lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 5 Mar 2022 15:55:27 -0500 From: Henry Sloan <henryksloan@...il.com> To: unlisted-recipients:; (no To-header on input) Cc: pbonzini@...hat.com, Henry Sloan <henryksloan@...il.com>, kvm@...r.kernel.org, linux-kernel@...r.kernel.org Subject: [PATCH 5/6] KVM: Use typical style for block comments Signed-off-by: Henry Sloan <henryksloan@...il.com> --- virt/kvm/irqchip.c | 6 ++++-- virt/kvm/kvm_main.c | 6 +++--- 2 files changed, 7 insertions(+), 5 deletions(-) diff --git a/virt/kvm/irqchip.c b/virt/kvm/irqchip.c index 69a327c043d7..80708f6ec9d9 100644 --- a/virt/kvm/irqchip.c +++ b/virt/kvm/irqchip.c @@ -120,8 +120,10 @@ static void free_irq_routing_table(struct kvm_irq_routing_table *rt) void kvm_free_irq_routing(struct kvm *kvm) { - /* Called only during vm destruction. Nobody can use the pointer - at this stage */ + /* + * Called only during vm destruction. Nobody can use the pointer + * at this stage + */ struct kvm_irq_routing_table *rt = rcu_access_pointer(kvm->irq_routing); free_irq_routing_table(rt); diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c index 1988dd081606..1a9f20e3fa2d 100644 --- a/virt/kvm/kvm_main.c +++ b/virt/kvm/kvm_main.c @@ -2182,7 +2182,7 @@ static int kvm_clear_dirty_log_protect(struct kvm *kvm, * never includes any bits beyond the length of the memslot (if * the length is not aligned to 64 pages), therefore it is not * a problem if userspace sets them in log->dirty_bitmap. - */ + */ if (mask) { flush = true; kvm_arch_mmu_enable_log_dirty_pt_masked(kvm, memslot, @@ -5245,8 +5245,8 @@ static int kvm_debugfs_open(struct inode *inode, struct file *file, /* * The debugfs files are a reference to the kvm struct which - * is still valid when kvm_destroy_vm is called. kvm_get_kvm_safe - * avoids the race between open and the removal of the debugfs directory. + * is still valid when kvm_destroy_vm is called. kvm_get_kvm_safe + * avoids the race between open and the removal of the debugfs directory. */ if (!kvm_get_kvm_safe(stat_data->kvm)) return -ENOENT; -- 2.35.1
Powered by blists - more mailing lists