lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20071005230141.63a1f6c3.pj@sgi.com>
Date:	Fri, 5 Oct 2007 23:01:41 -0700
From:	Paul Jackson <pj@....com>
To:	Ingo Molnar <mingo@...e.hu>
Cc:	akpm@...ux-foundation.org, nickpiggin@...oo.com.au,
	randy.dunlap@...cle.com, menage@...gle.com,
	linux-kernel@...r.kernel.org, dino@...ibm.com, cpw@....com
Subject: Re: [PATCH] cpuset and sched domains: sched_load_balance flag fixes

Ingo wrote:
> please resend the base patch to Andrew (or better yet, a combo patch 
> that Andrew can apply and which just does it all).

I'm reluctant to right now, because I will be off the air
for three days, starting in one more day, and don't like
firing off stuff just before I vanish.

Though I'm aware that time is short for 2.6.24 ... not
sure how best to handle this.

My plan had been to send Andrew something on Wednesday
next week (five days from now), either what we have now,
or with the improved cpuset-to-sched API, if Nick and I
can work through that (well, if Nick can figure out what
I broke, while I'm offline.)

Andrew or Ingo - you got any better plan?

-- 
                  I won't rest till it's the best ...
                  Programmer, Linux Scalability
                  Paul Jackson <pj@....com> 1.925.600.0401
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ