lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20190324121114.GA5772@kroah.com>
Date:   Sun, 24 Mar 2019 13:11:14 +0100
From:   Greg KH <gregkh@...uxfoundation.org>
To:     Bharath Vedartham <linux.bhar@...il.com>
Cc:     christian@...mp.de, neil@...wn.name, devel@...verdev.osuosl.org,
        linux-kernel@...r.kernel.org
Subject: Re: [PATCH] staging: ralink-gdma: Convert unsigned to unsigned int

On Sun, Mar 24, 2019 at 03:07:48PM +0530, Bharath Vedartham wrote:
> On Sun, Mar 24, 2019 at 09:58:42AM +0100, Greg KH wrote:
> > On Sat, Mar 23, 2019 at 05:04:44PM +0530, Bharath Vedartham wrote:
> > > Fix the checkpatch.pl warning: "Use unsigned int instead of unsigned".
> > > 
> > > Signed-off-by: Bharath Vedartham <linux.bhar@...il.com>
> > > ---
> > >  drivers/staging/ralink-gdma/ralink-gdma.c | 2 +-
> > >  1 file changed, 1 insertion(+), 1 deletion(-)
> > 
> > This patch also does not apply at all :(
> 
> I have been working on linus's branch and not the staging branch. I
> thought that linus's branch would have the latest updates and would be
> the latest branch :( . Is it a problem if I use linus's branch for
> staging drivers?

Yes, if you want to do kernel development, you always need to work off
of the subsystem tree that you are wanting to contribute to, or off of
linux-next.  Development trees can often be 3 months ahead of Linus's
tree depending on the time of the merge window.

The tree should always be listed in the MAINTAINERS file for what one to
use.

hope this helps,

greg k-h

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ