lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Mon, 5 Dec 2011 13:01:27 -0800
From:	Greg KH <gregkh@...e.de>
To:	Stefan Lippers-Hollmann <s.L-H@....de>
Cc:	linux-kernel@...r.kernel.org, sgruszka@...hat.com,
	IvDoorn@...il.com, linville@...driver.com, stable@...r.kernel.org
Subject: Re: Patch "rt2x00: handle spurious pci interrupts" has been added to
 the 3.1-stable tree

On Sat, Dec 03, 2011 at 03:52:05AM +0100, Stefan Lippers-Hollmann wrote:
> Hi
> 
> On Saturday 03 December 2011, gregkh@...e.de wrote:
> > 
> > This is a note to let you know that I've just added the patch titled
> > 
> >     rt2x00: handle spurious pci interrupts
> > 
> > to the 3.1-stable tree which can be found at:
> >     http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary
> > 
> > The filename of the patch is:
> >      rt2x00-handle-spurious-pci-interrupts.patch
> > and it can be found in the queue-3.1 subdirectory.
> > 
> > If you, or anyone else, feels it should not be added to the stable tree,
> > please let <stable@...r.kernel.org> know about it.
> > 
> > 
> > From 23085d5796561625db4143a671f1de081f66ef08 Mon Sep 17 00:00:00 2001
> > From: Stanislaw Gruszka <sgruszka@...hat.com>
> > Date: Wed, 16 Nov 2011 13:58:42 +0100
> > Subject: rt2x00: handle spurious pci interrupts
> [...]
> 
> This patch has been reverted again, due to 
> http://patchwork.ozlabs.org/patch/127153/
> (this also applies to the 2.6.32 backport)

Thanks for letting me know, I've now reverted it from all stable trees

greg k-h
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ