lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <aBTI-v5-_JWDdge2@localhost.localdomain>
Date: Fri, 2 May 2025 15:30:34 +0200
From: Petr Mladek <pmladek@...e.com>
To: Aditya Garg <gargaditya08@...e.com>, alyssa@...enzweig.io
Cc: admin@...eit.net, airlied@...hat.com, akpm@...ux-foundation.org,
	andriy.shevchenko@...ux.intel.com, apw@...onical.com,
	asahi@...ts.linux.dev, corbet@....net,
	dri-devel@...ts.freedesktop.org, dwaipayanray1@...il.com,
	geert@...ux-m68k.org, joe@...ches.com, kees@...nel.org,
	linux-doc@...r.kernel.org, linux-kernel@...r.kernel.org,
	linux@...musvillemoes.dk, lukas.bulwahn@...il.com, marcan@...can.st,
	mripard@...nel.org, rostedt@...dmis.org, senozhatsky@...omium.org,
	simona@...ll.ch, sven@...npeter.dev, tamird@...il.com,
	tzimmermann@...e.de
Subject: Re: [PATCH v3] checkpatch: remove %p4cn

On Wed 2025-04-30 19:19:08, Aditya Garg wrote:
> %p4cn was recently removed and replaced by %p4chR in vsprintf. So,
> remove the check for %p4cn from checkpatch.pl.
> 
> Fixes: 37eed892cc5f ("vsprintf: Use %p4chR instead of %p4cn for reading data in reversed host ordering")
> Signed-off-by: Aditya Garg <gargaditya08@...e.com>

Looks and works well:

Reviewed-by: Petr Mladek <pmladek@...e.com>
Tested-by: Petr Mladek <pmladek@...e.com>

Alyssa, could you please queue this one via drm-misc-next as well?

Best Regards,
Petr

PS: Aditya, thanks a lot for stepping in and providing this patch. Also
      thanks others for shaping in. I was not able to react quickly. I
      had technical problems with my workstation and public holidays.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ