lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Tue, 30 Aug 2016 20:52:57 +0300
From:   Sergei Shtylyov <sergei.shtylyov@...entembedded.com>
To:     Ivan Vecera <ivecera@...hat.com>, netdev@...r.kernel.org
Cc:     satish.baddipadige@...adcom.com, siva.kallam@...adcom.com,
        michael.chan@...adcom.com
Subject: Re: [PATCH net] tg3: Fix for disallow tx coalescing time to be 0

Hello.

On 08/30/2016 05:38 PM, Ivan Vecera wrote:

> The recent commit 087d7a8c disallows to set Rx coalescing time to be 0

    You should specify both 12-digit SHA1 and the commit summary enclosed in ("").

> as this stops generating interrupts for the incoming packets. I found
> the zero Tx coalescing time stops generating interrupts similarly for
> outgoing packets and fires Tx watchdog later. To avoid this, don't allow
> to set Tx coalescing time to 0.
>
> Cc: satish.baddipadige@...adcom.com
> Cc: siva.kallam@...adcom.com
> Cc: michael.chan@...adcom.com
> Signed-off-by: Ivan Vecera <ivecera@...hat.com>
[...]

MBR, Sergei

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ