lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 23 Sep 2015 12:29:42 +0200 From: Arnd Bergmann <arnd@...db.de> To: linaro-kernel@...ts.linaro.org Cc: Sudeep Holla <sudeep.holla@....com>, Rafael Wysocki <rjw@...ysocki.net>, Viresh Kumar <viresh.kumar@...aro.org>, "sboyd@...eaurora.org" <sboyd@...eaurora.org>, open list <linux-kernel@...r.kernel.org>, "stable@...r.kernel.org" <stable@...r.kernel.org>, "open list:ACPI" <linux-acpi@...r.kernel.org>, "Zheng, Lv" <lv.zheng@...el.com>, "gregkh@...uxfoundation.org" <gregkh@...uxfoundation.org>, Len Brown <lenb@...nel.org> Subject: Re: [PATCH V3 1/2] ACPI / EC: Fix broken big-endian 64bit platforms using 'global_lock' On Wednesday 23 September 2015 10:57:44 Sudeep Holla wrote: > > Also I am not against the $subject patch as such, just added > clarification so that it shouldn't be assumed that BE + ACPI works on > ARM64. > Ok, at least we can safely assume that we do not need to backport that patch to stable then. Arnd -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists