lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CANiq72n6Cvxydcef03kEo9fy=5Zd7MXYqFUGX1MBaTKF2o63nw@mail.gmail.com> Date: Thu, 26 Oct 2023 13:02:57 +0200 From: Miguel Ojeda <miguel.ojeda.sandonis@...il.com> To: FUJITA Tomonori <fujita.tomonori@...il.com> Cc: netdev@...r.kernel.org, rust-for-linux@...r.kernel.org, andrew@...n.ch, tmgross@...ch.edu, benno.lossin@...ton.me, wedsonaf@...il.com, Miguel Ojeda <ojeda@...nel.org> Subject: Re: [PATCH net-next v7 3/5] rust: add second `bindgen` pass for enum exhaustiveness checking On Thu, Oct 26, 2023 at 2:16 AM FUJITA Tomonori <fujita.tomonori@...il.com> wrote: > > From: Miguel Ojeda <ojeda@...nel.org> > > This patch makes sure that the C's enum is sync with Rust sides. If > the enum is out of sync, compiling fails with an error like the > following. > > Note that this is a temporary solution. It will be replaced with > bindgen when it supports generating the enum conversion code. > Signed-off-by: Miguel Ojeda <ojeda@...nel.org> > Signed-off-by: FUJITA Tomonori <fujita.tomonori@...il.com> Please do not modify patches from others without warning that you did so. I did not write this commit message nor agreed to this, but it looks as if I did. I even explicitly said I would send the patch independently. As I recently told you, if you want to pick it up in your series to showcase how it would work, you should have at least kept the WIP, put it at the end of the series and added RFC since it is not intended to be merged with your other patches. Cheers, Miguel
Powered by blists - more mailing lists