lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 29 Oct 2018 13:42:56 -0400 From: "Liang, Kan" <kan.liang@...ux.intel.com> To: David Miller <davem@...emloft.net> Cc: acme@...nel.org, linux-kernel@...r.kernel.org, wangnan0@...wei.com, jolsa@...nel.org, namhyung@...nel.org, kan.liang@...el.com, ak@...ux.intel.com, yao.jin@...ux.intel.com, peterz@...radead.org Subject: Re: [PATCHES/RFC] Re: A concern about overflow ring buffer mode On 10/29/2018 1:40 PM, David Miller wrote: > From: "Liang, Kan" <kan.liang@...ux.intel.com> > Date: Mon, 29 Oct 2018 10:33:06 -0400 > >> I just realized that the problem in KNL will be back if we switch >> back to non-overwrite mode. > > What is KNL? > Intel Xeon Phi Processor, Knights Landing. Thanks, Kan
Powered by blists - more mailing lists