lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 11 May 2011 22:41:31 -0700
From:	matt mooney <mfmooney@...il.com>
To:	Greg KH <greg@...ah.com>
Cc:	linux-kernel@...r.kernel.org, kernel-janitors@...r.kernel.org
Subject: Re: [PATCH 00/12] staging: usbip: miscellaneous code cleanup

On Wed, May 11, 2011 at 10:31 PM, Greg KH <greg@...ah.com> wrote:
> On Wed, May 11, 2011 at 08:24:12PM -0700, matt mooney wrote:
>> > We add it to drivers/staging/usbip/userspace/ and build it like the perf
>> > code is built.
>>
>> Okay, I will add the code as is to userspace/ except for the module
>> name changes of course. Now I am suppose to add this to
>> scripts/packages/Makefile or is there another way for staging?
>
> I really don't know as I haven't looked at that part of the build system
> in years.  If you have problems, I will be glad to help out, but give it
> a try first :)

Not a problem; I just wanted to make sure. I actually sent in a patch
to fix a bug with building perf earlier today so hopefully Michal
picks it up quickly.

I resent two patches that don't rely on my pr_*() commit in a new
thread. The other patches will be resent once I get the dev_*()
changes in. But I will send in the userspace utility patch asap
although I might have created a conflict with the perf patch I sent in
earlier.

Thanks,
matt

-- 
GPG-Key: 9AFE00EA
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ