lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 19 Apr 2010 09:06:11 +0300 From: "Eilon Greenstein" <eilong@...adcom.com> To: "David Miller" <davem@...emloft.net> cc: "Vladislav Zolotarov" <vladz@...adcom.com>, "netdev@...r.kernel.org" <netdev@...r.kernel.org>, "Dmitry Kravkov" <dmitry@...adcom.com>, "Yaniv Rosner" <yaniv.rosner@...adcom.com> Subject: Re: [PATCH 0/13] bnx2x: Buf fixes and enhancements On Sun, 2010-04-18 at 21:07 -0700, David Miller wrote: > From: "Vladislav Zolotarov" <vladz@...adcom.com> > Date: Sun, 18 Apr 2010 17:47:26 +0300 > > > Dave, hi. > > Pls., apply the following series of patches. > > It includes a few bug fixes and enhancements. > > Several of these patches are inappropriate or need corrections, and > you also have not specified where you want these patches applied > (net-2.6 or net-next-2.6) > We will re-submit the path series with the following fixes: - Omitting patch 11 (disabling LRO and leaving only GRO on XEN kernel on compile time) - restructuring patch 2 (using generic infrastructures for VPD-R-V0 access) - Better description - especially on email 0... - I'm sending another email regrading the number of queues on 32 bits kernel. Thanks for all the inputs, Eilon -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists