lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <BN3PR11MB02730845402BE347A2F978848BB50@BN3PR11MB0273.namprd11.prod.outlook.com>
Date:	Fri, 11 Mar 2016 06:40:01 +0000
From:	Rajesh Borundia <rajesh.borundia@...gic.com>
To:	David Miller <davem@...emloft.net>
CC:	netdev <netdev@...r.kernel.org>,
	Dept-GE Linux NIC Dev <Dept-GELinuxNICDev@...gic.com>
Subject: RE: [PATCH net v2 0/2] qlcnic fixes

>-----Original Message-----
>From: David Miller [mailto:davem@...emloft.net]
>Sent: Friday, March 11, 2016 2:47 AM
>To: Rajesh Borundia <rajesh.borundia@...gic.com>
>Cc: netdev <netdev@...r.kernel.org>; Dept-GE Linux NIC Dev <Dept-
>GELinuxNICDev@...gic.com>
>Subject: Re: [PATCH net v2 0/2] qlcnic fixes
>
>From: Rajesh Borundia <rajesh.borundia@...gic.com>
>Date: Tue, 8 Mar 2016 02:39:56 -0500
>
>> This series adds following fixes.
>>
>> o While processing mailbox if driver gets a spurious mailbox
>>   interrupt it leads into premature completion of a next
>>   mailbox request. Added a guard against this by checking current
>>   state of mailbox and ignored spurious interrupt.
>>   Added a stats counter to record this condition.
>>
>> v2:
>>
>> o Added patch that removes usage of atomic_t as we are not implemeting
>>   atomicity by using atomic_t value.
>>
>> Please apply these fixes to net.
>
>As explained in other list postings, 'net' is basically closed for this release cycle,
>so I applied this series to 'net-next'.
>

Thanks.

>Let me know if you'd like me to therefore queue these changes up for -stable.
>
Please queue the changes for stable.

>Thanks.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ