lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAH2r5muFzyAW6YYFRmoZ89AFPYETPZU59-DR+2H8zAxsZbnwkw@mail.gmail.com>
Date:   Mon, 30 Jan 2023 15:23:45 -0600
From:   Steve French <smfrench@...il.com>
To:     Colin Ian King <colin.i.king@...il.com>
Cc:     Namjae Jeon <linkinjeon@...nel.org>,
        Steve French <sfrench@...ba.org>,
        Sergey Senozhatsky <senozhatsky@...omium.org>,
        Tom Talpey <tom@...pey.com>, linux-cifs@...r.kernel.org,
        kernel-janitors@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH][next] ksmbd: Fix spelling mistake "excceed" -> "exceeded"

added to smb3-kernel ksmbd-for-next

thx

On Mon, Jan 30, 2023 at 3:26 AM Colin Ian King <colin.i.king@...il.com> wrote:
>
> There is a spelling mistake in an error message. Fix it.
>
> Signed-off-by: Colin Ian King <colin.i.king@...il.com>
> ---
>  fs/ksmbd/connection.c | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/fs/ksmbd/connection.c b/fs/ksmbd/connection.c
> index 56be077e5d8a..0f7eab5aa04c 100644
> --- a/fs/ksmbd/connection.c
> +++ b/fs/ksmbd/connection.c
> @@ -312,7 +312,7 @@ int ksmbd_conn_handler_loop(void *p)
>                         max_allowed_pdu_size = SMB3_MAX_MSGSIZE;
>
>                 if (pdu_size > max_allowed_pdu_size) {
> -                       pr_err_ratelimited("PDU length(%u) excceed maximum allowed pdu size(%u) on connection(%d)\n",
> +                       pr_err_ratelimited("PDU length(%u) exceeded maximum allowed pdu size(%u) on connection(%d)\n",
>                                         pdu_size, max_allowed_pdu_size,
>                                         conn->status);
>                         break;
> --
> 2.30.2
>


-- 
Thanks,

Steve

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ