On Fri, Nov 15, 2024 at 2:11 PM Dmitry Antipov <dmantipov@xxxxxxxxx> wrote: > > Correct spelling here and there as suggested by codespell. > > Signed-off-by: Dmitry Antipov <dmantipov@xxxxxxxxx> > --- > fs/ceph/addr.c | 2 +- > fs/ceph/caps.c | 2 +- > fs/ceph/crypto.h | 2 +- > fs/ceph/dir.c | 4 ++-- > fs/ceph/export.c | 4 ++-- > fs/ceph/inode.c | 2 +- > fs/ceph/mds_client.c | 10 +++++----- > fs/ceph/super.h | 2 +- > fs/ceph/xattr.c | 2 +- > 9 files changed, 15 insertions(+), 15 deletions(-) > > diff --git a/fs/ceph/addr.c b/fs/ceph/addr.c > index c2a9e2cc03de..4514b285e771 100644 > --- a/fs/ceph/addr.c > +++ b/fs/ceph/addr.c > @@ -2195,7 +2195,7 @@ int ceph_pool_perm_check(struct inode *inode, int need) > if (ci->i_vino.snap != CEPH_NOSNAP) { > /* > * Pool permission check needs to write to the first object. > - * But for snapshot, head of the first object may have alread > + * But for snapshot, head of the first object may have already > * been deleted. Skip check to avoid creating orphan object. > */ > return 0; > diff --git a/fs/ceph/caps.c b/fs/ceph/caps.c > index bed34fc11c91..4ac260c98c8c 100644 > --- a/fs/ceph/caps.c > +++ b/fs/ceph/caps.c > @@ -2813,7 +2813,7 @@ void ceph_take_cap_refs(struct ceph_inode_info *ci, int got, > * requested from the MDS. > * > * Returns 0 if caps were not able to be acquired (yet), 1 if succeed, > - * or a negative error code. There are 3 speical error codes: > + * or a negative error code. There are 3 special error codes: > * -EAGAIN: need to sleep but non-blocking is specified > * -EFBIG: ask caller to call check_max_size() and try again. > * -EUCLEAN: ask caller to call ceph_renew_caps() and try again. > diff --git a/fs/ceph/crypto.h b/fs/ceph/crypto.h > index 47e0c319fc68..d0768239a1c9 100644 > --- a/fs/ceph/crypto.h > +++ b/fs/ceph/crypto.h > @@ -27,7 +27,7 @@ struct ceph_fname { > }; > > /* > - * Header for the crypted file when truncating the size, this > + * Header for the encrypted file when truncating the size, this > * will be sent to MDS, and the MDS will update the encrypted > * last block and then truncate the size. > */ > diff --git a/fs/ceph/dir.c b/fs/ceph/dir.c > index 952109292d69..0bf388e07a02 100644 > --- a/fs/ceph/dir.c > +++ b/fs/ceph/dir.c > @@ -207,7 +207,7 @@ static int __dcache_readdir(struct file *file, struct dir_context *ctx, > dentry = __dcache_find_get_entry(parent, idx + step, > &cache_ctl); > if (!dentry) { > - /* use linar search */ > + /* use linear search */ > idx = 0; > break; > } > @@ -659,7 +659,7 @@ static bool need_reset_readdir(struct ceph_dir_file_info *dfi, loff_t new_pos) > return true; > if (is_hash_order(new_pos)) { > /* no need to reset last_name for a forward seek when > - * dentries are sotred in hash order */ > + * dentries are sorted in hash order */ > } else if (dfi->frag != fpos_frag(new_pos)) { > return true; > } > diff --git a/fs/ceph/export.c b/fs/ceph/export.c > index 44451749c544..719125822f12 100644 > --- a/fs/ceph/export.c > +++ b/fs/ceph/export.c > @@ -393,9 +393,9 @@ static struct dentry *ceph_get_parent(struct dentry *child) > } > dir = snapdir; > } > - /* If directory has already been deleted, futher get_parent > + /* If directory has already been deleted, further get_parent > * will fail. Do not mark snapdir dentry as disconnected, > - * this prevent exportfs from doing futher get_parent. */ > + * this prevent exportfs from doing further get_parent. */ prevent -> prevents > if (unlinked) > dn = d_obtain_root(dir); > else > diff --git a/fs/ceph/inode.c b/fs/ceph/inode.c > index 315ef02f9a3f..7dd6c2275085 100644 > --- a/fs/ceph/inode.c > +++ b/fs/ceph/inode.c > @@ -160,7 +160,7 @@ struct inode *ceph_get_inode(struct super_block *sb, struct ceph_vino vino, > } > > /* > - * get/constuct snapdir inode for a given directory > + * get/construct snapdir inode for a given directory > */ > struct inode *ceph_get_snapdir(struct inode *parent) > { > diff --git a/fs/ceph/mds_client.c b/fs/ceph/mds_client.c > index c4a5fd94bbbb..a4dd600d319e 100644 > --- a/fs/ceph/mds_client.c > +++ b/fs/ceph/mds_client.c > @@ -827,7 +827,7 @@ static void destroy_reply_info(struct ceph_mds_reply_info_parsed *info) > * And the worst case is that for the none async openc request it will > * successfully open the file if the CDentry hasn't been unlinked yet, > * but later the previous delayed async unlink request will remove the > - * CDenty. That means the just created file is possiblly deleted later > + * CDenty. That means the just created file is possibly deleted later CDenty -> CDentry > * by accident. > * > * We need to wait for the inflight async unlink requests to finish > @@ -3269,7 +3269,7 @@ static int __prepare_send_request(struct ceph_mds_session *session, > &session->s_features); > > /* > - * Avoid inifinite retrying after overflow. The client will > + * Avoid infinite retrying after overflow. The client will > * increase the retry count and if the MDS is old version, > * so we limit to retry at most 256 times. > */ > @@ -3522,7 +3522,7 @@ static void __do_request(struct ceph_mds_client *mdsc, > > /* > * For async create we will choose the auth MDS of frag in parent > - * directory to send the request and ususally this works fine, but > + * directory to send the request and usually this works fine, but > * if the migrated the dirtory to another MDS before it could handle > * it the request will be forwarded. > * > @@ -4033,7 +4033,7 @@ static void handle_forward(struct ceph_mds_client *mdsc, > __unregister_request(mdsc, req); > } else if (fwd_seq <= req->r_num_fwd || (uint32_t)fwd_seq >= U32_MAX) { > /* > - * Avoid inifinite retrying after overflow. > + * Avoid infinite retrying after overflow. > * > * The MDS will increase the fwd count and in client side > * if the num_fwd is less than the one saved in request > @@ -5738,7 +5738,7 @@ int ceph_mds_check_access(struct ceph_mds_client *mdsc, char *tpath, int mask) > if (err < 0) { > return err; > } else if (err > 0) { > - /* always follow the last auth caps' permision */ > + /* always follow the last auth caps' permission */ > root_squash_perms = true; > rw_perms_s = NULL; > if ((mask & MAY_WRITE) && s->writeable && > diff --git a/fs/ceph/super.h b/fs/ceph/super.h > index 037eac35a9e0..de7912b274ad 100644 > --- a/fs/ceph/super.h > +++ b/fs/ceph/super.h > @@ -60,7 +60,7 @@ > > /* max size of osd read request, limited by libceph */ > #define CEPH_MAX_READ_SIZE CEPH_MSG_MAX_DATA_LEN > -/* osd has a configurable limitaion of max write size. > +/* osd has a configurable limitation of max write size. > * CEPH_MSG_MAX_DATA_LEN should be small enough. */ > #define CEPH_MAX_WRITE_SIZE CEPH_MSG_MAX_DATA_LEN > #define CEPH_RASIZE_DEFAULT (8192*1024) /* max readahead */ > diff --git a/fs/ceph/xattr.c b/fs/ceph/xattr.c > index e066a556eccb..1a9f12204666 100644 > --- a/fs/ceph/xattr.c > +++ b/fs/ceph/xattr.c > @@ -899,7 +899,7 @@ static int __get_required_blob_size(struct ceph_inode_info *ci, int name_size, > } > > /* > - * If there are dirty xattrs, reencode xattrs into the prealloc_blob > + * If there are dirty xattrs, re-encode xattrs into the prealloc_blob > * and swap into place. It returns the old i_xattrs.blob (or NULL) so > * that it can be freed by the caller as the i_ceph_lock is likely to be > * held. > -- > 2.47.0 > Applied with above fixups. Thanks, Ilya