lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 2 Oct 2020 16:30:12 +0800 From: Coly Li <colyli@...e.de> To: David Miller <davem@...emloft.net> Cc: linux-block@...r.kernel.org, linux-nvme@...ts.infradead.org, netdev@...r.kernel.org, open-iscsi@...glegroups.com, linux-scsi@...r.kernel.org, ceph-devel@...r.kernel.org, linux-kernel@...r.kernel.org, chaitanya.kulkarni@....com, cleech@...hat.com, hch@....de, amwang@...hat.com, eric.dumazet@...il.com, hare@...e.de, idryomov@...il.com, jack@...e.com, jlayton@...nel.org, axboe@...nel.dk, lduncan@...e.com, michaelc@...wisc.edu, mskorzhinskiy@...arflare.com, philipp.reisner@...bit.com, sagi@...mberg.me, vvs@...tuozzo.com, vbabka@...e.com Subject: Re: [PATCH v9 0/7] Introduce sendpage_ok() to detect misused sendpage in network related drivers On 2020/10/2 03:48, David Miller wrote: > From: David Miller <davem@...emloft.net> > Date: Thu, 01 Oct 2020 12:43:45 -0700 (PDT) > >> Series applied and queued up for -stable, thank you. > > Actually, this doesn't even build: > > In file included from ./arch/x86/include/asm/bug.h:93, > from ./include/linux/bug.h:5, > from ./include/linux/mmdebug.h:5, > from ./include/linux/mm.h:9, > from net/socket.c:55: > net/socket.c: In function ‘kernel_sendpage’: > ./include/asm-generic/bug.h:97:3: error: too few arguments to function ‘__warn_printk’ > 97 | __warn_printk(arg); \ > | ^~~~~~~~~~~~~ > > Was this even build tested? > Hi David, Obviously my fault and no excuse for leaking this uncompleted version to you. I just re-post a v10 version which I make sure all patches are the latest version. Sorry for the inconvenience and thank you in advance for taking this set. Coly Li
Powered by blists - more mailing lists