lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 28 Jul 2020 08:53:55 -0700 From: Jakub Kicinski <kuba@...nel.org> To: Frank Wunderlich <frank-w@...lic-files.de> Cc: linux-mediatek@...ts.infradead.org, Landen Chao <landen.chao@...iatek.com>, Felix Fietkau <nbd@....name>, John Crispin <john@...ozen.org>, Sean Wang <sean.wang@...iatek.com>, Mark Lee <Mark-MC.Lee@...iatek.com>, "David S. Miller" <davem@...emloft.net>, Matthias Brugger <matthias.bgg@...il.com>, netdev@...r.kernel.org, linux-arm-kernel@...ts.infradead.org, linux-kernel@...r.kernel.org, René van Dorst <opensource@...rst.com> Subject: Re: [PATCH v3] net: ethernet: mtk_eth_soc: fix mtu warning On Tue, 28 Jul 2020 14:27:43 +0200 Frank Wunderlich wrote: > From: Landen Chao <landen.chao@...iatek.com> Hi gents, if the patch is from Landen we need his sign-off on it. > in recent Kernel-Versions there are warnings about incorrect MTU-Size > like these: > > eth0: mtu greater than device maximum > mtk_soc_eth 1b100000.ethernet eth0: error -22 setting MTU to include DSA overhead > > Fixes: bfcb813203e6 ("net: dsa: configure the MTU for switch ports") > Fixes: 72579e14a1d3 ("net: dsa: don't fail to probe if we couldn't set the MTU") > Fixes: 7a4c53bee332 ("net: report invalid mtu value via netlink extack") > Signed-off-by: René van Dorst <opensource@...rst.com> > Signed-off-by: Frank Wunderlich <frank-w@...lic-files.de>
Powered by blists - more mailing lists