lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20150413180347.6bfc0d5c@gandalf.local.home>
Date:	Mon, 13 Apr 2015 18:03:47 -0400
From:	Steven Rostedt <rostedt@...dmis.org>
To:	Andi Kleen <ak@...ux.intel.com>
Cc:	Andi Kleen <andi@...stfloor.org>, linux-kernel@...r.kernel.org,
	linux-kbuild@...r.kernel.org, mmarek@...e.cz
Subject: Re: [PATCH] Use -mcount-record for dynamic ftrace

On Mon, 13 Apr 2015 14:55:08 -0700
Andi Kleen <ak@...ux.intel.com> wrote:

> > Interesting. But I can't accept this until I can test it. I don't have
> 
> AFAIK that's a unique policy. I don't think any other maintainer operates
> this way.

Um, really? Other maintainers don't test patches that they maintain?
This isn't like hardware that I don't have. This could certainly affect
people if it breaks, and I will be responsible to fix it. I'm not going
to do that until I have a setup where I can test things that break.


> 
> > I wonder who's responsible for
> > https://www.kernel.org/pub/tools/crosstool/files/bin/x86_64/
> > 
> > If they can add a i386/x86_64 build for gcc5 I'll be happy to download
> > it and test this patch.
> 
> That doesn't make any sense.
> 

What, adding gcc5 to the crosstools suite? Why not?

-- Steve
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ