lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <20170615.143127.891558578047283901.davem@davemloft.net>
Date:   Thu, 15 Jun 2017 14:31:27 -0400 (EDT)
From:   David Miller <davem@...emloft.net>
To:     tlfalcon@...ux.vnet.ibm.com
Cc:     netdev@...r.kernel.org, nfont@...ux.vnet.ibm.com,
        jallen@...ux.vnet.ibm.com
Subject: Re: [PATCH 0/5 net-next v2] ibmvnic: LPM bug fixes

From: Thomas Falcon <tlfalcon@...ux.vnet.ibm.com>
Date: Wed, 14 Jun 2017 23:50:04 -0500

> This series of small patches is meant to resolve a number of
> bugs, mostly occurring during an ibmvnic driver reset when
> recovering from a logical partition migration (LPM).
> 
> The first patch ensures that RX buffer pools are properly
> activated following an adapter reset by setting the proper
> flag in the pool data structure.
> 
> The second patch uses netif_tx_disable to stop TX queues when
> closing the device during a reset.
> 
> Third, fixup a typo that resulted in partial sanitization of
> TX/RX descriptor queues following a device reset.
> 
> Fourth, remove an ambiguous conditional check that was resulting
> in a kernel panic as null RX/TX completion descriptors were being
> processed during napi polling while the device is closing.
> 
> Finally, fix a condition where the napi polling routine exits
> before it has completed its work budget without notifying the
> upper network layers. This omission could result in the
> napi_disable function sleeping indefinitely under certain conditions.
> 
> v2: Attempt to provide a proper cover letter

Series applied, thank you.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ