[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <877ca63ffz.fsf@trenco.lwn.net>
Date: Thu, 17 Oct 2024 09:41:04 -0600
From: Jonathan Corbet <corbet@....net>
To: Haoyang Liu <tttturtleruss@...t.edu.cn>, Alexander Potapenko
<glider@...gle.com>, Marco Elver <elver@...gle.com>, Dmitry Vyukov
<dvyukov@...gle.com>
Cc: hust-os-kernel-patches@...glegroups.com, Haoyang Liu
<tttturtleruss@...t.edu.cn>, kasan-dev@...glegroups.com,
workflows@...r.kernel.org, linux-doc@...r.kernel.org,
linux-kernel@...r.kernel.org
Subject: Re: [PATCH] docs/dev-tools: fix a typo
Haoyang Liu <tttturtleruss@...t.edu.cn> writes:
> fix a typo in dev-tools/kmsan.rst
>
> Signed-off-by: Haoyang Liu <tttturtleruss@...t.edu.cn>
> ---
> Documentation/dev-tools/kmsan.rst | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/Documentation/dev-tools/kmsan.rst b/Documentation/dev-tools/kmsan.rst
> index 6a48d96c5c85..0dc668b183f6 100644
> --- a/Documentation/dev-tools/kmsan.rst
> +++ b/Documentation/dev-tools/kmsan.rst
> @@ -133,7 +133,7 @@ KMSAN shadow memory
> -------------------
>
> KMSAN associates a metadata byte (also called shadow byte) with every byte of
> -kernel memory. A bit in the shadow byte is set iff the corresponding bit of the
> +kernel memory. A bit in the shadow byte is set if the corresponding bit of the
> kernel memory byte is uninitialized. Marking the memory uninitialized (i.e.
> setting its shadow bytes to ``0xff``) is called poisoning, marking it
> initialized (setting the shadow bytes to ``0x00``) is called unpoisoning.
So I have applied this, since "iff" is clearly confusing to a lot of
readers even iff it's correct.
Thanks,
jon
Powered by blists - more mailing lists