aboutsummaryrefslogtreecommitdiff
path: root/net
diff options
context:
space:
mode:
authorMichael Tokarev <mjt@tls.msk.ru>2023-07-14 14:33:49 +0300
committerMichael Tokarev <mjt@tls.msk.ru>2023-09-08 13:08:52 +0300
commit0a19d8799557f4644cbad76a6e496946166892b2 (patch)
tree9685167c2776ca291ee03a257af700f81e15df46 /net
parent01dc06511d679263505fadd84fd55f4955c6902b (diff)
downloadqemu-0a19d8799557f4644cbad76a6e496946166892b2.zip
qemu-0a19d8799557f4644cbad76a6e496946166892b2.tar.gz
qemu-0a19d8799557f4644cbad76a6e496946166892b2.tar.bz2
misc/other: spelling fixes
Signed-off-by: Michael Tokarev <mjt@tls.msk.ru> Reviewed-by: Eric Blake <eblake@redhat.com>
Diffstat (limited to 'net')
-rw-r--r--net/checksum.c4
-rw-r--r--net/filter.c6
-rw-r--r--net/vhost-vdpa.c8
3 files changed, 9 insertions, 9 deletions
diff --git a/net/checksum.c b/net/checksum.c
index 68245fd..1a957e4 100644
--- a/net/checksum.c
+++ b/net/checksum.c
@@ -74,7 +74,7 @@ void net_checksum_calculate(uint8_t *data, int length, int csum_flag)
return;
}
- /* Handle the optionnal VLAN headers */
+ /* Handle the optional VLAN headers */
switch (lduw_be_p(&PKT_GET_ETH_HDR(data)->h_proto)) {
case ETH_P_VLAN:
mac_hdr_len = sizeof(struct eth_header) +
@@ -96,7 +96,7 @@ void net_checksum_calculate(uint8_t *data, int length, int csum_flag)
length -= mac_hdr_len;
- /* Now check we have an IP header (with an optionnal VLAN header) */
+ /* Now check we have an IP header (with an optional VLAN header) */
if (length < sizeof(struct ip_header)) {
return;
}
diff --git a/net/filter.c b/net/filter.c
index 3fe88fa..3335908 100644
--- a/net/filter.c
+++ b/net/filter.c
@@ -91,8 +91,8 @@ ssize_t qemu_netfilter_pass_to_next(NetClientState *sender,
next = netfilter_next(nf, direction);
while (next) {
/*
- * if qemu_netfilter_pass_to_next been called, means that
- * the packet has been hold by filter and has already retured size
+ * if qemu_netfilter_pass_to_next has been called, it means that
+ * the packet was held by a filter and has already returned size
* to the sender, so sent_cb shouldn't be called later, just
* pass NULL to next.
*/
@@ -106,7 +106,7 @@ ssize_t qemu_netfilter_pass_to_next(NetClientState *sender,
/*
* We have gone through all filters, pass it to receiver.
- * Do the valid check again incase sender or receiver been
+ * Do the valid check again in case sender or receiver been
* deleted while we go through filters.
*/
if (sender && sender->peer) {
diff --git a/net/vhost-vdpa.c b/net/vhost-vdpa.c
index 9795306..34202ca 100644
--- a/net/vhost-vdpa.c
+++ b/net/vhost-vdpa.c
@@ -821,7 +821,7 @@ static int vhost_vdpa_net_load_rx(VhostVDPAState *s,
* According to virtio_net_reset(), device turns promiscuous mode
* on by default.
*
- * Addtionally, according to VirtIO standard, "Since there are
+ * Additionally, according to VirtIO standard, "Since there are
* no guarantees, it can use a hash filter or silently switch to
* allmulti or promiscuous mode if it is given too many addresses.".
* QEMU marks `n->mac_table.uni_overflow` if guest sets too many
@@ -1130,7 +1130,7 @@ static int vhost_vdpa_net_excessive_mac_filter_cvq_add(VhostVDPAState *s,
* Pack the non-multicast MAC addresses part for fake CVQ command.
*
* According to virtio_net_handle_mac(), QEMU doesn't verify the MAC
- * addresses provieded in CVQ command. Therefore, only the entries
+ * addresses provided in CVQ command. Therefore, only the entries
* field need to be prepared in the CVQ command.
*/
mac_ptr = out->iov_base + cursor;
@@ -1141,7 +1141,7 @@ static int vhost_vdpa_net_excessive_mac_filter_cvq_add(VhostVDPAState *s,
* Pack the multicast MAC addresses part for fake CVQ command.
*
* According to virtio_net_handle_mac(), QEMU doesn't verify the MAC
- * addresses provieded in CVQ command. Therefore, only the entries
+ * addresses provided in CVQ command. Therefore, only the entries
* field need to be prepared in the CVQ command.
*/
mac_ptr = out->iov_base + cursor;
@@ -1202,7 +1202,7 @@ static int vhost_vdpa_net_handle_ctrl_avail(VhostShadowVirtqueue *svq,
* rejects the flawed CVQ command.
*
* Therefore, QEMU must handle this situation instead of sending
- * the CVQ command direclty.
+ * the CVQ command directly.
*/
dev_written = vhost_vdpa_net_excessive_mac_filter_cvq_add(s, elem,
&out);