lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Fri, 6 Nov 2020 10:54:50 +0100
From:   Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To:     Lee Jones <lee.jones@...aro.org>
Cc:     linux-kernel@...r.kernel.org,
        Alexandre Torgue <alexandre.torgue@...com>,
        "Andrew J. Kroll" <ag784@...enet.buffalo.edu>,
        Andrew Morton <andrewm@....edu.eu>,
        Andy Gross <agross@...nel.org>,
        Benjamin Herrenschmidt <benh@...nel.crashing.org>,
        Bill Hawes <whawes@...r.net>,
        Bjorn Andersson <bjorn.andersson@...aro.org>,
        Christian König <christian.koenig@....com>,
        Colin Ian King <colin.king@...onical.com>,
        "C. Scott Ananian" <cananian@...mni.princeton.edu>,
        "David A. Hinds" <dahinds@...rs.sourceforge.net>,
        dri-devel@...ts.freedesktop.org, Filip Aben <f.aben@...ion.com>,
        Gerald Baeza <gerald.baeza@...com>,
        Jakub Jelinek <jj@...ra.linux.cz>,
        Jan Dumon <j.dumon@...ion.com>,
        Jiri Slaby <jirislaby@...nel.org>,
        Jonathan Hunter <jonathanh@...dia.com>,
        Joseph Barrow <d.barow@...ion.com>,
        -- <julian@...nix.uhcc.hawaii.edu>,
        Kevin Wells <kevin.wells@....com>,
        Laxman Dewangan <ldewangan@...dia.com>,
        linaro-mm-sig@...ts.linaro.org, linux-arm-msm@...r.kernel.org,
        linux-media@...r.kernel.org, linuxppc-dev@...ts.ozlabs.org,
        linux-riscv@...ts.infradead.org, linux-serial@...r.kernel.org,
        linux-stm32@...md-mailman.stormreply.com,
        linux-tegra@...r.kernel.org, Marko Kohtala <Marko.Kohtala@....fi>,
        Maxime Coquelin <mcoquelin.stm32@...il.com>,
        Michael Ellerman <mpe@...erman.id.au>,
        Michal Simek <michal.simek@...inx.com>,
        Mike Hudson <Exoray@...s.ca>, Miloslav Trmac <mitr@...hat.com>,
        Nick Holloway <alfie@....warwick.ac.uk>,
        Palmer Dabbelt <palmer@...belt.com>, paulkf@...rogate.com,
        Paul Mackerras <paulus@...ba.org>,
        Paul Walmsley <paul.walmsley@...ive.com>,
        Philipp Zabel <p.zabel@...gutronix.de>,
        processes-Sapan Bhatia <sapan@...ewars.org>,
        Robert Love <rlove@...gle.com>, Rob Herring <robh@...nel.org>,
        Roland Stigge <stigge@...com.de>,
        Russell King <linux@...linux.org.uk>,
        Russell King <rmk@....linux.org.uk>,
        Russ Gorby <russ.gorby@...el.com>,
        Stanislav Voronyi <stas@...i.uanet.kharkov.ua>,
        Sumit Semwal <sumit.semwal@...aro.org>,
        Sylvain Lemieux <slemieux.tyco@...il.com>,
        Thierry Reding <thierry.reding@...il.com>,
        Vladimir Zapolskiy <vz@...ia.com>
Subject: Re: [PATCH 00/36] Rid W=1 issues from TTY

On Wed, Nov 04, 2020 at 07:35:13PM +0000, Lee Jones wrote:
> This set is part of a larger effort attempting to clean-up W=1
> kernel builds, which are currently overwhelmingly riddled with
> niggly little warnings.

Many of these now applied, please update the series against my
tty-testing branch and resend the rest.

thanks,

greg k-h

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ