lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 22 Jun 2016 08:54:52 -0400
From:	Sathya Perla <sathya.perla@...adcom.com>
To:	netdev@...r.kernel.org
Subject: [net-next PATCH 0/5] be2net: patch set

Hi Dave, pls consider commiting the following patches to the net-next tree.
Thanks!

Patch 1 replaces the be_max_eqs() macro with two new macros called
be_max_nic_eqs() and be_max_func_eqs() to clear confusion in that part
of the code.

Patch 2 adds support to configure asymmetric number of rx/tx queues via
ethtool set-channels option.

Patch 3 disables EVB when VFs are not enabled on a BE3 SR-IOV config to
avoid the broadcast echo problem.

Patch 4 updates copyright markings in be2net src files

Patch 5 updates the be2net maintainers' list

Sathya Perla (3):
  be2net: fix definition of be_max_eqs()
  be2net: support asymmetric rx/tx queue counts
  be2net: update be2net maintainers list

Somnath Kotur (2):
  be2net: Fix broadcast echoes from EVB in BE3
  be2net: Change copyright markings in source files

 MAINTAINERS                                    |  3 +-
 drivers/net/ethernet/emulex/benet/be.h         | 36 +++++++++--
 drivers/net/ethernet/emulex/benet/be_cmds.c    | 13 +++-
 drivers/net/ethernet/emulex/benet/be_cmds.h    |  2 +-
 drivers/net/ethernet/emulex/benet/be_ethtool.c | 31 +++++++--
 drivers/net/ethernet/emulex/benet/be_main.c    | 89 +++++++++++++++++---------
 drivers/net/ethernet/emulex/benet/be_roce.c    |  2 +-
 drivers/net/ethernet/emulex/benet/be_roce.h    |  2 +-
 8 files changed, 128 insertions(+), 50 deletions(-)

-- 
2.4.1

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ