lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 7 Feb 2014 16:12:54 -0800
From:	Greg KH <gregkh@...uxfoundation.org>
To:	Tejun Heo <tj@...nel.org>
Cc:	linux-kernel@...r.kernel.org
Subject: Re: [PATCHSET v2 driver-core-next] kernfs: prepare for cgroup's
 kernfs conversion

On Fri, Feb 07, 2014 at 01:43:20PM -0500, Tejun Heo wrote:
> Hello,
> 
> On Mon, Feb 03, 2014 at 02:09:07PM -0500, Tejun Heo wrote:
> >  0001-kernfs-invoke-dir_ops-while-holding-active-ref-of-th.patch
> >  0002-kernfs-rename-kernfs_dir_ops-to-kernfs_syscall_ops.patch
> >  0003-kernfs-implement-kernfs_syscall_ops-remount_fs-and-s.patch
> >  0004-kernfs-add-missing-kernfs_active-checks-in-directory.patch
> >  0005-kernfs-allow-nodes-to-be-created-in-the-deactivated-.patch
> >  0006-kernfs-implement-kernfs_ops-atomic_write_len.patch
> >  0007-kernfs-add-kernfs_open_file-priv.patch
> >  0008-kernfs-implement-kernfs_node_from_dentry-kernfs_root.patch
> >  0009-kernfs-implement-kernfs_get_parent-kernfs_name-path-.patch
> >  0010-kernfs-add-CONFIG_KERNFS.patch
> 
> 0009 updated to v2 and a new patch added between 0009 and 0010.  Both
> are for dummy definition related issues for !CONFIG_SYSFS.  The git
> tree has been updated accordingly.

Ok, I should have now applied all of these, and hopefully in the correct
order.  If I got anything wrong, please let me know.

thanks,

greg k-h
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ