lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAE8XmWp9L4BVL00k1zjhpsV1ikkHcr-xzjBmomDvG=CTmGto+g@mail.gmail.com>
Date:	Tue, 10 Jan 2012 11:00:48 +0800
From:	Dongsheng Song <dongsheng.song@...il.com>
To:	"Nicholas A. Bellinger" <nab@...ux-iscsi.org>
Cc:	linux-kernel@...r.kernel.org
Subject: Re: Where is module target_core_stgt or forgot cleanup ?

On Tue, Jan 10, 2012 at 10:02, Nicholas A. Bellinger
<nab@...ux-iscsi.org> wrote:
>
> Hello,
>
> target_core_stgt is a backend driver for a userspace passthrough using
> STGT logic that exists in lio-core.git code.  It's only WIP code in it's
> current form, and until someone shows interest in doing the necessary
> work to make it run it's going to remaine a lio-core.git specific
> module.
>
> --nab
	
Thank you, I got it.

So ' request_module("target_core_stgt")' should be remove from
the mainline kernel code, isn't it?

--
Dongsheng
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ