lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4A5B20AF.80205@vlnb.net>
Date:	Mon, 13 Jul 2009 15:55:27 +0400
From:	Vladislav Bolkhovitin <vst@...b.net>
To:	linux-kernel@...r.kernel.org, linux-scsi@...r.kernel.org,
	scst-devel <scst-devel@...ts.sourceforge.net>
CC:	Stanislaw Gruszka <stf_xl@...pl>,
	Matthew Jacob <lydianconcepts@...il.com>
Subject: [ANNOUNCE]: SCST target driver for QLocic 24xx adapters qla_isp 1.0.1
 released

Hi All,

I'm glad to announce that SCST target driver for QLogic 24xx adapters 
qla_isp version 1.0.1 released and can be downloaded from the SCST 
download page, thanks to Stanislaw Gruszka and Matthew Jacob!

Summary of changes between versions 1.0.0 and 1.0.1
---------------------------------------------------

- Rewritten DMA mappings code.

- Fixed resources leakage when disabling target during pending I/O 
operations.

- Fixed 64 bit Type 3 request breakage.

- Recovery from not being able to push CTIO fix.

- Various task management fixes.

- Fixed OOPS when firmware provide bad VPIDX number.

- Fixed 24xx startup problems.

- In driver firmware images update.

- Various compilation fixes for different gcc and Linux kernel versions.

SCST page of the qla_isp target driver located at 
http://scst.sourceforge.net/target_qla_isp.html.

Vlad
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ