lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <s5h7euaqwtp.wl-tiwai@suse.de>
Date:   Tue, 28 Nov 2017 15:53:06 +0100
From:   Takashi Iwai <tiwai@...e.de>
To:     SF Markus Elfring <elfring@...rs.sourceforge.net>
Cc:     alsa-devel@...a-project.org,
        Arvind Yadav <arvind.yadav.cs@...il.com>,
        Jaroslav Kysela <perex@...ex.cz>,
        Takashi Sakamoto <o-takashi@...amocchi.jp>,
        kernel-janitors@...r.kernel.org,
        LKML <linux-kernel@...r.kernel.org>
Subject: Re: ALSA: nm256: Fine-tuning for three function implementations

On Tue, 28 Nov 2017 15:44:07 +0100,
SF Markus Elfring wrote:
> 
> >> How would such a setting influence my trust level for your subsystem maintenance?
> > 
> > Give the test result before speaking too much.
> 
> Which concrete data do you expect here?

Depends on the result.  The bottom line is that you run your patched
kernel on the real hardware or equivalent (VM or emulation) for the
device you touched.

> > It's already way too contra-productive, just chatting.
> 
> I got an other view.
> 
> I hope that we can achieve a better common understanding also in this case.

Hopefully, if you stop asking another new question for each word.

> > Show the result at first.
> 
> Which one would you like to compare exactly?

Run your patched kernel and the driver code on the real machine with
the corresponding device.  Show the device is running.  That's the
very first step.  Then follow the more detailed tests, but it depends
on the subsystem.


Takashi

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ