lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 2 Aug 2006 18:18:07 -0400 From: Xiaolan Zhang <cxzhang@...ibm.com> To: David Miller <davem@...emloft.net> Cc: catalin.marinas@...il.com, cxzhang@...son.ibm.com, czhang.us@...il.com, jmorris@...ei.org, linux-kernel@...r.kernel.org, michal.k.k.piotrowski@...il.com, netdev@...r.kernel.org, sds@...ho.nsa.org Subject: Re: [Patch] kernel memory leak fix for af_unix datagram getpeersec patch David, I did test it with CONFIG_SECURITY disabled, but did not catch the warning -- I verified that the build completes with a valid vmlinux image. There are many warnings (device drivers, and others) during the build and I didn't do a grep to find which one is specific to my patch. Next time I'll do a diff on warnings too. thanks, Catherine David Miller <davem@...emloft.net> wrote on 08/02/2006 05:32:04 PM: > > Can you also remember to test your patches with CONFIG_SECURITY > disabled, as you also promised in the past several times?!??!?! > > In file included from init/main.c:34: > include/linux/security.h: In function rxsecurity_release_secctxry: > include/linux/security.h:2757: warning: rxreturnry with a value, in > function returning void > > I'll fix this one up, but this is getting rediculious. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists