lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <9cd2163833e4144a519100d09ac6ec87@208suo.com>
Date:   Fri, 21 Jul 2023 08:52:18 +0000
From:   sunran001@...suo.com
To:     tglx@...utronix.de, mingo@...hat.com, bp@...en8.de,
        dave.hansen@...ux.intel.com, x86@...nel.org
Cc:     linux-kernel@...r.kernel.org
Subject: [PATCH] x86/apic: remove space before '('

Fixes the following checkpatch errors:

ERROR: space prohibited after that open parenthesis '('

Signed-off-by: Ran Sun <sunran001@...suo.com>
---
  arch/x86/kernel/apic/apic.c | 20 ++++++++++----------
  1 file changed, 10 insertions(+), 10 deletions(-)

diff --git a/arch/x86/kernel/apic/apic.c b/arch/x86/kernel/apic/apic.c
index 8d46733ad94b..adf06b05a221 100644
--- a/arch/x86/kernel/apic/apic.c
+++ b/arch/x86/kernel/apic/apic.c
@@ -566,7 +566,7 @@ static const struct x86_cpu_id deadline_match[] 
__initconst = {
  	X86_MATCH_INTEL_FAM6_MODEL_STEPPINGS(HASWELL_X, X86_STEPPINGS(0x2, 
0x2), 0x3a), /* EP */
  	X86_MATCH_INTEL_FAM6_MODEL_STEPPINGS(HASWELL_X, X86_STEPPINGS(0x4, 
0x4), 0x0f), /* EX */

-	X86_MATCH_INTEL_FAM6_MODEL( BROADWELL_X,	0x0b000020),
+	X86_MATCH_INTEL_FAM6_MODEL(BROADWELL_X, 0x0b000020),

  	X86_MATCH_INTEL_FAM6_MODEL_STEPPINGS(BROADWELL_D, X86_STEPPINGS(0x2, 
0x2), 0x00000011),
  	X86_MATCH_INTEL_FAM6_MODEL_STEPPINGS(BROADWELL_D, X86_STEPPINGS(0x3, 
0x3), 0x0700000e),
@@ -577,18 +577,18 @@ static const struct x86_cpu_id deadline_match[] 
__initconst = {
  	X86_MATCH_INTEL_FAM6_MODEL_STEPPINGS(SKYLAKE_X, X86_STEPPINGS(0x4, 
0x4), 0x02000014),
  	X86_MATCH_INTEL_FAM6_MODEL_STEPPINGS(SKYLAKE_X, X86_STEPPINGS(0x5, 
0xf), 0),

-	X86_MATCH_INTEL_FAM6_MODEL( HASWELL,		0x22),
-	X86_MATCH_INTEL_FAM6_MODEL( HASWELL_L,		0x20),
-	X86_MATCH_INTEL_FAM6_MODEL( HASWELL_G,		0x17),
+	X86_MATCH_INTEL_FAM6_MODEL(HASWELL, 0x22),
+	X86_MATCH_INTEL_FAM6_MODEL(HASWELL_L, 0x20),
+	X86_MATCH_INTEL_FAM6_MODEL(HASWELL_G, 0x17),

-	X86_MATCH_INTEL_FAM6_MODEL( BROADWELL,		0x25),
-	X86_MATCH_INTEL_FAM6_MODEL( BROADWELL_G,	0x17),
+	X86_MATCH_INTEL_FAM6_MODEL(BROADWELL, 0x25),
+	X86_MATCH_INTEL_FAM6_MODEL(BROADWELL_G, 0x17),

-	X86_MATCH_INTEL_FAM6_MODEL( SKYLAKE_L,		0xb2),
-	X86_MATCH_INTEL_FAM6_MODEL( SKYLAKE,		0xb2),
+	X86_MATCH_INTEL_FAM6_MODEL(SKYLAKE_L, 0xb2),
+	X86_MATCH_INTEL_FAM6_MODEL(SKYLAKE, 0xb2),

-	X86_MATCH_INTEL_FAM6_MODEL( KABYLAKE_L,		0x52),
-	X86_MATCH_INTEL_FAM6_MODEL( KABYLAKE,		0x52),
+	X86_MATCH_INTEL_FAM6_MODEL(KABYLAKE_L, 0x52),
+	X86_MATCH_INTEL_FAM6_MODEL(KABYLAKE, 0x52),

  	{},
  };

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ