lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 18 Jun 2020 15:51:48 -0500 From: Thomas Falcon <tlfalcon@...ux.ibm.com> To: Jakub Kicinski <kuba@...nel.org> Cc: netdev@...r.kernel.org, linuxppc-dev@...ts.ozlabs.org Subject: Re: [PATCH net] ibmveth: Fix max MTU limit On 6/18/20 10:57 AM, Jakub Kicinski wrote: > On Thu, 18 Jun 2020 10:43:46 -0500 Thomas Falcon wrote: >> The max MTU limit defined for ibmveth is not accounting for >> virtual ethernet buffer overhead, which is twenty-two additional >> bytes set aside for the ethernet header and eight additional bytes >> of an opaque handle reserved for use by the hypervisor. Update the >> max MTU to reflect this overhead. >> >> Signed-off-by: Thomas Falcon <tlfalcon@...ux.ibm.com> > How about > > Fixes: d894be57ca92 ("ethernet: use net core MTU range checking in more drivers") > Fixes: 110447f8269a ("ethernet: fix min/max MTU typos") > > ? Thanks, do you need me to send a v2 with those tags? Tom
Powered by blists - more mailing lists