lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20230406130415.1aa1d1cd@kernel.org> Date: Thu, 6 Apr 2023 13:04:15 -0700 From: Jakub Kicinski <kuba@...nel.org> To: Ahmed Zaki <ahmed.zaki@...el.com> Cc: Tony Nguyen <anthony.l.nguyen@...el.com>, <davem@...emloft.net>, <pabeni@...hat.com>, <edumazet@...gle.com>, <netdev@...r.kernel.org>, "Rafal Romanowski" <rafal.romanowski@...el.com> Subject: Re: [PATCH net 1/2] iavf: refactor VLAN filter states On Thu, 6 Apr 2023 12:55:43 -0600 Ahmed Zaki wrote: > > My intuition is that we prefix bit numbers with __, > > then the mask (1 << __BIT_NO) does not have a prefix. > > > > But these are not used as bits anywhere, in fact you're going away > > from bits... > > Ok, how about sending v2 without these underscores, then send another > patch to net-next fixing the rest of states? Definitely SGTM, thanks.
Powered by blists - more mailing lists