Message ID | 992a302542059fc40d86ea560eac413ecb31b6a1.1703188911.git.andreyknvl@google.com (mailing list archive) |
---|---|
State | New |
Headers | show
Return-Path: <owner-linux-mm@kvack.org> X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 27AC6C46CCD for <linux-mm@archiver.kernel.org>; Thu, 21 Dec 2023 20:05:14 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id DE03F6B0089; Thu, 21 Dec 2023 15:05:05 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id D682E6B008C; Thu, 21 Dec 2023 15:05:05 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id C0B5D6B0092; Thu, 21 Dec 2023 15:05:05 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id ADAD96B0089 for <linux-mm@kvack.org>; Thu, 21 Dec 2023 15:05:05 -0500 (EST) Received: from smtpin30.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay06.hostedemail.com (Postfix) with ESMTP id 5B317A160F for <linux-mm@kvack.org>; Thu, 21 Dec 2023 20:05:05 +0000 (UTC) X-FDA: 81591904170.30.ACE2898 Received: from out-187.mta1.migadu.com (out-187.mta1.migadu.com [95.215.58.187]) by imf30.hostedemail.com (Postfix) with ESMTP id A78E08001D for <linux-mm@kvack.org>; Thu, 21 Dec 2023 20:05:03 +0000 (UTC) Authentication-Results: imf30.hostedemail.com; dkim=pass header.d=linux.dev header.s=key1 header.b=D1d+7ZX8; spf=pass (imf30.hostedemail.com: domain of andrey.konovalov@linux.dev designates 95.215.58.187 as permitted sender) smtp.mailfrom=andrey.konovalov@linux.dev; dmarc=pass (policy=none) header.from=linux.dev ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1703189103; a=rsa-sha256; cv=none; b=y+/VmDa9SnfIuKvnAlQWDLEm9SUKwGZ3YjJmKC/EfKthcco0jsiJLO1yqbnTO+P9ELakl9 4k1lSGo5J5qAe6lgjmFjW6Zb0n/JoH5TR2IYfwVC63u2mMkLSbg/XtgmcwkmtIvvUIV0ZJ FC5vc226ntomwVzLvaboRpk0PxF1W6o= ARC-Authentication-Results: i=1; imf30.hostedemail.com; dkim=pass header.d=linux.dev header.s=key1 header.b=D1d+7ZX8; spf=pass (imf30.hostedemail.com: domain of andrey.konovalov@linux.dev designates 95.215.58.187 as permitted sender) smtp.mailfrom=andrey.konovalov@linux.dev; dmarc=pass (policy=none) header.from=linux.dev ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1703189103; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=yJpT5npX9+Mi4/2vKIXBMX5Zb3QcQCwOWJP1qz8pE0M=; b=ucBQJLM9/Uc0hVLiffB5S2XfyYLM+nYfkTajUCj1y0preLz+x/4Zqcd3AcOTJB3n4C1hFQ iJUz8M2DZgvfYqmbCcry8E/XMDMrM4vE9/4HEQKg1fAc2LLnIeCUGEISHHcB6X2QYdU5mO DitGZIhTtIWsXczBc+QBAIlS0rlYHnI= X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1703189101; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=yJpT5npX9+Mi4/2vKIXBMX5Zb3QcQCwOWJP1qz8pE0M=; b=D1d+7ZX8K/5XJRivQkOs08EDlsgfMyw9smPDLE+z0+/A5XJO1xiUqRuZmE0KKjzXfCVjOl B9Re2Z/G6jvedBYwergcLq/h7gQe6/xiCIpFFxCDZnzStwThLFWfJDZzzYMVmxbBjsmc1F kpPC6wGFc7aq4172XBiDkq6JKDgFx/0= From: andrey.konovalov@linux.dev To: Marco Elver <elver@google.com> Cc: Andrey Konovalov <andreyknvl@gmail.com>, Alexander Potapenko <glider@google.com>, Dmitry Vyukov <dvyukov@google.com>, Andrey Ryabinin <ryabinin.a.a@gmail.com>, kasan-dev@googlegroups.com, Andrew Morton <akpm@linux-foundation.org>, linux-mm@kvack.org, linux-kernel@vger.kernel.org, Andrey Konovalov <andreyknvl@google.com> Subject: [PATCH mm 05/11] kasan: update kasan_poison documentation comment Date: Thu, 21 Dec 2023 21:04:47 +0100 Message-Id: <992a302542059fc40d86ea560eac413ecb31b6a1.1703188911.git.andreyknvl@google.com> In-Reply-To: <cover.1703188911.git.andreyknvl@google.com> References: <cover.1703188911.git.andreyknvl@google.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Migadu-Flow: FLOW_OUT X-Rspamd-Server: rspam08 X-Rspamd-Queue-Id: A78E08001D X-Stat-Signature: 99tnrzawps6z3e1areqgax3d9iwe9d8z X-Rspam-User: X-HE-Tag: 1703189103-436621 X-HE-Meta: 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 1FNBlJjP CXBdN3e5vYnE+anaX5qyqTW7Q7ighWUGVnuHql5I44KpYkJOsg2h0mFZCgkgMwSjmDU1HgD96pyxk9PrwrYTooTSfAYOiSdPNPiKC5kjgWODADWKCm84UkSjsa83wzw4bvc0AVdwLsomeqCFNR+YO+3w+tLzC7KNVwAQZLt5hcDNVzQ0LJp1IeSMquMrQZLKvtCz1ARNdIANR3wXDq2jdGQH5Lw== X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: <linux-mm.kvack.org> List-Subscribe: <mailto:majordomo@kvack.org> List-Unsubscribe: <mailto:majordomo@kvack.org> |
Series |
kasan: assorted clean-ups
|
expand
|
diff --git a/mm/kasan/kasan.h b/mm/kasan/kasan.h index 38af25b9c89c..1c34511090d7 100644 --- a/mm/kasan/kasan.h +++ b/mm/kasan/kasan.h @@ -513,8 +513,6 @@ static inline bool kasan_byte_accessible(const void *addr) * @size - range size, must be aligned to KASAN_GRANULE_SIZE * @value - value that's written to metadata for the range * @init - whether to initialize the memory range (only for hardware tag-based) - * - * The size gets aligned to KASAN_GRANULE_SIZE before marking the range. */ void kasan_poison(const void *addr, size_t size, u8 value, bool init);