lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <a0186cc6-2a55-cb2b-edc6-571ecb3403b6@cn.fujitsu.com>
Date:   Mon, 26 Jun 2017 18:08:16 +0800
From:   Dou Liyang <douly.fnst@...fujitsu.com>
To:     Thomas Gleixner <tglx@...utronix.de>
CC:     <x86@...nel.org>, <linux-kernel@...r.kernel.org>,
        <mingo@...nel.org>, <hpa@...or.com>, <ebiederm@...ssion.com>,
        <bhe@...hat.com>, <izumi.taku@...fujitsu.com>
Subject: Re: [RFC PATCH v3 00/12] Unify interrupt mode and setup it as soon as
 possible

Hi Thomas,

At 05/23/2017 04:23 AM, Thomas Gleixner wrote:
> Dou,
>
> On Wed, 10 May 2017, Dou Liyang wrote:
>
>> According to Ingo's and Eric's advice[1,2], Try my best to optimize the
>> init of interrupt delivery mode for x86.
>
> sorry for replying late. The patchset is not forgotten, it's on my todo
> list and I'll tend to it latest next week.


I hope to know the status of this patchest in your todo list.

If you haven't dealt with it yet, I want to resent it as V5 first for
you:

   * rebase this patchset to upstream
   * remove the RFC presix
   * remove the 1/12 patch
   * replace the pr_info with apic_printk

Look forward to your reply !

Thanks,
	Dou.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ