lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20240206181531.412503fd@kernel.org>
Date: Tue, 6 Feb 2024 18:15:31 -0800
From: Jakub Kicinski <kuba@...nel.org>
To: Luiz Augusto von Dentz <luiz.dentz@...il.com>
Cc: Paolo Abeni <pabeni@...hat.com>, davem@...emloft.net,
 linux-bluetooth@...r.kernel.org, netdev@...r.kernel.org
Subject: Re: pull request: bluetooth 2024-02-02

On Tue, 6 Feb 2024 09:45:44 -0500 Luiz Augusto von Dentz wrote:
> > >  - hci_bcm4377: do not mark valid bd_addr as invalid
> > >  - hci_sync: Check the correct flag before starting a scan
> > >  - Enforce validation on max value of connection interval  
> >
> > and this one ^^^  
> 
> Ok, do you use any tools to capture these? checkpatch at least didn't
> capture anything for me.

You should use Greg's version directly:

https://raw.githubusercontent.com/gregkh/gregkh-linux/master/work/scripts/verify_fixes.sh

it has an ancestry check which should catch rebases.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ