lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Thu, 10 Jul 2014 11:27:37 -0400
From:	Tejun Heo <>
To:	Linus Torvalds <>
Subject: [GIT PULL] libata fixes for v3.16-rc4


Nothing too interesting.  All fixes are ahci_platform related.


The following changes since commit ebe06187bf2aec10d537ce4595e416035367d703:

  epoll: fix use-after-free in eventpoll_release_file (2014-06-16 17:21:59 -1000)

are available in the git repository at:

  git:// for-3.16-fixes

for you to fetch changes up to 2a0bdff6b958d1b2523d2754b6cd5e0ea4053016:

  ahci_xgene: fix the dma state machine lockup for the IDENTIFY DEVICE PIO mode command. (2014-07-08 11:46:05 -0400)

Kefeng Wang (1):
      ahci: disable ncq feature for hisilicon sata

Mikko Perttunen (1):
      libahci_platform: Fail when PHY required but PHY support disabled

Russell King (1):
      ata: ahci_imx: warn when disabling ahci link

Shawn Guo (1):
      ahci: imx: manage only sata_ref_clk in imx_sata_enable[disable]

Suman Tripathi (2):
      libahci: export ahci_qc_issue() and ahci_start_fix_rx()
      ahci_xgene: fix the dma state machine lockup for the IDENTIFY DEVICE PIO mode command.

 drivers/ata/ahci.h             |  2 ++
 drivers/ata/ahci_imx.c         | 38 +++++++++++++++++++++++---
 drivers/ata/ahci_platform.c    |  2 +-
 drivers/ata/ahci_xgene.c       | 60 +++++++++++++++++++++++++++++++++---------
 drivers/ata/libahci.c          |  7 ++---
 drivers/ata/libahci_platform.c |  7 ++++-
 6 files changed, 94 insertions(+), 22 deletions(-)

To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to
More majordomo info at
Please read the FAQ at

Powered by blists - more mailing lists