lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 9 Sep 2011 22:48:54 +0200 (CEST)
From:	Julia Lawall <julia@...u.dk>
To:	"Luis R. Rodriguez" <mcgrof@...il.com>
Cc:	Jesper Andersen <jespera@...u.dk>,
	Hauke Mehrtens <hauke@...ke-m.de>,
	linux-wireless <linux-wireless@...r.kernel.org>,
	linux-kernel@...r.kernel.org, netdev@...r.kernel.org
Subject: Re: Backporting the Linux kernel, for good - was: Re: semantic patch
 inference

Thanks for your email.  It made me realize that there was one thing that I
didn't understand at all.  If the patches are only intended to apply to
linux-next, that makes the problem quite a bit simpler.  I guess that the
patch that spdiff will receive will already contain the appropriate #ifs,
so we don't have to be concerned about them.  We just add them in as is.

There was also the question about one or multiple types of changes.  I
think this is not a problem, but Jesper should confirm.  If a patch contains
two changes and one can be generalized and the other one cannot for some
reason, does spdiff give up on the whole thing, or does it do what it can?

Overall, the whole thing seems to be doable :)

julia
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ