diff --git a/src/modules/tm/doc/rpc.xml b/src/modules/tm/doc/rpc.xml
index d00ae09b73a..8f31ad34364 100644
--- a/src/modules/tm/doc/rpc.xml
+++ b/src/modules/tm/doc/rpc.xml
@@ -194,7 +194,7 @@
tm.clean
- Trigger an hard clean of expired transactions.
+ Trigger a hard clean of expired transactions.
Parameters:
diff --git a/src/modules/tm/t_lookup.c b/src/modules/tm/t_lookup.c
index b33d276787c..b8da44dbc14 100644
--- a/src/modules/tm/t_lookup.c
+++ b/src/modules/tm/t_lookup.c
@@ -899,7 +899,7 @@ int t_lookup_request( struct sip_msg* p_msg , int leave_new_locked,
/* it is not an e2e ACK/200 -- perhaps it is
* local negative case; in which case we will want
* more elements to match: r-uri and via; allow
- * mismatching r-uri as an config option for broken
+ * mismatching r-uri as a config option for broken
* UACs */
if (cfg_get(tm, tm_cfg, ruri_matching) && !EQ_REQ_URI_LEN )
continue;
@@ -1938,7 +1938,7 @@ int t_unref( struct sip_msg* p_msg )
LM_BUG("called w/ kr=REQ_ERR_DELAYED in failure"
" route for %p\n", T);
}else if (unlikely( kill_transaction(T, tm_error)<=0 )){
- // could be a valid error, or due to a immediate CANCEL
+ // could be a valid error, or due to an immediate CANCEL
LM_WARN("generation of a delayed stateful reply"
" failed\n");
t_release_transaction(T);
diff --git a/src/modules/tm/t_reply.c b/src/modules/tm/t_reply.c
index f478da054b0..ea0cde2d566 100644
--- a/src/modules/tm/t_reply.c
+++ b/src/modules/tm/t_reply.c
@@ -22,7 +22,7 @@
/** Defines:
* TM_ONREPLY_FINAL_DROP_OK - allows dropping the final reply
* from the tm onreply_routes, but comes with a small performance
- * hit (extra unlock()/lock() for each final reply when a onreply
+ * hit (extra unlock()/lock() for each final reply when an onreply
* route is set).
*/
@@ -2615,7 +2615,7 @@ int reply_received( struct sip_msg *p_msg )
#ifdef USE_DST_BLOCKLIST
/* add temporary to the blocklist the source of a 503 reply */
if ( (msg_status==503) && cfg_get(tm, tm_cfg, tm_blst_503) &&
- /* check if the request sent on the branch had the the
+ /* check if the request sent on the branch had the
* blst 503 ignore flags set or it was set in the onreply_r*/
should_blocklist_su(BLST_503, &p_msg->fwd_send_flags,
p_msg->rcv.proto, &p_msg->rcv.src_su)