lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 17 Aug 2012 12:33:22 +0800 From: Michael Wang <wangyun@...ux.vnet.ibm.com> To: LKML <linux-kernel@...r.kernel.org>, linux-raid@...r.kernel.org, linux-mm@...ck.org, "netdev@...r.kernel.org" <netdev@...r.kernel.org>, netfilter@...r.kernel.org, coreteam@...filter.org, netfilter-devel@...r.kernel.org CC: neilb@...e.de, catalin.marinas@....com, David Miller <davem@...emloft.net>, kaber@...sh.net, pablo@...filter.org, "paulmck@...ux.vnet.ibm.com" <paulmck@...ux.vnet.ibm.com> Subject: [PATCH 0/3] raid, kmemleak, netfilter: replace list_for_each_continue_rcu with new interface From: Michael Wang <wangyun@...ux.vnet.ibm.com> This patch set will replace the list_for_each_continue_rcu with the new interface list_for_each_entry_continue_rcu, so we could remove the old one later. Changed: raid: in "next_active_rdev" kmemleak: in "kmemleak_seq_next" netfilter: in "nf_iterate" Tested: raid: mdadm command with an internal bitmap. kmemleak: enable kmemleak and check the info it captured. netfilter: add rule to iptables and check result by ping. nfqnl_test which is a test utility of libnetfilter_queue. All testing are using printk to make sure the code we want test was invoked. Signed-off-by: Michael Wang <wangyun@...ux.vnet.ibm.com> --- drivers/md/bitmap.c | 9 +++------ mm/kmemleak.c | 6 ++---- net/netfilter/core.c | 11 +++++++---- 3 files changed, 12 insertions(+), 14 deletions(-) -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists