lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <49B75292.6090208@kernel.org>
Date:	Wed, 11 Mar 2009 14:56:34 +0900
From:	Tejun Heo <tj@...nel.org>
To:	mingo@...e.hu, rusty@...tcorp.com.au, tglx@...utronix.de,
	x86@...nel.org, linux-kernel@...r.kernel.org, hpa@...or.com,
	Paul Mundt <lethal@...ux-sh.org>, rmk@....linux.org.uk,
	starvik@...s.com, ralf@...ux-mips.org, davem@...emloft.net,
	cooloney@...nel.org, kyle@...artin.ca, matthew@....cx,
	grundler@...isc-linux.org, takata@...ux-m32r.org,
	benh@...nel.crashing.org, rth@...ddle.net,
	ink@...assic.park.msu.ru, schwidefsky@...ibm.com,
	heiko.carstens@...ibm.com
Subject: [GIT PULL] pull request for safe part

Tejun Heo wrote:
>  0001-linker-script-define-__per_cpu_load-on-all-SMP-capa.patch
>  0002-percpu-make-x86-addr-pcpu-ptr-conversion-macros.patch
>  0003-percpu-more-flexibility-for-dyn_size-of-pcpu_setup.patch
>  0004-percpu-generalize-embedding-first-chunk-setup-helpe.patch

I left the above four patches which shouldn't cause disruption on
archs in #tj-percpu and put the recent alignment warning fix on top of
it.

>  0005-percpu-use-dynamic-percpu-allocator-as-the-default.patch

and moved this one to #tj-percpu-exp.  I'll move it into #tj-percpu
once it gets confirmed.  So, pulling from #tj-percpu should be safe
now.

Thanks.

-- 
tejun
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ