lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20160602072018.GC1987@nanopsycho> Date: Thu, 2 Jun 2016 09:24:20 +0200 From: Jiri Pirko <jiri@...nulli.us> To: Jakub Kicinski <jakub.kicinski@...ronome.com> Cc: netdev@...r.kernel.org, ast@...nel.org, daniel@...earbox.net, dinan.gunawardena@...ronome.com Subject: Re: [RFC 03/12] net: cls_bpf: limit hardware offload by software-only flag Wed, Jun 01, 2016 at 06:50:05PM CEST, jakub.kicinski@...ronome.com wrote: >Add cls_bpf support for the TCA_CLS_FLAGS_SKIP_HW flag. >Unlike U32 and flower cls_bpf already has some netlink >flags defined. I chose to create a new attribute to be >able to use the same flag values as the above. > >Unknown flags are ignored and not reported upon dump. > >Signed-off-by: Jakub Kicinski <jakub.kicinski@...ronome.com> >Reviewed-by: Dinan Gunawardena <dgunawardena@...ronome.com> >Reviewed-by: Simon Horman <simon.horman@...ronome.com> Reviewed-by: Jiri Pirko <jiri@...lanox.com>
Powered by blists - more mailing lists