lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 18 Mar 2024 12:50:24 +0100
From: Jiri Pirko <jiri@...nulli.us>
To: Thinh Tran <thinhtr@...ux.ibm.com>
Cc: jacob.e.keller@...el.com, kuba@...nel.org, netdev@...r.kernel.org,
	VENKATA.SAI.DUGGI@....com, abdhalee@...ibm.com, aelior@...vell.com,
	davem@...emloft.net, drc@...ux.vnet.ibm.com, edumazet@...gle.com,
	manishc@...vell.com, pabeni@...hat.com, simon.horman@...igine.com,
	skalluru@...vell.com
Subject: Re: [PATCH v11] net-next/bnx2x: refactor common code to
 bnx2x_stop_nic()

Fri, Mar 15, 2024 at 10:26:25PM CET, thinhtr@...ux.ibm.com wrote:
>Refactor common code which disables and releases HW interrupts, deletes
>NAPI objects, into a new bnx2x_stop_nic() function.
>
>Fixes: bf23ffc8a9a7 ("bnx2x: new flag for track HW resource allocation")
>v11: updated with coding style per Jacob's suggestion
>     this patch targets net-next
>
>Signed-off-by: Thinh Tran <thinhtr@...ux.ibm.com>
>Reviewed-by: Jacob Keller <jacob.e.keller@...el.com>

net-next is closed. Resubmit next week please.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ