lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <515A364B.7070100@osadl.org>
Date:	Tue, 02 Apr 2013 03:37:15 +0200
From:	Carsten Emde <C.Emde@...dl.org>
To:	Steven Rostedt <rostedt@...dmis.org>
CC:	LKML <linux-kernel@...r.kernel.org>,
	RT <linux-rt-users@...r.kernel.org>,
	Thomas Gleixner <tglx@...utronix.de>,
	John Kacur <jkacur@...hat.com>
Subject: Re: [ANNOUNCE] 3.6.11.1-rt32

Steven,

> I'm pleased to announce the 3.6.11.1-rt32 stable release.
Thank you.

Your patch-3.6.11.1 additionally needs 
23d3b8bfb8eb20e7d96afa09991e6a5ed1c83164 (net: qdisc busylock needs 
lockdep annotations) to avoid the compile error
drivers/net/ppp/ppp_generic.c: In function ‘ppp_dev_init’:
drivers/net/ppp/ppp_generic.c:1027:5: error: ‘struct net_device’ has no 
member named ‘qdisc_tx_busylock’

And since you apparently decided to backport 
303c07db487be59ae9fda10600ea65ca11c21497 (ppp: set qdisc_tx_busylock to 
avoid LOCKDEP splat), you probably should also backport the related 
changes in bonding and team:
- 49ee49202b4ac4be95d05e4bf24a9ac8b54c5528 (bonding: set 
qdisc_tx_busylock to avoid LOCKDEP splat)
- b3c581d5d7130fc7f2eab9ab14c8de8882b42380 (team: set qdisc_tx_busylock 
to avoid LOCKDEP splat)

	-Carsten.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ