lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 09 Mar 2009 12:52:09 +0200
From:	"Eilon Greenstein" <eilong@...adcom.com>
To:	"David Miller" <davem@...emloft.net>
cc:	netdev@...r.kernel.org, "Alex Chiang" <achiang@...com>,
	"Bjorn Helgaas" <bjorn.helgaas@...com>,
	"Vladislav Zolotarov" <vladz@...adcom.com>
Subject: [PATCH 0/3] bnx2x: net-2.6 Bug Fixes

Hi Dave,

This patch series against net-2.6 contains critical bug fixes for the
bnx2x.

The first two issues manifest themselves on IA64 with 64KB pages and
were reported and tested by Bjorn Helgass <bjorn.helgass@...com>. Those
two do not exist in net-next. Please let me know if you want me to send
a patch against net-next with those fixes (or if you can apply it to
net-next as well).

The third and last issue was already fixed in net-next as part of an
enhancement. After implementing this enhancement we got reports on
failures on some specific boards only at first load after power up. It
turned out that the root-cause is a HW issue on those boards that needs
to be workaround with the usage of the DMAE to initialize the chip - so
we are back-porting the needed part out of the DMAE enhancement to
net-2.6 as well. This issue was also tested and verified by a costumer,
but I'm respecting that costumer privacy.

Please consider applying to net-2.6.

Thanks,
Eilon

Vlad - thanks for preparing this patch series!



--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ