lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20230313173026.5b8fb013@kernel.org>
Date:   Mon, 13 Mar 2023 17:30:26 -0700
From:   Jakub Kicinski <kuba@...nel.org>
To:     Vladimir Nikishkin <vladimir@...ishkin.pw>
Cc:     netdev@...r.kernel.org
Subject: Re: [PATCH net-next v1 1/1] vxlan: Make vxlan try without a local
 bypass, if bypass fails.

On Sun, 12 Mar 2023 14:07:05 +0800 Vladimir Nikishkin wrote:
> From: Vladimir Nikishkin <vladimir@...ishkin.pw>
> Date: Sun, 19 Feb 2023 21:24:49 +0800
> Subject: [PATCH net-next v1 1/1] vxlan: Make vxlan try without a local bypass, if bypass fails.
> Signed-off-by: Vladimir Nikishkin <vladimir@...ishkin.pw>
> From 8650e2e742b7a2cd6c35d1c034084b9f68e0f112 Mon Sep 17 00:00:00 2001
> In vxlan_core, if an fdb entry is pointing to a local
> address with some port, the system tries to get the packet to
> deliver the packet to the vxlan directly, bypassing the network
> stack.

Looks mangled, could you try resending with get send-email?

Please make sure you CC the right people (scripts/get_maintainers)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ