lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <a67c6a9b-9ea0-ac44-9aaa-5a6747b2e8b1@leemhuis.info>
Date:   Mon, 28 Aug 2017 12:23:05 +0200
From:   Thorsten Leemhuis <regressions@...mhuis.info>
To:     Lorenzo Pieralisi <lorenzo.pieralisi@....com>
Cc:     Arnd Bergmann <arnd@...db.de>, Hanjun Guo <hanjun.guo@...aro.org>,
        Sudeep Holla <sudeep.holla@....com>,
        "Rafael J. Wysocki" <rjw@...ysocki.net>,
        Len Brown <lenb@...nel.org>, Will Deacon <will.deacon@....com>,
        Tomasz Nowicki <tn@...ihalf.com>,
        Joerg Roedel <jroedel@...e.de>,
        Sricharan R <sricharan@...eaurora.org>,
        Robin Murphy <robin.murphy@....com>,
        Geetha Sowjanya <geethasowjanya.akula@...ium.com>,
        linux-acpi@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH] ACPI/IORT: fix build regression without IOMMU

Lo! On 28.08.2017 11:57, Lorenzo Pieralisiwrote:
> On Mon, Aug 28, 2017 at 11:27:20AM +0200, Thorsten Leemhuis wrote:
>
>> Was there any progress? Afaics that patch hasn't hit mainline yet (or
>> was it fixed by a different patch?). Asking because the issue is
>> mentioned in the regression report for 4.13.
> I do not understand how it can be mentioned in the 4.13 regression
> report given that it is code queued for 4.14 […]

Ohh, there is a simple explanation: Because I'm stupid and missed that
the commit Arnd mentioned was not in mainline :-/ I could have sworn I
checked that, but seems I did not.

Sorry for the noise & many thx for the answer!

Ciao, Thorsten

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ