.PHONY: bloatcheck
bloatcheck: busybox_old busybox_unstripped
@$(srctree)/scripts/bloat-o-meter busybox_old busybox_unstripped
+ @$(CROSS_COMPILE)size busybox_old busybox_unstripped
.PHONY: baseline
baseline: busybox_unstripped
endif
# Busybox is a stack-fatty so make sure we increase default size
-# TODO: use "make stksizes" to find & fix big stack users; should
-# just steal scripts/checkstack.pl from the kernel ...
+# TODO: use "make stksizes" to find & fix big stack users
+# (we stole scripts/checkstack.pl from the kernel... thanks guys!)
FLTFLAGS += -s 20000
header_name = fileName;
while (header_name[0] == '/') {
- static int alreadyWarned = FALSE;
+ static smallint warned;
- if (alreadyWarned == FALSE) {
+ if (!warned) {
bb_error_msg("removing leading '/' from member names");
- alreadyWarned = TRUE;
+ warned = 1;
}
header_name++;
}
int fold_main(int argc, char **argv);
int fold_main(int argc, char **argv)
{
+ char *line_out = NULL;
+ int allocated_out = 0;
char *w_opt;
int width = 80;
int i;
int c;
int column = 0; /* Screen column where next char will go. */
int offset_out = 0; /* Index in `line_out' for next char. */
- static char *line_out = NULL;
- static int allocated_out = 0;
if (istream == NULL) {
errs |= EXIT_FAILURE;
column = offset_out = 0;
continue;
}
-
-rescan:
+ rescan:
column = adjust_column(column, c);
if (column > width) {
static int next(char **argv)
{
- static int done;
+ static smallint done;
+
int statok;
if (argv) {
++_argv;
continue;
}
- statok = done = 1;
+ done = statok = 1;
} else {
- if (done++)
+ if (done)
return 0;
+ done = 1;
statok = 0;
}
if (bb_dump_skip)
static unsigned char *get(void)
{
- static int ateof = 1;
- static unsigned char *curp=NULL, *savp; /*DBU:[dave@cray.com]initialize curp */
+ static smallint ateof = 1;
+ static unsigned char *curp = NULL, *savp; /*DBU:[dave@cray.com]initialize curp */
+
int n;
int need, nread;
unsigned char *tmpp;
if (bb_dump_length != -1) {
bb_dump_length -= n;
}
- if (!(need -= n)) {
+ need -= n;
+ if (!need) {
if (bb_dump_vflag == ALL || bb_dump_vflag == FIRST
|| memcmp(curp, savp, bb_dump_blocksize)) {
if (bb_dump_vflag == DUP || bb_dump_vflag == FIRST) {
static void set_tainted(struct obj_file *f, int fd, char *m_name,
int kernel_has_tainted, int taint, const char *text1, const char *text2)
{
+ static smallint printed_info;
+
char buf[80];
int oldval;
- static int first = 1;
+
if (fd < 0 && !kernel_has_tainted)
return; /* New modutils on old kernel */
printf("Warning: loading %s will taint the kernel: %s%s\n",
m_name, text1, text2);
- if (first) {
+ if (!printed_info) {
printf(" See %s for information about tainted modules\n", TAINT_URL);
- first = 0;
+ printed_info = 1;
}
if (fd >= 0) {
read(fd, buf, sizeof(buf)-1);