lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 3 Mar 2008 18:22:15 +0100
From:	Ingo Molnar <mingo@...e.hu>
To:	Glauber Costa <gcosta@...hat.com>
Cc:	linux-kernel@...r.kernel.org, akpm@...ux-foundation.org,
	glommer@...il.com, tglx@...utronix.de
Subject: Re: [PATCH 0/52] First attempt at smp integration


* Glauber Costa <gcosta@...hat.com> wrote:

> Hi,
> 
> This series of patches does a first attempt at smp integration (I call 
> it first, although I don't believe it's too far away from a real one). 
> The series comprises 52 patches, and the full diffstat says in the 
> end:
> 
> 	 34 files changed, 1858 insertions(+), 2344 deletions(-)
> 
> smp_32.c and smp_64.c are completely gone. smp.h and smpboot_{32,64}.c 
> are not, although substantially reduced. I know that ideally, no 
> leftovers are wanted, but the series were already big enough (I tried 
> to split the patches as much as I could), so I considered this a good 
> cutting point. If this is all agreed upon and merged, I'll start 
> looking at the other bits that are left.
> 
> All patches are tested is various random x86 subarchitectures, and all 
> of them works. The result also boots fine in mine x86_64 and i386 
> boxes.

wow, really nice work and the result looks awesome! I'll put this into 
x86.git and see how it goes.

	Ingo
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ