lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Mon, 7 Mar 2011 18:56:47 +0200
From:	"Tanya Brokhman" <tlinder@...eaurora.org>
To:	"'Greg KH'" <gregkh@...e.de>
Cc:	<linux-arm-msm@...r.kernel.org>, <ablay@...eaurora.org>,
	"'open list:USB GADGET/PERIPH...'" <linux-usb@...r.kernel.org>,
	"'open list'" <linux-kernel@...r.kernel.org>
Subject: RE: [RFC/PATCH 5/5] uas: HACK needed for UAS host.

This patch is not for submission, it's a HACK and the bug should be fixed in
another way. I've uploaded it because it's needed at the moment for working
with the UAS gadget driver and the current version of UAS host. I'm working
on resolving this issue with Sarah on another email thread. Just thought
that if someone wishes to use the driver right now this patch will be useful
to him.

Best regards,
Tanya Brokhman
Consultant for Qualcomm Innovation Center, Inc.
Qualcomm Innovation Center, Inc. is a member of Code Aurora Forum


> -----Original Message-----
> From: Greg KH [mailto:gregkh@...e.de]
> Sent: Monday, March 07, 2011 6:52 PM
> To: Tatyana Brokhman
> Cc: linux-arm-msm@...r.kernel.org; ablay@...eaurora.org; open list:USB
> GADGET/PERIPH...; open list
> Subject: Re: [RFC/PATCH 5/5] uas: HACK needed for UAS host.
> 
> On Mon, Mar 07, 2011 at 06:48:51PM +0200, Tatyana Brokhman wrote:
> > REMOVE LATER ON!
> 
> Remove what?  The patch or this description?
> 
> confused,
> 
> greg k-h

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ