lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <20181108.204929.2004608845629526400.davem@davemloft.net>
Date:   Thu, 08 Nov 2018 20:49:29 -0800 (PST)
From:   David Miller <davem@...emloft.net>
To:     jakub.kicinski@...ronome.com
Cc:     netdev@...r.kernel.org, oss-drivers@...ronome.com
Subject: Re: [PATCH net-next 0/7] nfp: abm: move code and improve parameter
 validation

From: Jakub Kicinski <jakub.kicinski@...ronome.com>
Date: Thu,  8 Nov 2018 19:50:32 -0800

> This set starts by separating Qdisc handling code into a new file.
> Next two patches allow early access to TLV-based capabilities during
> probe, previously the capabilities were parsed just before netdevs
> were registered, but its cleaner to do some basic validation earlier
> and avoid cleanup work.
> 
> Next three patches improve RED's parameter validation.  First we provide
> a more precise message about why offload failed (and move the parameter
> validation to a helper).  Next we make sure we don't set the top bit
> in the 32 bit max RED threshold value.  Because FW is treating the value
> as signed it reportedly causes slow downs (unnecessary queuing and
> marking) when top bit is set with recent firmwares.  Last (and perhaps
> least importantly) we offload the harddrop parameter of the Qdisc.
> We don't plan to offload harddrop RED, but it seems prudent to make
> sure user didn't set that flag as device behaviour would have differed.

Series applied, thanks Jakub.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ