Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp240072pxb; Wed, 18 Nov 2020 03:21:29 -0800 (PST) X-Google-Smtp-Source: ABdhPJxi2W9bb/cjzwtip1r24uFU6AhkSKWPxiTD1ez/Mzi9Pa201/56153MTQNbDtb8GukB8+mC X-Received: by 2002:a17:906:d8b0:: with SMTP id qc16mr23217551ejb.268.1605698488609; Wed, 18 Nov 2020 03:21:28 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605698488; cv=none; d=google.com; s=arc-20160816; b=05L+8+2x5ORZRfROBQ6x8EF4MJycB+W1ZFIN8HezinhgaXVSH7oQYW5LeBoKTSkXJW osQIidSOCZFrf6lyu2LWcIZbAQusQ+g/9ckn6l9D9h6yWguY31tNoZVsNvSM0mAib7vw vIzimbdQmNqMnJl4dnJsaaVLVmZC9rX1Ahl5h7XCYy3RWmtqlCh5UeWPSLw3NUcS0Mj4 920ByWixMJg3Fq6dlXRAY+ZAeP90NxUTwFYBD5pqZnRUeFTNXDdNY+RtbkG/J3dv616e BByxje04PMYsmIARUERj/mJnZC9nR4t60P5zvPBWmqDvA0tITmfiZFQ7Cqik+IiitZ7X zpWA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=/ovjSkkj+pP7zpXzoV2FaBY80rRmAkeAXTToEnVDEWw=; b=YMjDQqtMCb61sDnpj4EEbohCgkQCzbexXVvd6WC9m+SpWie7JAR7xlkhDqSedQfwsP dohW4SabJi1T1DVwzmsyFZx9v9Wh4Ms/QRhSSEPnWfEZ7c6kz8aCOusyftoVEmh9R8Vu A/mWMHZQfk1g7gJZ74KjhyViQYHpPv9veejM1ycsni2ORf7MV1ReBj7vWkEbsC3NgRSf grnl0GwXcUGbDC1PNyDdKySwmhuwLleP2woyRtavJAH0yfEWpE0vwjJFcwsB2dnO6Qdv 1mQ5sC6qt3kRQeofjX1f9DXd4RD3OD5WmORzrFSxgXSqPJ18BxVoXl19RzKrYySbFdW4 paHw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@privacyrequired.com header.s=stigmate header.b=mMgCOAbD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bx4si15791804edb.505.2020.11.18.03.21.06; Wed, 18 Nov 2020 03:21:28 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@privacyrequired.com header.s=stigmate header.b=mMgCOAbD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727859AbgKRLRL (ORCPT + 99 others); Wed, 18 Nov 2020 06:17:11 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37540 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727812AbgKRLRJ (ORCPT ); Wed, 18 Nov 2020 06:17:09 -0500 Received: from latitanza.investici.org (latitanza.investici.org [IPv6:2001:888:2000:56::19]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7BB69C0613D4 for ; Wed, 18 Nov 2020 03:17:09 -0800 (PST) Received: from mx3.investici.org (unknown [127.0.0.1]) by latitanza.investici.org (Postfix) with ESMTP id 4Cbg5T4cCyz8shP; Wed, 18 Nov 2020 11:07:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=privacyrequired.com; s=stigmate; t=1605697677; bh=/ovjSkkj+pP7zpXzoV2FaBY80rRmAkeAXTToEnVDEWw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=mMgCOAbDjQ+yGDUHcYfa9kc9nDG2pwfSWDacKs/gYhxxw7jGSdwNFr6vnbLYR6EBz PrDr1/5L0eSxcTJ3jcwibtQ7ipw3xVF3O+FW3gq/hhy1XZmk43rLAsMm0Z5vBUUlHM mmeSUYZva9uKATjxFT7NNNTPHdi69npYBI0wVb/g= Received: from [82.94.249.234] (mx3.investici.org [82.94.249.234]) (Authenticated sender: laniel_francis@privacyrequired.com) by localhost (Postfix) with ESMTPSA id 4Cbg5S686vz8sgF; Wed, 18 Nov 2020 11:07:56 +0000 (UTC) From: laniel_francis@privacyrequired.com To: akpm@linux-foundation.org Cc: linux-hardening@vger.kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, dja@axtens.net, keescook@chromium.org, Francis Laniel Subject: [PATCH v5 5/5] Correct wrong filenames in comment. Date: Wed, 18 Nov 2020 12:07:31 +0100 Message-Id: <20201118110731.15833-6-laniel_francis@privacyrequired.com> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20201118110731.15833-1-laniel_francis@privacyrequired.com> References: <20201118110731.15833-1-laniel_francis@privacyrequired.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Francis Laniel In lkdtm.h, files targeted in comments are named "lkdtm_file.c" while there are named "file.c" in directory. Signed-off-by: Francis Laniel Acked-by: Kees Cook --- drivers/misc/lkdtm/lkdtm.h | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/drivers/misc/lkdtm/lkdtm.h b/drivers/misc/lkdtm/lkdtm.h index 138f06254b61..6aa6d6a1a839 100644 --- a/drivers/misc/lkdtm/lkdtm.h +++ b/drivers/misc/lkdtm/lkdtm.h @@ -6,7 +6,7 @@ #include -/* lkdtm_bugs.c */ +/* bugs.c */ void __init lkdtm_bugs_init(int *recur_param); void lkdtm_PANIC(void); void lkdtm_BUG(void); @@ -35,7 +35,7 @@ void lkdtm_CORRUPT_PAC(void); void lkdtm_FORTIFY_OBJECT(void); void lkdtm_FORTIFY_SUBOBJECT(void); -/* lkdtm_heap.c */ +/* heap.c */ void __init lkdtm_heap_init(void); void __exit lkdtm_heap_exit(void); void lkdtm_OVERWRITE_ALLOCATION(void); @@ -47,7 +47,7 @@ void lkdtm_SLAB_FREE_DOUBLE(void); void lkdtm_SLAB_FREE_CROSS(void); void lkdtm_SLAB_FREE_PAGE(void); -/* lkdtm_perms.c */ +/* perms.c */ void __init lkdtm_perms_init(void); void lkdtm_WRITE_RO(void); void lkdtm_WRITE_RO_AFTER_INIT(void); @@ -62,7 +62,7 @@ void lkdtm_EXEC_NULL(void); void lkdtm_ACCESS_USERSPACE(void); void lkdtm_ACCESS_NULL(void); -/* lkdtm_refcount.c */ +/* refcount.c */ void lkdtm_REFCOUNT_INC_OVERFLOW(void); void lkdtm_REFCOUNT_ADD_OVERFLOW(void); void lkdtm_REFCOUNT_INC_NOT_ZERO_OVERFLOW(void); @@ -83,10 +83,10 @@ void lkdtm_REFCOUNT_SUB_AND_TEST_SATURATED(void); void lkdtm_REFCOUNT_TIMING(void); void lkdtm_ATOMIC_TIMING(void); -/* lkdtm_rodata.c */ +/* rodata.c */ void lkdtm_rodata_do_nothing(void); -/* lkdtm_usercopy.c */ +/* usercopy.c */ void __init lkdtm_usercopy_init(void); void __exit lkdtm_usercopy_exit(void); void lkdtm_USERCOPY_HEAP_SIZE_TO(void); @@ -98,7 +98,7 @@ void lkdtm_USERCOPY_STACK_FRAME_FROM(void); void lkdtm_USERCOPY_STACK_BEYOND(void); void lkdtm_USERCOPY_KERNEL(void); -/* lkdtm_stackleak.c */ +/* stackleak.c */ void lkdtm_STACKLEAK_ERASING(void); /* cfi.c */ -- 2.20.1