Randy Dunlap
unread,Jan 24, 2023, 1:17:04 PM1/24/23Sign in to reply to author
Sign in to forward
You do not have permission to delete messages in this group
Sign in to report message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to linux-...@vger.kernel.org, Randy Dunlap, Andrew Morton, Marco Elver, Dmitry Vyukov, Steven Rostedt, kasa...@googlegroups.com
Fix spelling in lib/ Kconfig files.
(reported by codespell)
Signed-off-by: Randy Dunlap <
rdu...@infradead.org>
Cc: Andrew Morton <
ak...@linux-foundation.org>
Cc: Marco Elver <
el...@google.com>
Cc: Dmitry Vyukov <
dvy...@google.com>
Cc: Steven Rostedt <
ros...@goodmis.org>
Cc:
kasa...@googlegroups.com
---
lib/Kconfig.debug | 2 +-
lib/Kconfig.kcsan | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff -- a/lib/Kconfig.debug b/lib/Kconfig.debug
--- a/lib/Kconfig.debug
+++ b/lib/Kconfig.debug
@@ -1876,7 +1876,7 @@ config FUNCTION_ERROR_INJECTION
help
Add fault injections into various functions that are annotated with
ALLOW_ERROR_INJECTION() in the kernel. BPF may also modify the return
- value of theses functions. This is useful to test error paths of code.
+ value of these functions. This is useful to test error paths of code.
If unsure, say N
diff -- a/lib/Kconfig.kcsan b/lib/Kconfig.kcsan
--- a/lib/Kconfig.kcsan
+++ b/lib/Kconfig.kcsan
@@ -194,7 +194,7 @@ config KCSAN_WEAK_MEMORY
Enable support for modeling a subset of weak memory, which allows
detecting a subset of data races due to missing memory barriers.
- Depends on KCSAN_STRICT, because the options strenghtening certain
+ Depends on KCSAN_STRICT, because the options strengthening certain
plain accesses by default (depending on !KCSAN_STRICT) reduce the
ability to detect any data races invoving reordered accesses, in
particular reordered writes.