lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1425774269-25618-1-git-send-email-green@linuxhacker.ru>
Date:	Sat,  7 Mar 2015 19:24:25 -0500
From:	green@...uxhacker.ru
To:	Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
	devel@...verdev.osuosl.org,
	Andreas Dilger <andreas.dilger@...el.com>
Cc:	Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
	Oleg Drokin <green@...uxhacker.ru>
Subject: [PATCH 0/4] Lustre fixes

From: Oleg Drokin <green@...uxhacker.ru>

The first two patches are a follow on for the previous patch series
on not using deprecated cpumask-related code.

And two blocking while atomic/not running fixes.

Please consider.

Lai Siyao (1):
  staging/lustre/llite: avoid nonatomic memory alloc under spinlock

Oleg Drokin (3):
  staging/lustre/libcfs: replace deprecated cpus_ calls with cpumask_
  staging/lustre/o2iblnd: Don't use cpus_weight
  staging/lustre: Don't call blocking funcitons when !RUNNABLE

 .../staging/lustre/lnet/klnds/o2iblnd/o2iblnd.c    |  4 +--
 .../staging/lustre/lustre/libcfs/linux/linux-cpu.c | 32 ++++++++++++----------
 .../lustre/lustre/libcfs/linux/linux-tcpip.c       | 10 +++----
 drivers/staging/lustre/lustre/llite/statahead.c    | 13 +++++++--
 4 files changed, 35 insertions(+), 24 deletions(-)

-- 
2.1.0

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ