lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <201112030352.07030.s.L-H@gmx.de>
Date:	Sat, 3 Dec 2011 03:52:05 +0100
From:	"Stefan Lippers-Hollmann" <s.L-H@....de>
To:	gregkh@...e.de
Cc:	linux-kernel@...r.kernel.org, sgruszka@...hat.com,
	IvDoorn@...il.com, linville@...driver.com, stable@...r.kernel.org
Subject: Re: Patch "rt2x00: handle spurious pci interrupts" has been added to the 3.1-stable tree

Hi

On Saturday 03 December 2011, gregkh@...e.de wrote:
> 
> This is a note to let you know that I've just added the patch titled
> 
>     rt2x00: handle spurious pci interrupts
> 
> to the 3.1-stable tree which can be found at:
>     http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary
> 
> The filename of the patch is:
>      rt2x00-handle-spurious-pci-interrupts.patch
> and it can be found in the queue-3.1 subdirectory.
> 
> If you, or anyone else, feels it should not be added to the stable tree,
> please let <stable@...r.kernel.org> know about it.
> 
> 
> From 23085d5796561625db4143a671f1de081f66ef08 Mon Sep 17 00:00:00 2001
> From: Stanislaw Gruszka <sgruszka@...hat.com>
> Date: Wed, 16 Nov 2011 13:58:42 +0100
> Subject: rt2x00: handle spurious pci interrupts
[...]

This patch has been reverted again, due to 
http://patchwork.ozlabs.org/patch/127153/
(this also applies to the 2.6.32 backport)

commit 6cccccafe9e8b88adb1800940ded6ad76c587e1b
Author: John W. Linville <linville@...driver.com>
Date:   Tue Nov 22 16:36:35 2011 -0500

    Revert "rt2x00: handle spurious pci interrupts"
    
    This reverts commit 23085d5796561625db4143a671f1de081f66ef08.
    
    The original patch was a misguided attempt to improve performance on
    some hardware that is apparently prone to spurious interrupt generation.
    
    Signed-off-by: John W. Linville <linville@...driver.com>

Regards
	Stefan Lippers-Hollmann
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ