lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20200602155631.GA1638@paulmck-ThinkPad-P72>
Date:   Tue, 2 Jun 2020 08:56:31 -0700
From:   "Paul E. McKenney" <paulmck@...nel.org>
To:     mingo@...nel.org, tglx@...utronix.de
Cc:     geert@...ux-m68k.org, wangkefeng.wang@...wei.com,
        linux-kernel@...r.kernel.org
Subject: [GIT PULL rcu/urgent] Fix printk format warning

Hello!

This pull request contains a single commit that fixes a printk() format
error that appears on 32-bit architectures.  This could be argued to
be a minor bug, but it is a regression from this week's merge window,
and is in code that is never used in production.  Therefore the risk of
adding this late in process is quite low, more than worth it to fix the
irritation/confusion that the bug can cause.

And a big "Thank you!!!" to Geert (CCed) for bringing this to my
attention, as it has slipped through the cracks earlier.

The following changes since commit b1fcf9b83c4149c63d1e0c699e85f93cbe28e211:

  rcu: Provide __rcu_is_watching() (2020-05-19 15:51:21 +0200)

are available in the git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/paulmck/linux-rcu.git urgent-for-mingo

for you to fetch changes up to b3e2d20973db3ec87a6dd2fee0c88d3c2e7c2f61:

  rcuperf: Fix printk format warning (2020-06-02 08:41:37 -0700)

----------------------------------------------------------------
Kefeng Wang (1):
      rcuperf: Fix printk format warning

 kernel/rcu/rcuperf.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ