lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 27 Jul 2007 11:44:25 +0200 (MEST) From: Yoann Padioleau <padator@...adoo.fr> To: kernel-janitors@...r.kernel.org Cc: starvik@...s.com, dev-etrax@...s.com, akpm@...ux-foundation.org, linux-kernel@...r.kernel.org Subject: [PATCH 05/68] 0 -> NULL, for arch/cris When comparing a pointer, it's clearer to compare it to NULL than to 0. Here is an excerpt of the semantic patch: @@ expression *E; @@ E == - 0 + NULL @@ expression *E; @@ E != - 0 + NULL Signed-off-by: Yoann Padioleau <padator@...adoo.fr> Cc: starvik@...s.com Cc: dev-etrax@...s.com Cc: akpm@...ux-foundation.org --- fault.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/cris/mm/fault.c b/arch/cris/mm/fault.c index 8672ab7..d5b1e3d 100644 --- a/arch/cris/mm/fault.c +++ b/arch/cris/mm/fault.c @@ -448,7 +448,7 @@ find_fixup_code(struct pt_regs *regs) { const struct exception_table_entry *fixup; - if ((fixup = search_exception_tables(instruction_pointer(regs))) != 0) { + if ((fixup = search_exception_tables(instruction_pointer(regs))) != NULL) { /* Adjust the instruction pointer in the stackframe. */ instruction_pointer(regs) = fixup->fixup; arch_fixup(regs); - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists