lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <8397397f-d341-0593-9ba9-a87f1d63c26b@tessares.net>
Date:   Thu, 18 Jun 2020 10:06:29 +0200
From:   Matthieu Baerts <matthieu.baerts@...sares.net>
To:     Geliang Tang <geliangtang@...il.com>
Cc:     Mat Martineau <mathew.j.martineau@...ux.intel.com>,
        netdev@...r.kernel.org, mptcp@...ts.01.org,
        linux-kernel@...r.kernel.org
Subject: Re: [PATCH net-next 0/3] add MP_PRIO, MP_FAIL and MP_FASTCLOSE
 suboptions handling

Hi Geliang,

On 18/06/2020 08:27, Geliang Tang wrote:
> On Tue, Jun 16, 2020 at 05:18:56PM +0200, Matthieu Baerts wrote:
>> On 16/06/2020 08:47, Geliang Tang wrote:
 >>
>> I would suggest you to discuss about that on MPTCP mailing list. We also
>> have meetings every Thursday. New devs are always welcome to contribute to
>> new features and bug-fixes!
 >
> Thanks for your reply. I will do these tests and improve my patches.

Great, thank you! Looking forward to see new kernel selftests and/or 
packetdrill tests!

For any new features related to MPTCP or bug fixes involving significant 
code modifications, please send it first to the MPTCP Upstream mailing 
list only: mptcp@...ts.01.org

We will be able to give a first review without involving the whole 
netdev community and if needed, we can "park" patches in our mptcp-next 
repo.

For more details about the project, please check: 
https://github.com/multipath-tcp/mptcp_net-next/wiki

Cheers,
Matt
-- 
Tessares | Belgium | Hybrid Access Solutions
www.tessares.net

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ