lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAHS8izO=64PCgs7mjobznH0D7sQ76fBXjWoTTNxzO-Or+hqhcQ@mail.gmail.com>
Date: Wed, 28 May 2025 14:53:35 -0700
From: Mina Almasry <almasrymina@...gle.com>
To: Pranjal Shrivastava <praan@...gle.com>
Cc: netdev@...r.kernel.org, "David S . Miller" <davem@...emloft.net>, 
	Eric Dumazet <edumazet@...gle.com>, Jakub Kicinski <kuba@...nel.org>, Simon Horman <horms@...nel.org>, 
	Willem de Bruijn <willemb@...gle.com>, Kaiyuan Zhang <kaiyuanz@...gle.com>
Subject: Re: [PATCH net-next] net: Fix net_devmem_bind_dmabuf for non-devmem configs

On Wed, May 28, 2025 at 2:11 PM Pranjal Shrivastava <praan@...gle.com> wrote:
>
> Fix the signature of the net_devmem_bind_dmabuf API for
> CONFIG_NET_DEVMEM=n.
>
> Fixes: bd61848900bf ("net: devmem: Implement TX path")
> Signed-off-by: Pranjal Shrivastava <praan@...gle.com>

Patch itself looks good to me, but currently net-next is closed.

I've looked at the maintainer docs:
https://www.kernel.org/doc/Documentation/process/maintainer-netdev.rst

I'm unsure whether this needs to be resent to net now or wait for the
merge window to reopen. I think net is for fixes to code in mainline
linux, but the devmem TX path has not made it there yet (and is not
even in the net tree yet). My guess is that this patch should be
reposted to net-next once net-next reopens.

-- 
Thanks,
Mina

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ