lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 4 Mar 2022 06:52:08 -0800 From: Dongli Zhang <dongli.zhang@...cle.com> To: David Miller <davem@...emloft.net> Cc: netdev@...r.kernel.org, bpf@...r.kernel.org, linux-kernel@...r.kernel.org, kuba@...nel.org, rostedt@...dmis.org, mingo@...hat.com, ast@...nel.org, daniel@...earbox.net, andrii@...nel.org, imagedong@...cent.com, joao.m.martins@...cle.com, joe.jin@...cle.com, dsahern@...il.com, edumazet@...gle.com Subject: Re: [PATCH net-next v5 0/4] tun/tap: use kfree_skb_reason() to trace dropped skb Hi David, On 3/4/22 4:25 AM, David Miller wrote: > From: Dongli Zhang <dongli.zhang@...cle.com> > Date: Thu, 3 Mar 2022 22:33:03 -0800 > >> The commit c504e5c2f964 ("net: skb: introduce kfree_skb_reason()") has >> introduced the kfree_skb_reason() to help track the reason. >> >> The tun and tap are commonly used as virtio-net/vhost-net backend. This is to >> use kfree_skb_reason() to trace the dropped skb for those two drivers. > > This patch series does not apply cleanly against net-next, plewase respin. > Sorry for that. I will rebase to the most recent net-next. Unfortunately, one patch just merged to net-next has already been in my patchset ... https://lore.kernel.org/netdev/40f63798-2b85-c31c-9722-ee24d55093a8@oracle.com/ ... so that I will need to remove my PATCH 1/4 and rebase. Thank you very much! Dongli Zhang
Powered by blists - more mailing lists