lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CALxhOngtGNP7MATzwtMZd_Xw+rqvdhP9NMtTxwCEgmzayZshOQ@mail.gmail.com>
Date:   Fri, 12 Oct 2018 09:31:30 +0530
From:   Firoz Khan <firoz.khan@...aro.org>
To:     Tony Luck <tony.luck@...el.com>
Cc:     linux-ia64@...r.kernel.org, Fenghua Yu <fenghua.yu@...el.com>,
        Thomas Gleixner <tglx@...utronix.de>,
        Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
        Philippe Ombredanne <pombredanne@...b.com>,
        Kate Stewart <kstewart@...uxfoundation.org>,
        y2038 Mailman List <y2038@...ts.linaro.org>,
        Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
        Linux-Arch <linux-arch@...r.kernel.org>,
        Arnd Bergmann <arnd@...db.de>,
        Deepa Dinamani <deepa.kernel@...il.com>,
        Marcin Juszkiewicz <marcin.juszkiewicz@...aro.org>
Subject: Re: [PATCH v3 0/7] ia64: system call table generation support

Hi Tony,

On Thu, 11 Oct 2018 at 22:59, Luck, Tony <tony.luck@...el.com> wrote:
>
> Third time lucky. This series boots without any obvious errors on my ia64 machine.

Great! Thanks for your support!

>
> That's not and Ack or Review ... I just applied, compiled and booted.

I suspect the offset logic in the system call generation script had a bug. That
I fixed it in this patch series.

Arnd and Eugene had shared few comments on adding new system call entry in the
table and some other things. Appreciate if you can review this patch
series so I can
finalize system call table implementation for ia64 architecture.

Firoz

>
> -Tony

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ