lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <4BB2F75C.4060004@canonical.com>
Date:	Wed, 31 Mar 2010 09:18:52 +0200
From:	Stefan Bader <stefan.bader@...onical.com>
To:	Greg KH <greg@...ah.com>
CC:	linux-kernel@...r.kernel.org, stable-commits@...r.kernel.org,
	gregkh@...e.de, davem@...emloft.net, stable@...nel.org
Subject: Re: [stable] patch sparc64-make-prom-entry-spinlock-nmi-safe.patch
 added to 2.6.32-stable tree

Greg KH wrote:
> On Tue, Mar 30, 2010 at 02:07:42PM +0200, Stefan Bader wrote:
>> This converted the raw_spinlock usage which is used in the upstream patch but
>> not available in 2.6.32 to normal spinlock usage. Should it get annotated to
>> document that?
> 
> why, you obviously figured that out :)
> 
> It's not the normal thing to do for backports otherwise we would be here
> all day long...

Sometimes its more or less to change. Well at least David saying "nah" and not
"hm argh" achieved half of what the intention of the suggested annotation was. :)

Thanks,
Stefan

> thanks,
> 
> greg k-h
> --
> To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
> the body of a message to majordomo@...r.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
> Please read the FAQ at  http://www.tux.org/lkml/

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ