lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Tue, 27 Jul 2021 14:20:43 -0700
From:   Andrii Nakryiko <andrii.nakryiko@...il.com>
To:     wangborong@...rlc.com
Cc:     Daniel Borkmann <daniel@...earbox.net>,
        Alexei Starovoitov <ast@...nel.org>,
        Andrii Nakryiko <andrii@...nel.org>, Martin Lau <kafai@...com>,
        Song Liu <songliubraving@...com>, Yonghong Song <yhs@...com>,
        john fastabend <john.fastabend@...il.com>,
        KP Singh <kpsingh@...nel.org>,
        Networking <netdev@...r.kernel.org>, bpf <bpf@...r.kernel.org>,
        open list <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH] libbpf: fix commnet typo

On Tue, Jul 27, 2021 at 5:00 AM Jason Wang <wangborong@...rlc.com> wrote:
>
> Remove the repeated word 'the' in line 48.
>
> Signed-off-by: Jason Wang <wangborong@...rlc.com>
> ---

Fixed the typo in the subject of a patch fixing a typo in libbpf
comment :) Applied to bpf-next.

>  tools/lib/bpf/libbpf.c | 6 +++---
>  1 file changed, 3 insertions(+), 3 deletions(-)
>
> diff --git a/tools/lib/bpf/libbpf.c b/tools/lib/bpf/libbpf.c
> index 4c153c379989..d474816ecd70 100644
> --- a/tools/lib/bpf/libbpf.c
> +++ b/tools/lib/bpf/libbpf.c
> @@ -7236,7 +7236,7 @@ static int bpf_object__collect_relos(struct bpf_object *obj)
>
>         for (i = 0; i < obj->nr_programs; i++) {
>                 struct bpf_program *p = &obj->programs[i];
> -
> +
>                 if (!p->nr_reloc)
>                         continue;
>
> @@ -9533,7 +9533,7 @@ static int find_btf_by_prefix_kind(const struct btf *btf, const char *prefix,
>         ret = snprintf(btf_type_name, sizeof(btf_type_name),
>                        "%s%s", prefix, name);
>         /* snprintf returns the number of characters written excluding the
> -        * the terminating null. So, if >= BTF_MAX_NAME_SIZE are written, it
> +        * terminating null. So, if >= BTF_MAX_NAME_SIZE are written, it
>          * indicates truncation.
>          */
>         if (ret < 0 || ret >= sizeof(btf_type_name))
> @@ -10075,7 +10075,7 @@ struct bpf_link {
>  int bpf_link__update_program(struct bpf_link *link, struct bpf_program *prog)
>  {
>         int ret;
> -
> +
>         ret = bpf_link_update(bpf_link__fd(link), bpf_program__fd(prog), NULL);
>         return libbpf_err_errno(ret);
>  }
> --
> 2.32.0
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ