lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <1AE640813FDE7649BE1B193DEA596E88026B9F96@SHSMSX101.ccr.corp.intel.com>
Date:	Thu, 22 Jan 2015 06:39:19 +0000
From:	"Zheng, Lv" <lv.zheng@...el.com>
To:	"Purdila, Octavian" <octavian.purdila@...el.com>
CC:	"Wysocki, Rafael J" <rafael.j.wysocki@...el.com>,
	"Box, David E" <david.e.box@...el.com>,
	"Moore, Robert" <robert.moore@...el.com>,
	"linux-acpi@...r.kernel.org" <linux-acpi@...r.kernel.org>,
	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
	"Brown, Len" <len.brown@...el.com>
Subject: RE: About 2 ACPICA table patches

Hi, Octavian

> From: Octavian Purdila [mailto:octavian.purdila@...el.com]
> Sent: Saturday, January 17, 2015 2:03 PM
> 
> On Fri, Jan 16, 2015 at 11:44 AM, Zheng, Lv <lv.zheng@...el.com> wrote:
> > Hi, Octavian
> >
> 
> Hi Lv,
> 
> > I noticed there are 2 patches you've sent to the community.
> > But unfortunately I didn't find them in my mailbox.
> > Let me comment you here.
> >
> > https://patchwork.kernel.org/patch/5501621/
> > This patch seem to be correct.
> > But Rafael should merge it directly via Linux because acpi_unload_table_id() is not in the ACPICA upstream.
> 
> OK, thanks for letting me know. Rafel, does the patch look ok to you?
> 
> > We expect the OSPMs to use acpi_unload_parent_table() instead.
> > I have a divergences reduction series to achieve the transition.
> > But they are pending for review for almost half a year.
> > If you have an environment to test.
> > Could you help to test this again?
> > I can prepare the patchset for you.
> >
> 
> Sure, if you can point me to the patch-set I can test it on my setup.

I didn't have environment to test, so let me send it as RFC with some pci-hotplug/ia64 guys Cced...

Thanks
-Lv


> 
> > https://patchwork.kernel.org/patch/5501561/
> > This patch is correct, I've put it in the 201501 ACPICA release materials for review:
> > https://patchwork.kernel.org/patch/5501621/
> > The patch can be found at:
> > https://github.com/zetalog/acpica/commit/281ff873
> > So if it is merged, you'll see it in the upstream after 201501 ACPICA release cycle.
> > And hence Linux trees doesn't need to merge this patch directly.
> >
> 
> Thanks,
> Tavi

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ