lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 23 Sep 2008 21:54:46 -0700 From: Arjan van de Ven <arjan@...radead.org> To: linux-kernel@...r.kernel.org Cc: Arjan van de Ven <arjan@...radead.org>, mingo@...e.hu, Hugh Dickins <hugh@...itas.com>, Jeremy Fitzhardinge <jeremy.fitzhardinge@...rix.com>, "Randy.Dunlap" <rdunlap@...otime.net> Subject: [PATCH 3/3] corruption check: fix various checkpatch warnings >From 9e49c38637f335d5c91a0f1c4deea7ce2c20aa34 Mon Sep 17 00:00:00 2001 From: Arjan van de Ven <arjan@...ux.intel.com> Date: Tue, 23 Sep 2008 11:09:10 -0700 Subject: [PATCH] corruption check: fix various checkpatch warnings Cleanups as suggested by Randy / checkpatch.pl Signed-off-by: Arjan van de Ven <arjan@...ux.intel.com> --- arch/x86/kernel/check.c | 8 ++++---- include/linux/kernel.h | 5 ----- 2 files changed, 4 insertions(+), 9 deletions(-) diff --git a/arch/x86/kernel/check.c b/arch/x86/kernel/check.c index b22733f..c59bfe6 100644 --- a/arch/x86/kernel/check.c +++ b/arch/x86/kernel/check.c @@ -80,7 +80,7 @@ void __init setup_bios_corruption_check(void) corruption_check_size = round_up(corruption_check_size, PAGE_SIZE); - while(addr < corruption_check_size && num_scan_areas < MAX_SCAN_AREAS) { + while (addr < corruption_check_size && num_scan_areas < MAX_SCAN_AREAS) { u64 size; addr = find_e820_area_size(addr, &size, PAGE_SIZE); @@ -119,11 +119,11 @@ void check_for_bios_corruption(void) if (!memory_corruption_check) return; - for(i = 0; i < num_scan_areas; i++) { + for (i = 0; i < num_scan_areas; i++) { unsigned long *addr = __va(scan_areas[i].addr); unsigned long size = scan_areas[i].size; - for(; size; addr++, size -= sizeof(unsigned long)) { + for (; size; addr++, size -= sizeof(unsigned long)) { if (!*addr) continue; printk(KERN_ERR "Corrupted low memory at %p (%lx phys) = %08lx\n", @@ -150,7 +150,7 @@ static void periodic_check_for_corruption(unsigned long data) -int start_periodic_check_for_corruption(void) +static int start_periodic_check_for_corruption(void) { if (!memory_corruption_check || corruption_check_period == 0) return 0; diff --git a/include/linux/kernel.h b/include/linux/kernel.h index 01085d2..b39c7ef 100644 --- a/include/linux/kernel.h +++ b/include/linux/kernel.h @@ -260,15 +260,10 @@ extern int root_mountflags; * able to scatter it around anywhere in the kernel. */ void check_for_bios_corruption(void); -int start_periodic_check_for_corruption(void); #else static inline void check_for_bios_corruption(void) { } - -static inline void start_periodic_check_for_corruption(void) -{ -} #endif /* Values used for system_state */ -- 1.5.5.1 -- Arjan van de Ven Intel Open Source Technology Centre For development, discussion and tips for power savings, visit http://www.lesswatts.org -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists