lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1342406154-24001-1-git-send-email-alex.shi@intel.com>
Date:	Mon, 16 Jul 2012 10:35:54 +0800
From:	Alex Shi <alex.shi@...el.com>
To:	rusty@...tcorp.com.au, kosaki.motohiro@...fujitsu.com
Cc:	alex.shi@...el.com, akpm@...ux-foundation.org,
	paul.gortmaker@...driver.com, linux-kernel@...r.kernel.org
Subject: [PATCH 2/2] cpumask: cpumask_scnprintf() comments correction

The function has no parameter @len now, so need to remove it from
comments to avoid kernel-doc warning:

alexs@...ian:~/linux-next$ scripts/kernel-doc -man
include/linux/cpumask.h | split-man.pl /tmp/man
....
Creating /tmp/man/cpumask_scnprintf.9
Warning(include/linux/cpumask.h:602): Excess function parameter 'len'
description in 'cpulist_parse'

Signed-off-by: Alex Shi <alex.shi@...el.com>
---
 include/linux/cpumask.h |    1 -
 1 files changed, 0 insertions(+), 1 deletions(-)

diff --git a/include/linux/cpumask.h b/include/linux/cpumask.h
index 8bf1c27..5bad959 100644
--- a/include/linux/cpumask.h
+++ b/include/linux/cpumask.h
@@ -593,7 +593,6 @@ static inline int cpulist_scnprintf(char *buf, int len,
 /**
  * cpulist_parse_user - extract a cpumask from a user string of ranges
  * @buf: the buffer to extract from
- * @len: the length of the buffer
  * @dstp: the cpumask to set.
  *
  * Returns -errno, or 0 for success.
-- 
1.7.5.4

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ