lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <49760b47.2I7MimCEUJOM3CRp%dougthompson@xmission.com>
Date:	Tue, 20 Jan 2009 10:35:03 -0700
From:	dougthompson@...ssion.com
To:	dougthompson@...ssion.com, linux-kernel@...r.kernel.org,
	akpm@...ux-foundation.org
Subject: [PATCH 1/1] edac: remove EDACs experimental status

From: Doug Thompson <dougthompson@...ssion.com>

After 3 years, this is a patch to remove the EXPERIMENTAL tag on EDAC.
We now have many module drivers submitters in EDAC and believe EDAC
is no longer EXPERIMENTAL


Signed-off-by: Doug Thompson <dougthompson@...ssion.com
---
 Kconfig |    5 ++---
 1 file changed, 2 insertions(+), 3 deletions(-)

Index: linux-2.6.28/drivers/edac/Kconfig
===================================================================
--- linux-2.6.28.orig/drivers/edac/Kconfig
+++ linux-2.6.28/drivers/edac/Kconfig
@@ -1,13 +1,12 @@
 #
 #	EDAC Kconfig
-#	Copyright (c) 2003 Linux Networx
+#	Copyright (c) 2008 Doug Thompson www.softwarebitmaker.com
 #	Licensed and distributed under the GPL
 #
 
 menuconfig EDAC
-	bool "EDAC - error detection and reporting (EXPERIMENTAL)"
+	bool "EDAC - error detection and reporting"
 	depends on HAS_IOMEM
-	depends on EXPERIMENTAL
 	depends on X86 || PPC
 	help
 	  EDAC is designed to report errors in the core system.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ