lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <200811271848.26520.yur@emcraft.com>
Date:	Thu, 27 Nov 2008 18:48:26 +0300
From:	Yuri Tikhonov <yur@...raft.com>
To:	"Grant Likely" <grant.likely@...retlab.ca>
Cc:	linux-kernel@...r.kernel.org, "Wolfgang Denk" <wd@...x.de>,
	"Detlev Zundel" <dzu@...x.de>, "Ilya Yanok" <yanok@...raft.com>,
	linuxppc-dev@...abs.org, Paul Mackerras <paulus@...ba.org>
Subject: Re: [PATCH][v2] xsysace: use resource_size_t instead of unsigned long


 Hello Grant,

On Thursday 27 November 2008 17:11, Grant Likely wrote:
> On Thu, Nov 27, 2008 at 5:21 AM, Yuri Tikhonov <yur@...raft.com> wrote:
> > Use resource_size_t for physical address of SystemACE
> > chip. This fixes the driver brokeness for 32 bit systems
> > with 64 bit resources (e.g. PPC440SPe).
> 
> Hey Yuri,
> 
> I actually already picked up the last version of your patch after
> fixing it up myself.  It's currently sitting in Paul's powerpc tree
> and it will be merged into mainline when Linus gets back from
> vacation.

 Oops. Indeed. Thanks.

> 
> Can you please spin a new version with just the addition of the
> compatible value and base it on Paul's tree.

 Sure. I've generated the patch against the origin/merge branch of Paul's 
tree, and posting it as separate "[PATCH] xsysace: add compatible string
".

 Regards, Yuri
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ