lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20140401095521.GA3326@katana>
Date:	Tue, 1 Apr 2014 11:55:22 +0200
From:	Wolfram Sang <wsa@...-dreams.de>
To:	Hans-Christian Egtvedt <egtvedt@...fundet.no>
Cc:	linux-kernel@...r.kernel.org, Magnus Damm <magnus.damm@...il.com>,
	kbuild-all@...org, daniel.lezcano@...aro.org,
	Haavard Skinnemoen <hskinnemoen@...il.com>
Subject: Re: [PATCH] avr32: remove cpu_data macro to fix compiles

On Mon, Feb 24, 2014 at 08:28:20AM +0100, Hans-Christian Egtvedt wrote:
> Around Sat 22 Feb 2014 09:28:27 +0100 or thereabout, Wolfram Sang wrote:
> > Having cpu_data as a parameterless macro can easily cause build failures
> > because it can be a variable name like in linux/pm_domain.h [1]. So,
> > remove the macro and convert its only user. Because this architecture
> > cannot do SMP, remove the whole SMP block, too. Only compile tested due
> > to no hardware.
> 
> Looks sane, AVR32 doesn't support SMP, so this change should be fine.
> 
> > Signed-off-by: Wolfram Sang <wsa@...-dreams.de>
> > 
> 
> Acked-by: Hans-Christian Egtvedt <egtvedt@...fundet.no>
> 
> > [1] https://lists.01.org/pipermail/kbuild-all/2014-February/003252.html
> >
> 
> clockevents/3.15 branch, mens what you have queued up for 3.15?
> 
> I can queue this in my linux-next, and send Linus an early pull request the
> moment 3.14 is released.

Have you done this already? I can't find it, yet I see the pull request
for the clocks is already out.


Download attachment "signature.asc" of type "application/pgp-signature" (837 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ