lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <20080502195118.39a3fc99.akpm@linux-foundation.org>
Date:	Fri, 2 May 2008 19:51:18 -0700
From:	Andrew Morton <akpm@...ux-foundation.org>
To:	Eric Sandeen <sandeen@...hat.com>
Cc:	Jörn Engel <joern@...fs.org>,
	linux-kernel@...r.kernel.org, joern@...ybastard.org,
	Andy Whitcroft <apw@...dowen.org>
Subject: Re: [PATCH] fix checkstack.pl arch detection

On Fri, 02 May 2008 21:40:23 -0500 Eric Sandeen <sandeen@...hat.com> wrote:

> Andrew Morton wrote:
> 
> >>> please cc apw on checkpatch changes.
> >>>
> >>> This patch needs some help to merge against the forthcoming
> >>> checkpatch-0.19.  I sent your patches apw-wards.
> >>>
> >> Um, checkpatch or checkstack? :)
> >>
> > 
> > bah.
> > 
> > hm, I wonder why one of them got a reject.  `patch -l' was needed.  Mailer
> > munchies, perhaps?
> > 
> > Please check that what I applied is still correct.
> 
> They look fine... sorry, didn't generate against -mm but didn't expect
> differences.  I'll update an -mm tree and give it a functional check too...
> 

There are no changes since 2.6.25.

"find dynamic stack allocations in checkstack.pl" just doesn't apply.  Hunk
1 assumes that "fix checkstack.pl arch detection" is present, but when "fix
checkstack.pl arch detection" is applied, hunks 1 and 2 don't apply.

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ