lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20090217220825.GA24337@elte.hu>
Date:	Tue, 17 Feb 2009 23:08:25 +0100
From:	Ingo Molnar <mingo@...e.hu>
To:	"H. Peter Anvin" <hpa@...or.com>
Cc:	Jan Engelhardt <jengelh@...ozas.de>, Alain Knaff <alain@...ff.lu>,
	the arch/x86 maintainers <x86@...nel.org>,
	linux-kernel@...r.kernel.org
Subject: Re: tip: bzip2/lzma now in tip:x86/setup-lzma


* H. Peter Anvin <hpa@...or.com> wrote:

> Jan Engelhardt wrote:
>> On Monday 2009-01-05 00:58, H. Peter Anvin wrote:
>>> I have pulled the x86 parts of the bzip2/lzma patchset into
>>> tip:x86/setup-lzma.  I would appreciate it if you could look at it and
>>> make sure it looks sane.  I have not added the ARM portions (patch 4),
>>> since those should go via the ARM tree, nor the capstone patch 5, which
>>> can only be added after the old code is removed from *all* remaining
>>> architectures.
>>
>> It seems to work well here. It would be cool if this finds its way
>> into mainline sometime.
>
> There were some build failures with "make randconfig" I seem 
> to recall.  Those need to be addressed soon if we're going to 
> be able to push this for .30.

Correct. I'll merge it into tip:master again and will report any 
breakages, should they occur.

	Ingo
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ