lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20100125171524.GA17421@kroah.com>
Date:	Mon, 25 Jan 2010 09:15:24 -0800
From:	Greg KH <greg@...ah.com>
To:	Thomas Gleixner <tglx@...utronix.de>
Cc:	Andrew Morton <akpm@...ux-foundation.org>,
	Greg KH <gregkh@...e.de>, linux-kernel@...r.kernel.org,
	stable@...nel.org, Xiaotian Feng <dfeng@...hat.com>,
	torvalds@...ux-foundation.org, stable-review@...nel.org,
	alan@...rguk.ukuu.org.uk
Subject: Re: [stable] [00/29] 2.6.32.6 stable review

On Sun, Jan 24, 2010 at 05:29:26PM +0100, Thomas Gleixner wrote:
> On Sat, 23 Jan 2010, Andrew Morton wrote:
> 
> > On Fri, 22 Jan 2010 16:11:45 -0800 Greg KH <gregkh@...e.de> wrote:
> > 
> > > This is the start of the stable review cycle for the 2.6.32.6 release.
> > > There are 29 patches in this series, all will be posted as a response to
> > > this one.  If anyone has any issues with these being applied, please let
> > > us know.  If anyone is a maintainer of the proper subsystem, and wants
> > > to add a Signed-off-by: line to the patch, please respond with it.
> > > 
> > > Responses should be made by Monday, January 24, 00:00:00 UTC.
> > > Anything received after that time might be too late.
> > 
> > 2.6.32.6 will still contain the regression described in (for example)
> > 
> > http://bugzilla.kernel.org/show_bug.cgi?id=15117 
> > http://bugzilla.kernel.org/show_bug.cgi?id=15005
> > 
> > It's fixed with the below revert which has been in -mm (and only in
> > -mm) for ten days.
> > 
> > I don't what's going on - perhaps we're waiting for Thomas, and he's
> > otherwise engaged.  There's a fix in the lkml thread "Re: [RFC PATCH
> > 0/4] clockevents: fix clockevent_devices list corruption after cpu
> > hotplug" to which Thomas replied
> > 
> >     I just applied your patch, but kept the cpuweight check.  This
> >     is the least intrusive solution for now.  The logic needs an
> >     overhaul, but thats neither rc4 nor stable material"
> 
> Just sent the pull request for it. Sorry for the delay. The patch
> needs to go into 32.6 as well.

So that would be commit id ea9d8e3f45404d411c00ae67b45cc35c58265bb7 ?

Or something else?

I'll queue that one up for the next .32 stable update, but will refrain
from having it in this specific release in an hour, as there has not
been any time to test it all out.  I will start up a round for the next
.32 kernel right afterward, later today, with this patch in it.

thanks,

greg k-h
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ