lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20140908180327.6ef7f2b8@canb.auug.org.au>
Date:	Mon, 8 Sep 2014 18:03:27 +1000
From:	Stephen Rothwell <sfr@...b.auug.org.au>
To:	Mark Brown <broonie@...nel.org>
Cc:	Randy Dunlap <rdunlap@...radead.org>,
	Peter Foley <pefoley2@...oley.com>,
	LKML <linux-kernel@...r.kernel.org>, linux-doc@...r.kernel.org,
	Sam Ravnborg <sam@...nborg.org>
Subject: Re: [PATCH 1/4] Documentation: use subdir-y to avoid unnecessary
 built-in.o files

Hi Mark,

On Sun, 7 Sep 2014 19:48:37 +0100 Mark Brown <broonie@...nel.org> wrote:
>
> On Sun, Sep 07, 2014 at 10:59:53AM -0700, Randy Dunlap wrote:
> 
> > The quilt-import.log from 20140829 says:
> 
> > $ git am --patch-format=mbox ../quilt/rd-docs/001-docum-use-subdiry-avoid-builtin.patch
> 
> > and in the 20140905 git tree it says:
> 
> > $ git am ../quilt/rd-docs/001-docum-use-subdiry-avoid-builtin.patch
> > Patch format detection failed.
> 
> > Are you using Stephen's scripts?  Why would his tree apply patches with
> > --patch-format=mbox
> > while the later trees did not use that git-am option?
> 
> Yes, I'm using his scripts.  I guess it's possible there's something in
> his global git configuration that changes the behaviour?


You seem to have been using an older version of my scripts.  The above
was changed on May 5th in commit
9f1441da46c87531635fe742016124db2069db24 in my "tools" directory.
-- 
Cheers,
Stephen Rothwell                    sfr@...b.auug.org.au

Download attachment "signature.asc" of type "application/pgp-signature" (820 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ