Received: by 10.192.165.148 with SMTP id m20csp5384119imm; Wed, 9 May 2018 04:17:33 -0700 (PDT) X-Google-Smtp-Source: AB8JxZoBY0lDMCq0JJTYmUtpdW9AE5h3zXwOWfyZCkMs5fQkzUwfiD5CoE6NIFornJqa8rnwAnI2 X-Received: by 10.98.139.7 with SMTP id j7mr43514960pfe.28.1525864653217; Wed, 09 May 2018 04:17:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525864653; cv=none; d=google.com; s=arc-20160816; b=d+Rqe6CeoZRzUTDkzimJbiA1ilUlroQiQdNKieLjNK/wI/5CTxqUdYpayMwrd8nRfn VOMojkfzHPed13DDPSv6fWNKW5gqZhIWUYJLhfnD9KmJu86llu5BpOyZdzfGQUw6Os5+ Pd8uh8tc+loSGGf0EAwTI0TsE9vENRkhnrnwEz19C4mytC2t4tkQQvkEYLei2V90NVid b5O1sAPgsMsfQv5ukg2MtowA/svHPm/zRZ3HcY8sq2P6YzkFaeihhPY9e2Gbrd+4kUP1 P4T/AR4BE1NT8r2f2Tt2pnZjPx2Hp1Q4dTKDo/BP0aEbqli1hklhM3VYyV6LprvgniJm 6uKQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=l8i33AOKwPhtjjcaKQTLunePCeaa4XfO6RhFgASqw5I=; b=VWnRJ5AlOAOz3SIsdrJf09ZhizNA1DlTz30vVfXtLuLAbWn3teGAWTROG3aa6vpgku LkdfqU8SXFAufGUGIzRaXuXKXRzrrlrAeWz/KHNAZ02ua/r288KOnPe3+3Z5M+wEtEy8 BpNwTLLAJqCFgNgPHIRIXzcuH2/AdaaB0FnTQ1V9oQFwMjWaRHXqPEnNV9/pF5YTZsc9 QfgZtHrNMXvbtxrl9POfjIg7cyq5l0m+KBJHd3BzM4h8D5A7j12xOvL6TBGVUXTO+Uko FTjver1WD+mdEvFK7k1KvoribUP8lCxoNDkptKQyjQX6X/WcSOEqcF+esuX8clIRZWpo 6I8w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e37-v6si8928327plb.400.2018.05.09.04.17.18; Wed, 09 May 2018 04:17:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S934180AbeEILQ4 (ORCPT + 99 others); Wed, 9 May 2018 07:16:56 -0400 Received: from charlotte.tuxdriver.com ([70.61.120.58]:47857 "EHLO smtp.tuxdriver.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933832AbeEILQy (ORCPT ); Wed, 9 May 2018 07:16:54 -0400 Received: from cpe-2606-a000-111b-40b7-640c-26a-4e16-9225.dyn6.twc.com ([2606:a000:111b:40b7:640c:26a:4e16:9225] helo=localhost) by smtp.tuxdriver.com with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.63) (envelope-from ) id 1fGN5G-00085C-HQ; Wed, 09 May 2018 07:16:47 -0400 Date: Wed, 9 May 2018 07:16:02 -0400 From: Neil Horman To: Colin King Cc: Vlad Yasevich , Marcelo Ricardo Leitner , "David S . Miller" , linux-sctp@vger.kernel.org, netdev@vger.kernel.org, kernel-janitors@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] sctp: fix spelling mistake: "max_retans" -> "max_retrans" Message-ID: <20180509111602.GA29443@hmswarspite.think-freely.org> References: <20180508222428.24874-1-colin.king@canonical.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180508222428.24874-1-colin.king@canonical.com> User-Agent: Mutt/1.9.2 (2017-12-15) X-Spam-Score: -2.9 (--) X-Spam-Status: No Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, May 08, 2018 at 11:24:28PM +0100, Colin King wrote: > From: Colin Ian King > > Trivial fix to spelling mistake in error string > > Signed-off-by: Colin Ian King > --- > net/sctp/sm_make_chunk.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/net/sctp/sm_make_chunk.c b/net/sctp/sm_make_chunk.c > index 4d7b3ccea078..4a4fd1971255 100644 > --- a/net/sctp/sm_make_chunk.c > +++ b/net/sctp/sm_make_chunk.c > @@ -1131,7 +1131,7 @@ struct sctp_chunk *sctp_make_violation_max_retrans( > const struct sctp_association *asoc, > const struct sctp_chunk *chunk) > { > - static const char error[] = "Association exceeded its max_retans count"; > + static const char error[] = "Association exceeded its max_retrans count"; > size_t payload_len = sizeof(error) + sizeof(struct sctp_errhdr); > struct sctp_chunk *retval; > > -- > 2.17.0 > > Acked-by: Neil Horman