lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20110719114741.GA5827@redhat.com>
Date:	Tue, 19 Jul 2011 14:47:41 +0300
From:	"Michael S. Tsirkin" <mst@...hat.com>
To:	netdev@...r.kernel.org
Cc:	jasowang@...hat.com, mashirle@...ibm.com
Subject: [PULL net-next] vhost-net fixes for 3.1

Here's Jason's fix for a theoretical event loss
on migration (tweaked by me to update the test
module as well), and a refcounting fix by me
for a bug in the new zerocopy mode.

I thought hard about merging Jason's patches for 3.0
as well, but in the end I think it's not worth
the risk of breaking something at this stage.

Please pull for 3.1, thanks a lot!

The following changes since commit 81fc70d86527a1450560709500ca5f52e661da1f:

  net: can: remove custom hex_to_bin() (2011-07-18 11:31:43 -0700)

are available in the git repository at:
  git://git.kernel.org/pub/scm/linux/kernel/git/mst/vhost.git vhost-net-next

Jason Wang (2):
      vhost: init used ring after backend was set
      vhost: set log when updating used flags or avail event

Michael S. Tsirkin (1):
      vhost: fix zcopy reference counting

 drivers/vhost/net.c   |    4 ++
 drivers/vhost/test.c  |    5 +++
 drivers/vhost/vhost.c |   87 ++++++++++++++++++++++++++++++------------------
 drivers/vhost/vhost.h |    1 +
 4 files changed, 64 insertions(+), 33 deletions(-)
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ