lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Thu, 9 Apr 2009 16:39:48 -0700
From:	Andrew Morton <akpm@...ux-foundation.org>
To:	Jörn Engel <joern@...fs.org>
Cc:	matthieu.castet@...rot.com, linux-kernel@...r.kernel.org,
	arnd@...db.de, tarmigan@...il.com
Subject: Re: [PATCH][Checkstack] Don't censor output

On Mon, 6 Apr 2009 23:11:46 +0200
J__rn Engel <joern@...fs.org> wrote:

> Subject: [PATCH][Checkstack] Don't censor output

Please use the form

	subsytem-identifier: what-i-did-to-it

so

	[patch] checkstack: don't censor output

would suit here.

> Date: Mon, 6 Apr 2009 23:11:46 +0200
> User-Agent: Mutt/1.5.13 (2006-08-11)
> 
> For reasons that neither Arnd nor I can remember, the s390 port of
> checkstack happened to ignore stack frames below 300 and above 10000
> bytes.  Later on the same effect - arguably a bug - was copied into the
> arm, ia64, mips and sh64 ports.
> 
> Fixing it also makes the regular expressions shorter and simpler.
> 
>  scripts/checkstack.pl |   12 ++++++------
>  1 file changed, 6 insertions(+), 6 deletions(-)
> 
> --- debuggerhead/scripts/checkstack.pl~checkstack	2008-03-05 12:14:05.000000000 +0100
> +++ debuggerhead/scripts/checkstack.pl	2008-11-04 20:38:08.000000000 +0100

The patch fails to apply, yet nobody has changed checkstack.pl in ages.
I think you're tricking me.

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ