mirror of
https://github.com/Motorhead1991/qemu.git
synced 2025-08-08 18:23:57 -06:00
misc/other: spelling fixes
Signed-off-by: Michael Tokarev <mjt@tls.msk.ru> Reviewed-by: Eric Blake <eblake@redhat.com>
This commit is contained in:
parent
01dc06511d
commit
0a19d87995
11 changed files with 23 additions and 23 deletions
|
@ -74,7 +74,7 @@ void net_checksum_calculate(uint8_t *data, int length, int csum_flag)
|
|||
return;
|
||||
}
|
||||
|
||||
/* Handle the optionnal VLAN headers */
|
||||
/* Handle the optional VLAN headers */
|
||||
switch (lduw_be_p(&PKT_GET_ETH_HDR(data)->h_proto)) {
|
||||
case ETH_P_VLAN:
|
||||
mac_hdr_len = sizeof(struct eth_header) +
|
||||
|
@ -96,7 +96,7 @@ void net_checksum_calculate(uint8_t *data, int length, int csum_flag)
|
|||
|
||||
length -= mac_hdr_len;
|
||||
|
||||
/* Now check we have an IP header (with an optionnal VLAN header) */
|
||||
/* Now check we have an IP header (with an optional VLAN header) */
|
||||
if (length < sizeof(struct ip_header)) {
|
||||
return;
|
||||
}
|
||||
|
|
|
@ -91,8 +91,8 @@ ssize_t qemu_netfilter_pass_to_next(NetClientState *sender,
|
|||
next = netfilter_next(nf, direction);
|
||||
while (next) {
|
||||
/*
|
||||
* if qemu_netfilter_pass_to_next been called, means that
|
||||
* the packet has been hold by filter and has already retured size
|
||||
* if qemu_netfilter_pass_to_next has been called, it means that
|
||||
* the packet was held by a filter and has already returned size
|
||||
* to the sender, so sent_cb shouldn't be called later, just
|
||||
* pass NULL to next.
|
||||
*/
|
||||
|
@ -106,7 +106,7 @@ ssize_t qemu_netfilter_pass_to_next(NetClientState *sender,
|
|||
|
||||
/*
|
||||
* We have gone through all filters, pass it to receiver.
|
||||
* Do the valid check again incase sender or receiver been
|
||||
* Do the valid check again in case sender or receiver been
|
||||
* deleted while we go through filters.
|
||||
*/
|
||||
if (sender && sender->peer) {
|
||||
|
|
|
@ -821,7 +821,7 @@ static int vhost_vdpa_net_load_rx(VhostVDPAState *s,
|
|||
* According to virtio_net_reset(), device turns promiscuous mode
|
||||
* on by default.
|
||||
*
|
||||
* Addtionally, according to VirtIO standard, "Since there are
|
||||
* Additionally, according to VirtIO standard, "Since there are
|
||||
* no guarantees, it can use a hash filter or silently switch to
|
||||
* allmulti or promiscuous mode if it is given too many addresses.".
|
||||
* QEMU marks `n->mac_table.uni_overflow` if guest sets too many
|
||||
|
@ -1130,7 +1130,7 @@ static int vhost_vdpa_net_excessive_mac_filter_cvq_add(VhostVDPAState *s,
|
|||
* Pack the non-multicast MAC addresses part for fake CVQ command.
|
||||
*
|
||||
* According to virtio_net_handle_mac(), QEMU doesn't verify the MAC
|
||||
* addresses provieded in CVQ command. Therefore, only the entries
|
||||
* addresses provided in CVQ command. Therefore, only the entries
|
||||
* field need to be prepared in the CVQ command.
|
||||
*/
|
||||
mac_ptr = out->iov_base + cursor;
|
||||
|
@ -1141,7 +1141,7 @@ static int vhost_vdpa_net_excessive_mac_filter_cvq_add(VhostVDPAState *s,
|
|||
* Pack the multicast MAC addresses part for fake CVQ command.
|
||||
*
|
||||
* According to virtio_net_handle_mac(), QEMU doesn't verify the MAC
|
||||
* addresses provieded in CVQ command. Therefore, only the entries
|
||||
* addresses provided in CVQ command. Therefore, only the entries
|
||||
* field need to be prepared in the CVQ command.
|
||||
*/
|
||||
mac_ptr = out->iov_base + cursor;
|
||||
|
@ -1202,7 +1202,7 @@ static int vhost_vdpa_net_handle_ctrl_avail(VhostShadowVirtqueue *svq,
|
|||
* rejects the flawed CVQ command.
|
||||
*
|
||||
* Therefore, QEMU must handle this situation instead of sending
|
||||
* the CVQ command direclty.
|
||||
* the CVQ command directly.
|
||||
*/
|
||||
dev_written = vhost_vdpa_net_excessive_mac_filter_cvq_add(s, elem,
|
||||
&out);
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue