lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <tip-8cb562b1d56fad42cbee44bdc9bc64cea41a0a8c@git.kernel.org> Date: Tue, 12 Dec 2017 07:07:53 -0800 From: tip-bot for Mark Rutland <tipbot@...or.com> To: linux-tip-commits@...r.kernel.org Cc: joe@...ches.com, hpa@...or.com, peterz@...radead.org, paulmck@...ux.vnet.ibm.com, linux-kernel@...r.kernel.org, torvalds@...ux-foundation.org, mingo@...nel.org, apw@...onical.com, mark.rutland@....com, tglx@...utronix.de Subject: [tip:locking/urgent] checkpatch: Remove ACCESS_ONCE() warning Commit-ID: 8cb562b1d56fad42cbee44bdc9bc64cea41a0a8c Gitweb: https://git.kernel.org/tip/8cb562b1d56fad42cbee44bdc9bc64cea41a0a8c Author: Mark Rutland <mark.rutland@....com> AuthorDate: Mon, 27 Nov 2017 10:38:24 +0000 Committer: Ingo Molnar <mingo@...nel.org> CommitDate: Tue, 12 Dec 2017 13:22:10 +0100 checkpatch: Remove ACCESS_ONCE() warning Now that ACCESS_ONCE() has been excised from the kernel, any uses will result in a build error, and we no longer need to whine about it in checkpatch. This patch removes the newly redundant warning. Tested-by: Paul E. McKenney <paulmck@...ux.vnet.ibm.com> Signed-off-by: Mark Rutland <mark.rutland@....com> Acked-by: Joe Perches <joe@...ches.com> Cc: Andy Whitcroft <apw@...onical.com> Cc: Linus Torvalds <torvalds@...ux-foundation.org> Cc: Peter Zijlstra <peterz@...radead.org> Cc: Thomas Gleixner <tglx@...utronix.de> Cc: acme@...hat.com Link: http://lkml.kernel.org/r/20171127103824.36526-5-mark.rutland@arm.com Signed-off-by: Ingo Molnar <mingo@...nel.org> --- scripts/checkpatch.pl | 22 ---------------------- 1 file changed, 22 deletions(-) diff --git a/scripts/checkpatch.pl b/scripts/checkpatch.pl index 040aa79..31031f1 100755 --- a/scripts/checkpatch.pl +++ b/scripts/checkpatch.pl @@ -6233,28 +6233,6 @@ sub process { } } -# whine about ACCESS_ONCE - if ($^V && $^V ge 5.10.0 && - $line =~ /\bACCESS_ONCE\s*$balanced_parens\s*(=(?!=))?\s*($FuncArg)?/) { - my $par = $1; - my $eq = $2; - my $fun = $3; - $par =~ s/^\(\s*(.*)\s*\)$/$1/; - if (defined($eq)) { - if (WARN("PREFER_WRITE_ONCE", - "Prefer WRITE_ONCE(<FOO>, <BAR>) over ACCESS_ONCE(<FOO>) = <BAR>\n" . $herecurr) && - $fix) { - $fixed[$fixlinenr] =~ s/\bACCESS_ONCE\s*\(\s*\Q$par\E\s*\)\s*$eq\s*\Q$fun\E/WRITE_ONCE($par, $fun)/; - } - } else { - if (WARN("PREFER_READ_ONCE", - "Prefer READ_ONCE(<FOO>) over ACCESS_ONCE(<FOO>)\n" . $herecurr) && - $fix) { - $fixed[$fixlinenr] =~ s/\bACCESS_ONCE\s*\(\s*\Q$par\E\s*\)/READ_ONCE($par)/; - } - } - } - # check for mutex_trylock_recursive usage if ($line =~ /mutex_trylock_recursive/) { ERROR("LOCKING",
Powered by blists - more mailing lists