Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751775AbdG1JQy (ORCPT ); Fri, 28 Jul 2017 05:16:54 -0400 Received: from mail-qk0-f193.google.com ([209.85.220.193]:37564 "EHLO mail-qk0-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751045AbdG1JQv (ORCPT ); Fri, 28 Jul 2017 05:16:51 -0400 MIME-Version: 1.0 In-Reply-To: References: <1501108037-14429-1-git-send-email-abdallah.meziti.pro@gmail.com> From: Luc Van Oostenryck Date: Fri, 28 Jul 2017 11:16:49 +0200 X-Google-Sender-Auth: hiRim1fRx6-O0EJMXJE9n2Y119M Message-ID: Subject: Re: [PATCH] thread_info: suppress sparse warning in check_copy_size() To: Linus Torvalds Cc: AbdAllah-MEZITI , luto@kernel.org, Mark Rutland , Kees Cook , Ingo Molnar , Heiko Carstens , Kyle Huey , Sahara , Al Viro , lkml , Linux-Sparse , Lance Richardson , Johannes Berg Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 326 Lines: 9 On Thu, Jul 27, 2017 at 12:41 AM, Linus Torvalds wrote: > This is wrong. The sparse version of __compiletime_object_size() > should just be fixed to take a 'const' pointer without complaints. The underlying __builtin_object_size() has been fixed in the sparse tree 6 months ago or so. -- Luc