Skip to content

Commit 6f33e36

Browse files
bpf: Fix various typos in verifier.c comments
JIRA: https://issues.redhat.com/browse/RHEL-78204 commit 5b4c54a Author: Suchit Karunakaran <[email protected]> Date: Sun Jul 27 13:47:54 2025 +0530 bpf: Fix various typos in verifier.c comments This patch fixes several minor typos in comments within the BPF verifier. No changes in functionality. Signed-off-by: Suchit Karunakaran <[email protected]> Link: https://lore.kernel.org/r/[email protected] Signed-off-by: Alexei Starovoitov <[email protected]> Signed-off-by: Jerome Marchand <[email protected]>
1 parent ec54d83 commit 6f33e36

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

kernel/bpf/verifier.c

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4557,7 +4557,7 @@ static int backtrack_insn(struct bpf_verifier_env *env, int idx, int subseq_idx,
45574557
* . if (scalar cond K|scalar)
45584558
* . helper_call(.., scalar, ...) where ARG_CONST is expected
45594559
* backtrack through the verifier states and mark all registers and
4560-
* stack slots with spilled constants that these scalar regisers
4560+
* stack slots with spilled constants that these scalar registers
45614561
* should be precise.
45624562
* . during state pruning two registers (or spilled stack slots)
45634563
* are equivalent if both are not precise.
@@ -18493,7 +18493,7 @@ static void clean_verifier_state(struct bpf_verifier_env *env,
1849318493
/* the parentage chains form a tree.
1849418494
* the verifier states are added to state lists at given insn and
1849518495
* pushed into state stack for future exploration.
18496-
* when the verifier reaches bpf_exit insn some of the verifer states
18496+
* when the verifier reaches bpf_exit insn some of the verifier states
1849718497
* stored in the state lists have their final liveness state already,
1849818498
* but a lot of states will get revised from liveness point of view when
1849918499
* the verifier explores other branches.
@@ -19209,7 +19209,7 @@ static bool is_iter_next_insn(struct bpf_verifier_env *env, int insn_idx)
1920919209
* terminology) calls specially: as opposed to bounded BPF loops, it *expects*
1921019210
* states to match, which otherwise would look like an infinite loop. So while
1921119211
* iter_next() calls are taken care of, we still need to be careful and
19212-
* prevent erroneous and too eager declaration of "ininite loop", when
19212+
* prevent erroneous and too eager declaration of "infinite loop", when
1921319213
* iterators are involved.
1921419214
*
1921519215
* Here's a situation in pseudo-BPF assembly form:
@@ -19251,7 +19251,7 @@ static bool is_iter_next_insn(struct bpf_verifier_env *env, int insn_idx)
1925119251
*
1925219252
* This approach allows to keep infinite loop heuristic even in the face of
1925319253
* active iterator. E.g., C snippet below is and will be detected as
19254-
* inifintely looping:
19254+
* infinitely looping:
1925519255
*
1925619256
* struct bpf_iter_num it;
1925719257
* int *p, x;
@@ -24492,7 +24492,7 @@ static int compute_scc(struct bpf_verifier_env *env)
2449224492
* if pre[i] == 0:
2449324493
* recur(i)
2449424494
*
24495-
* Below implementation replaces explicit recusion with array 'dfs'.
24495+
* Below implementation replaces explicit recursion with array 'dfs'.
2449624496
*/
2449724497
for (i = 0; i < insn_cnt; i++) {
2449824498
if (pre[i])

0 commit comments

Comments
 (0)