lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20090917215344.GE3691@ghostprotocols.net>
Date:	Thu, 17 Sep 2009 18:53:44 -0300
From:	Arnaldo Carvalho de Melo <acme@...hat.com>
To:	Nir Tzachar <nir.tzachar@...il.com>
Cc:	David Miller <davem@...emloft.net>,
	Linux Networking Development Mailing List 
	<netdev@...r.kernel.org>,
	Caitlin Bestler <caitlin.bestler@...il.com>,
	Chris Van Hoof <vanhoof@...hat.com>,
	Clark Williams <williams@...hat.com>,
	Neil Horman <nhorman@...driver.com>,
	Nivedita Singhvi <niv@...ibm.com>,
	Paul Moore <paul.moore@...com>,
	RĂ©mi Denis-Courmont 
	<remi.denis-courmont@...ia.com>,
	Steven Whitehouse <steve@...gwyn.com>,
	Ziv Ayalon <zivayalon@...il.com>
Subject: Re: [RFCv4 PATCH 2/2] net: Allow protocols to provide an
	unlocked_recvmsg socket method

Em Thu, Sep 17, 2009 at 06:21:13PM -0300, Arnaldo Carvalho de Melo escreveu:
> Em Thu, Sep 17, 2009 at 05:09:19PM +0300, Nir Tzachar escreveu:
> > Hello.
> > 
> > Below are some test results with the patch (only part 1, as I did not
> > manage to apply part 2).
> 
> I forgot to mention that the patches were made against DaveM's
> net-next-2.6 tree at:
> 
> git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next-2.6
> 
> If you have a linux-2.6 git tree, just do:
> 
> cd linux-2.6
> git remote add net-next git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next-2.6
> git branch -b net-next-recvmmsg net-next/master
> 
> And you should be able to apply the two patches cleanly.

Strange, I just checked out v2.6.31 and only one hunk in the _first_
patch (adding the recvmmsg entry in the sparc 32 syscall table) failed,
the second applied with just minor offsets.

You must have corrupted the patch when saving somehow, anyway, find
both, against v2.6.31, attached.

Back to building the kernel on 10 Gbit/s hardware.

- Arnaldo

View attachment "0001-net-Introduce-recvmmsg-socket-syscall.patch" of type "text/plain" (26147 bytes)

View attachment "0002-net-Allow-protocols-to-provide-an-unlocked_recvmsg.patch" of type "text/plain" (37301 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ