lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20190429120936.GA21405@infradead.org> Date: Mon, 29 Apr 2019 05:09:36 -0700 From: Christoph Hellwig <hch@...radead.org> To: Nicholas Mc Guire <hofrat@...dl.org> Cc: Jamal Hadi Salim <jhs@...atatu.com>, Cong Wang <xiyou.wangcong@...il.com>, Jiri Pirko <jiri@...nulli.us>, "David S. Miller" <davem@...emloft.net>, netdev@...r.kernel.org, linux-kernel@...r.kernel.org Subject: Re: [PATCH] net_sched: force endianness annotation On Sun, Apr 28, 2019 at 07:54:59AM +0200, Nicholas Mc Guire wrote: > While the endiannes is being handled correctly sparse was unhappy with > the missing annotation as be16_to_cpu()/be32_to_cpu() expects a __be16 > respectively __be32. To mitigate this annotation issue forced annotation > is introduced. Note that this patch has no impact on the generated binary. Every __force needs a comment explaining why it actually іs fine in this particular case. Even more bonus points for finding a solution that does not require the __force.
Powered by blists - more mailing lists