lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <f7ca9b619b85ea1c2a07a045197f92bd@208suo.com>
Date:   Fri, 21 Jul 2023 08:08:58 +0000
From:   sunran001@...suo.com
To:     tglx@...utronix.de, mingo@...hat.com, bp@...en8.de,
        dave.hansen@...ux.intel.com
Cc:     linux-kernel@...r.kernel.org
Subject: [PATCH] x86/head: "foo * bar" should be "foo *bar"

ERROR: "foo * bar" should be "foo *bar"

Signed-off-by: Ran Sun <sunran001@...suo.com>
---
  arch/x86/kernel/head64.c | 4 ++--
  1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/arch/x86/kernel/head64.c b/arch/x86/kernel/head64.c
index 49f7629b17f7..20d35bfd70af 100644
--- a/arch/x86/kernel/head64.c
+++ b/arch/x86/kernel/head64.c
@@ -445,7 +445,7 @@ static unsigned long get_cmd_line_ptr(void)

  static void __init copy_bootdata(char *real_mode_data)
  {
-	char * command_line;
+	char *command_line;
  	unsigned long cmd_line_ptr;

  	/*
@@ -471,7 +471,7 @@ static void __init copy_bootdata(char 
*real_mode_data)
  	sme_unmap_bootdata(real_mode_data);
  }

-asmlinkage __visible void __init __noreturn x86_64_start_kernel(char * 
real_mode_data)
+asmlinkage __visible void __init __noreturn x86_64_start_kernel(char 
*real_mode_data)
  {
  	/*
  	 * Build-time sanity checks on the kernel image and module

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ