lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <daf08193-bc7e-eaf4-8df0-f75265b06fb2@gmail.com> Date: Mon, 24 Apr 2023 12:04:23 +0100 From: Edward Cree <ecree.xilinx@...il.com> To: Jakub Kicinski <kuba@...nel.org>, edward.cree@....com Cc: linux-net-drivers@....com, davem@...emloft.net, pabeni@...hat.com, edumazet@...gle.com, netdev@...r.kernel.org, habetsm.xilinx@...il.com, Pieter Jansen van Vuuren <pieter.jansen-van-vuuren@....com> Subject: Re: [PATCH net-next 2/4] sfc: populate enc_ip_tos matches in MAE outer rules On 22/04/2023 05:04, Jakub Kicinski wrote: > On Fri, 21 Apr 2023 15:19:52 +0100 edward.cree@....com wrote: >> From: Edward Cree <ecree.xilinx@...il.com> >> >> Currently tc.c will block them before they get here, but following >> patch will change that. >> Use the extack message from efx_mae_check_encap_match_caps() instead >> of writing a new one, since there's now more being fed in than just >> an IP version. > > Transient build breakage here Whoops, I re-ordered patches and didn't check carefully enough. Serves me right for rushing to beat the merge window. FITNV
Powered by blists - more mailing lists