lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 1 May 2015 11:30:33 +0000
From:	David Laight <David.Laight@...LAB.COM>
To:	'Alexander Duyck' <alexander.duyck@...il.com>,
	Alexei Starovoitov <alexei.starovoitov@...il.com>,
	Alexander Duyck <alexander.h.duyck@...hat.com>
CC:	"netdev@...r.kernel.org" <netdev@...r.kernel.org>,
	"davem@...emloft.net" <davem@...emloft.net>
Subject: RE: [PATCH 0/3] A few minor clean-ups to eth_type_trans

From: Alexander Duyck
> Sent: 01 May 2015 00:12
...
> > Only the comment 'ETH_P_802_3_MIN is aligned to 512' through me off.
> > It's divisible by 256 that matters.
> 
> Yeah, it is 0x0600 hex so we can ignore the lower 8 bits, or in the case
> of little-endian systems the upper 8 bits.  I think when I had
> originally written the patch I was using a mask of 0xFE00, but then I
> realized that all the compiler cared about is knowing which byte it is
> supposed to compare against.

Isn't the limit actually 1500 (0x5dc) not 1536 (0x600).
Certainly the longest 8802.3 frame has a 'length' field of 1500
followed by the 3 bytes LLC header and 1497 bytes of 'userdata'.
(If you do ISO transport nothing is ever word aligned.)

Whether any 'ethertypes' from 0x5dd to 0x5ff were ever allocated
(and plausibly still in use) is a separate question.
Some below 1500 were allocated.

	David

--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ