lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <6204724.lOV4Wx5bFT@rafael.j.wysocki>
Date: Sat, 20 Sep 2025 12:49:20 +0200
From: "Rafael J. Wysocki" <rafael@...nel.org>
To: Linux PM <linux-pm@...r.kernel.org>, Takashi Iwai <tiwai@...e.de>
Cc: LKML <linux-kernel@...r.kernel.org>,
 Linux PCI <linux-pci@...r.kernel.org>,
 Alex Williamson <alex.williamson@...hat.com>,
 Bjorn Helgaas <helgaas@...nel.org>, Zhang Qilong <zhangqilong3@...wei.com>,
 Ulf Hansson <ulf.hansson@...aro.org>
Subject: [PATCH v2 0/3] PM: runtime: Auto-cleanup macros for runtime PM

Hi All,

This supersedes both

https://lore.kernel.org/linux-pm/5049058.31r3eYUQgx@rafael.j.wysocki/

and

https://lore.kernel.org/linux-pm/20250919163147.4743-1-tiwai@suse.de/

that were sent simultaneously by mistake and both made a mistake of
forgetting that __pm_runtime_suspend() returns an error code for devices
with runtime PM disabled.

The first patch in this series has been modified to provide additional
two macros for the cases in which runtime PM is expected to work
transparently if runtime PM has been disabled for the given device.
Also the names of the new classes defined in it and the new helper
static inline function have been changed.

The second patch has been updated to reflect the changes in the first patch.

The last patch is basically the same as before.

Thanks!




Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ