lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20241107063042.106228-1-xandfury@gmail.com>
Date: Wed,  6 Nov 2024 23:30:41 -0700
From: Abhinav Saxena <xandfury@...il.com>
To: linux-kernel-mentees@...ts.linuxfoundation.org,
	linux-doc@...r.kernel.org,
	linux-kernel@...r.kernel.org
Cc: Jonathan Corbet <corbet@....net>,
	Matthew Wilcox <willy@...radead.org>,
	Zhihao Cheng <chengzhihao1@...wei.com>,
	Richard Weinberger <richard@....at>,
	Abhinav Saxena <xandfury@...il.com>
Subject: [PATCH 1/2] Documentation/mm: Fix spelling in hwpoison.rst

Fix spelling of "focusses" to "focuses" to follow standard English usage.

Checkpatch.pl reported this issue.

Signed-off-by: Abhinav Saxena <xandfury@...il.com>
---
 Documentation/mm/hwpoison.rst | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/Documentation/mm/hwpoison.rst b/Documentation/mm/hwpoison.rst
index 483b72aa7c11..dd02fae484dc 100644
--- a/Documentation/mm/hwpoison.rst
+++ b/Documentation/mm/hwpoison.rst
@@ -17,7 +17,7 @@ To quote the overview comment::
 	hardware as being corrupted usually due to a 2bit ECC memory or cache
 	failure.
 
-	This focusses on pages detected as corrupted in the background.
+	This focuses on pages detected as corrupted in the background.
 	When the current CPU tries to consume corruption the currently
 	running process can just be killed directly instead. This implies
 	that if the error cannot be handled for some reason it's safe to
-- 
2.34.1


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ