lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Mon, 6 Apr 2009 23:13:50 +0200
From:	Bartlomiej Zolnierkiewicz <bzolnier@...il.com>
To:	Sergei Shtylyov <sshtylyov@...mvista.com>
Cc:	Atsushi Nemoto <anemo@....ocn.ne.jp>, linux-ide@...r.kernel.org,
	linux-kernel@...r.kernel.org
Subject: Re: [PATCH] tx493[89]ide: Remove big endian version of tx493[89]ide_tf_{load,read}

On Monday 06 April 2009, Sergei Shtylyov wrote:
> Atsushi Nemoto wrote:
> 
> > Now tx493[89]ide_tf_{load,read} do not contain word I/O operations.
> > They are endian-free now.
> 
> > Signed-off-by: Atsushi Nemoto <anemo@....ocn.ne.jp>
> 
>     Oops, now this clashes with my patchset (not applied to pata-2.6 AFAICS). 
> I guess I'll have to repost it... Bart?

Since I already had your patches merged locally I just applied this one
in front of yours and then repeated:

- force apply the patch
- ignore rejects
- refresh the patch
- audit the result

cycle for all patches.

It seems like the end result is OK (changes to big endian ->tf_{load,read}
vanished, change to "fixup" ->tf_load survived and all patch descriptions
remained valid) but please verify it.

Thanks,
Bart
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ