From nobody Mon Apr 29 05:37:41 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Authentication-Results: mx.zohomail.com; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail(p=none dis=none) header.from=linux.intel.com ARC-Seal: i=1; a=rsa-sha256; t=1557531542; cv=none; d=zoho.com; s=zohoarc; b=WwpYl7stKU5fc6ZSlH44OueJeCPJ71haiPe/bKHTB28ffMutmYBZ4njgB+LHhO4NwMsa5q9iO7ml8Ue4/uIAMZbu0IkhuWsFRmB1fh1JcG20GE91PbNApPPlo7YDx1KyjF9ZuG29n582SZKf8WdrmPNZIA6Wf4pkLuyU8P37NUs= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zoho.com; s=zohoarc; t=1557531542; h=Content-Transfer-Encoding:Cc:Date:From:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Sender:Subject:To:ARC-Authentication-Results; bh=XQpTskdkymbhPhdfo1ggS2BBmgOpzlMKnAlFE9hgc+Q=; b=ocFZS3onSq+o0l+/frxMUXWjUaLpyroG7eX3EfEn+hC0S6DA7vEG254pk12fx8fZnkv91gQ+Go/V5EiNkuoBmVHsXVuYxFs/m/e0ND6KQJwIpUigDHxKlPot1vQ6CxhrWDi47fqJFztSI272GOsFIk9dWacpjAyiPE+GtWCMDTw= ARC-Authentication-Results: i=1; mx.zoho.com; spf=pass (zoho.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1557531542133378.84582128749264; Fri, 10 May 2019 16:39:02 -0700 (PDT) Received: from localhost ([127.0.0.1]:51417 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hPF6J-0007lD-81 for importer@patchew.org; Fri, 10 May 2019 19:38:51 -0400 Received: from eggs.gnu.org ([209.51.188.92]:37894) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1hPF5W-0007U2-MK for qemu-devel@nongnu.org; Fri, 10 May 2019 19:38:03 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1hPF5V-0004ff-M7 for qemu-devel@nongnu.org; Fri, 10 May 2019 19:38:02 -0400 Received: from mga12.intel.com ([192.55.52.136]:9166) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1hPF5V-0004e1-Ea for qemu-devel@nongnu.org; Fri, 10 May 2019 19:38:01 -0400 Received: from orsmga006.jf.intel.com ([10.7.209.51]) by fmsmga106.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 10 May 2019 16:37:59 -0700 Received: from richard.sh.intel.com (HELO localhost) ([10.239.159.54]) by orsmga006.jf.intel.com with ESMTP; 10 May 2019 16:37:58 -0700 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False X-ExtLoop1: 1 From: Wei Yang To: qemu-devel@nongnu.org Date: Sat, 11 May 2019 07:37:29 +0800 Message-Id: <20190510233729.15554-1-richardw.yang@linux.intel.com> X-Mailer: git-send-email 2.19.1 MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-detected-operating-system: by eggs.gnu.org: Genre and OS details not recognized. X-Received-From: 192.55.52.136 Subject: [Qemu-devel] [PATCH] migration/ram.c: fix typos in comments X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Wei Yang , dgilbert@redhat.com, quintela@redhat.com Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" Content-Type: text/plain; charset="utf-8" Signed-off-by: Wei Yang Reviewed-by: Dr. David Alan Gilbert --- migration/ram.c | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/migration/ram.c b/migration/ram.c index 1def8122e9..720c2b73ca 100644 --- a/migration/ram.c +++ b/migration/ram.c @@ -888,7 +888,7 @@ struct { * - to make easier to know what to free at the end of migration * * This way we always know who is the owner of each "pages" struct, - * and we don't need any loocking. It belongs to the migration thread + * and we don't need any locking. It belongs to the migration thread * or to the channel thread. Switching is safe because the migration * thread is using the channel mutex when changing it, and the channel * have to had finish with its own, otherwise pending_job can't be @@ -1594,7 +1594,7 @@ static int save_xbzrle_page(RAMState *rs, uint8_t **c= urrent_data, * * Called with rcu_read_lock() to protect migration_bitmap * - * Returns the byte offset within memory region of the start of a dirty pa= ge + * Returns the page offset within memory region of the start of a dirty pa= ge * * @rs: current RAM state * @rb: RAMBlock where to search for dirty pages @@ -2108,7 +2108,7 @@ retry: * find_dirty_block: find the next dirty page and update any state * associated with the search process. * - * Returns if a page is found + * Returns true if a page is found * * @rs: current RAM state * @pss: data about the state of the current dirty page scan @@ -2204,7 +2204,7 @@ static RAMBlock *unqueue_page(RAMState *rs, ram_addr_= t *offset) * * Skips pages that are already sent (!dirty) * - * Returns if a queued page is found + * Returns true if a queued page is found * * @rs: current RAM state * @pss: data about the state of the current dirty page scan @@ -3411,7 +3411,7 @@ static int ram_save_iterate(QEMUFile *f, void *opaque) =20 /* we want to check in the 1st loop, just in case it was the 1st t= ime and we had to sync the dirty bitmap. - qemu_get_clock_ns() is a bit expensive, so we only check each s= ome + qemu_clock_get_ns() is a bit expensive, so we only check each s= ome iterations */ if ((i & 63) =3D=3D 0) { --=20 2.19.1