lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20250815001803.112924-3-sohammetha01@gmail.com>
Date: Fri, 15 Aug 2025 05:48:01 +0530
From: Soham Metha <sohammetha01@...il.com>
To: linux-kselftest@...r.kernel.org
Cc: shuah@...nel.org,
	skhan@...uxfoundation.org,
	linux-kernel-mentees@...ts.linuxfoundation.org,
	linux-kernel@...r.kernel.org,
	Soham Metha <sohammetha01@...il.com>,
	Anup Patel <anup@...infault.org>,
	Atish Patra <atish.patra@...ux.dev>,
	Paolo Bonzini <pbonzini@...hat.com>,
	Paul Walmsley <paul.walmsley@...ive.com>,
	Palmer Dabbelt <palmer@...belt.com>,
	Albert Ou <aou@...s.berkeley.edu>,
	Alexandre Ghiti <alex@...ti.fr>,
	kvm@...r.kernel.org,
	kvm-riscv@...ts.infradead.org,
	linux-riscv@...ts.infradead.org
Subject: [PATCH 4/6] selftests: kvm: riscv: fix spelling mistakes in comments

found/fixed the following typos

- indicies -> indices
- requrired -> required
- guranteed -> guaranteed

in `tools/testing/selftests/kvm/riscv/sbi_pmu_test.c`

Signed-off-by: Soham Metha <sohammetha01@...il.com>
---
 tools/testing/selftests/kvm/riscv/sbi_pmu_test.c | 10 +++++-----
 1 file changed, 5 insertions(+), 5 deletions(-)

diff --git a/tools/testing/selftests/kvm/riscv/sbi_pmu_test.c b/tools/testing/selftests/kvm/riscv/sbi_pmu_test.c
index 924a335d2262..6a8818ac036c 100644
--- a/tools/testing/selftests/kvm/riscv/sbi_pmu_test.c
+++ b/tools/testing/selftests/kvm/riscv/sbi_pmu_test.c
@@ -212,7 +212,7 @@ static void update_counter_info(int num_counters)
 	for (i = 0; i < num_counters; i++) {
 		ret = sbi_ecall(SBI_EXT_PMU, SBI_EXT_PMU_COUNTER_GET_INFO, i, 0, 0, 0, 0, 0);
 
-		/* There can be gaps in logical counter indicies*/
+		/* There can be gaps in logical counter indices*/
 		if (ret.error)
 			continue;
 		GUEST_ASSERT_NE(ret.value, 0);
@@ -446,7 +446,7 @@ static void test_pmu_basic_sanity(void)
 		ret = sbi_ecall(SBI_EXT_PMU, SBI_EXT_PMU_COUNTER_GET_INFO, i,
 				0, 0, 0, 0, 0);
 
-		/* There can be gaps in logical counter indicies*/
+		/* There can be gaps in logical counter indices*/
 		if (ret.error)
 			continue;
 		GUEST_ASSERT_NE(ret.value, 0);
@@ -474,7 +474,7 @@ static void test_pmu_events_snaphost(void)
 	struct riscv_pmu_snapshot_data *snapshot_data = snapshot_gva;
 	int i;
 
-	/* Verify presence of SBI PMU and minimum requrired SBI version */
+	/* Verify presence of SBI PMU and minimum required SBI version */
 	verify_sbi_requirement_assert();
 
 	snapshot_set_shmem(snapshot_gpa, 0);
@@ -489,7 +489,7 @@ static void test_pmu_events_snaphost(void)
 		if (counter_mask_available & (BIT(i)))
 			GUEST_ASSERT_EQ(READ_ONCE(snapshot_data->ctr_values[i]), 0);
 	}
-	/* Only these two events are guranteed to be present */
+	/* Only these two events are guaranteed to be present */
 	test_pmu_event_snapshot(SBI_PMU_HW_CPU_CYCLES);
 	test_pmu_event_snapshot(SBI_PMU_HW_INSTRUCTIONS);
 
@@ -500,7 +500,7 @@ static void test_pmu_events_overflow(void)
 {
 	int num_counters = 0, i = 0;
 
-	/* Verify presence of SBI PMU and minimum requrired SBI version */
+	/* Verify presence of SBI PMU and minimum required SBI version */
 	verify_sbi_requirement_assert();
 
 	snapshot_set_shmem(snapshot_gpa, 0);
-- 
2.34.1


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ