lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 14 Jan 2009 21:36:22 -0800 (PST)
From:	David Miller <davem@...emloft.net>
To:	eilong@...adcom.com
Cc:	netdev@...r.kernel.org, pl@...ux.vnet.ibm.com, yanivr@...adcom.com
Subject: Re: [PATCH 00/34]bnx2x: Bug fixes

From: "Eilon Greenstein" <eilong@...adcom.com>
Date: Wed, 14 Jan 2009 18:42:35 +0200

> The problem is that more and more bugs required immediate attention so
> the result is a long list of bug fixes.

You have to understand that you absolutely cannot slap me with 34 "bug
fixes" all at once after the merge window is closed.

> Please consider applying.

I've gone through patches 1 to 17 for now.  Patched I didn't apply:

1) [PATCH 02/34]bnx2x: Barriers for the compiler

   Need feedback on my query, if this requires a compiler barrier
   it almost certainly needs cpu reordering barriers too.

2) [PATCH 05/34]bnx2x: Setting the GSO_TYPE with LRO

   As discussed at length, this isn't correct and it's not the
   way to fix this problem.  Implement the ethtool LRO disable
   and the kernel will turn it off when bridging or routing is
   being used over this interface.

3) [PATCH 10/34]bnx2x: Compilation issue on IA64

   This code is ugly and even in the worst case the thing to do
   is unconditionally use "%llx" and cast the arg to "long long"
   to kill the warning.

4) [PATCH 13/34]bnx2x: System cache alignment

   This is an optimization and has no business going in outside
   of the merge window.

I'll go over the rest after I send what I have now to Linus, but don't
set your expectations high, this is way too many patches to be sending
now.

--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ