lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 1 Dec 2014 18:00:38 -0500 From: Mike Snitzer <snitzer@...hat.com> To: Milan Broz <gmazyland@...il.com> Cc: kernel-janitors@...r.kernel.org, linux-kernel@...r.kernel.org, linux-raid@...r.kernel.org, Julia Lawall <Julia.Lawall@...6.fr>, dm-devel@...hat.com, Alasdair Kergon <agk@...hat.com> Subject: Re: [PATCH 5/8 v2] dm: replace memset by memzero_explicit On Mon, Dec 01 2014 at 4:03pm -0500, Milan Broz <gmazyland@...il.com> wrote: > On 11/30/2014 06:03 PM, Julia Lawall wrote: > > From: Julia Lawall <Julia.Lawall@...6.fr> > > > > Memset on a local variable may be removed when it is called just before the > > variable goes out of scope. Using memzero_explicit defeats this > > optimization. A simplified version of the semantic patch that makes this > > change is as follows: (http://coccinelle.lip6.fr/) > > Ack, but I submitted the same patch a week ago.... > > https://www.redhat.com/archives/dm-devel/2014-November/msg00084.html > > Mike, please could you add this to linux-next tree or you want this > to go through Herbert's tree? > (I do not think it is good idea for DM patches.) I staged it in linux-next for 3.19 inclusion, see: https://git.kernel.org/cgit/linux/kernel/git/device-mapper/linux-dm.git/commit/?h=dm-for-3.19&id=a722201f9075b28be140bc13f8ec07bf6a42edd4 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists