lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20130626223554.GB25104@schnuecks.de>
Date:	Thu, 27 Jun 2013 00:35:54 +0200
From:	Simon Baatz <gmbnomis@...il.com>
To:	Luis Henriques <luis.henriques@...onical.com>,
	Ben Hutchings <ben@...adent.org.uk>
Cc:	linux-kernel@...r.kernel.org, stable@...r.kernel.org,
	akpm@...ux-foundation.org,
	Catalin Marinas <catalin.marinas@....com>,
	Russell King <rmk+kernel@....linux.org.uk>
Subject: Re: [04/26] ARM: 7755/1: handle user space mapped pages in
 flush_kernel_dcache_page

Hi Ben, Luis,

On Wed, Jun 26, 2013 at 10:04:11AM +0100, Luis Henriques wrote:
> Ben Hutchings <ben@...adent.org.uk> writes:
> 
> > 3.2.48-rc1 review patch.  If anyone has any objections, please let me know.
> >
> > ------------------
> >
> > From: Simon Baatz <gmbnomis@...il.com>
> >
> > commit 1bc39742aab09248169ef9d3727c9def3528b3f3 upstream.
> 
> Simon suggested Greg not to queue this patch for stable kernels as it
> breaks no-MMU ARM configs.  He will provide a follow-up patch that
> should go together with this one.

Fortunately, the follow-up patch is upstream now. It is commit
63384fd0b1509acf522a8a8fcede09087eedb7df (ARM: 7772/1: Fix missing
flush_kernel_dcache_page() for noMMU).

Thus, please add that patch as well. If it is too late to do this, my
suggestion would be to queue both of them together for the next cycle.

- Simon
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ