lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20071114185826.GA1384@suse.de>
Date:	Wed, 14 Nov 2007 10:58:26 -0800
From:	Greg KH <gregkh@...e.de>
To:	Mark Lord <liml@....ca>
Cc:	Allen Martin <AMartin@...dia.com>,
	Alan Cox <alan@...rguk.ukuu.org.uk>,
	Jeff Garzik <jeff@...zik.org>,
	Riki Oktarianto <rkoktarianto@...il.com>,
	linux-kernel@...r.kernel.org, linux-ide@...r.kernel.org
Subject: Re: [PATCH] Add quirk to set AHCI mode on ICH boards

On Wed, Nov 14, 2007 at 01:46:09PM -0500, Mark Lord wrote:
> Allen Martin wrote:
> ..
>> Errata for which there is an SBIOS workaround are generally only
>> released to BIOS vendors and under NDA.  If Linux users were impacted by
>> such a bug we would most likely release a patch, but a much more likely
> ..
>
> All of that silly secrecy harms your company and your customers.
> You really should find a way to make the full information available
> to all O/S providers.  In the case of Linux, this costs nothing
> but a willingness on your part.

Actually, we (Linux developers) can sign NDAs if that is what the
manufacturer needs in order for us to be able to get this information.

If that is what nvidia requires, please let me know and I can set up the
proper paperwork so that we can get this needed information.

thanks,

greg k-h
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ