lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 06 Oct 2006 22:02:17 +0530
From:	"Aneesh Kumar K.V" <aneesh.kumar@...il.com>
To:	linux-kernel@...r.kernel.org
Subject:  safe_smp_processor_id i386 and x86_64

I was looking at the git log and the below changes confused me.

dc2bc768a009b9ad8711894c544dc6b0d8c0ce57

commit dc2bc768a009b9ad8711894c544dc6b0d8c0ce57
Author: Fernando Vazquez <fernando@...ellilink.co.jp>
Date:   Sat Sep 30 23:29:07 2006 -0700

    [PATCH] stack overflow safe kdump: safe_smp_processor_id()

..............

   This patch set does the following:

    * Add safe_smp_processor_id function to i386 architecture (this function was
      inspired by the x86_64 function of the same name).

151f8cc1169f9052095b2be36183ab132d75c6c2

commit 151f8cc1169f9052095b2be36183ab132d75c6c2
Author: Andi Kleen <ak@...e.de>
Date:   Tue Sep 26 10:52:37 2006 +0200

    [PATCH] Remove safe_smp_processor_id()




-aneesh

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ