lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 19 Dec 2020 10:03:45 -0800 From: Jakub Kicinski <kuba@...nel.org> To: <stefanc@...vell.com> Cc: <netdev@...r.kernel.org>, <thomas.petazzoni@...tlin.com>, <davem@...emloft.net>, <nadavh@...vell.com>, <ymarkman@...vell.com>, <linux-kernel@...r.kernel.org>, <linux@...linux.org.uk>, <mw@...ihalf.com>, <andrew@...n.ch>, <rmk+kernel@...linux.org.uk>, <lironh@...vell.com> Subject: Re: [PATCH net-next] net: mvpp2: prs: improve ipv4 parse flow On Thu, 17 Dec 2020 18:07:58 +0200 stefanc@...vell.com wrote: > From: Stefan Chulski <stefanc@...vell.com> > > Patch didn't fix any issue, just improve parse flow > and align ipv4 parse flow with ipv6 parse flow. > > Currently ipv4 kenguru parser first check IP protocol(TCP/UDP) > and then destination IP address. > Patch introduce reverse ipv4 parse, first destination IP address parsed > and only then IP protocol. > This would allow extend capability for packet L4 parsing and align ipv4 > parsing flow with ipv6. > > Suggested-by: Liron Himi <lironh@...vell.com> > Signed-off-by: Stefan Chulski <stefanc@...vell.com> This one will need to wait until after the merge window -- # Form letter - net-next is closed We have already sent the networking pull request for 5.11 and therefore net-next is closed for new drivers, features, code refactoring and optimizations. We are currently accepting bug fixes only. Please repost when net-next reopens after 5.11-rc1 is cut. Look out for the announcement on the mailing list or check: http://vger.kernel.org/~davem/net-next.html RFC patches sent for review only are obviously welcome at any time.
Powered by blists - more mailing lists