lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20220208174023.868438-1-carlos.bilbao@amd.com>
Date:   Tue, 8 Feb 2022 11:40:24 -0600
From:   Carlos Bilbao <carlos.bilbao@....com>
To:     <arve@...roid.com>, <tkjos@...roid.com>, <maco@...roid.com>,
        <joel@...lfernandes.org>, <christian@...uner.io>,
        <hridya@...gle.com>, <surenb@...gle.com>
CC:     <linux-kernel@...r.kernel.org>, <bilbao@...edu>,
        Carlos Bilbao <carlos.bilbao@....com>
Subject: [PATCH] binder: Fix misspelled words in two files

Fix a few words misspelled in binder.c and binderfs.c.

Signed-off-by: Carlos Bilbao <carlos.bilbao@....com>
---
 drivers/android/binder.c   | 2 +-
 drivers/android/binderfs.c | 4 ++--
 2 files changed, 3 insertions(+), 3 deletions(-)

diff --git a/drivers/android/binder.c b/drivers/android/binder.c
index 49fb74196d02..87b35074b01f 100644
--- a/drivers/android/binder.c
+++ b/drivers/android/binder.c
@@ -1394,7 +1394,7 @@ static void binder_thread_dec_tmpref(struct binder_thread *thread)
  * by threads that are being released. When done with the binder_proc,
  * this function is called to decrement the counter and free the
  * proc if appropriate (proc has been released, all threads have
- * been released and not currenly in-use to process a transaction).
+ * been released and not currently in-use to process a transaction).
  */
 static void binder_proc_dec_tmpref(struct binder_proc *proc)
 {
diff --git a/drivers/android/binderfs.c b/drivers/android/binderfs.c
index e3605cdd4335..3a7ce5117881 100644
--- a/drivers/android/binderfs.c
+++ b/drivers/android/binderfs.c
@@ -93,7 +93,7 @@ bool is_binderfs_device(const struct inode *inode)
 /**
  * binderfs_binder_device_create - allocate inode from super block of a
  *                                 binderfs mount
- * @ref_inode: inode from wich the super block will be taken
+ * @ref_inode: inode from which the super block will be taken
  * @userp:     buffer to copy information about new device for userspace to
  * @req:       struct binderfs_device as copied from userspace
  *
@@ -159,7 +159,7 @@ static int binderfs_binder_device_create(struct inode *ref_inode,
 	inode->i_uid = info->root_uid;
 	inode->i_gid = info->root_gid;
 
-	req->name[BINDERFS_MAX_NAME] = '\0'; /* NUL-terminate */
+	req->name[BINDERFS_MAX_NAME] = '\0'; /* NULL-terminate */
 	name_len = strlen(req->name);
 	/* Make sure to include terminating NUL byte */
 	name = kmemdup(req->name, name_len + 1, GFP_KERNEL);
-- 
2.27.0

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ