lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <468572BF.1050904@garzik.org>
Date:	Fri, 29 Jun 2007 16:59:43 -0400
From:	Jeff Garzik <jeff@...zik.org>
To:	"Kok, Auke" <auke-jan.h.kok@...el.com>
CC:	Jason Lunz <lunz@...lexsecurity.com>,
	Mark McLoughlin <markmc@...hat.com>,
	e1000-devel@...ts.sourceforge.net, netdev@...r.kernel.org
Subject: Re: e1000: backport ich9 support from 7.5.5 ?

Kok, Auke wrote:
> I disagree, we should not break the current e1000 driver in the kernel 
> while there is a new driver coming up that introduces ich9 support 
> without breaking (the old e1000) support for all other devices. This is 
> why we want to drop a new version of the e1000 driver upstream instead, 
> and put all newer devices in that driver.

If it's clean -and- new hardware is quite different from older hardware, 
a new driver makes sense, and causes far less disruption to both new and 
old hardware.


> For distro's not following kernel.org releases we have the perfect 
> solution: A fully tested 7.5.5 driver on sourceforge that was 
> extensively tested against RHEL5 for instance, but also a lot of other 
> older kernels.

I respectfully object to the advertising, here.

Based on past history, "posted on sf.net and tested by Intel" does not 
equate to "extensively tested."  Field experience proves time and again 
that PickYourVendor test labs always miss the raft of problems that show 
up once code is upstream and in production use.  If the code has never 
seen Internet-wide testing in an upstream kernel, it's -not- widely nor 
extensively tested.

	Jeff



-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ