Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp7525684rwl; Fri, 30 Dec 2022 09:41:14 -0800 (PST) X-Google-Smtp-Source: AMrXdXvt8DiKEFtJa2azNK0+2pxVg3vntQw3xzsF/YJwegBkMTEgQUDqE4N5IFS5StqYrT5ZrWC/ X-Received: by 2002:a17:907:8b09:b0:7c0:e5c8:d439 with SMTP id sz9-20020a1709078b0900b007c0e5c8d439mr29995887ejc.3.1672422074681; Fri, 30 Dec 2022 09:41:14 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1672422074; cv=none; d=google.com; s=arc-20160816; b=VFEeqM7UQ4DVoz1xvDUTZDcKYyElYVSoGqMEiO0nuGGrXvnqhU+MIhB5gvJm8KcSYJ wEEPFccVAGYJvxJgQ+vVWTjknNjc6oejOnO8ed5kUFdd5EE5d3NHP8E0wmfxT2u1ljwA 0ELZA6OsDgdvLsPEw58lgGl5gAeN+i9NitqpSanTHQt3e0Cf+gdWijW8+xUJGahXZ9hX ygWqxcebweXYkj/xhTh6Z8ns5+MloUbx0y7IIe9nxKZg6XrWsLs+d9uFhlOfJWQSuTJR zZ8GUQEDi5jykzA1/VpQsOLQP5Nl4Fa1x2HGAhr5LoPs5N+/99cvcz6yCms4gMSWCkri febw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=fO2Ta8gQoZusE1bBuaw217knTKoCUDuwlkal8bO/pZc=; b=bIs+GHONvpwV2k/PR0zR1sNy33sSqzQX+u0/XH/g1Ol34XiaZ40AV+cTz1kJ5vB+yX B9s66vukfybqtNavCpibs+d1ag6WnafQIMTrC0ePcE5S7aFworzJVd2biWcuTBfywLSf l4jEZju1p8f52ULf+BTQ/GXflqoLChaqzIcd3DjSGw9SuU6+QycwbcrH2/3nkILVki5p o2AqiXo0AiG2FskIzaqkHb536y2A3U46J9YcOLx6oIqqIaG/1NHy3f/DiunzCYY8cavd 9GY2//TaELDhAjL9KFzts8y3C9GcNcm8Km1Y1ZibFXZXVqvpIAxWrcifL0YJDWMvzQjy Ui0Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kolabnow.com header.s=dkim20160331 header.b=stoRQRgU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id y17-20020a056402441100b0046bf2cb7a3asi20388811eda.578.2022.12.30.09.40.59; Fri, 30 Dec 2022 09:41:14 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kolabnow.com header.s=dkim20160331 header.b=stoRQRgU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235325AbiL3RXz (ORCPT + 63 others); Fri, 30 Dec 2022 12:23:55 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:32906 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229464AbiL3RXv (ORCPT ); Fri, 30 Dec 2022 12:23:51 -0500 X-Greylist: delayed 170 seconds by postgrey-1.37 at lindbergh.monkeyblade.net; Fri, 30 Dec 2022 09:23:48 PST Received: from mx.kolabnow.com (mx.kolabnow.com [212.103.80.154]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 473E6FD19; Fri, 30 Dec 2022 09:23:48 -0800 (PST) Received: from localhost (unknown [127.0.0.1]) by mx.kolabnow.com (Postfix) with ESMTP id BF6D81468; Fri, 30 Dec 2022 18:23:46 +0100 (CET) Authentication-Results: ext-mx-out002.mykolab.com (amavisd-new); dkim=pass (4096-bit key) reason="pass (just generated, assumed good)" header.d=kolabnow.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kolabnow.com; h= content-transfer-encoding:mime-version:message-id:date:date :subject:subject:from:from:received:received:received; s= dkim20160331; t=1672421024; x=1674235425; bh=fO2Ta8gQoZusE1bBuaw 217knTKoCUDuwlkal8bO/pZc=; b=stoRQRgUZaZP+9RRiZOa0fBrItmxqx9CpFD I6GcCG1eS1EPz+dDlPs3I2IhV5jlOTR6hMT+Hphmotjah2jp6FGFIpNs5NJlilrI fnKR71YKO+Wm2yQyzZraxsLQ2BBWGbHn4VrPefba196HmlFydB7dVIWW160bUc0z Ssm/WZKA9etZMRwucEIZSMouYcAEvMrJXo7gVx+26ZqqM0X/c/dKwKrJOFBLmWwF 3GD13UMg5Ltm0JboZ3sP3kYAa0QCTwq9E7hOibOEYFBwn3dCyhz8NDtcMmUWaPFN lCYXK1GS24ONpSNntsI7xKVnzd8FDbdKq4qJZ+KUSja2TIji9IX40zD98Z7vQALW U7j0s5A8vgMWfV5Iq0CbC8Cyi4rfaIi/a2RSvNPutQJnmPmQ6PZf7/wXWwI99s+T jpTVJs2v1YlYfCEGrZ7xSr6kugecEF9usD75FvOgha0ow+R2s9NE6PaG7LBGtWe4 KXrmX6tO3vFK72RBHViM/kHQmYZ6azUJSEJhYpMrvoAxRSbVFdYRCqE5l70bHGZQ o9whxJ87hTD6KR7WTyViax/+GvJx/0n3NTA6MKGKUzaMMP7hQE4XKIy9pXGVgyH2 GewHDKBzWv3CjEDm6efgXrXySM0qPtpx4yin5Ic+9gNjjOEjMEwRXCWw10UJQ3zY LGE759MY= X-Virus-Scanned: amavisd-new at mykolab.com X-Spam-Score: -1.9 X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 Received: from mx.kolabnow.com ([127.0.0.1]) by localhost (ext-mx-out002.mykolab.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Q2XVluE6iL6v; Fri, 30 Dec 2022 18:23:44 +0100 (CET) Received: from int-mx003.mykolab.com (unknown [10.9.13.3]) by mx.kolabnow.com (Postfix) with ESMTPS id DBE1A1467; Fri, 30 Dec 2022 18:23:42 +0100 (CET) Received: from ext-subm003.mykolab.com (unknown [10.9.6.3]) by int-mx003.mykolab.com (Postfix) with ESMTPS id 922E1254E; Fri, 30 Dec 2022 18:23:42 +0100 (CET) From: Federico Vaga To: Jonathan Corbet Cc: Federico Vaga , linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH V2] doc: fix typo in botching up ioctls Date: Fri, 30 Dec 2022 18:23:28 +0100 Message-Id: <20221230172328.58612-1-federico.vaga@vaga.pv.it> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The type contained a typo `uintprt` -> `uintptr` Signed-off-by: Federico Vaga --- Documentation/process/botching-up-ioctls.rst | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) v1 -> v2 fix the typo in the commit message diff --git a/Documentation/process/botching-up-ioctls.rst b/Documentation/process/botching-up-ioctls.rst index ba4667ab396b..9739b88463a5 100644 --- a/Documentation/process/botching-up-ioctls.rst +++ b/Documentation/process/botching-up-ioctls.rst @@ -41,7 +41,7 @@ will need to add a 32-bit compat layer: structures to the kernel, or if the kernel checks the structure size, which e.g. the drm core does. - * Pointers are __u64, cast from/to a uintprt_t on the userspace side and + * Pointers are __u64, cast from/to a uintptr_t on the userspace side and from/to a void __user * in the kernel. Try really hard not to delay this conversion or worse, fiddle the raw __u64 through your code since that diminishes the checking tools like sparse can provide. The macro -- 2.30.2