Received: by 2002:a05:7412:f690:b0:e2:908c:2ebd with SMTP id ej16csp1278857rdb; Fri, 20 Oct 2023 13:49:31 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHsuXsnTqGI1wKqnRcRvfLtP59HP3xJa692+hh1xEja1GKX1Zp3FAG621F9ZwhcTDUX5nf5 X-Received: by 2002:a17:902:e809:b0:1c9:d908:d60c with SMTP id u9-20020a170902e80900b001c9d908d60cmr2731992plg.63.1697834971454; Fri, 20 Oct 2023 13:49:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1697834971; cv=none; d=google.com; s=arc-20160816; b=rPDp89GacYC15AuWAq5zaxNoQ3VEZqxg7f+/kKi+EM0q4IRSYXcui77EM2N2789Xrk fax7mTxId42J/LaPzGFg3H5iCM+nrmrqJPXUjlrwCgHDYU/vAqheKhHafPQKAOkFstUa Sz/oUUdhI2nmClSsx+3KJIHB97nUPskcWFsDkvgHDeZsO82ip1fWTdunZsSEZLeo/c+I PEgxx698H0qDOKT/AQte/PrbMfhoqZyJM/dTS/TeBcn1hkcqgxBti1ah7nS0isjbbcWG Xu79eLnCKIN0L0g8Fco8ey1yLr+ZfQ2kM6wYxWAyXCK4hN0R+Z5Jdq/BjTKf3o/NfkqM ENXw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=xj5FkpbfMV6qYJZZahO0tdshZG5EZHCSRz8iPwg/u1k=; fh=5ymglSWGQCwnoECr5D4NncnS4lBZcJt3LG1cpRjGOwE=; b=pdE/CBvhLTLAXDuJVuK8rHpE5JcLnEToeKgQ4wrui7i6NjkBM8akbvKqeBEg/pq2hl OZhXqLrmJSDiOqZpXR3dL2jGStHDOF4dlONvHKg2820YiSBYiaw67ASeSdFLrdQcV2Pv 8SsSfFsoWbx3tfA2/H1uRwxOprcolEmjtma27PRqp5a81k8tUf6k7UE0U5Lw8la6JKwC xMhbZEdarm25ALjzXU/O1GlywSJxAgmhCmaPuSZKA+GkssxAuhimD1cE5Z8tSFwvnuBO QndP8dBysTjADjvnb1K5FPapNUb6hA95Bi+Vrepb64IX3LF0fMxBUBwM+t9iTNb6Y0yq hX3w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from howler.vger.email (howler.vger.email. [2620:137:e000::3:4]) by mx.google.com with ESMTPS id f5-20020a170902684500b001c5c632aea4si2453821pln.217.2023.10.20.13.49.31 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 20 Oct 2023 13:49:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) client-ip=2620:137:e000::3:4; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by howler.vger.email (Postfix) with ESMTP id A0C858348DAF; Fri, 20 Oct 2023 13:49:28 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at howler.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230464AbjJTUtX (ORCPT + 99 others); Fri, 20 Oct 2023 16:49:23 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37346 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230222AbjJTUtW (ORCPT ); Fri, 20 Oct 2023 16:49:22 -0400 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C2372B3 for ; Fri, 20 Oct 2023 13:49:20 -0700 (PDT) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 19220C433CA; Fri, 20 Oct 2023 20:49:20 +0000 (UTC) Date: Fri, 20 Oct 2023 16:49:17 -0400 From: Steven Rostedt To: Jonathan Corbet Cc: LKML Subject: Re: [PATCH] seq_buf: fix a misleading comment Message-ID: <20231020164917.6fb6f89b@gandalf.local.home> In-Reply-To: <87pm19kp0m.fsf@meer.lwn.net> References: <87pm19kp0m.fsf@meer.lwn.net> X-Mailer: Claws Mail 3.19.1 (GTK+ 2.24.33; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on howler.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (howler.vger.email [0.0.0.0]); Fri, 20 Oct 2023 13:49:28 -0700 (PDT) On Fri, 20 Oct 2023 14:38:49 -0600 Jonathan Corbet wrote: > The comment for seq_buf_has_overflowed() says that an overflow condition is > marked by len == size, but that's not what the code is testing. Make the > comment match reality. > I guess we can add: Fixes: 8cd709ae7658a ("tracing: Have seq_buf use full buffer") Thanks! -- Steve > Signed-off-by: Jonathan Corbet > --- > include/linux/seq_buf.h | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/include/linux/seq_buf.h b/include/linux/seq_buf.h > index 515d7fcb9634..026302765494 100644 > --- a/include/linux/seq_buf.h > +++ b/include/linux/seq_buf.h > @@ -39,7 +39,7 @@ seq_buf_init(struct seq_buf *s, char *buf, unsigned int size) > > /* > * seq_buf have a buffer that might overflow. When this happens > - * the len and size are set to be equal. > + * len is set to be greater than size. > */ > static inline bool > seq_buf_has_overflowed(struct seq_buf *s)