lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 9 May 2016 21:37:05 -0700 From: Cong Wang <xiyou.wangcong@...il.com> To: Jamal Hadi Salim <jhs@...atatu.com> Cc: David Miller <davem@...emloft.net>, Linux Kernel Network Developers <netdev@...r.kernel.org> Subject: Re: [net-next PATCH v2 3/6] net sched: mirred action fix late binding On Mon, May 9, 2016 at 4:51 AM, Jamal Hadi Salim <jhs@...atatu.com> wrote: > On 16-05-08 11:19 PM, Cong Wang wrote: >> >> On Sun, May 8, 2016 at 10:26 AM, Jamal Hadi Salim <jhs@...atatu.com> >> wrote: >>> >>> -static int tcf_mirred_dump(struct sk_buff *skb, struct tc_action *a, int >>> bind, int ref) >>> +static int tcf_mirred_dump(struct sk_buff *skb, struct tc_action *a, int >>> bind, >>> + int ref) >>> { >>> unsigned char *b = skb_tail_pointer(skb); >>> struct tcf_mirred *m = a->priv; >> >> >> Nit: this is irrelevant to the bug you fix. >> > > It is (80 char) indentation fix. Dont think it deserves its own patch > but it was annoying enough to include. If you target this to net-next, I would not even mention it, but you are targeting it for -stable... ;)
Powered by blists - more mailing lists