[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20081023231943.GA14519@orion>
Date: Fri, 24 Oct 2008 03:19:43 +0400
From: Alexander Beregalov <a.beregalov@...il.com>
To: mingo@...hat.com, linux-kernel@...r.kernel.org
Subject: [PATCH] x86/kernel/setup.c: fix warning dmi_low_memory_corruption
defined but not used
Signed-off-by: Alexander Beregalov <a.beregalov@...il.com>
---
arch/x86/kernel/setup.c | 8 ++++++--
1 files changed, 6 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kernel/setup.c b/arch/x86/kernel/setup.c
index 0fa6790..ce892b0 100644
--- a/arch/x86/kernel/setup.c
+++ b/arch/x86/kernel/setup.c
@@ -738,6 +738,7 @@ void start_periodic_check_for_corruption(void)
}
#endif
+#ifdef CONFIG_X86_RESERVE_LOW_64K
static int __init dmi_low_memory_corruption(const struct dmi_system_id *d)
{
printk(KERN_NOTICE
@@ -752,7 +753,6 @@ static int __init dmi_low_memory_corruption(const struct dmi_system_id *d)
/* List of systems that have known low memory corruption BIOS problems */
static struct dmi_system_id __initdata bad_bios_dmi_table[] = {
-#ifdef CONFIG_X86_RESERVE_LOW_64K
{
.callback = dmi_low_memory_corruption,
.ident = "AMI BIOS",
@@ -767,9 +767,13 @@ static struct dmi_system_id __initdata bad_bios_dmi_table[] = {
DMI_MATCH(DMI_BIOS_VENDOR, "Phoenix Technologies, LTD"),
},
},
-#endif
{}
};
+#else
+static struct dmi_system_id __initdata bad_bios_dmi_table[] = {
+ {}
+};
+#endif
/*
* Determine if we were loaded by an EFI loader. If so, then we have also been
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists