staging: lustre: Fix typo in lustre/lnet
authorMasanari Iida <standby24x7@gmail.com>
Sun, 25 Aug 2013 01:10:14 +0000 (10:10 +0900)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Mon, 26 Aug 2013 13:29:09 +0000 (06:29 -0700)
Correct spelling typo in comments and debug messages.

Signed-off-by: Masanari Iida <standby24x7@gmail.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
drivers/staging/lustre/include/linux/lnet/lib-types.h
drivers/staging/lustre/lnet/klnds/socklnd/socklnd.c
drivers/staging/lustre/lnet/klnds/socklnd/socklnd_cb.c
drivers/staging/lustre/lnet/klnds/socklnd/socklnd_proto.c
drivers/staging/lustre/lnet/lnet/lib-msg.c
drivers/staging/lustre/lnet/selftest/brw_test.c
drivers/staging/lustre/lnet/selftest/conrpc.c
drivers/staging/lustre/lnet/selftest/rpc.c

index 538e4ffa7a1848b8d28529fda9e40839d7e9cd03..e579e7ed5070662468c8016bdfe73610941981a4 100644 (file)
@@ -619,7 +619,7 @@ typedef struct lnet_portal {
        unsigned int            ptl_index;      /* portal ID, reserved */
        /* flags on this portal: lazy, unique... */
        unsigned int            ptl_options;
-       /* list of messags which are stealing buffer */
+       /* list of messages which are stealing buffer */
        struct list_head                ptl_msg_stealing;
        /* messages blocking for MD */
        struct list_head                ptl_msg_delayed;
index 1f367638eec43597cfc6ac9bc5a405572d300914..6825b452e5fe6a44f4fa33434101f5429de63778 100644 (file)
@@ -1441,7 +1441,7 @@ ksocknal_close_conn_locked (ksock_conn_t *conn, int error)
 
                conn->ksnc_route = NULL;
 
-#if 0     /* irrelevent with only eager routes */
+#if 0     /* irrelevant with only eager routes */
                /* make route least favourite */
                list_del (&route->ksnr_list);
                list_add_tail (&route->ksnr_list, &peer->ksnp_routes);
@@ -1496,7 +1496,7 @@ ksocknal_peer_failed (ksock_peer_t *peer)
 
        /* There has been a connection failure or comms error; but I'll only
         * tell LNET I think the peer is dead if it's to another kernel and
-        * there are no connections or connection attempts in existance. */
+        * there are no connections or connection attempts in existence. */
 
        read_lock(&ksocknal_data.ksnd_global_lock);
 
@@ -2358,7 +2358,7 @@ ksocknal_new_incarnation (void)
        /* The incarnation number is the time this module loaded and it
         * identifies this particular instance of the socknal.  Hopefully
         * we won't be able to reboot more frequently than 1MHz for the
-        * forseeable future :) */
+        * foreseeable future :) */
 
        do_gettimeofday(&tv);
 
index 727f352e88609d211b4e8a418eede08a1f7e02aa..2c581b7fa8adee363d19791007f4696e9e439d06 100644 (file)
@@ -1116,7 +1116,7 @@ ksocknal_process_receive (ksock_conn_t *conn)
        LASSERT (atomic_read(&conn->ksnc_conn_refcount) > 0);
 
        /* NB: sched lock NOT held */
-       /* SOCKNAL_RX_LNET_HEADER is here for backward compatability */
+       /* SOCKNAL_RX_LNET_HEADER is here for backward compatibility */
        LASSERT (conn->ksnc_rx_state == SOCKNAL_RX_KSM_HEADER ||
                 conn->ksnc_rx_state == SOCKNAL_RX_LNET_PAYLOAD ||
                 conn->ksnc_rx_state == SOCKNAL_RX_LNET_HEADER ||
@@ -1985,7 +1985,7 @@ ksocknal_connect (ksock_route_t *route)
                list_splice_init(&peer->ksnp_tx_queue, &zombies);
        }
 
-#if 0     /* irrelevent with only eager routes */
+#if 0     /* irrelevant with only eager routes */
        if (!route->ksnr_deleted) {
                /* make this route least-favourite for re-selection */
                list_del(&route->ksnr_list);
index 6f7147dd36e58bc3b2096d14d154448568237b61..71205e2015ce56006bc218f49340fea78d1c87bf 100644 (file)
@@ -218,7 +218,7 @@ ksocknal_queue_tx_zcack_v3(ksock_conn_t *conn,
        if (tx->tx_msg.ksm_zc_cookies[0] > tx->tx_msg.ksm_zc_cookies[1]) {
                __u64   tmp = 0;
 
-               /* two seperated cookies: (a+2, a) or (a+1, a) */
+               /* two separated cookies: (a+2, a) or (a+1, a) */
                LASSERT (tx->tx_msg.ksm_zc_cookies[0] -
                         tx->tx_msg.ksm_zc_cookies[1] <= 2);
 
index fc7ba42a4dd1a236c55b707763d61b4531e82468..61ae88be6f021d617197e60dec418e048f3607d9 100644 (file)
@@ -316,7 +316,7 @@ lnet_msg_attach_md(lnet_msg_t *msg, lnet_libmd_t *md,
        LASSERT(!msg->msg_routing);
 
        msg->msg_md = md;
-       if (msg->msg_receiving) { /* commited for receiving */
+       if (msg->msg_receiving) { /* committed for receiving */
                msg->msg_offset = offset;
                msg->msg_wanted = mlen;
        }
@@ -392,7 +392,7 @@ lnet_complete_msg_locked(lnet_msg_t *msg, int cpt)
                 * NB: message is committed for sending, we should return
                 * on success because LND will finalize this message later.
                 *
-                * Also, there is possibility that message is commited for
+                * Also, there is possibility that message is committed for
                 * sending and also failed before delivering to LND,
                 * i.e: ENOMEM, in that case we can't fall through either
                 * because CPT for sending can be different with CPT for
@@ -414,7 +414,7 @@ lnet_complete_msg_locked(lnet_msg_t *msg, int cpt)
                 * NB: message is committed for sending, we should return
                 * on success because LND will finalize this message later.
                 *
-                * Also, there is possibility that message is commited for
+                * Also, there is possibility that message is committed for
                 * sending and also failed before delivering to LND,
                 * i.e: ENOMEM, in that case we can't fall through either:
                 * - The rule is message must decommit for sending first if
@@ -474,14 +474,14 @@ lnet_finalize (lnet_ni_t *ni, lnet_msg_t *msg, int status)
  again:
        rc = 0;
        if (!msg->msg_tx_committed && !msg->msg_rx_committed) {
-               /* not commited to network yet */
+               /* not committed to network yet */
                LASSERT(!msg->msg_onactivelist);
                lnet_msg_free(msg);
                return;
        }
 
        /*
-        * NB: routed message can be commited for both receiving and sending,
+        * NB: routed message can be committed for both receiving and sending,
         * we should finalize in LIFO order and keep counters correct.
         * (finalize sending first then finalize receiving)
         */
index 3bb6fbe23f782b622c9b3d7f13d536a04a7efbc1..ef5064e0055f26bae931f656cd603f5c0db4d2e9 100644 (file)
@@ -361,7 +361,7 @@ brw_server_rpc_done (srpc_server_rpc_t *rpc)
                        blk->bk_sink ? "from" : "to",
                        libcfs_id2str(rpc->srpc_peer), rpc->srpc_status);
        else
-               CDEBUG (D_NET, "Transfered %d pages bulk data %s %s\n",
+               CDEBUG (D_NET, "Transferred %d pages bulk data %s %s\n",
                        blk->bk_niov, blk->bk_sink ? "from" : "to",
                        libcfs_id2str(rpc->srpc_peer));
 
index 446de0e4672ff8c9dc58c201aac8b051ba2c5070..cbce662b987bdce0ce2f6ac4b84e7490a5f68f33 100644 (file)
@@ -1356,7 +1356,7 @@ lstcon_rpc_cleanup_wait(void)
 
        lst_wait_until((atomic_read(&console_session.ses_rpc_counter) == 0),
                       console_session.ses_rpc_lock,
-                      "Network is not accessable or target is down, "
+                      "Network is not accessible or target is down, "
                       "waiting for %d console RPCs to being recycled\n",
                       atomic_read(&console_session.ses_rpc_counter));
 
index 0dfc76e02e0bdbb7a567eda2be25870541ae87a7..7659a26676bbeca424ef3a8e79767e848e5bea7a 100644 (file)
@@ -1117,7 +1117,7 @@ srpc_del_client_rpc_timer (srpc_client_rpc_t *rpc)
        if (rpc->crpc_timeout == 0)
                return;
 
-       /* timer sucessfully defused */
+       /* timer successfully defused */
        if (stt_del_timer(&rpc->crpc_timer))
                return;