lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 31 Oct 2007 18:37:10 -0400
From:	Mathieu Desnoyers <mathieu.desnoyers@...ymtl.ca>
To:	akpm@...ux-foundation.org, linux-kernel@...r.kernel.org
Subject: [patch 00/28] cmpxchg_local and cmpxchg64_local patches, cleaned up

Hi,

Here is a repost of those patches after running them through checkpatch.

I added a compile check to each architecture implementing cmpxchg64_local that
verifies if the argument size is 8 bytes.

Sorry about the coding style state in which those patches were : I tried to
follow the coding style of the existing header code, which is, to be polite,
disappointing.

I left the "volatile" in the function headers, since I do not want to take any
decision in that aspect without being fully aware of the consequences. If we
remove them in those functions, we should clean up the surrounding, already
existing, functions as well.

The only checkpatch errors left are related to inline assembly code, which does
not seem to follow the same rules.

Mathieu

-- 
Mathieu Desnoyers
Computer Engineering Ph.D. Student, Ecole Polytechnique de Montreal
OpenPGP key fingerprint: 8CD5 52C3 8E3C 4140 715F  BA06 3F25 A8FE 3BAE 9A68
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ