lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <tkrat.7cdc7f6a1e6d9f28@s5r6.in-berlin.de>
Date:	Mon, 2 Apr 2007 02:11:56 +0200 (CEST)
From:	Stefan Richter <stefanr@...6.in-berlin.de>
To:	linux1394-devel@...ts.sourceforge.net
cc:	netdev@...r.kernel.org
Subject: [PATCH linux1394-2.6.git 00/15] ieee1394: eth1394: cleanups and small
 fixes

01/15 ieee1394: eth1394: coding style
02/15 ieee1394: eth1394: .probe and .update may sleep
03/15 ieee1394: eth1394: refactor .probe and .update
04/15 ieee1394: eth1394: correct a memset argument
05/15 ieee1394: eth1394: shorter error messages
06/15 ieee1394: eth1394: contain host reset
07/15 ieee1394: eth1394: make MTU configurable
08/15 ieee1394: eth1394: CONFIG_INET is always defined
09/15 ieee1394: eth1394: omit useless set_mac_address callback
10/15 ieee1394: eth1394: don't use alloc_etherdev
11/15 ieee1394: eth1394: clean up fragment_overlap
12/15 ieee1394: eth1394: some conditions are unlikely
13/15 ieee1394: eth1394: hard_start_xmit is called in atomic context
14/15 ieee1394: eth1394: correct return codes in hard_start_xmit
15/15 ieee1394: eth1394: check for kmem_cache_create failure

 drivers/ieee1394/eth1394.c |  603 ++++++++++++++++---------------------
 drivers/ieee1394/eth1394.h |   24 -
 2 files changed, 268 insertions(+), 359 deletions(-)

-- 
Stefan Richter
-=====-=-=== -=-- ---=-
http://arcgraph.de/sr/

-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ