lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Mon, 8 Feb 2010 11:24:37 +0900
From:	Paul Mundt <lethal@...ux-sh.org>
To:	Linus Torvalds <torvalds@...ux-foundation.org>
Cc:	linux-sh@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: [GIT PULL] sh updates for 2.6.33-rc8

This fixes up a number of crashes both with the unwinder and with booting
from USB mass storage on certain CPUs. While the unwinder fixups aren't
technically regression fixes, they address a fairly long-standing set of
bugs. The HCD changes fix a fairly long-standing regression that was only
recently reported.

Please pull from:

	master.kernel.org:/pub/scm/linux/kernel/git/lethal/sh-2.6.git sh/for-2.6.33

Which contains:

Matt Fleming (4):
      sh: Correct the offset of the return address in ret_from_exception
      sh: Setup frame pointer in handle_exception path
      sh: Don't continue unwinding across interrupts
      sh: Remove superfluous setup_frame_reg call

Paul Mundt (2):
      usb: r8a66597-hcd: Flush the D-cache for the pipe-in transfer buffers.
      usb: r8a66597-hcd: Fix up spinlock recursion in root hub polling.

 arch/sh/kernel/cpu/sh3/entry.S  |    3 +-
 arch/sh/kernel/dwarf.c          |   20 +++++++++++++++++++
 arch/sh/kernel/entry-common.S   |    8 ++++++-
 drivers/usb/host/r8a66597-hcd.c |   41 +++++++++++++++++++++++++++-----------
 4 files changed, 58 insertions(+), 14 deletions(-)
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ