lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sun, 11 Jan 2015 13:55:04 +0200 From: "Michael S. Tsirkin" <mst@...hat.com> To: Arnd Bergmann <arnd@...db.de> Cc: linux-kernel@...r.kernel.org, linux-arch@...r.kernel.org Subject: Re: [PATCH v2 00/40] uaccess: fix sparse warning on get/put_user for bitwise types On Tue, Jan 06, 2015 at 08:08:57PM +0100, Arnd Bergmann wrote: > On Tuesday 06 January 2015 17:43:28 Michael S. Tsirkin wrote: > > > > I tested this on x86 only. Since it's just adding __force, should be > > trivially safe everywhere? > > > > > > Arnd, did you merge v1 already? If yes, can you please replace with > > this version? > > > > I haven't merged it yet. I see that more Acks and some comments are > coming in. Once those are done, could you send a pull request? It > might be useful to have a branch that can be shared with architecture > trees if necessary to avoid merge conflicts. > > Arnd OK, I got a bunch of acks, mostly it seems to have calmed down. Heiko Carstens (s390 maintainer) says he won't apply whitespace changes: http://mid.gmane.org/20150107083339.GB4365@osiris so I dropped s390 patches. The rest is tagged: git://git.kernel.org/pub/scm/linux/kernel/git/mst/vhost.git tags/uaccess_for_upstream and pushed out to linux-next. I'll give it a couple of days there, then send a pull request - Arnd, you meant I should send it to you, right? -- MST -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists