aboutsummaryrefslogtreecommitdiff
path: root/sys/netinet
diff options
context:
space:
mode:
authorPedro F. Giffuni <pfg@FreeBSD.org>2016-05-03 18:05:43 +0000
committerPedro F. Giffuni <pfg@FreeBSD.org>2016-05-03 18:05:43 +0000
commita4641f4eaad242fd40c50e4dd14522aff3494f9a (patch)
tree3bd5a1b080e3f0e8e4c5ca5a06e77b298320c545 /sys/netinet
parent31ae3b070d2c79b25061f7847c4bf887e4c55fa4 (diff)
downloadsrc-a4641f4eaad242fd40c50e4dd14522aff3494f9a.tar.gz
src-a4641f4eaad242fd40c50e4dd14522aff3494f9a.zip
Notes
Diffstat (limited to 'sys/netinet')
-rw-r--r--sys/netinet/cc/cc_cubic.c2
-rw-r--r--sys/netinet/cc/cc_dctcp.c2
-rw-r--r--sys/netinet/cc/cc_htcp.c2
-rw-r--r--sys/netinet/igmp.c4
-rw-r--r--sys/netinet/in_mcast.c2
-rw-r--r--sys/netinet/in_pcb.h2
-rw-r--r--sys/netinet/ip.h2
-rw-r--r--sys/netinet/ip_fastfwd.c2
-rw-r--r--sys/netinet/ip_fw.h6
-rw-r--r--sys/netinet/ip_icmp.c2
-rw-r--r--sys/netinet/ip_options.c2
-rw-r--r--sys/netinet/libalias/alias_irc.c4
-rw-r--r--sys/netinet/libalias/alias_local.h2
-rw-r--r--sys/netinet/libalias/alias_smedia.c2
-rw-r--r--sys/netinet/libalias/libalias.32
-rw-r--r--sys/netinet/tcp_input.c4
-rw-r--r--sys/netinet/tcp_output.c8
-rw-r--r--sys/netinet/tcp_sack.c4
-rw-r--r--sys/netinet/tcp_stacks/fastpath.c4
-rw-r--r--sys/netinet/tcp_subr.c2
-rw-r--r--sys/netinet/tcp_syncache.c4
-rw-r--r--sys/netinet/tcp_timer.c2
22 files changed, 33 insertions, 33 deletions
diff --git a/sys/netinet/cc/cc_cubic.c b/sys/netinet/cc/cc_cubic.c
index 9fdb99ea74bc..a447345ac4a9 100644
--- a/sys/netinet/cc/cc_cubic.c
+++ b/sys/netinet/cc/cc_cubic.c
@@ -143,7 +143,7 @@ cubic_ack_received(struct cc_var *ccv, uint16_t type)
* the I-D. Using min_rtt in the tf_cwnd calculation
* causes w_tf to grow much faster than it should if the
* RTT is dominated by network buffering rather than
- * propogation delay.
+ * propagation delay.
*/
w_tf = tf_cwnd(ticks_since_cong,
cubic_data->mean_rtt_ticks, cubic_data->max_cwnd,
diff --git a/sys/netinet/cc/cc_dctcp.c b/sys/netinet/cc/cc_dctcp.c
index fd36d1ce6694..ce75750fef8b 100644
--- a/sys/netinet/cc/cc_dctcp.c
+++ b/sys/netinet/cc/cc_dctcp.c
@@ -202,7 +202,7 @@ dctcp_cb_init(struct cc_var *ccv)
dctcp_data->bytes_ecn = 0;
dctcp_data->bytes_total = 0;
/*
- * When alpha is set to 0 in the beggining, DCTCP sender transfers as
+ * When alpha is set to 0 in the beginning, DCTCP sender transfers as
* much data as possible until the value converges which may expand the
* queueing delay at the switch. When alpha is set to 1, queueing delay
* is kept small.
diff --git a/sys/netinet/cc/cc_htcp.c b/sys/netinet/cc/cc_htcp.c
index 97012f5e5d06..5cd84f3b3192 100644
--- a/sys/netinet/cc/cc_htcp.c
+++ b/sys/netinet/cc/cc_htcp.c
@@ -440,7 +440,7 @@ htcp_recalc_beta(struct cc_var *ccv)
/*
* TCPTV_SRTTBASE is the initialised value of each connection's SRTT, so
* we only calc beta if the connection's SRTT has been changed from its
- * inital value. beta is bounded to ensure it is always between
+ * initial value. beta is bounded to ensure it is always between
* HTCP_MINBETA and HTCP_MAXBETA.
*/
if (V_htcp_adaptive_backoff && htcp_data->minrtt != TCPTV_SRTTBASE &&
diff --git a/sys/netinet/igmp.c b/sys/netinet/igmp.c
index dcadec559e68..90c00c627f7b 100644
--- a/sys/netinet/igmp.c
+++ b/sys/netinet/igmp.c
@@ -1103,9 +1103,9 @@ out_locked:
}
/*
- * Process a recieved IGMPv3 group-specific or group-and-source-specific
+ * Process a received IGMPv3 group-specific or group-and-source-specific
* query.
- * Return <0 if any error occured. Currently this is ignored.
+ * Return <0 if any error occurred. Currently this is ignored.
*/
static int
igmp_input_v3_group_query(struct in_multi *inm, struct igmp_ifsoftc *igi,
diff --git a/sys/netinet/in_mcast.c b/sys/netinet/in_mcast.c
index 4037dbfbff4d..07b5bbabb691 100644
--- a/sys/netinet/in_mcast.c
+++ b/sys/netinet/in_mcast.c
@@ -619,7 +619,7 @@ inm_clear_recorded(struct in_multi *inm)
*
* Return 0 if the source didn't exist or was already marked as recorded.
* Return 1 if the source was marked as recorded by this function.
- * Return <0 if any error occured (negated errno code).
+ * Return <0 if any error occurred (negated errno code).
*/
int
inm_record_source(struct in_multi *inm, const in_addr_t naddr)
diff --git a/sys/netinet/in_pcb.h b/sys/netinet/in_pcb.h
index 9c77a5148ccc..17f7c3dc24ce 100644
--- a/sys/netinet/in_pcb.h
+++ b/sys/netinet/in_pcb.h
@@ -121,7 +121,7 @@ struct in_conninfo {
*/
#define INC_ISIPV6 0x01
-#define inc_isipv6 inc_flags /* temp compatability */
+#define inc_isipv6 inc_flags /* temp compatibility */
#define inc_fport inc_ie.ie_fport
#define inc_lport inc_ie.ie_lport
#define inc_faddr inc_ie.ie_faddr
diff --git a/sys/netinet/ip.h b/sys/netinet/ip.h
index 92693965c7bd..98bd1e999404 100644
--- a/sys/netinet/ip.h
+++ b/sys/netinet/ip.h
@@ -147,7 +147,7 @@ struct ip {
#define IPOPT_SECURITY 130 /* provide s,c,h,tcc */
#define IPOPT_LSRR 131 /* loose source route */
#define IPOPT_ESO 133 /* extended security */
-#define IPOPT_CIPSO 134 /* commerical security */
+#define IPOPT_CIPSO 134 /* commercial security */
#define IPOPT_SATID 136 /* satnet id */
#define IPOPT_SSRR 137 /* strict source route */
#define IPOPT_RA 148 /* router alert */
diff --git a/sys/netinet/ip_fastfwd.c b/sys/netinet/ip_fastfwd.c
index 22eb727620f6..3fc7c74ba61f 100644
--- a/sys/netinet/ip_fastfwd.c
+++ b/sys/netinet/ip_fastfwd.c
@@ -205,7 +205,7 @@ ip_tryforward(struct mbuf *m)
*
* XXX: Probably some of these checks could be direct drop
* conditions. However it is not clear whether there are some
- * hacks or obscure behaviours which make it neccessary to
+ * hacks or obscure behaviours which make it necessary to
* let ip_input handle it. We play safe here and let ip_input
* deal with it until it is proven that we can directly drop it.
*/
diff --git a/sys/netinet/ip_fw.h b/sys/netinet/ip_fw.h
index 7250527476e7..e46abf8ffc2a 100644
--- a/sys/netinet/ip_fw.h
+++ b/sys/netinet/ip_fw.h
@@ -861,9 +861,9 @@ typedef struct _ipfw_obj_tentry {
#define IPFW_CTF_ATOMIC 0x01 /* Perform atomic operation */
/* Operation results */
#define IPFW_TR_IGNORED 0 /* Entry was ignored (rollback) */
-#define IPFW_TR_ADDED 1 /* Entry was succesfully added */
-#define IPFW_TR_UPDATED 2 /* Entry was succesfully updated*/
-#define IPFW_TR_DELETED 3 /* Entry was succesfully deleted*/
+#define IPFW_TR_ADDED 1 /* Entry was successfully added */
+#define IPFW_TR_UPDATED 2 /* Entry was successfully updated*/
+#define IPFW_TR_DELETED 3 /* Entry was successfully deleted*/
#define IPFW_TR_LIMIT 4 /* Entry was ignored (limit) */
#define IPFW_TR_NOTFOUND 5 /* Entry was not found */
#define IPFW_TR_EXISTS 6 /* Entry already exists */
diff --git a/sys/netinet/ip_icmp.c b/sys/netinet/ip_icmp.c
index fee980f4cb5a..a87daf74af86 100644
--- a/sys/netinet/ip_icmp.c
+++ b/sys/netinet/ip_icmp.c
@@ -223,7 +223,7 @@ icmp_error(struct mbuf *n, int type, int code, uint32_t dest, int mtu)
/*
* Calculate length to quote from original packet and
* prevent the ICMP mbuf from overflowing.
- * Unfortunatly this is non-trivial since ip_forward()
+ * Unfortunately this is non-trivial since ip_forward()
* sends us truncated packets.
*/
nlen = m_length(n, NULL);
diff --git a/sys/netinet/ip_options.c b/sys/netinet/ip_options.c
index b0504234e306..3e44ffb7b7c9 100644
--- a/sys/netinet/ip_options.c
+++ b/sys/netinet/ip_options.c
@@ -706,7 +706,7 @@ bad:
* may change in future.
* Router alert options SHOULD be passed if running in IPSTEALTH mode and
* we are not the endpoint.
- * Length checks on individual options should already have been peformed
+ * Length checks on individual options should already have been performed
* by ip_dooptions() therefore they are folded under INVARIANTS here.
*
* Return zero if not present or options are invalid, non-zero if present.
diff --git a/sys/netinet/libalias/alias_irc.c b/sys/netinet/libalias/alias_irc.c
index 552fab8d582c..cb2d67dc314e 100644
--- a/sys/netinet/libalias/alias_irc.c
+++ b/sys/netinet/libalias/alias_irc.c
@@ -44,7 +44,7 @@ __FBSDID("$FreeBSD$");
Version 2.1: May, 1997 (cjm)
Very minor changes to conform with
local/global/function naming conventions
- withing the packet alising module.
+ within the packet alising module.
*/
/* Includes */
@@ -482,7 +482,7 @@ lPACKET_DONE:
which will generate a type-error on all but 32-bit machines.
[Note 2] This routine really ought to be replaced with one that
- creates a transparent proxy on the aliasing host, to allow arbitary
+ creates a transparent proxy on the aliasing host, to allow arbitrary
changes in the TCP stream. This should not be too difficult given
this base; I (ee) will try to do this some time later.
*/
diff --git a/sys/netinet/libalias/alias_local.h b/sys/netinet/libalias/alias_local.h
index c291a372837b..506193c6b557 100644
--- a/sys/netinet/libalias/alias_local.h
+++ b/sys/netinet/libalias/alias_local.h
@@ -357,7 +357,7 @@ void PunchFWHole(struct alias_link *_lnk);
/* Housekeeping function */
void HouseKeeping(struct libalias *);
-/* Tcp specfic routines */
+/* Tcp specific routines */
/* lint -save -library Suppress flexelint warnings */
/* Transparent proxy routines */
diff --git a/sys/netinet/libalias/alias_smedia.c b/sys/netinet/libalias/alias_smedia.c
index 0e4420729c3e..6ab490b07e17 100644
--- a/sys/netinet/libalias/alias_smedia.c
+++ b/sys/netinet/libalias/alias_smedia.c
@@ -518,7 +518,7 @@ AliasHandleRtspOut(struct libalias *la, struct ip *pip, struct alias_link *lnk,
/*
* When aliasing a server, check for the 200 reply
- * Accomodate varying number of blanks between 200 & OK
+ * Accommodate varying number of blanks between 200 & OK
*/
if (dlen >= (int)strlen(str200)) {
diff --git a/sys/netinet/libalias/libalias.3 b/sys/netinet/libalias/libalias.3
index 543420b87db0..e496168264e5 100644
--- a/sys/netinet/libalias/libalias.3
+++ b/sys/netinet/libalias/libalias.3
@@ -1067,7 +1067,7 @@ In case the application provides a
.Dv SIGHUP
signal handler, add a call to
.Fn LibAliasRefreshModules
-inside the handler, and everytime you want to refresh the loaded modules,
+inside the handler, and every time you want to refresh the loaded modules,
send it the
.Dv SIGHUP
signal:
diff --git a/sys/netinet/tcp_input.c b/sys/netinet/tcp_input.c
index 324b0da76933..cd400f5d896b 100644
--- a/sys/netinet/tcp_input.c
+++ b/sys/netinet/tcp_input.c
@@ -365,7 +365,7 @@ cc_conn_init(struct tcpcb *tp)
/*
* There's some sort of gateway or interface
* buffer limit on the path. Use this to set
- * the slow start threshhold, but set the
+ * the slow start threshold, but set the
* threshold to no less than 2*mss.
*/
tp->snd_ssthresh = max(2 * maxseg, metrics.rmx_ssthresh);
@@ -2533,7 +2533,7 @@ tcp_do_segment(struct mbuf *m, struct tcphdr *th, struct socket *so,
* change and FIN isn't set),
* the ack is the biggest we've
* seen and we've seen exactly our rexmt
- * threshhold of them, assume a packet
+ * threshold of them, assume a packet
* has been dropped and retransmit it.
* Kludge snd_nxt & the congestion
* window so we send only this one
diff --git a/sys/netinet/tcp_output.c b/sys/netinet/tcp_output.c
index 2043fc959bd1..e2490ac61579 100644
--- a/sys/netinet/tcp_output.c
+++ b/sys/netinet/tcp_output.c
@@ -215,7 +215,7 @@ tcp_output(struct tcpcb *tp)
*/
if ((tp->t_flags & TF_FASTOPEN) &&
(tp->t_state == TCPS_SYN_RECEIVED) &&
- SEQ_GT(tp->snd_max, tp->snd_una) && /* inital SYN|ACK sent */
+ SEQ_GT(tp->snd_max, tp->snd_una) && /* initial SYN|ACK sent */
(tp->snd_nxt != tp->snd_una)) /* not a retransmit */
return (0);
#endif
@@ -495,9 +495,9 @@ after_sack_rexmit:
* and does at most one step per received ACK. This fast
* scaling has the drawback of growing the send buffer beyond
* what is strictly necessary to make full use of a given
- * delay*bandwith product. However testing has shown this not
+ * delay*bandwidth product. However testing has shown this not
* to be much of an problem. At worst we are trading wasting
- * of available bandwith (the non-use of it) for wasting some
+ * of available bandwidth (the non-use of it) for wasting some
* socket buffer memory.
*
* TODO: Shrink send buffer during idle periods together
@@ -1619,7 +1619,7 @@ tcp_setpersist(struct tcpcb *tp)
if (tcp_timer_active(tp, TT_REXMT))
panic("tcp_setpersist: retransmit pending");
/*
- * Start/restart persistance timer.
+ * Start/restart persistence timer.
*/
TCPT_RANGESET(tt, t * tcp_backoff[tp->t_rxtshift],
tcp_persmin, tcp_persmax);
diff --git a/sys/netinet/tcp_sack.c b/sys/netinet/tcp_sack.c
index 1e31871b3e7c..a153f6caf858 100644
--- a/sys/netinet/tcp_sack.c
+++ b/sys/netinet/tcp_sack.c
@@ -401,8 +401,8 @@ tcp_sack_doack(struct tcpcb *tp, struct tcpopt *to, tcp_seq th_ack)
/*
* Sort the SACK blocks so we can update the scoreboard with just one
- * pass. The overhead of sorting upto 4+1 elements is less than
- * making upto 4+1 passes over the scoreboard.
+ * pass. The overhead of sorting up to 4+1 elements is less than
+ * making up to 4+1 passes over the scoreboard.
*/
for (i = 0; i < num_sack_blks; i++) {
for (j = i + 1; j < num_sack_blks; j++) {
diff --git a/sys/netinet/tcp_stacks/fastpath.c b/sys/netinet/tcp_stacks/fastpath.c
index 5529fd8224de..83547ebba33f 100644
--- a/sys/netinet/tcp_stacks/fastpath.c
+++ b/sys/netinet/tcp_stacks/fastpath.c
@@ -185,7 +185,7 @@ tcp_do_fastack(struct mbuf *m, struct tcphdr *th, struct socket *so,
short ostate = 0;
#endif
/*
- * The following if statment will be true if
+ * The following if statement will be true if
* we are doing the win_up_in_fp <and>
* - We have more new data (SEQ_LT(tp->snd_wl1, th->th_seq)) <or>
* - No more new data, but we have an ack for new data
@@ -1061,7 +1061,7 @@ tcp_do_slowpath(struct mbuf *m, struct tcphdr *th, struct socket *so,
* change and FIN isn't set),
* the ack is the biggest we've
* seen and we've seen exactly our rexmt
- * threshhold of them, assume a packet
+ * threshold of them, assume a packet
* has been dropped and retransmit it.
* Kludge snd_nxt & the congestion
* window so we send only this one
diff --git a/sys/netinet/tcp_subr.c b/sys/netinet/tcp_subr.c
index 178ea77eb81f..64d71244ffa1 100644
--- a/sys/netinet/tcp_subr.c
+++ b/sys/netinet/tcp_subr.c
@@ -1376,7 +1376,7 @@ tcp_discardcb(struct tcpcb *tp)
* Update the ssthresh always when the conditions below
* are satisfied. This gives us better new start value
* for the congestion avoidance for new connections.
- * ssthresh is only set if packet loss occured on a session.
+ * ssthresh is only set if packet loss occurred on a session.
*
* XXXRW: 'so' may be NULL here, and/or socket buffer may be
* being torn down. Ideally this code would not use 'so'.
diff --git a/sys/netinet/tcp_syncache.c b/sys/netinet/tcp_syncache.c
index 2c568dadc807..adb4cabbfe81 100644
--- a/sys/netinet/tcp_syncache.c
+++ b/sys/netinet/tcp_syncache.c
@@ -1419,7 +1419,7 @@ skip_alloc:
* With the default maxsockbuf of 256K, a scale factor
* of 3 will be chosen by this algorithm. Those who
* choose a larger maxsockbuf should watch out
- * for the compatiblity problems mentioned above.
+ * for the compatibility problems mentioned above.
*
* RFC1323: The Window field in a SYN (i.e., a <SYN>
* or <SYN,ACK>) segment itself is never scaled.
@@ -1746,7 +1746,7 @@ syncache_respond(struct syncache *sc, struct syncache_head *sch, int locked,
* with the latter taking over when the former is exhausted. When matching
* syncache entry is found the syncookie is ignored.
*
- * The only reliable information persisting the 3WHS is our inital sequence
+ * The only reliable information persisting the 3WHS is our initial sequence
* number ISS of 32 bits. Syncookies embed a cryptographically sufficient
* strong hash (MAC) value and a few bits of TCP SYN options in the ISS
* of our SYN|ACK. The MAC can be recomputed when the ACK to our SYN|ACK
diff --git a/sys/netinet/tcp_timer.c b/sys/netinet/tcp_timer.c
index 5d6865c6bf4d..5925f42449d0 100644
--- a/sys/netinet/tcp_timer.c
+++ b/sys/netinet/tcp_timer.c
@@ -522,7 +522,7 @@ tcp_timer_persist(void *xtp)
KASSERT((tp->t_timers->tt_flags & TT_PERSIST) != 0,
("%s: tp %p persist callout should be running", __func__, tp));
/*
- * Persistance timer into zero window.
+ * Persistence timer into zero window.
* Force a byte to be output, if possible.
*/
TCPSTAT_INC(tcps_persisttimeo);