lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Tue, 14 Dec 2021 08:35:19 +0800
From:   Baoquan He <bhe@...hat.com>
To:     Andrew Morton <akpm@...ux-foundation.org>
Cc:     linux-kernel@...r.kernel.org, linux-mm@...ck.org, hch@....de,
        cl@...ux.com, John.p.donnelly@...cle.com, kexec@...ts.infradead.org
Subject: Re: [PATCH v3 0/5] Avoid requesting page from DMA zone when no
 managed pages

On 12/13/21 at 01:05pm, Andrew Morton wrote:
> On Mon, 13 Dec 2021 20:27:07 +0800 Baoquan He <bhe@...hat.com> wrote:
> 
> > Background information can be checked in cover letter of v2 RESEND POST
> > as below:
> > https://lore.kernel.org/all/20211207030750.30824-1-bhe@redhat.com/T/#u
> 
> Please include all relevant info right here, in the [0/n].  For a
> number of reasons, one of which is that the text is more likely to be
> up to date as the patchset evolves.
> 
> It's unusual that this patchset has two non-urgent patches and the
> final three patches are cc:stable.  It makes one worry that patches 3-5
> might have dependencies on 1-2.  Also, I'd expect to merge the three
> -stable patches during 5.16-rcX which means I have to reorder things,
> redo changelogs, update links and blah blah.
> 
> So can I ask that you redo all of this as two patch series?  A 3-patch
> series which is targeted at -stable, followed by a separate two-patch
> series which is targeted at 5.17-rc1.  Each series with its own fully
> prepared [0/n] cover.

Sure, will do. Sorry for the mess.

Before the 3-patch series posting, I may need to continue discussing and
making clear if the current patch 5/5 is a good fix, or whether we need
change to take other solution. So I will take the first two patches out
and post them.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ