->r_num_fwd || (uint32_t)fwd_seq >= U32_MAX) {
>                 /*
> -                * Avoid inifinite retrying after overflow.
> +                * Avoid infinite retrying after overflow.
>                  *
>                  * The MDS will increase the fwd count and in client side
>                  * if the num_fwd is less than the one saved in request
> @@ -5738,7 +5738,7 @@ int ceph_mds_check_access(struct ceph_mds_client *mdsc, char *tpath, int mask)
>                 if (err < 0) {
>                         return err;
>                 } else if (err > 0) {
> -                       /* always follow the last auth caps' permision */
> +                       /* always follow the last auth caps' permission */
>                         root_squash_perms = true;
>                         rw_perms_s = NULL;
>                         if ((mask & MAY_WRITE) && s->writeable &&
> diff --git a/fs/ceph/super.h b/fs/ceph/super.h
> index 037eac35a9e0..de7912b274ad 100644
> --- a/fs/ceph/super.h
> +++ b/fs/ceph/super.h
> @@ -60,7 +60,7 @@
>
>  /* max size of osd read request, limited by libceph */
>  #define CEPH_MAX_READ_SIZE              CEPH_MSG_MAX_DATA_LEN
> -/* osd has a configurable limitaion of max write size.
> +/* osd has a configurable limitation of max write size.
>   * CEPH_MSG_MAX_DATA_LEN should be small enough. */
>  #define CEPH_MAX_WRITE_SIZE            CEPH_MSG_MAX_DATA_LEN
>  #define CEPH_RASIZE_DEFAULT             (8192*1024)    /* max readahead */
> diff --git a/fs/ceph/xattr.c b/fs/ceph/xattr.c
> index e066a556eccb..1a9f12204666 100644
> --- a/fs/ceph/xattr.c
> +++ b/fs/ceph/xattr.c
> @@ -899,7 +899,7 @@ static int __get_required_blob_size(struct ceph_inode_info *ci, int name_size,
>  }
>
>  /*
> - * If there are dirty xattrs, reencode xattrs into the prealloc_blob
> + * If there are dirty xattrs, re-encode xattrs into the prealloc_blob
>   * and swap into place.  It returns the old i_xattrs.blob (or NULL) so
>   * that it can be freed by the caller as the i_ceph_lock is likely to be
>   * held.
> --
> 2.47.0
>

Applied with above fixups.

Thanks,

                Ilya





[Index of Archives]     [CEPH Users]     [Ceph Large]     [Ceph Dev]     [Information on CEPH]     [Linux BTRFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux