Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1761455AbYFWTiU (ORCPT ); Mon, 23 Jun 2008 15:38:20 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1755889AbYFWTiN (ORCPT ); Mon, 23 Jun 2008 15:38:13 -0400 Received: from mx3.mail.elte.hu ([157.181.1.138]:35911 "EHLO mx3.mail.elte.hu" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755371AbYFWTiM (ORCPT ); Mon, 23 Jun 2008 15:38:12 -0400 Date: Mon, 23 Jun 2008 21:36:50 +0200 From: Ingo Molnar To: Greg KH Cc: Linus Torvalds , "Theodore Ts'o" , Zwane Mwaikambo , Bernhard Walle , Greg KH , Justin Forbes , Johannes Weiner , Chris Wedgwood , linux-kernel@vger.kernel.org, Randy Dunlap , Willy Tarreau , Michael Krufky , alan@lxorguk.ukuu.org.uk, Chuck Ebbert , Domenico Andreoli , Dave Jones , akpm@linux-foundation.org, Chuck Wolber , stable@kernel.org, Rodrigo Rubira Branco Subject: Re: [stable] [patch 4/5] x86: use BOOTMEM_EXCLUSIVE on 32-bit Message-ID: <20080623193650.GB20535@elte.hu> References: <20080622185327.348377223@mini.kroah.org> <20080622190131.GB20141@suse.de> <87prq9dxst.fsf@skyscraper.fehenstaub.lan> <20080622203047.GC20800@suse.de> <20080623080940.GA23313@elte.hu> <20080623192012.GA15183@kroah.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20080623192012.GA15183@kroah.com> User-Agent: Mutt/1.5.18 (2008-05-17) X-ELTE-VirusStatus: clean X-ELTE-SpamScore: -1.5 X-ELTE-SpamLevel: X-ELTE-SpamCheck: no X-ELTE-SpamVersion: ELTE 2.0 X-ELTE-SpamCheck-Details: score=-1.5 required=5.9 tests=BAYES_00 autolearn=no SpamAssassin version=3.2.3 -1.5 BAYES_00 BODY: Bayesian spam probability is 0 to 1% [score: 0.0000] Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1459 Lines: 37 * Greg KH wrote: > > thanks. This patch (which was not a build fix but an infrastructure > > fix that the kexec fix in arch/x86 depended on) is well-tested as > > well, it was queued in -tip on June 10th: > > > > | commit 91d48fc80f22817332170082e10de60a75851640 > > | Author: Bernhard Walle > > | Date: Sun Jun 8 15:46:29 2008 +0200 > > | CommitDate: Tue Jun 10 14:41:56 2008 +0200 > > | > > | bootmem: add return value to reserve_bootmem_node() > > | > > | This patch changes the function reserve_bootmem_node() from void to > > | int, returning -ENOMEM if the allocation fails. > > | > > | Signed-off-by: Bernhard Walle > > | Signed-off-by: Ingo Molnar > > > > so it is a -stable candidate just as much as the kexec fix. (These > > are all fixes for long-standing problems so i guess it can go all > > the way back to all stable kernels that are being maintained.) > > Hm, but it's not in Linus's tree yet, so I can't take it for stable at > this time :( it's all fine already: it's the very same patch you just added, but different sha1. I just pointed out the lineage and the testing status of the patch. Ingo -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/