diff options
author | Pedro F. Giffuni <pfg@FreeBSD.org> | 2016-05-03 18:05:43 +0000 |
---|---|---|
committer | Pedro F. Giffuni <pfg@FreeBSD.org> | 2016-05-03 18:05:43 +0000 |
commit | a4641f4eaad242fd40c50e4dd14522aff3494f9a (patch) | |
tree | 3bd5a1b080e3f0e8e4c5ca5a06e77b298320c545 /sys/netinet | |
parent | 31ae3b070d2c79b25061f7847c4bf887e4c55fa4 (diff) | |
download | src-a4641f4eaad242fd40c50e4dd14522aff3494f9a.tar.gz src-a4641f4eaad242fd40c50e4dd14522aff3494f9a.zip |
Notes
Diffstat (limited to 'sys/netinet')
-rw-r--r-- | sys/netinet/cc/cc_cubic.c | 2 | ||||
-rw-r--r-- | sys/netinet/cc/cc_dctcp.c | 2 | ||||
-rw-r--r-- | sys/netinet/cc/cc_htcp.c | 2 | ||||
-rw-r--r-- | sys/netinet/igmp.c | 4 | ||||
-rw-r--r-- | sys/netinet/in_mcast.c | 2 | ||||
-rw-r--r-- | sys/netinet/in_pcb.h | 2 | ||||
-rw-r--r-- | sys/netinet/ip.h | 2 | ||||
-rw-r--r-- | sys/netinet/ip_fastfwd.c | 2 | ||||
-rw-r--r-- | sys/netinet/ip_fw.h | 6 | ||||
-rw-r--r-- | sys/netinet/ip_icmp.c | 2 | ||||
-rw-r--r-- | sys/netinet/ip_options.c | 2 | ||||
-rw-r--r-- | sys/netinet/libalias/alias_irc.c | 4 | ||||
-rw-r--r-- | sys/netinet/libalias/alias_local.h | 2 | ||||
-rw-r--r-- | sys/netinet/libalias/alias_smedia.c | 2 | ||||
-rw-r--r-- | sys/netinet/libalias/libalias.3 | 2 | ||||
-rw-r--r-- | sys/netinet/tcp_input.c | 4 | ||||
-rw-r--r-- | sys/netinet/tcp_output.c | 8 | ||||
-rw-r--r-- | sys/netinet/tcp_sack.c | 4 | ||||
-rw-r--r-- | sys/netinet/tcp_stacks/fastpath.c | 4 | ||||
-rw-r--r-- | sys/netinet/tcp_subr.c | 2 | ||||
-rw-r--r-- | sys/netinet/tcp_syncache.c | 4 | ||||
-rw-r--r-- | sys/netinet/tcp_timer.c | 2 |
22 files changed, 33 insertions, 33 deletions
diff --git a/sys/netinet/cc/cc_cubic.c b/sys/netinet/cc/cc_cubic.c index 9fdb99ea74bc..a447345ac4a9 100644 --- a/sys/netinet/cc/cc_cubic.c +++ b/sys/netinet/cc/cc_cubic.c @@ -143,7 +143,7 @@ cubic_ack_received(struct cc_var *ccv, uint16_t type) * the I-D. Using min_rtt in the tf_cwnd calculation * causes w_tf to grow much faster than it should if the * RTT is dominated by network buffering rather than - * propogation delay. + * propagation delay. */ w_tf = tf_cwnd(ticks_since_cong, cubic_data->mean_rtt_ticks, cubic_data->max_cwnd, diff --git a/sys/netinet/cc/cc_dctcp.c b/sys/netinet/cc/cc_dctcp.c index fd36d1ce6694..ce75750fef8b 100644 --- a/sys/netinet/cc/cc_dctcp.c +++ b/sys/netinet/cc/cc_dctcp.c @@ -202,7 +202,7 @@ dctcp_cb_init(struct cc_var *ccv) dctcp_data->bytes_ecn = 0; dctcp_data->bytes_total = 0; /* - * When alpha is set to 0 in the beggining, DCTCP sender transfers as + * When alpha is set to 0 in the beginning, DCTCP sender transfers as * much data as possible until the value converges which may expand the * queueing delay at the switch. When alpha is set to 1, queueing delay * is kept small. diff --git a/sys/netinet/cc/cc_htcp.c b/sys/netinet/cc/cc_htcp.c index 97012f5e5d06..5cd84f3b3192 100644 --- a/sys/netinet/cc/cc_htcp.c +++ b/sys/netinet/cc/cc_htcp.c @@ -440,7 +440,7 @@ htcp_recalc_beta(struct cc_var *ccv) /* * TCPTV_SRTTBASE is the initialised value of each connection's SRTT, so * we only calc beta if the connection's SRTT has been changed from its - * inital value. beta is bounded to ensure it is always between + * initial value. beta is bounded to ensure it is always between * HTCP_MINBETA and HTCP_MAXBETA. */ if (V_htcp_adaptive_backoff && htcp_data->minrtt != TCPTV_SRTTBASE && diff --git a/sys/netinet/igmp.c b/sys/netinet/igmp.c index dcadec559e68..90c00c627f7b 100644 --- a/sys/netinet/igmp.c +++ b/sys/netinet/igmp.c @@ -1103,9 +1103,9 @@ out_locked: } /* - * Process a recieved IGMPv3 group-specific or group-and-source-specific + * Process a received IGMPv3 group-specific or group-and-source-specific * query. - * Return <0 if any error occured. Currently this is ignored. + * Return <0 if any error occurred. Currently this is ignored. */ static int igmp_input_v3_group_query(struct in_multi *inm, struct igmp_ifsoftc *igi, diff --git a/sys/netinet/in_mcast.c b/sys/netinet/in_mcast.c index 4037dbfbff4d..07b5bbabb691 100644 --- a/sys/netinet/in_mcast.c +++ b/sys/netinet/in_mcast.c @@ -619,7 +619,7 @@ inm_clear_recorded(struct in_multi *inm) * * Return 0 if the source didn't exist or was already marked as recorded. * Return 1 if the source was marked as recorded by this function. - * Return <0 if any error occured (negated errno code). + * Return <0 if any error occurred (negated errno code). */ int inm_record_source(struct in_multi *inm, const in_addr_t naddr) diff --git a/sys/netinet/in_pcb.h b/sys/netinet/in_pcb.h index 9c77a5148ccc..17f7c3dc24ce 100644 --- a/sys/netinet/in_pcb.h +++ b/sys/netinet/in_pcb.h @@ -121,7 +121,7 @@ struct in_conninfo { */ #define INC_ISIPV6 0x01 -#define inc_isipv6 inc_flags /* temp compatability */ +#define inc_isipv6 inc_flags /* temp compatibility */ #define inc_fport inc_ie.ie_fport #define inc_lport inc_ie.ie_lport #define inc_faddr inc_ie.ie_faddr diff --git a/sys/netinet/ip.h b/sys/netinet/ip.h index 92693965c7bd..98bd1e999404 100644 --- a/sys/netinet/ip.h +++ b/sys/netinet/ip.h @@ -147,7 +147,7 @@ struct ip { #define IPOPT_SECURITY 130 /* provide s,c,h,tcc */ #define IPOPT_LSRR 131 /* loose source route */ #define IPOPT_ESO 133 /* extended security */ -#define IPOPT_CIPSO 134 /* commerical security */ +#define IPOPT_CIPSO 134 /* commercial security */ #define IPOPT_SATID 136 /* satnet id */ #define IPOPT_SSRR 137 /* strict source route */ #define IPOPT_RA 148 /* router alert */ diff --git a/sys/netinet/ip_fastfwd.c b/sys/netinet/ip_fastfwd.c index 22eb727620f6..3fc7c74ba61f 100644 --- a/sys/netinet/ip_fastfwd.c +++ b/sys/netinet/ip_fastfwd.c @@ -205,7 +205,7 @@ ip_tryforward(struct mbuf *m) * * XXX: Probably some of these checks could be direct drop * conditions. However it is not clear whether there are some - * hacks or obscure behaviours which make it neccessary to + * hacks or obscure behaviours which make it necessary to * let ip_input handle it. We play safe here and let ip_input * deal with it until it is proven that we can directly drop it. */ diff --git a/sys/netinet/ip_fw.h b/sys/netinet/ip_fw.h index 7250527476e7..e46abf8ffc2a 100644 --- a/sys/netinet/ip_fw.h +++ b/sys/netinet/ip_fw.h @@ -861,9 +861,9 @@ typedef struct _ipfw_obj_tentry { #define IPFW_CTF_ATOMIC 0x01 /* Perform atomic operation */ /* Operation results */ #define IPFW_TR_IGNORED 0 /* Entry was ignored (rollback) */ -#define IPFW_TR_ADDED 1 /* Entry was succesfully added */ -#define IPFW_TR_UPDATED 2 /* Entry was succesfully updated*/ -#define IPFW_TR_DELETED 3 /* Entry was succesfully deleted*/ +#define IPFW_TR_ADDED 1 /* Entry was successfully added */ +#define IPFW_TR_UPDATED 2 /* Entry was successfully updated*/ +#define IPFW_TR_DELETED 3 /* Entry was successfully deleted*/ #define IPFW_TR_LIMIT 4 /* Entry was ignored (limit) */ #define IPFW_TR_NOTFOUND 5 /* Entry was not found */ #define IPFW_TR_EXISTS 6 /* Entry already exists */ diff --git a/sys/netinet/ip_icmp.c b/sys/netinet/ip_icmp.c index fee980f4cb5a..a87daf74af86 100644 --- a/sys/netinet/ip_icmp.c +++ b/sys/netinet/ip_icmp.c @@ -223,7 +223,7 @@ icmp_error(struct mbuf *n, int type, int code, uint32_t dest, int mtu) /* * Calculate length to quote from original packet and * prevent the ICMP mbuf from overflowing. - * Unfortunatly this is non-trivial since ip_forward() + * Unfortunately this is non-trivial since ip_forward() * sends us truncated packets. */ nlen = m_length(n, NULL); diff --git a/sys/netinet/ip_options.c b/sys/netinet/ip_options.c index b0504234e306..3e44ffb7b7c9 100644 --- a/sys/netinet/ip_options.c +++ b/sys/netinet/ip_options.c @@ -706,7 +706,7 @@ bad: * may change in future. * Router alert options SHOULD be passed if running in IPSTEALTH mode and * we are not the endpoint. - * Length checks on individual options should already have been peformed + * Length checks on individual options should already have been performed * by ip_dooptions() therefore they are folded under INVARIANTS here. * * Return zero if not present or options are invalid, non-zero if present. diff --git a/sys/netinet/libalias/alias_irc.c b/sys/netinet/libalias/alias_irc.c index 552fab8d582c..cb2d67dc314e 100644 --- a/sys/netinet/libalias/alias_irc.c +++ b/sys/netinet/libalias/alias_irc.c @@ -44,7 +44,7 @@ __FBSDID("$FreeBSD$"); Version 2.1: May, 1997 (cjm) Very minor changes to conform with local/global/function naming conventions - withing the packet alising module. + within the packet alising module. */ /* Includes */ @@ -482,7 +482,7 @@ lPACKET_DONE: which will generate a type-error on all but 32-bit machines. [Note 2] This routine really ought to be replaced with one that - creates a transparent proxy on the aliasing host, to allow arbitary + creates a transparent proxy on the aliasing host, to allow arbitrary changes in the TCP stream. This should not be too difficult given this base; I (ee) will try to do this some time later. */ diff --git a/sys/netinet/libalias/alias_local.h b/sys/netinet/libalias/alias_local.h index c291a372837b..506193c6b557 100644 --- a/sys/netinet/libalias/alias_local.h +++ b/sys/netinet/libalias/alias_local.h @@ -357,7 +357,7 @@ void PunchFWHole(struct alias_link *_lnk); /* Housekeeping function */ void HouseKeeping(struct libalias *); -/* Tcp specfic routines */ +/* Tcp specific routines */ /* lint -save -library Suppress flexelint warnings */ /* Transparent proxy routines */ diff --git a/sys/netinet/libalias/alias_smedia.c b/sys/netinet/libalias/alias_smedia.c index 0e4420729c3e..6ab490b07e17 100644 --- a/sys/netinet/libalias/alias_smedia.c +++ b/sys/netinet/libalias/alias_smedia.c @@ -518,7 +518,7 @@ AliasHandleRtspOut(struct libalias *la, struct ip *pip, struct alias_link *lnk, /* * When aliasing a server, check for the 200 reply - * Accomodate varying number of blanks between 200 & OK + * Accommodate varying number of blanks between 200 & OK */ if (dlen >= (int)strlen(str200)) { diff --git a/sys/netinet/libalias/libalias.3 b/sys/netinet/libalias/libalias.3 index 543420b87db0..e496168264e5 100644 --- a/sys/netinet/libalias/libalias.3 +++ b/sys/netinet/libalias/libalias.3 @@ -1067,7 +1067,7 @@ In case the application provides a .Dv SIGHUP signal handler, add a call to .Fn LibAliasRefreshModules -inside the handler, and everytime you want to refresh the loaded modules, +inside the handler, and every time you want to refresh the loaded modules, send it the .Dv SIGHUP signal: diff --git a/sys/netinet/tcp_input.c b/sys/netinet/tcp_input.c index 324b0da76933..cd400f5d896b 100644 --- a/sys/netinet/tcp_input.c +++ b/sys/netinet/tcp_input.c @@ -365,7 +365,7 @@ cc_conn_init(struct tcpcb *tp) /* * There's some sort of gateway or interface * buffer limit on the path. Use this to set - * the slow start threshhold, but set the + * the slow start threshold, but set the * threshold to no less than 2*mss. */ tp->snd_ssthresh = max(2 * maxseg, metrics.rmx_ssthresh); @@ -2533,7 +2533,7 @@ tcp_do_segment(struct mbuf *m, struct tcphdr *th, struct socket *so, * change and FIN isn't set), * the ack is the biggest we've * seen and we've seen exactly our rexmt - * threshhold of them, assume a packet + * threshold of them, assume a packet * has been dropped and retransmit it. * Kludge snd_nxt & the congestion * window so we send only this one diff --git a/sys/netinet/tcp_output.c b/sys/netinet/tcp_output.c index 2043fc959bd1..e2490ac61579 100644 --- a/sys/netinet/tcp_output.c +++ b/sys/netinet/tcp_output.c @@ -215,7 +215,7 @@ tcp_output(struct tcpcb *tp) */ if ((tp->t_flags & TF_FASTOPEN) && (tp->t_state == TCPS_SYN_RECEIVED) && - SEQ_GT(tp->snd_max, tp->snd_una) && /* inital SYN|ACK sent */ + SEQ_GT(tp->snd_max, tp->snd_una) && /* initial SYN|ACK sent */ (tp->snd_nxt != tp->snd_una)) /* not a retransmit */ return (0); #endif @@ -495,9 +495,9 @@ after_sack_rexmit: * and does at most one step per received ACK. This fast * scaling has the drawback of growing the send buffer beyond * what is strictly necessary to make full use of a given - * delay*bandwith product. However testing has shown this not + * delay*bandwidth product. However testing has shown this not * to be much of an problem. At worst we are trading wasting - * of available bandwith (the non-use of it) for wasting some + * of available bandwidth (the non-use of it) for wasting some * socket buffer memory. * * TODO: Shrink send buffer during idle periods together @@ -1619,7 +1619,7 @@ tcp_setpersist(struct tcpcb *tp) if (tcp_timer_active(tp, TT_REXMT)) panic("tcp_setpersist: retransmit pending"); /* - * Start/restart persistance timer. + * Start/restart persistence timer. */ TCPT_RANGESET(tt, t * tcp_backoff[tp->t_rxtshift], tcp_persmin, tcp_persmax); diff --git a/sys/netinet/tcp_sack.c b/sys/netinet/tcp_sack.c index 1e31871b3e7c..a153f6caf858 100644 --- a/sys/netinet/tcp_sack.c +++ b/sys/netinet/tcp_sack.c @@ -401,8 +401,8 @@ tcp_sack_doack(struct tcpcb *tp, struct tcpopt *to, tcp_seq th_ack) /* * Sort the SACK blocks so we can update the scoreboard with just one - * pass. The overhead of sorting upto 4+1 elements is less than - * making upto 4+1 passes over the scoreboard. + * pass. The overhead of sorting up to 4+1 elements is less than + * making up to 4+1 passes over the scoreboard. */ for (i = 0; i < num_sack_blks; i++) { for (j = i + 1; j < num_sack_blks; j++) { diff --git a/sys/netinet/tcp_stacks/fastpath.c b/sys/netinet/tcp_stacks/fastpath.c index 5529fd8224de..83547ebba33f 100644 --- a/sys/netinet/tcp_stacks/fastpath.c +++ b/sys/netinet/tcp_stacks/fastpath.c @@ -185,7 +185,7 @@ tcp_do_fastack(struct mbuf *m, struct tcphdr *th, struct socket *so, short ostate = 0; #endif /* - * The following if statment will be true if + * The following if statement will be true if * we are doing the win_up_in_fp <and> * - We have more new data (SEQ_LT(tp->snd_wl1, th->th_seq)) <or> * - No more new data, but we have an ack for new data @@ -1061,7 +1061,7 @@ tcp_do_slowpath(struct mbuf *m, struct tcphdr *th, struct socket *so, * change and FIN isn't set), * the ack is the biggest we've * seen and we've seen exactly our rexmt - * threshhold of them, assume a packet + * threshold of them, assume a packet * has been dropped and retransmit it. * Kludge snd_nxt & the congestion * window so we send only this one diff --git a/sys/netinet/tcp_subr.c b/sys/netinet/tcp_subr.c index 178ea77eb81f..64d71244ffa1 100644 --- a/sys/netinet/tcp_subr.c +++ b/sys/netinet/tcp_subr.c @@ -1376,7 +1376,7 @@ tcp_discardcb(struct tcpcb *tp) * Update the ssthresh always when the conditions below * are satisfied. This gives us better new start value * for the congestion avoidance for new connections. - * ssthresh is only set if packet loss occured on a session. + * ssthresh is only set if packet loss occurred on a session. * * XXXRW: 'so' may be NULL here, and/or socket buffer may be * being torn down. Ideally this code would not use 'so'. diff --git a/sys/netinet/tcp_syncache.c b/sys/netinet/tcp_syncache.c index 2c568dadc807..adb4cabbfe81 100644 --- a/sys/netinet/tcp_syncache.c +++ b/sys/netinet/tcp_syncache.c @@ -1419,7 +1419,7 @@ skip_alloc: * With the default maxsockbuf of 256K, a scale factor * of 3 will be chosen by this algorithm. Those who * choose a larger maxsockbuf should watch out - * for the compatiblity problems mentioned above. + * for the compatibility problems mentioned above. * * RFC1323: The Window field in a SYN (i.e., a <SYN> * or <SYN,ACK>) segment itself is never scaled. @@ -1746,7 +1746,7 @@ syncache_respond(struct syncache *sc, struct syncache_head *sch, int locked, * with the latter taking over when the former is exhausted. When matching * syncache entry is found the syncookie is ignored. * - * The only reliable information persisting the 3WHS is our inital sequence + * The only reliable information persisting the 3WHS is our initial sequence * number ISS of 32 bits. Syncookies embed a cryptographically sufficient * strong hash (MAC) value and a few bits of TCP SYN options in the ISS * of our SYN|ACK. The MAC can be recomputed when the ACK to our SYN|ACK diff --git a/sys/netinet/tcp_timer.c b/sys/netinet/tcp_timer.c index 5d6865c6bf4d..5925f42449d0 100644 --- a/sys/netinet/tcp_timer.c +++ b/sys/netinet/tcp_timer.c @@ -522,7 +522,7 @@ tcp_timer_persist(void *xtp) KASSERT((tp->t_timers->tt_flags & TT_PERSIST) != 0, ("%s: tp %p persist callout should be running", __func__, tp)); /* - * Persistance timer into zero window. + * Persistence timer into zero window. * Force a byte to be output, if possible. */ TCPSTAT_INC(tcps_persisttimeo); |