Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp1131101pxk; Fri, 18 Sep 2020 04:45:38 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw6YJZJiEhu3Nc3Q+hgQkF6t+Ph8IypNlxfiyIM+3c5W3jcB0TDKCNA3rBK/W1idyB5Wmvk X-Received: by 2002:a17:906:a101:: with SMTP id t1mr34777797ejy.203.1600429538054; Fri, 18 Sep 2020 04:45:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1600429538; cv=none; d=google.com; s=arc-20160816; b=CNPE09jcJeVN0jEBaAFll4X/Ng+QgXffn9Edml0e20tD5JSzr1yysk7BAw6d8LNpxv BL5+/g+7WdKTYydaHSILlxLJt0/8PyKJNBJd5/4bFEITQO3k1AUNs0YF9Qkg9vwY3PMd vHxJe5To47ATHWf6PvBoroUaTA3e57T7ZXLkieC1xNnVScks7G5udQVzQotpgdWJlRCH ggq5ho0dPmeW7AaLd67FgEGU0yZqCVcUVX2I+VvWjk31eYyAYZyIR3EtwRSc2sh/aXKT ofPaXpUu9xE9BmnW7OdsAlnC5sm7e/4+yuImcIiuGEuHLaulZ26++JtcKZTCt698+gwj KZog== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=Z+Ama2Gn35NOMvXg+GDJdwPlC6h7Yc/5hgNBNtL9jUY=; b=ctcFMpB/JZFwrfmJBzhl/PUfUfiW5MubFiDXz4S7AxfPHO5gQSFaGRm77Mb98S8hfZ +6CFsuSJWaKkkJfAKznNLU4znZg5A3EFlIlOu5kqA+nuJZykgOz/ETbq33djEjs/LE2b AOhn7bm6zqeJIXlaBl5UQGV0Er93GY7/J7ts49jyxz6tB6yU2INCe1FiSQXtwoaelnPB Hkm16B6Z87MWMvUGSbRSz+hk6Oyn2yScOvZPULPDBRAgWPBKN9Y/QD5hCkvFlLjCRVjc ZnH/sdywfPmTTNmARDX5RrI/ulOp4RAp8k0O3gydgTzhG5Bg/O9/tMm0fZxkCIi72GNq StRw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b="sFh/HHTO"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n11si1959417ejh.372.2020.09.18.04.45.15; Fri, 18 Sep 2020 04:45:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b="sFh/HHTO"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726365AbgIRLoA (ORCPT + 99 others); Fri, 18 Sep 2020 07:44:00 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58476 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726064AbgIRLn7 (ORCPT ); Fri, 18 Sep 2020 07:43:59 -0400 Received: from mail-pj1-x1043.google.com (mail-pj1-x1043.google.com [IPv6:2607:f8b0:4864:20::1043]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B7682C06174A for ; Fri, 18 Sep 2020 04:43:59 -0700 (PDT) Received: by mail-pj1-x1043.google.com with SMTP id mm21so3029980pjb.4 for ; Fri, 18 Sep 2020 04:43:59 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Z+Ama2Gn35NOMvXg+GDJdwPlC6h7Yc/5hgNBNtL9jUY=; b=sFh/HHTOb26PpO+ksRIrJCdmApW1t5VywnOdPyUzGIrw5Rbwj3WMJL40NtTIEFL6AS /lx2uK4Ykc/3gzLN9LEzeNwb43AzA5+LpUbw11A3p7pF2vSsdF1oFOmS0qEp4LPRh67f mcOc75W8mSvx8mBa0OvstLr0qk9JsPiUHvMWC9mVnjlIr/TOTToZoncnx7GsabThWYmc z0Hv+BcPS0Tbym+ibXXN2ck4SCHKjgsMTmsO3TXlwDN+yjWVuvp0Doo0Pls9cufQjkqv zaUjpORJE12lyCrcY36729qZQzyW6h48J9jJj1hq+GnbrPQo8wbuyyXUv2baq0C0G9WQ acrQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Z+Ama2Gn35NOMvXg+GDJdwPlC6h7Yc/5hgNBNtL9jUY=; b=b5XVwmSvSH5ki/gycurTcNtPQTzCWSbHwlBrXZwxCnG+L2nTLKYrZGLKTYtawt5bKf xaw48mbK+Y+Eh6EMPOsmchckoFLA0PFzQIeFkXG3v/aIGJWms1sWheoPza5oEcZN6hS1 +ARhZw0yrggWUpxCBHaT4bdhxjB0BBwqRhTkGpprt4LonRny7wBH7cOTZ/zlIT69myiu lTxAMgMFEFXo2YWPGwVndv/9z7wh37yMDbuh/PUPTOg54PTcCCf/Y48fH2/ldcNa9GgO owP8/4qttGxvUyBANbJXTV+Eqxk82HDkNou5wayM/leZVhGvLV+QMhsJGyCrr8Y1xzjy l9pg== X-Gm-Message-State: AOAM531OMXK1e9HQu9j5kZRg4jPk7g6mCCxROS/+yF9nzHNIEM8mIzCs 4vGS41PN1lV2Oj8hM7UponD/AbWqMxK8HBjrqdes9w== X-Received: by 2002:a17:90b:140c:: with SMTP id jo12mr12638805pjb.41.1600429438957; Fri, 18 Sep 2020 04:43:58 -0700 (PDT) MIME-Version: 1.0 References: <20200917134407.63487-1-standby24x7@gmail.com> In-Reply-To: <20200917134407.63487-1-standby24x7@gmail.com> From: Andrey Konovalov Date: Fri, 18 Sep 2020 13:43:48 +0200 Message-ID: Subject: Re: [PATCH linux-next] docs:dev-tools: Fix typo in Documentation/dev-tools To: Masanari Iida Cc: Jonathan Corbet , "open list:DOCUMENTATION" , LKML , Andrey Ryabinin , Alexander Potapenko , Dmitry Vyukov , Catalin Marinas , Randy Dunlap Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Sep 17, 2020 at 3:44 PM Masanari Iida wrote: > > This patch fixes some spelling typos found in > Documentation/dev-tools. > > Signed-off-by: Masanari Iida > --- > Documentation/dev-tools/kasan.rst | 4 ++-- > Documentation/dev-tools/kcov.rst | 2 +- > Documentation/dev-tools/kmemleak.rst | 2 +- > 3 files changed, 4 insertions(+), 4 deletions(-) > > diff --git a/Documentation/dev-tools/kasan.rst b/Documentation/dev-tools/kasan.rst > index c09c9ca2ff1c..49ec0ab6cfc7 100644 > --- a/Documentation/dev-tools/kasan.rst > +++ b/Documentation/dev-tools/kasan.rst > @@ -328,7 +328,7 @@ using something like insmod or modprobe. The module is called ``test_kasan``. > ~~~~~~~~~~~~~ > > With ``CONFIG_KUNIT`` built-in, ``CONFIG_KASAN_KUNIT_TEST`` can be built-in > -on any architecure that supports KASAN. These and any other KUnit > +on any architecture that supports KASAN. These and any other KUnit > tests enabled will run and print the results at boot as a late-init > call. > > @@ -349,5 +349,5 @@ converted to KUnit. These tests can be run only as a module with > ``CONFIG_KASAN`` built-in. The type of error expected and the > function being run is printed before the expression expected to give > an error. Then the error is printed, if found, and that test > -should be interpretted to pass only if the error was the one expected > +should be interpreted to pass only if the error was the one expected > by the test. > diff --git a/Documentation/dev-tools/kcov.rst b/Documentation/dev-tools/kcov.rst > index 8548b0b04e43..d2c4c27e1702 100644 > --- a/Documentation/dev-tools/kcov.rst > +++ b/Documentation/dev-tools/kcov.rst > @@ -243,7 +243,7 @@ handles as they don't belong to a particular subsystem. The bytes 4-7 are > currently reserved and must be zero. In the future the number of bytes > used for the subsystem or handle ids might be increased. > > -When a particular userspace proccess collects coverage via a common > +When a particular userspace process collects coverage via a common > handle, kcov will collect coverage for each code section that is annotated > to use the common handle obtained as kcov_handle from the current > task_struct. However non common handles allow to collect coverage > diff --git a/Documentation/dev-tools/kmemleak.rst b/Documentation/dev-tools/kmemleak.rst > index a41a2d238af2..1c935f41cd3a 100644 > --- a/Documentation/dev-tools/kmemleak.rst > +++ b/Documentation/dev-tools/kmemleak.rst > @@ -229,7 +229,7 @@ Testing with kmemleak-test > > To check if you have all set up to use kmemleak, you can use the kmemleak-test > module, a module that deliberately leaks memory. Set CONFIG_DEBUG_KMEMLEAK_TEST > -as module (it can't be used as bult-in) and boot the kernel with kmemleak > +as module (it can't be used as built-in) and boot the kernel with kmemleak > enabled. Load the module and perform a scan with:: > > # modprobe kmemleak-test Reviewed-by: Andrey Konovalov