lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20080402.012022.106064938.davem@davemloft.net>
Date:	Wed, 02 Apr 2008 01:20:22 -0700 (PDT)
From:	David Miller <davem@...emloft.net>
To:	andi@...stfloor.org
Cc:	netdev@...r.kernel.org
Subject: Re: [PING^2] [PATCH] srandom32 fixes for networking

From: Andi Kleen <andi@...stfloor.org>
Date: Wed, 2 Apr 2008 10:21:03 +0200

> On Wed, Apr 02, 2008 at 01:03:24AM -0700, David Miller wrote:
> > From: Andi Kleen <andi@...stfloor.org>
> > Date: Wed, 2 Apr 2008 09:50:11 +0200
> > 
> > > Can you send me your config please? I don't see any build problem
> > > here with the patch on top of -rc7-git something on either i386 nor x86-64.
> > 
> > I found it with "git grep srandom32", I guess I'm quite old school in
> > that I actually check the tree when interfaces are being changed.
> 
> Ah I see the problem now.  The patch requires 
> 
> ftp://firstfloor.org/pub/ak/misc/patches/pageattr-own-random
> 
> applied first to remove this reference. Sorry should 
> have made that more clear.  The original post had both
> patches, but in the reposts the reference to the dependency
> got dropped somehow, sorry.

You have to decide how to submit this without introducing
the build failure then.

I would suggest getting your first change in, and when that
happens, resubmit this one.
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ