From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-5.6 required=3.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,NICE_REPLY_A,SPF_HELO_NONE, SPF_PASS,USER_AGENT_SANE_1 autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9059FC433DB for ; Fri, 26 Feb 2021 22:35:18 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 5468564E38 for ; Fri, 26 Feb 2021 22:35:18 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229618AbhBZWfR (ORCPT ); Fri, 26 Feb 2021 17:35:17 -0500 Received: from www62.your-server.de ([213.133.104.62]:38136 "EHLO www62.your-server.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229586AbhBZWfQ (ORCPT ); Fri, 26 Feb 2021 17:35:16 -0500 Received: from sslproxy06.your-server.de ([78.46.172.3]) by www62.your-server.de with esmtpsa (TLSv1.3:TLS_AES_256_GCM_SHA384:256) (Exim 4.92.3) (envelope-from ) id 1lFlgw-000Ejm-So; Fri, 26 Feb 2021 23:34:34 +0100 Received: from [85.7.101.30] (helo=pc-9.home) by sslproxy06.your-server.de with esmtpsa (TLSv1.3:TLS_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1lFlgw-000Q70-Nd; Fri, 26 Feb 2021 23:34:34 +0100 Subject: Re: [PATCH bpf-next V2 0/2] bpf: Updates for BPF-helper bpf_check_mtu To: Jesper Dangaard Brouer , bpf@vger.kernel.org Cc: netdev@vger.kernel.org, Daniel Borkmann , Alexei Starovoitov References: <161364896576.1250213.8059418482723660876.stgit@firesoul> <20210219073638.75b3d8f3@carbon> From: Daniel Borkmann Message-ID: <9e620507-6e9b-16f8-5ef9-3bbf2c2b6a3c@iogearbox.net> Date: Fri, 26 Feb 2021 23:34:34 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.7.2 MIME-Version: 1.0 In-Reply-To: <20210219073638.75b3d8f3@carbon> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Authenticated-Sender: daniel@iogearbox.net X-Virus-Scanned: Clear (ClamAV 0.102.4/26092/Fri Feb 26 13:12:59 2021) Precedence: bulk List-ID: X-Mailing-List: bpf@vger.kernel.org On 2/19/21 7:36 AM, Jesper Dangaard Brouer wrote: > On Thu, 18 Feb 2021 12:49:53 +0100 > Jesper Dangaard Brouer wrote: > >> The FIB lookup example[1] show how the IP-header field tot_len >> (iph->tot_len) is used as input to perform the MTU check. The recently >> added MTU check helper bpf_check_mtu() should also support this type >> of MTU check. >> >> Lets add this feature before merge window, please. This is a followup >> to 34b2021cc616 ("bpf: Add BPF-helper for MTU checking"). > > Which git tree should I send this against bpf-next or bpf, to keep this > change together with 34b2021cc616 ("bpf: Add BPF-helper for MTU > checking") ? Given this is an api change, we'll take this into bpf tree after the pending pr was merged.