[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <dvdu27leqnwvxgz6rcgsdbovw2576dtcbmxuaznevjvijdxp6s@t64lg6bckgkd>
Date: Tue, 11 Nov 2025 18:52:49 +0100
From: Uwe Kleine-König <u.kleine-koenig@...libre.com>
To: Andy Shevchenko <andriy.shevchenko@...el.com>
Cc: Daniel Gomez <da.gomez@...nel.org>, Kees Cook <kees@...nel.org>,
Luis Chamberlain <mcgrof@...nel.org>, Hans Verkuil <hverkuil+cisco@...nel.org>,
Malcolm Priestley <tvboxspy@...il.com>, Mauro Carvalho Chehab <mchehab@...nel.org>,
Hans Verkuil <hverkuil@...nel.org>, Rusty Russell <rusty@...tcorp.com.au>,
Petr Pavlu <petr.pavlu@...e.com>, Sami Tolvanen <samitolvanen@...gle.com>,
linux-kernel@...r.kernel.org, linux-media@...r.kernel.org, linux-modules@...r.kernel.org,
linux-hardening@...r.kernel.org
Subject: Re: [PATCH v2 0/3] module: Add compile-time check for embedded NUL
characters
Helo Andy,
On Tue, Nov 11, 2025 at 12:42:36PM +0100, Andy Shevchenko wrote:
> Folks, are you aware that this change blown up the sparse?
> Now there is a "bad constant expression" to each MODULE_*() macro line.
>
> Nice that Uwe is in the Cc list, so IIRC he is Debian maintainer for sparse
> and perhaps has an influence to it to some extent.
To be honest, in the nearer past I'm very passive on the sparse
maintainer side and even stopped using it as it fails on guard locking.
My impression is also that upstream isn't very active any more, but that
might have been temporal and wrong as I stopped looking.
If there is an outcome and a patch to cherry-pick into the Debian
packaging, give me a ping.
Uwe
Download attachment "signature.asc" of type "application/pgp-signature" (489 bytes)
Powered by blists - more mailing lists