lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <1533632163-93769-1-git-send-email-maowenan@huawei.com>
Date:   Tue, 7 Aug 2018 08:56:03 +0000
From:   Mao Wenan <maowenan@...wei.com>
To:     Peter Zijlstra <peterz@...radead.org>,
        Ingo Molnar <mingo@...hat.com>,
        Will Deacon <will.deacon@....com>
CC:     Mao Wenan <maowenan@...wei.com>, <linux-kernel@...r.kernel.org>,
        <kernel-janitors@...r.kernel.org>
Subject: [PATCH] rtmutex: Drop pointless static qualifier in rt_mutex_adjust_prio_chain()

There is no need to have the 'T *v' variable static
since new value always be assigned before use it.

Signed-off-by: Mao Wenan <maowenan@...wei.com>
---
 kernel/locking/rtmutex.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/kernel/locking/rtmutex.c b/kernel/locking/rtmutex.c
index 2823d41..ba70db8 100644
--- a/kernel/locking/rtmutex.c
+++ b/kernel/locking/rtmutex.c
@@ -472,7 +472,7 @@ static int rt_mutex_adjust_prio_chain(struct task_struct *task,
 	 * We limit the lock chain length for each invocation.
 	 */
 	if (++depth > max_lock_depth) {
-		static int prev_max;
+		int prev_max;
 
 		/*
 		 * Print this only once. If the admin changes the limit,



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ