lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <201005312356.27299.Martin@lichtvoll.de>
Date:	Mon, 31 May 2010 23:56:26 +0200
From:	Martin Steigerwald <Martin@...htvoll.de>
To:	Jerome Glisse <glisse@...edesktop.org>
Cc:	Greg KH <greg@...ah.com>, stable@...nel.org,
	Alex Deucher <alexdeucher@...il.com>,
	linux-kernel@...r.kernel.org
Subject: Re: [stable]  please consider drm radeon kms agp release

Am Montag 31 Mai 2010 schrieb Jerome Glisse:
> On Mon, May 31, 2010 at 10:02:34AM -0700, Greg KH wrote:
> > On Mon, May 31, 2010 at 04:42:41PM +0200, Martin Steigerwald wrote:
> > > Hi Greg, hi stable kernel team,
> > > 
> > > Please consider the attached patch from Jérôme Glisse. It fixes drm
> > > radeon KMS after coming out from a snapshot cycle [1] - no matter
> > > whether I use userspace software suspend or TuxOnIce.
> > > 
> > > Verified on my notebook ThinkPad T42 and by cedric, the reporter of
> > > above bug.
> > 
> > Which stable kernel release do you want to see this patch in?  .27,
> > .32, .33, or .34?  Yeah, there's a lot active at the moment :(
> > 
> > thanks,
> > 
> > greg k-h
> 
> 2.6.34 sorry if i wasn't clear when ccing stable while sending patch
> for 2.6.35.

Yeah forgot to mention it also, in 2.6.33 it works. In 2.6.35 its fixed. So 
it applies for 2.6.34.

Thanks,
-- 
Martin 'Helios' Steigerwald - http://www.Lichtvoll.de
GPG: 03B0 0D6C 0040 0710 4AFA  B82F 991B EAAC A599 84C7

Download attachment "signature.asc " of type "application/pgp-signature" (199 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ