lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Thu, 20 Apr 2017 20:50:55 +0000
From:   "Mintz, Yuval" <Yuval.Mintz@...ium.com>
To:     David Miller <davem@...emloft.net>
CC:     "jiri@...nulli.us" <jiri@...nulli.us>,
        "gerlitz.or@...il.com" <gerlitz.or@...il.com>,
        "jeffrey.t.kirsher@...el.com" <jeffrey.t.kirsher@...el.com>,
        "mitch.a.williams@...el.com" <mitch.a.williams@...el.com>,
        "netdev@...r.kernel.org" <netdev@...r.kernel.org>,
        "nhorman@...hat.com" <nhorman@...hat.com>,
        "sassmann@...hat.com" <sassmann@...hat.com>,
        "jogreene@...hat.com" <jogreene@...hat.com>,
        "Dupuis, Chad" <Chad.Dupuis@...ium.com>,
        "Rangankar, Manish" <Manish.Rangankar@...ium.com>
Subject: RE: [net-next 04/14] i40e: dump VF information in debugfs

> > I surely wouldn't want to write a million lines of code just to
> > provide such a detailed abstraction.
> 
> So now the argument has gone from "it's not possible" to "it's going to be a
> HUGE amount of code."

Nothing here's is strictly impossible - you can always create a simulated HW
model in SW, and have a one-to-one mapping with the HW entities.
But "unreasonable amount of code" comes very close to it.

> I wonder what the next argument will be when I shoot this one down.
> 
> If you simply don't want to do the hard work necessary to implement this
> properly, which is fine, just say so.

Nope, I don't mind doing the work. What I would appreciate is some
constructive suggestions on a seemingly feasible approach that might work.
I feel like I've been bashed enough for one day. :-)


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ