From nobody Sat Apr 18 11:20:42 2026 Received: from out-188.mta0.migadu.com (out-188.mta0.migadu.com [91.218.175.188]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id A6EBE296BBF for ; Fri, 27 Feb 2026 23:04:37 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=91.218.175.188 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1772233479; cv=none; b=Cf9ViiuJUzot0Ey/kY50yLr5e5A4ZdP0FEzQivf7nge+Zjv3yVgmUK0nZWBPU6sk6HC9ESeqcc8numTOgr/YDcIuh37DSrnsF4Dy1z76Jtj+V4Q6c8T5zkCGQ2JEK2XmnPt8HPYRDwHhpj1zHNB5f9O0GvbWMYEJzSieOzTTfOc= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1772233479; c=relaxed/simple; bh=NZeOUjA1mhRAtI1Tp5YEldT7yJrTN/zD6ScOjfzMweA=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=YwA+gTvp53AJrMH7p1at3iUHj1/e10X5o4+3QhnP/PlBwesLfStvy7A0cQW3twjMNBugwvDcfS5OY3UdwaJAkAUaZXBzIY/fI91iX8tJRv3mgW2v8CB53A4voywW/JEzi1u5xF30w9Vg0qLSPIzTwoGej+eRaiHE2Wz25JbEeoc= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.dev; spf=pass smtp.mailfrom=linux.dev; dkim=pass (1024-bit key) header.d=linux.dev header.i=@linux.dev header.b=QKN+H1zZ; arc=none smtp.client-ip=91.218.175.188 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.dev Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=linux.dev Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linux.dev header.i=@linux.dev header.b="QKN+H1zZ" X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1772233475; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=QJIIPRBWqu2HSoQ5Rn8Z/3bFqXXOfFgdn1gvbsH/uFQ=; b=QKN+H1zZ+GFTCkO2VUwohbeOaDsZz57X+e3UTOoNmKLogXZQ6dKVZHFXeCpnXe71T75FDJ RL7PSSXQRuriz2HD4smngoVQCKlrVXNhfW7h8k+hpG2nAwQBYC8K0KWsnGnaOiZnfktjyl OykLp3KGmd+4E4cpmK+0QiVQExqbrBs= From: Thorsten Blum To: Andrew Morton , Baoquan He , Vivek Goyal , Dave Young Cc: Thorsten Blum , kexec@lists.infradead.org, linux-kernel@vger.kernel.org Subject: [PATCH] crash_dump: Fix typo in function name read_key_from_user_keying Date: Sat, 28 Feb 2026 00:04:21 +0100 Message-ID: <20260227230422.859423-1-thorsten.blum@linux.dev> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Migadu-Flow: FLOW_OUT Content-Type: text/plain; charset="utf-8" The function read_key_from_user_keying() is missing an 'r' in its name. Fix the typo by renaming it to read_key_from_user_keyring(). Signed-off-by: Thorsten Blum Acked-by: Baoquan He --- kernel/crash_dump_dm_crypt.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/kernel/crash_dump_dm_crypt.c b/kernel/crash_dump_dm_crypt.c index 27a144920562..dcb69e96c6ff 100644 --- a/kernel/crash_dump_dm_crypt.c +++ b/kernel/crash_dump_dm_crypt.c @@ -139,7 +139,7 @@ static int restore_dm_crypt_keys_to_thread_keyring(void) return 0; } =20 -static int read_key_from_user_keying(struct dm_crypt_key *dm_key) +static int read_key_from_user_keyring(struct dm_crypt_key *dm_key) { const struct user_key_payload *ukp; struct key *key; @@ -387,7 +387,7 @@ static int build_keys_header(void) =20 strscpy(keys_header->keys[i].key_desc, key->description, KEY_DESC_MAX_LEN); - r =3D read_key_from_user_keying(&keys_header->keys[i]); + r =3D read_key_from_user_keyring(&keys_header->keys[i]); if (r !=3D 0) { kexec_dprintk("Failed to read key %s\n", keys_header->keys[i].key_desc); --=20 Thorsten Blum GPG: 1D60 735E 8AEF 3BE4 73B6 9D84 7336 78FD 8DFE EAD4