lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <170178722474.32384.10492437388064744383.git-patchwork-notify@kernel.org> Date: Tue, 05 Dec 2023 14:40:24 +0000 From: patchwork-bot+netdevbpf@...nel.org To: Zhengchao Shao <shaozhengchao@...wei.com> Cc: netdev@...r.kernel.org, davem@...emloft.net, edumazet@...gle.com, kuba@...nel.org, pabeni@...hat.com, willemb@...gle.com, luwei32@...wei.com, willemdebruijn.kernel@...il.com, weiyongjun1@...wei.com, yuehaibing@...wei.com Subject: Re: [PATCH net-next,v3] ipvlan: implement .parse_protocol hook function in ipvlan_header_ops Hello: This patch was applied to netdev/net-next.git (main) by Paolo Abeni <pabeni@...hat.com>: On Sat, 2 Dec 2023 21:04:38 +0800 you wrote: > The .parse_protocol hook function in the ipvlan_header_ops structure is > not implemented. As a result, when the AF_PACKET family is used to send > packets, skb->protocol will be set to 0. > Ipvlan is a device of type ARPHRD_ETHER (ether_setup). Therefore, use > eth_header_parse_protocol function to obtain the protocol. > > Signed-off-by: Zhengchao Shao <shaozhengchao@...wei.com> > Reviewed-by: Willem de Bruijn <willemb@...gle.com> > > [...] Here is the summary with links: - [net-next,v3] ipvlan: implement .parse_protocol hook function in ipvlan_header_ops https://git.kernel.org/netdev/net-next/c/fb70136ded2e You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists