lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 07 Dec 2017 16:42:12 +0100 From: Jerome Brunet <jbrunet@...libre.com> To: Andrew Lunn <andrew@...n.ch> Cc: Florian Fainelli <f.fainelli@...il.com>, Kevin Hilman <khilman@...libre.com>, netdev@...r.kernel.org, linux-arm-kernel@...ts.infradead.org, linux-amlogic@...ts.infradead.org, linux-kernel@...r.kernel.org Subject: Re: [PATCH net-next v2 5/8] net: phy: meson-gxl: detect LPA corruption On Thu, 2017-12-07 at 16:34 +0100, Andrew Lunn wrote: > On Thu, Dec 07, 2017 at 03:27:12PM +0100, Jerome Brunet wrote: > > The purpose of this change is to fix the incorrect detection of the link > > partner (LP) advertised capabilities which sometimes happens with this PHY > > (roughly 1 time in a dozen) > > Hi Jerome > > Since this is a real fix, please send it alone. Base it on net, not > net-next. David will then get it applied to stable, so it will be > backported. I hesitated on this. For this fix to be "not too ugly" I need at least the helper functions (patch 1 to 3) ... which are not really fixes. Would it be Ok if send patches 1 to 5 to net ? and 6 to 8 separately on net-next ? > > Thanks > Andrew
Powered by blists - more mailing lists