lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <1368166628.3378.46.camel@shinybook.infradead.org>
Date:	Fri, 10 May 2013 07:17:08 +0100
From:	David Woodhouse <dwmw2@...radead.org>
To:	Greg KH <gregkh@...uxfoundation.org>
Cc:	"Michael D. Setzer II" <msetzerii@...il.com>,
	linux-kernel@...r.kernel.org
Subject: Re: Kernel Firmware Support

On Tue, 2013-05-07 at 10:20 -0700, Greg KH wrote:
> > But yesterday, I got a message from a different user with screen 
> > captures that showed  failure of loading the firmware below. 
> > Actually, one screen shot with the 7.0.23.0 and another with the 
> > 7.0.29.0. Wasn't sure, so I had added all three of th 7.0.x group to 
> > a test build of my kernels. Is only the latest needed?
> > 
> > ./bnx2x/bnx2x-e1h-7.0.23.0.fw
> > ./bnx2x/bnx2x-e1h-7.0.29.0.fw
> > ./bnx2x/bnx2x-e1h-7.0.20.0.fw
> 
> If you are supporting multiple versions of the kernel, that need
> different versions of the firmware package, then you need to include
> all of these to handle that properly.

The linux-firmware tree should include them all, hopefully. We don't
intentionally *remove* old stuff, since that would break old kernels.

Eventually we'll want a way for people to filter out firmware which is
only used by old kernels, when they install or package linux-firmware.
But for now you just get everything.

-- 
David Woodhouse                            Open Source Technology Centre
David.Woodhouse@...el.com                              Intel Corporation




Download attachment "smime.p7s" of type "application/x-pkcs7-signature" (5745 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ