Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752489AbcDRQCb (ORCPT ); Mon, 18 Apr 2016 12:02:31 -0400 Received: from mout.kundenserver.de ([212.227.17.10]:65097 "EHLO mout.kundenserver.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751335AbcDRQC3 (ORCPT ); Mon, 18 Apr 2016 12:02:29 -0400 From: Arnd Bergmann To: Baolin Wang Cc: serge.hallyn@canonical.com, james.l.morris@oracle.com, serge@hallyn.com, john.stultz@linaro.org, tglx@linutronix.de, pmoore@redhat.com, sds@tycho.nsa.gov, keescook@chromium.org, john.johansen@canonical.com, casey@schaufler-ca.com, agruenba@redhat.com, viro@zeniv.linux.org.uk, neilb@suse.de, jann@thejh.net, broonie@kernel.org, christopher.s.hall@intel.com, pang.xunlei@linaro.org, harald@ccbib.org, linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org Subject: Re: [RESEND PATCH v2 3/5] security: Introduce security_settime64() Date: Mon, 18 Apr 2016 18:01:33 +0200 Message-ID: <25528989.ZvcD3CdaC6@wuerfel> User-Agent: KMail/4.11.5 (Linux/3.16.0-10-generic; KDE/4.11.5; x86_64; ; ) In-Reply-To: <50b61ce23a73b68c3c55d6d9aa416af29001205a.1438170155.git.baolin.wang@linaro.org> References: <50b61ce23a73b68c3c55d6d9aa416af29001205a.1438170155.git.baolin.wang@linaro.org> MIME-Version: 1.0 Content-Transfer-Encoding: 7Bit Content-Type: text/plain; charset="us-ascii" X-Provags-ID: V03:K0:CW1VzXLHuAoOSgFuzXFykZO+wmLAX+my/BvlP81U8m4wnwsHROw wQJ8lr3DBsuwebS6gg+T1e4Ta2dXqVbeQmNqkzLuQgssSVWhgt0/a2Ggc2V3ButXrAw752/ Q1i/sp82KDE8U9yIHiwmcgn0OSje+7Wn+9eLhsidtxmU8LrCOvbXplITdWouCTJxzbvkZ7i BqoVgUM0XiPK1WHjSAhIg== X-UI-Out-Filterresults: notjunk:1;V01:K0:Ahu+eqYCiBg=:uXsB6k/3ZrZbOpdb7zeHmY RQi2RHQ+8OX4JY298MrFAPztptdVXv2sAN/r7reg5A6ODA99zbn8HdWffZcKCliJSKNCvZMBQ dRupBKawD2VQsQZFjzsaR4r5N9z4lPZsAPobVGveJ4+MuoenoreGL20A+b9873ZNF2CjJjvyt C5pVCsRBhjbsYeJjsIBTPvN9+jINSQzhfouDaAcx2JGXZnUkTUdS3eS/o6DDcSV0t4xDS1XRX P1TXeOCBjT+xqesjnDn/NoZ6pjHqsdexQZLezvV1G3l24wqBdAN5WelXZ3L+Pq+Bvy5mFMc9q owa4SHdE0Y4+iCW/RbHg+GZxsBLzPI7KSWgf2P2AMTZZtTaanwyf53x+aCmevxC0h5f5ysFPO DPsDIWE7Ge6xg1Pp1gxr4jvo06wdJUKDXQP/B/zZtB8QBM5mHPM/dgzL0ny8axE367kI9Lawv SGAh7H2PvC8eBCXUJF1RhrlynCYCVk3mcFmx5gfe8raDl1ftde4+L/89sAVxZuazeV+Q4ZtCF cQMbVkifwYKLY2Gt0gOMYiMyd1bKq9mM9rekz854LU3kDQT8wLLVN3zLSDJX3At2ctgPB4nLL +2GwGMDjjonTINOiRBqKDWrda4BSU3kz/jQA8P3ecW8FSTrrJbAI/qhpjytOC2UiYwsoSQ5OT RXpTox3AK6Jun2fmYHUw/vLtYjPahvSjcF7c9OWN0v2vUG+01pg2txpeDEZowfPQz5HyZv10z 4QxiTgGIbGNvqv5F Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 908 Lines: 23 On Friday 08 April 2016 14:02:11 Baolin Wang wrote: > security_settime() uses a timespec, which is not year 2038 safe > on 32bit systems. Thus this patch introduces the security_settime64() > function with timespec64 type. We also convert the cap_settime() helper > function to use the 64bit types. > > Move the security_settime() to the head file as a inline function for > removing that inline helper when following up patches are fixed the > call sites. > > None of the existing hooks is using the timespec argument and therefor > the patch is not doing any functional changes. > > Signed-off-by: Baolin Wang I seem to have only received patches 3 and 4, both on my personal address and on lkml. Any idea what happened? Unless you did not mean to send these patches at all, could you resend the entire series and put me and the y2038 list on cc to all of the patches? Arnd