lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <971c14bd-e755-d1cf-b518-c889e5348f11@infradead.org>
Date:   Wed, 17 Mar 2021 10:35:30 -0700
From:   Randy Dunlap <rdunlap@...radead.org>
To:     Bhaskar Chowdhury <unixbhaskar@...il.com>,
        gregkh@...uxfoundation.org, colin.king@...onical.com,
        davem@...emloft.net, johannes@...solutions.net, arnd@...db.de,
        lee.jones@...aro.org, devel@...verdev.osuosl.org,
        linux-kernel@...r.kernel.org
Subject: Re: [PATCH] staging: wimax: i2400m: Mundane typo fix in the file
 driver.c

On 3/17/21 2:26 AM, Bhaskar Chowdhury wrote:
> 
> s/procesing/processing/
> 
> Signed-off-by: Bhaskar Chowdhury <unixbhaskar@...il.com>

Acked-by: Randy Dunlap <rdunlap@...radead.org>

> ---
>  drivers/staging/wimax/i2400m/driver.c | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
> 
> diff --git a/drivers/staging/wimax/i2400m/driver.c b/drivers/staging/wimax/i2400m/driver.c
> index f5186458bb3d..8091106212f9 100644
> --- a/drivers/staging/wimax/i2400m/driver.c
> +++ b/drivers/staging/wimax/i2400m/driver.c
> @@ -96,7 +96,7 @@ MODULE_PARM_DESC(barkers,
>   *
>   * This function just verifies that the header declaration and the
>   * payload are consistent and then deals with it, either forwarding it
> - * to the device or procesing it locally.
> + * to the device or processing it locally.
>   *
>   * In the i2400m, messages are basically commands that will carry an
>   * ack, so we use i2400m_msg_to_dev() and then deliver the ack back to
> --


-- 
~Randy

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ