lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 1 Jun 2016 10:16:47 -0700 From: John Fastabend <john.fastabend@...il.com> To: Jakub Kicinski <jakub.kicinski@...ronome.com>, netdev@...r.kernel.org Cc: ast@...nel.org, daniel@...earbox.net, dinan.gunawardena@...ronome.com Subject: Re: [RFC 03/12] net: cls_bpf: limit hardware offload by software-only flag On 16-06-01 09:50 AM, Jakub Kicinski wrote: > Add cls_bpf support for the TCA_CLS_FLAGS_SKIP_HW flag. > Unlike U32 and flower cls_bpf already has some netlink > flags defined. I chose to create a new attribute to be > able to use the same flag values as the above. > > Unknown flags are ignored and not reported upon dump. > > Signed-off-by: Jakub Kicinski <jakub.kicinski@...ronome.com> > Reviewed-by: Dinan Gunawardena <dgunawardena@...ronome.com> > Reviewed-by: Simon Horman <simon.horman@...ronome.com> > --- Seems reasonable to me. Acked-by: John Fastabend <john.r.fastabend@...el.com>
Powered by blists - more mailing lists