lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Wed, 19 Dec 2018 14:44:23 +1100
From:   Stephen Rothwell <sfr@...b.auug.org.au>
To:     Nathan Chancellor <natechancellor@...il.com>
Cc:     Guenter Roeck <linux@...ck-us.net>,
        Linux Next Mailing List <linux-next@...r.kernel.org>,
        Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
        Mauro Carvalho Chehab <mchehab@...nel.org>
Subject: Re: linux-next: Tree for Dec 11

Hi all,

On Wed, 12 Dec 2018 09:36:32 +1100 Stephen Rothwell <sfr@...b.auug.org.au> wrote:
>
> On Tue, 11 Dec 2018 11:04:37 -0700 Nathan Chancellor <natechancellor@...il.com> wrote:
> >
> > On Tue, Dec 11, 2018 at 09:38:51AM -0800, Guenter Roeck wrote:  
> > > Build results:
> > > 	total: 152 pass: 150 fail: 2
> > > Failed builds: 
> > > 	arm:allmodconfig 
> > > 	arm64:allmodconfig 
> > > Qemu test results:
> > > 	total: 337 pass: 137 fail: 200
> > > 
> > > Build failures:
> > > 
> > > arm:
> > > 
> > > In file included from drivers/media/pci/ddbridge/ddbridge.h:22:0,
> > >                  from drivers/media/pci/ddbridge/ddbridge-ci.c:19:
> > > arch/arm/include/asm/irq.h:35:50: error: unknown type name 'cpumask_t'
> > >     
> > 
> > Just FYI, I noticed this one yesterday on next-20181210 and sent a patch:
> > https://lore.kernel.org/linux-media/20181210233514.3069-1-natechancellor@gmail.com/  
> 
> I have added that patch after the v4l-dvb tree for today.

I am still applying that patch ...

-- 
Cheers,
Stephen Rothwell

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ