lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 23 Jun 2015 08:31:10 -0700 From: Guenter Roeck <linux@...ck-us.net> To: Stephan Mueller <smueller@...onox.de> Cc: Geert Uytterhoeven <geert@...ux-m68k.org>, Herbert Xu <herbert@...dor.apana.org.au>, Peter Zijlstra <public-peterz-wegcikhe2lqwvfeawa7xhq@...ne.gmane.org>, Andy Shevchenko <andy.shevchenko@...il.com>, Jim Davis <jim.epost@...il.com>, Stephen Rothwell <sfr@...b.auug.org.au>, Linux-Next <linux-next@...r.kernel.org>, "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>, "David S. Miller" <davem@...emloft.net>, linux-crypto@...r.kernel.org, Waiman Long <waiman.long@...com>, Ingo Molnar <mingo@...nel.org>, x86 <x86@...nel.org> Subject: Re: [PATCH] crypto: jitterentropy - avoid compiler warnings On Tue, Jun 23, 2015 at 04:18:54PM +0200, Stephan Mueller wrote: > Hi Geert, Guenter, > > may I ask that you check that the following patch compiles without errors or warnings on your systems? > Stephan, I applied your patch on top of the current mainline (which includes the crypto updates for 4.2) and pushed it into my 'testing' branch. You should be able to see the results in a couple of hours at http://server.roeck-us.net:8010/builders, in the 'testing' column. The build system doesn't log warnings, but this should give us an idea if the build passes for all architectures. I'll have a look myself later and let you know as well. Guenter -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists