lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Sat, 05 Nov 2011 09:37:35 +1100
From:	Con Kolivas <kernel@...ivas.org>
To:	Belisko Marek <marek.belisko@...il.com>
Cc:	Juergen Beisert <jbe@...gutronix.de>, linux-kernel@...r.kernel.org
Subject: Re: [ANNOUNCE] 3.1.0-ck1

On Fri, 4 Nov 2011 22:50:15 Belisko Marek wrote:
> On Thu, Nov 3, 2011 at 11:18 AM, Juergen Beisert <jbe@...gutronix.de> wrote:
> > Con Kolivas wrote:
> >> These are patches designed to improve system responsiveness and
> >> interactivity with specific emphasis on the desktop, but suitable to
> >> any
> >> commodity hardware workload.
> >> 
> >> As it may take some time to get a kernel.org account, I have started
> >> hosting these patches exclusively on my site for now.
> >> 
> >> 
> >> Apply to 3.1.x:
> >> http://ck.kolivas.org/patches/3.0/3.1/3.1.0-ck1/patch-3.1.0-ck1.bz2
> > 
> > Tried here with Mini2440 (=ARM arch) to compile:
> Seems in kernel/sched_bfs.c is missing #include <linux/prefetch.h>
> With that fix it compiles fine. Problem is that prefetch is defined in
> ARM headers only for version > v5 (mini is v4).

Thanks for that. The prefetch is only of questionable advantage so it can be 
removed entirely. The following patch should fix it:

http://ck.kolivas.org/patches/3.0/3.1/3.1.0-ck1/bfs414-noprefetch.patch

Regards,
Con

-- 
-ck
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ