[<prev] [next>] [day] [month] [year] [list]
Message-ID:
<KUZPR04MB8965486F5D00D5B7BCC0B4738F3EA@KUZPR04MB8965.apcprd04.prod.outlook.com>
Date: Mon, 25 Aug 2025 11:09:20 +0000
From: mingzhu.wang(王明珠) <mingzhu.wang@...nssion.com>
To: "kees@...nel.org" <kees@...nel.org>, "mingo@...hat.com"
<mingo@...hat.com>, "peterz@...radead.org" <peterz@...radead.org>,
"akpm@...ux-foundation.org" <akpm@...ux-foundation.org>, "david@...hat.com"
<david@...hat.com>
CC: "dietmar.eggemann@....com" <dietmar.eggemann@....com>, "mgorman@...e.de"
<mgorman@...e.de>, "vbabka@...e.cz" <vbabka@...e.cz>, "rppt@...nel.org"
<rppt@...nel.org>, "surenb@...gle.com" <surenb@...gle.com>, "mhocko@...e.com"
<mhocko@...e.com>, "linux-mm@...ck.org" <linux-mm@...ck.org>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>, Jiazi Li
<jqqlijiazi@...il.com>
Subject: [PATCH] kernel/fork: Update obsolete use_mm references to
kthread_use_mm
The comment for get_task_mm() in kernel/fork.c incorrectly references the deprecated function `use_mm()`, which has been renamed to `kthread_use_mm()` in kernel/kthread.c.
This patch updates the documentation to reflect the current function names, ensuring accuracy when developers refer to the kernel thread memory context API.
No functional changes were introduced.
Signed-off-by: mingzhu.wang <mingzhu.wang@...nssion.com>
---
kernel/fork.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/kernel/fork.c b/kernel/fork.c index c4ada32598bd..64e228c541bc 100644
--- a/kernel/fork.c
+++ b/kernel/fork.c
@@ -1312,7 +1312,7 @@ struct file *get_task_exe_file(struct task_struct *task)
* @task: The task.
*
* Returns %NULL if the task has no mm. Checks PF_KTHREAD (meaning
- * this kernel workthread has transiently adopted a user mm with use_mm,
+ * this kernel workthread has transiently adopted a user mm with
+ kthread_use_mm,
* to do its AIO) is not set and if so returns a reference to it, after
* bumping up the use count. User must release the mm via mmput()
* after use. Typically used by /proc and ptrace.
--
2.34.1
Powered by blists - more mailing lists