lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4E41055F.9010900@redhat.com>
Date:	Tue, 09 Aug 2011 07:01:03 -0300
From:	Mauro Carvalho Chehab <mchehab@...hat.com>
To:	Borislav Petkov <bp@...en8.de>,
	Randy Dunlap <rdunlap@...otime.net>,
	Linus Torvalds <torvalds@...ux-foundation.org>,
	Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
	linux-edac@...r.kernel.org
Subject: Re: Linux 3.1-rc1 (i7core_edac build error)

Em 08-08-2011 18:31, Borislav Petkov escreveu:
> On Mon, Aug 08, 2011 at 01:59:31PM -0700, Randy Dunlap wrote:
>> on x86_64:
>>
>> ERROR: "x86_mce_decoder_chain" [drivers/edac/i7core_edac.ko] undefined!
>>
>> Full kernel (rand)config file is attached.
> 
> This has got to be linux-next because the x86_mce_decoder_chain for
> i7core_edac is not upstream yet, AFAICT.
> 
> If so, then
> 
> http://git.kernel.org/?p=linux/kernel/git/mchehab/edac.git;a=commitdiff;h=cd90cc84c6bf0f40a681900c609c044336a1b12e
> 
> needs to be changed to depend on X86_MCE. Mauro, you want an updated
> patch or you don't rebase your linux-next branch and need a diff ontop?

I don't think that anyone, except for -next, is cloning from my tree,
and there are just a few new patches there, so I'm not caring a lot of 
not doing rebase on this tree, but incremantal patches is better.

Thanks,
Mauro
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ