lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 5 May 2007 11:31:25 -0700 From: Andrew Morton <akpm@...ux-foundation.org> To: Frederik Deweerdt <deweerdt@...e.fr> Cc: linux-kernel@...r.kernel.org Subject: Re: [-mm patch] mutex.h bogus __must_check (was Re: 2.6.21-mm1) On Sat, 5 May 2007 14:14:44 +0200 Frederik Deweerdt <deweerdt@...e.fr> wrote: > On Sat, May 05, 2007 at 01:49:55AM -0700, Andrew Morton wrote: > > > > ftp://ftp.kernel.org/pub/linux/kernel/people/akpm/patches/2.6/2.6.21/2.6.21-mm1/ > > > __must_check was added to mutex_lock_nested() which returns void. This > causes the following warnings: > include/linux/mutex.h:128: warning: 'warn_unused_result' attribute ignored > > This was introduced by > broken-out/mutex_lock_interruptible-add-__must_check.patch erp. It was supposed to be on mutex_lock_interruptible(): --- a/include/linux/mutex.h~mutex_lock_interruptible-add-__must_check-must-fix +++ a/include/linux/mutex.h @@ -121,10 +121,10 @@ static inline int fastcall mutex_is_lock * Also see Documentation/mutex-design.txt. */ extern void fastcall mutex_lock(struct mutex *lock); -extern int fastcall mutex_lock_interruptible(struct mutex *lock); +extern int __must_check fastcall mutex_lock_interruptible(struct mutex *lock); #ifdef CONFIG_DEBUG_LOCK_ALLOC -extern void __must_check mutex_lock_nested(struct mutex *lock, +extern void mutex_lock_nested(struct mutex *lock, unsigned int subclass); extern int __must_check mutex_lock_interruptible_nested(struct mutex *lock, unsigned int subclass); _ - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists