[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <20200721.182617.1769882891819370159.davem@davemloft.net>
Date: Tue, 21 Jul 2020 18:26:17 -0700 (PDT)
From: David Miller <davem@...emloft.net>
To: rppt@...nel.org
Cc: sparclinux@...r.kernel.org, torvalds@...ux-foundation.org,
linux-kernel@...r.kernel.org, rppt@...ux.ibm.com
Subject: Re: [PATCH v2 0/2] sparc32: srmmu: improve type safety of
__nocache_fix()
From: Mike Rapoport <rppt@...nel.org>
Date: Sat, 27 Jun 2020 11:16:51 +0300
> From: Mike Rapoport <rppt@...ux.ibm.com>
>
> Hi,
>
> As discussed at [1] the __nocache_fix() macro in sparc's SRMMU can be made
> type safe and so the compiler will yell anout misuse of pXd pointers for
> which the __nocache_fix() is primarily used.
>
> The first patch is an fix of such misuse that I've discovered after adding
> type cast to __nocache_fix(), but to avoid breaking bisection I've made it
> the first commit.
>
> v2: rebased on v5.8-rc2+
Series applied, thanks Mike.
Powered by blists - more mailing lists