lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <200805300952.15969.bjorn.helgaas@hp.com>
Date:	Fri, 30 May 2008 09:52:14 -0600
From:	Bjorn Helgaas <bjorn.helgaas@...com>
To:	Stas Sergeev <stsp@...et.ru>
Cc:	Andrew Morton <akpm@...ux-foundation.org>, ambx1@....rr.com,
	david-b@...bell.net, mingo@...e.hu, tglx@...utronix.de,
	dbrownell@...rs.sourceforge.net, rmk+lkml@....linux.org.uk,
	linux-kernel@...r.kernel.org
Subject: Re: [patch][resend] provide rtc_cmos platform device, take 2

On Thursday 29 May 2008 10:12:42 pm Stas Sergeev wrote:
> Hello.
> 
> Bjorn Helgaas wrote:
> > As far as I'm concerned, "pnpacpi=off" should only be used to work
> > around defects, so I'd like to fix the defect you're seeing with
> > parport_pc.  Is there a bug report for it?
> Certainly, and you've seen it many
> times. :)
> http://bugzilla.kernel.org/show_bug.cgi?id=7491
> Its that the module parameters are overriden
> by PNP and are ignored, so you can't do
> "dma=none" etc.
> Your patch is not for that, AFAICS.
> Or let me know if it is.

Oh, yeah, that one :-)  No, my patch does nothing for that.

I can't remember why it's so hard to fix that bug.  Maybe now that
we fixed the *other* reason for using "pnpacpi=off", I can take
another look at it and make some progress.  It doesn't *sound* like
it should be hard to fix.

Bjorn

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ