lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <1409920745.30155.93.camel@linux.intel.com> Date: Fri, 05 Sep 2014 15:39:05 +0300 From: Andy Shevchenko <andriy.shevchenko@...ux.intel.com> To: Geert Uytterhoeven <geert@...ux-m68k.org> Cc: Tadeusz Struk <tadeusz.struk@...el.com>, Herbert Xu <herbert@...dor.apana.org.au>, Mauro Carvalho Chehab <m.chehab@...sung.com>, Helge Deller <deller@....de>, Ingo Tuchscherer <ingo.tuchscherer@...ibm.com>, Alexander Viro <viro@...iv.linux.org.uk>, "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>, Joe Perches <joe@...ches.com>, Marek Vasut <marex@...x.de>, Vladimir Kondratiev <qca_vkondrat@....qualcomm.com>, Benjamin Romer <benjamin.romer@...sys.com>, Catalin Marinas <catalin.marinas@....com>, Randy Dunlap <rdunlap@...radead.org>, Chen Gang <gang.chen.5i5j@...il.com> Subject: Re: [PATCH v4 01/12] hexdump: introduce test suite On Fri, 2014-09-05 at 11:37 +0200, Geert Uytterhoeven wrote: > On Thu, Sep 4, 2014 at 4:26 PM, Andy Shevchenko > <andriy.shevchenko@...ux.intel.com> wrote: > > Test different scenarios of function calls located in lib/hexdump.c. > > > > Currently hex_dump_to_buffer() is only tested and test data is provided for > > little endian CPUs. > > That's a nice one to be amended using Chen's > "arch: Kconfig: Let all little endian architectures define > CPU_LITTLE_ENDIAN explicitly". I don't see it in the upstream yet, right? Thus, I wouldn't like to depend on it now. -- Andy Shevchenko <andriy.shevchenko@...el.com> Intel Finland Oy -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists