lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20130111223604.GA14144@joi.lan> Date: Fri, 11 Jan 2013 23:36:04 +0100 From: Marcin Slusarz <marcin.slusarz@...il.com> To: Amit Kale <akale@...c-inc.com> Cc: LKML <linux-kernel@...r.kernel.org> Subject: Re: Announcement: STEC EnhanceIO SSD caching software for Linux kernel On Sat, Jan 12, 2013 at 01:18:37AM +0800, Amit Kale wrote: > Greetings, > > STEC is happy to announce hosting of our EnhanceIO SSD caching software on github. > We would like to invite kernel hackers to try it. We'll appreciate your > valuable feedback to help us improve it to the standards of Linux kernel > source code. We hope to eventually submit it for a possible inclusion in > Linux kernel. If you are serious about inclusion in Linux kernel sources, you may want to act on these comments: - kernel API wrappers should be removed - your ioctl won't work with 32-bit userspace on 64-bit kernel (differences in size and padding of struct cache_rec_short fields) - volatiles (probably) should go, see Documentation/volatile-considered-harmful.txt - printk wrappers can be easily replaced by pr_debug/pr_info/etc - the code should be more or less checkpatch.pl clean - this is buggy: VERIFY(spin_is_locked((sl))); - spin_is_locked always returns 0 on !CONFIG_SMP && !CONFIG_DEBUG_SPINLOCK > (...) > PROPRIETARY-CONFIDENTIAL INFORMATION INCLUDED > > This electronic transmission, and any documents attached hereto, may contain > confidential, proprietary and/or legally privileged information. The > information is intended only for use by the recipient named above. If you > received this electronic message in error, please notify the sender and delete > the electronic message. Any disclosure, copying, distribution, or use of the > contents of information received in error is strictly prohibited, and > violators will be pursued legally. FYI, most people are annoyed when they see those kind of threats on public mailing lists... Marcin -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists