lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 29 Apr 2013 14:08:16 -0400 (EDT) From: David Miller <davem@...emloft.net> To: bigeasy@...utronix.de Cc: mugunthanvnm@...com, netdev@...r.kernel.org, linux-omap@...r.kernel.org Subject: Re: [net-next PATCH 1/1] drivers: net: cpsw: fix kernel warn on cpsw irq enable From: Sebastian Andrzej Siewior <bigeasy@...utronix.de> Date: Fri, 26 Apr 2013 14:03:24 +0200 > David, how did this happen? The patch I've sent > > http://www.spinics.net/lists/netdev/msg234240.html > > adds this to the probe function, according to the net-next tree it was > added to cpsw_probe_dual_emac(). The context is similar but not exact > the same. This is usually I ask people to respin patches even if there are minor fuzz differences when I try to apply this patch. I tried to be nice and save you some work this time, 'patch' accepted it with minor offsets, and with a cursory glance I didn't see any problems. Next time I'll be a hardliner and request a respin :-) -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists