lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <554A530C.4050109@akamai.com>
Date:	Wed, 06 May 2015 13:44:44 -0400
From:	Sri <sjayaram@...mai.com>
To:	Shuah Khan <shuahkh@....samsung.com>
CC:	Andrew Morton <akpm@...ux-foundation.org>,
	Eric B Munson <emunson@...mai.com>,
	linux-kernel@...r.kernel.org, linux-api@...r.kernel.org
Subject: Re: [PATCH V2] Test compaction of mlocked memory

Thanks!

-Sri

On 05/06/2015 01:41 PM, Shuah Khan wrote:
> On 05/06/2015 11:28 AM, Sri wrote:
>> Hi Shuah,
>>
>> This is what I see when I check the patch against the script,
>>
>> linux-stable$ ./scripts/checkpatch.pl
>> 0001-Test-compaction-of-mlocked-memory.patch
>> WARNING: added, moved or deleted file(s), does MAINTAINERS need updating?
>> #72:
>> new file mode 100644
>>
>> total: 0 errors, 1 warnings, 256 lines checked
>>
>> 0001-Test-compaction-of-mlocked-memory.patch has style problems, please
>> review.
>>
>> If any of these errors are false positives, please report
>> them to the maintainer, see CHECKPATCH in MAINTAINERS.
>>
>>
>> That was the only warning I saw even before I submitted the patch. I'm
>> not sure how the whitespaces are introduced...
>>
> 
> Hmm. Perhaps something is odd with the 4.1 checkpatch script.
> I am not seeing any whitespace errors when I do a manual
> check on the patch file.
> 
> Applying to linux-kselftest next
> 
> -- Shuah
> 
> 
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ