lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 16 Mar 2007 22:42:46 -0300
From: "Arnaldo Carvalho de Melo" <acme@...stprotocols.net>
To: "David Miller" <davem@...emloft.net>
Cc: "Netdev List" <netdev@...r.kernel.org>
Subject: [PATCH] [SK_BUFF]: Disable the offset code
David,
Please pull from:
master.kernel.org:/pub/scm/linux/kernel/git/acme/net-2.6.22
Till I fully investigate and fix this we should just use the
pointer based approach, where this problem bug doesn't happens, good
thing its selectable :)
- Arnaldo
-----
There is a bug when using IPSEC, so till it is fixed, just use the
old code in all arches.
Signed-off-by: Arnaldo Carvalho de Melo <acme@...hat.com>
---
include/linux/skbuff.h | 4 +++-
1 files changed, 3 insertions(+), 1 deletions(-)
View attachment "0001-SK_BUFF-Disable-the-offset-code.patch" of type "text/x-patch" (845 bytes)
Powered by blists - more mailing lists