lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20201208073214.0d3bd2b8@canb.auug.org.au>
Date:   Tue, 8 Dec 2020 07:32:14 +1100
From:   Stephen Rothwell <sfr@...b.auug.org.au>
To:     Marco Elver <elver@...gle.com>
Cc:     Hui Su <sh_def@....com>, Alexander Potapenko <glider@...gle.com>,
        Dmitry Vyukov <dvyukov@...gle.com>,
        Catalin Marinas <catalin.marinas@....com>,
        Will Deacon <will@...nel.org>,
        kasan-dev <kasan-dev@...glegroups.com>,
        Linux ARM <linux-arm-kernel@...ts.infradead.org>,
        LKML <linux-kernel@...r.kernel.org>,
        Andrew Morton <akpm@...ux-foundation.org>
Subject: Re: [PATCH][next] arm64: fix the mm build error in mm/kfence/core.c

Hi Marco,

On Mon, 7 Dec 2020 15:52:07 +0100 Marco Elver <elver@...gle.com> wrote:
>
> On Sun, 6 Dec 2020 at 23:08, Marco Elver <elver@...gle.com> wrote:
> > On Sun, 6 Dec 2020 at 22:23, Stephen Rothwell <sfr@...b.auug.org.au> wrote:  
> [...]
> > > > ../arch/arm64/include/asm/kfence.h:12:2: error: implicit declaration of
> > > > function ‘set_memory_valid’ [-Werror=implicit-function-declaration]
> > > >    12 |  set_memory_valid(addr, 1, !protect);
> > > >       |  ^~~~~~~~~~~~~~~~
> > > > cc1: some warnings being treated as errors
> > > >
> > > > which introduced by commit d54febeba2ff ("kfence: use pt_regs to
> > > > generate stack trace on faults").
> > > >
> > > > Signed-off-by: Hui Su <sh_def@....com>
> > > > ---
> > > >  arch/arm64/include/asm/kfence.h | 1 +
> > > >  1 file changed, 1 insertion(+)  
> >
> > Thanks, but a patch for this is already in the -mm tree:
> > https://lore.kernel.org/mm-commits/20201205011409.o9PNsRntR%25akpm@linux-foundation.org/
> >
> > Perhaps try the latest -next?  
> 
> Although I notice that patch somehow was dropped from -mm, or maybe
> I'm not looking hard enough?

It may just be that Andrew has not published that version of his patch
series yet.

-- 
Cheers,
Stephen Rothwell

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ