From patchwork Fri Mar 25 01:12:08 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Andrew Morton X-Patchwork-Id: 12791171 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 45AD2C43219 for ; Fri, 25 Mar 2022 01:12:11 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id CFF2F8D001D; Thu, 24 Mar 2022 21:12:10 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id CB1B78D0005; Thu, 24 Mar 2022 21:12:10 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id B9FEF8D001D; Thu, 24 Mar 2022 21:12:10 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (relay.hostedemail.com [64.99.140.26]) by kanga.kvack.org (Postfix) with ESMTP id 9D5DA8D0005 for ; Thu, 24 Mar 2022 21:12:10 -0400 (EDT) Received: from smtpin14.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay13.hostedemail.com (Postfix) with ESMTP id 796A860135 for ; Fri, 25 Mar 2022 01:12:10 +0000 (UTC) X-FDA: 79281132420.14.1393B27 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by imf14.hostedemail.com (Postfix) with ESMTP id BB923100032 for ; Fri, 25 Mar 2022 01:12:09 +0000 (UTC) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 79A3A6187D; Fri, 25 Mar 2022 01:12:09 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id D4DE5C340EC; Fri, 25 Mar 2022 01:12:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linux-foundation.org; s=korg; t=1648170728; bh=YYOPx6tAYUSAh1j+lyoATmZ6aGpKrZHhFdYqlfAIIdc=; h=Date:To:From:In-Reply-To:Subject:From; b=CPuZt1rZj3MVeFoMddb9AqWIp6W0Wdimbz9KXYjuNXxEvZ+49b1vu/d3WgSaaZyJX WXDvs7anlIHKgy96mv6/ddlEDEWvhIYsRc3CkfVy1SD1peEaQxr++hrcvcQcOtGlVE EPV/U/ASKiEq6Hjn6Hr+KJJhUYMIGRFNY7Q/vhk8= Date: Thu, 24 Mar 2022 18:12:08 -0700 To: linmiaohe@huawei.com,elver@google.com,andreyknvl@gmail.com,pcc@google.com,akpm@linux-foundation.org,patches@lists.linux.dev,linux-mm@kvack.org,mm-commits@vger.kernel.org,torvalds@linux-foundation.org,akpm@linux-foundation.org From: Andrew Morton In-Reply-To: <20220324180758.96b1ac7e17675d6bc474485e@linux-foundation.org> Subject: [patch 071/114] kasan: update function name in comments Message-Id: <20220325011208.D4DE5C340EC@smtp.kernel.org> X-Stat-Signature: j5af77cm6ot5h1omx9rxuh8bn9xuet9y Authentication-Results: imf14.hostedemail.com; dkim=pass header.d=linux-foundation.org header.s=korg header.b=CPuZt1rZ; spf=pass (imf14.hostedemail.com: domain of akpm@linux-foundation.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=akpm@linux-foundation.org; dmarc=none X-Rspam-User: X-Rspamd-Server: rspam08 X-Rspamd-Queue-Id: BB923100032 X-HE-Tag: 1648170729-85016 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: From: Peter Collingbourne Subject: kasan: update function name in comments The function kasan_global_oob was renamed to kasan_global_oob_right, but the comments referring to it were not updated. Do so. Link: https://linux-review.googlesource.com/id/I20faa90126937bbee77d9d44709556c3dd4b40be Link: https://lkml.kernel.org/r/20220219012433.890941-1-pcc@google.com Signed-off-by: Peter Collingbourne Reviewed-by: Miaohe Lin Reviewed-by: Marco Elver Reviewed-by: Andrey Konovalov Signed-off-by: Andrew Morton --- lib/test_kasan.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) --- a/lib/test_kasan.c~kasan-update-function-name-in-comments +++ a/lib/test_kasan.c @@ -786,7 +786,7 @@ static void ksize_uaf(struct kunit *test static void kasan_stack_oob(struct kunit *test) { char stack_array[10]; - /* See comment in kasan_global_oob. */ + /* See comment in kasan_global_oob_right. */ char *volatile array = stack_array; char *p = &array[ARRAY_SIZE(stack_array) + OOB_TAG_OFF]; @@ -799,7 +799,7 @@ static void kasan_alloca_oob_left(struct { volatile int i = 10; char alloca_array[i]; - /* See comment in kasan_global_oob. */ + /* See comment in kasan_global_oob_right. */ char *volatile array = alloca_array; char *p = array - 1; @@ -814,7 +814,7 @@ static void kasan_alloca_oob_right(struc { volatile int i = 10; char alloca_array[i]; - /* See comment in kasan_global_oob. */ + /* See comment in kasan_global_oob_right. */ char *volatile array = alloca_array; char *p = array + i;