lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <3FAC1EB0-2606-40BF-9BDF-8D2BCEB003E9@kernel.crashing.org>
Date:	Tue, 6 Dec 2011 23:35:31 -0600
From:	Kumar Gala <galak@...nel.crashing.org>
To:	David Miller <davem@...emloft.net>
Cc:	afleming@...escale.com, netdev@...r.kernel.org
Subject: Re: [PATCH] fsl_pq_mdio: Clean up tbi address configuration


On Dec 5, 2011, at 11:41 PM, David Miller wrote:

> From: Kumar Gala <galak@...nel.crashing.org>
> Date: Mon, 5 Dec 2011 23:38:14 -0600
> 
>> Any comment on getting this patch pulled into net.git?
> 
> It requires a DT patch or related set of changes which have need
> to be done differently as per feedback.
> 
> My understanding is there are two patches required, this revert plus
> the changes to add the tbi property to the DT which are missing it.
> 
> That's why these tbi changes went in to begin with, to handle DT
> which lack the property, or something like that.  So you can't
> just revert this thing without also fixing the DT that lack the
> tbi property, or else you break those systems.

We need this patch in 3.2 regardless of DT.  Currently we get the oops on 3.2 on ALL systems.  Andy should be working up a device tree patch to fix the subset of .dts that are missing the tbi property.

What happens in 'next' is slightly different issue.

- k--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ