lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAFqt6zZivU3XJmjwdCqhSJBAoNwWfJZeUipG4es4u+iaEnDGtw@mail.gmail.com>
Date:   Thu, 30 Jun 2022 06:17:55 +0530
From:   Souptick Joarder <jrdr.linux@...il.com>
To:     Zhang Jiaming <jiaming@...china.com>
Cc:     ebiederm@...ssion.com, Kees Cook <keescook@...omium.org>,
        Al Viro <viro@...iv.linux.org.uk>,
        Linux-MM <linux-mm@...ck.org>,
        linux-fsdevel <linux-fsdevel@...r.kernel.org>,
        linux-kernel@...r.kernel.org, liqiong@...china.com,
        renyu@...china.com
Subject: Re: [PATCH] exec: Fix a spelling mistake

On Wed, Jun 29, 2022 at 1:07 PM Zhang Jiaming <jiaming@...china.com> wrote:
>
> Change 'wont't' to 'won't'.
>
> Signed-off-by: Zhang Jiaming <jiaming@...china.com>

Reviewed-by: Souptick Joarder (HPE) <jrdr.linux@...il.com>
> ---
>  fs/exec.c | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/fs/exec.c b/fs/exec.c
> index 96b9847fca99..5f0656e10b5d 100644
> --- a/fs/exec.c
> +++ b/fs/exec.c
> @@ -1156,7 +1156,7 @@ static int de_thread(struct task_struct *tsk)
>                 /*
>                  * We are going to release_task()->ptrace_unlink() silently,
>                  * the tracer can sleep in do_wait(). EXIT_DEAD guarantees
> -                * the tracer wont't block again waiting for this thread.
> +                * the tracer won't block again waiting for this thread.
>                  */
>                 if (unlikely(leader->ptrace))
>                         __wake_up_parent(leader, leader->parent);
> --
> 2.34.1
>
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ