| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-Id: <20100301.183955.258219526.davem@davemloft.net> Date: Mon, 01 Mar 2010 18:39:55 -0800 (PST) From: David Miller <davem@...emloft.net> To: stefanr@...6.in-berlin.de Cc: eric.dumazet@...il.com, linux-kernel@...r.kernel.org, netdev@...r.kernel.org Subject: Re: sparse checking prevented by "net: fix kmemcheck annotations" From: Stefan Richter <stefanr@...6.in-berlin.de> Date: Mon, 01 Mar 2010 17:18:06 +0100 > Eric Dumazet wrote: >> [PATCH] net: fix protocol sk_buff field >> >> Commit e992cd9b72a18 (kmemcheck: make bitfield annotations truly no-ops >> when disabled) allows us to revert a workaround we did in the past to >> not add holes in sk_buff structure. >> >> This patch partially reverts commit 14d18a81b5171 >> (net: fix kmemcheck annotations) so that sparse doesnt complain: >> >> include/linux/skbuff.h:357:41: error: invalid bitfield specifier for >> type restricted __be16. > > Great, very appreciated. Applied, thanks everyone. -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists