lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <1607003162-18444-1-git-send-email-cainiao666999@gmail.com>
Date:   Thu,  3 Dec 2020 21:46:02 +0800
From:   Mingzhe Yang <cainiao666999@...il.com>
To:     tglx@...utronix.de
Cc:     mingo@...hat.com, bp@...en8.de, x86@...nel.org, hpa@...or.com,
        nivedita@...m.mit.edu, ardb@...nel.org, keescook@...omium.org,
        jroedel@...e.de, linux-kernel@...r.kernel.org,
        Mingzhe Yang <cainiao666999@...il.com>
Subject: [PATCH] x86_64: coding style and whitespace fixup

This patch fixes some whitespace issues.

Signed-off-by: Mingzhe Yang <cainiao666999@...il.com>
---
 arch/x86/boot/compressed/head_64.S | 12 ++++++------
 1 file changed, 6 insertions(+), 6 deletions(-)

diff --git a/arch/x86/boot/compressed/head_64.S b/arch/x86/boot/compressed/head_64.S
index 017de6c..57b3cf4 100644
--- a/arch/x86/boot/compressed/head_64.S
+++ b/arch/x86/boot/compressed/head_64.S
@@ -151,7 +151,7 @@ SYM_FUNC_START(startup_32)
 
 	/* Target address to relocate to for decompression */
 	addl	BP_init_size(%esi), %ebx
-	subl	$ rva(_end), %ebx
+	subl	$rva(_end), %ebx
 
 /*
  * Prepare for entering 64 bit mode
@@ -186,7 +186,7 @@ SYM_FUNC_START(startup_32)
 
 	/* Build Level 4 */
 	leal	rva(pgtable + 0)(%ebx), %edi
-	leal	0x1007 (%edi), %eax
+	leal	0x1007(%edi), %eax
 	movl	%eax, 0(%edi)
 	addl	%edx, 4(%edi)
 
@@ -282,7 +282,7 @@ SYM_FUNC_START(efi32_stub_entry)
 
 	call	1f
 1:	pop	%ebp
-	subl	$ rva(1b), %ebp
+	subl	$rva(1b), %ebp
 
 	movl	%esi, rva(efi32_boot_args+8)(%ebp)
 SYM_INNER_LABEL(efi32_pe_stub_entry, SYM_L_LOCAL)
@@ -372,7 +372,7 @@ SYM_CODE_START(startup_64)
 
 	/* Target address to relocate to for decompression */
 	movl	BP_init_size(%rsi), %ebx
-	subl	$ rva(_end), %ebx
+	subl	$rva(_end), %ebx
 	addq	%rbp, %rbx
 
 	/* Set up the stack */
@@ -512,7 +512,7 @@ SYM_FUNC_START_ALIAS(efi_stub_entry)
 	and	$~0xf, %rsp			/* realign the stack */
 	movq	%rdx, %rbx			/* save boot_params pointer */
 	call	efi_main
-	movq	%rbx,%rsi
+	movq	%rbx, %rsi
 	leaq	rva(startup_64)(%rax), %rax
 	jmp	*%rax
 SYM_FUNC_END(efi64_stub_entry)
@@ -727,7 +727,7 @@ SYM_FUNC_START(efi32_pe_entry)
 
 	call	1f
 1:	pop	%ebx
-	subl	$ rva(1b), %ebx
+	subl	$rva(1b), %ebx
 
 	/* Get the loaded image protocol pointer from the image handle */
 	leal	-4(%ebp), %eax
-- 
1.8.3.1

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ