lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 12 May 2011 00:45:30 -0400 (EDT) From: David Miller <davem@...emloft.net> To: maheshb@...gle.com Cc: mirqus@...il.com, jeffrey.t.kirsher@...el.com, e1000-devel@...ts.sourceforge.net, netdev@...r.kernel.org, therbert@...gle.com Subject: Re: [PATCHv1] e1000e: Allow ethtool to enable/disable loopback. From: Mahesh Bandewar <maheshb@...gle.com> Date: Wed, 11 May 2011 16:11:21 -0700 > On Wed, May 11, 2011 at 12:15 PM, Michaİİ Mirosİİaw <mirqus@...il.com> wrote: >> 2011/5/11 Mahesh Bandewar <maheshb@...gle.com>: >>> This patch adds e1000_set_features() to handle loopback mode. When loopback >>> is enabled, it enables internal-MAC loopback. >> >> Please wait for this driver's conversion to hw_features. One comment >> below, though. >> > This is not intrusive so should not create problems when that happens. Right and the Intel maintainer folks can resolve such conflicts anyways. -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists