lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <99737F4847ED0A48AECC9F4A1974A4B80FD10E8439@MNEXMB2.qlogic.org>
Date:	Mon, 21 Mar 2011 06:13:02 -0500
From:	Amit Salecha <amit.salecha@...gic.com>
To:	Eric Dumazet <eric.dumazet@...il.com>
CC:	"davem@...emloft.net" <davem@...emloft.net>,
	"netdev@...r.kernel.org" <netdev@...r.kernel.org>,
	Ameen Rahman <ameen.rahman@...gic.com>,
	Rajesh Borundia <rajesh.borundia@...gic.com>
Subject: RE: [PATCH] netxen: fix LRO disable warning

> Le lundi 21 mars 2011 à 03:37 -0700, Amit Kumar Salecha a écrit :
> > netxen_nic_set_flags() rejects data if other flag than ETH_FLAG_LRO
> is set.
> > Driver also supports NETIF_F_HW_VLAN_TX.
> > Now compare data with ethtool_op_get_flags(), to get all supported
> features.
> >
> > Reported-by: Jesper Dangaard Brouer <jdb@...x.dk>
> > Signed-off-by: Rajesh Borundia <rajesh.borundia@...gic.com>
> > Signed-off-by: Amit Kumar Salecha <amit.salecha@...gic.com>
> > ---
>
> Hmm, it would be really nice you provide more information for stable
> teams.
>
> If I am not mistaken, bug was introduced in 2.6.36 ?
>
No, It was introduced in 2.6.37, when ETH_FLAG_TXVLAN and ETH_FLAG_RXVLAN introduced.
Yes it should also make into 2.6.37.4 stable kernel.


This message and any attached documents contain information from QLogic Corporation or its wholly-owned subsidiaries that may be confidential. If you are not the intended recipient, you may not read, copy, distribute, or use this information. If you have received this transmission in error, please notify the sender immediately by reply e-mail and then delete this message.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ