lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1157364634.3162.8.camel@sebastian.intellilink.co.jp>
Date:	Mon, 04 Sep 2006 19:10:34 +0900
From:	Fernando Luis Vázquez Cao 
	<fernando@....ntt.co.jp>
To:	Greg KH <gregkh@...e.de>
Cc:	Kirill Korotaev <dev@...ru>, Greg KH <greg@...ah.com>,
	"Luck, Tony" <tony.luck@...el.com>, akpm@...l.org, dev@...nvz.org,
	linux-ia64@...r.kernel.org, linux-kernel@...r.kernel.org,
	davem@...emloft.net, stable@...nel.org,
	kamezawa.hiroyu@...fujitsu.com, xemul@...nvz.org
Subject: Re: [stable] [PATCH] Linux 2.6.17.11 - fix compilation error on
	IA64 (try #3)

On Tue, 2006-08-29 at 09:08 -0700, Greg KH wrote:
> On Tue, Aug 29, 2006 at 04:24:21PM +0400, Kirill Korotaev wrote:
> > Probably it is my fault, since I thought that patches which got into -stable
> > automatically go into Linus tree.
> 
> No they do not.  Usually it's the requirement that they be in his tree
> first, but I didn't think it was necessary this time due to my
> misunderstanding about the fix.
2.6.18-rc6 has just been released and neither my patch nor the original
patch to which it is a fix seem to have been included. Does this mean
they will not be sent to Linux before the final release of 2.6.18?

Regards,

Fernando


-- 
VGER BF report: H 0.358263
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ