lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Thu, 29 Jun 2017 15:12:23 +0200
From:   Stefan Assmann <sassmann@...nic.de>
To:     intel-wired-lan@...ts.osuosl.org
Cc:     netdev@...r.kernel.org, davem@...emloft.net,
        jeffrey.t.kirsher@...el.com, sassmann@...nic.de
Subject: [PATCH 0/2] i40e/i40evf: fix override of administratively set MAC address in trusted mode

In trusted mode VFs should be able to override the administratively set MAC
address. This is currently not possible as i40evf returns -EPERM if an
administratively set MAC is present, for MAC change requests.

First patch renames vf_offload_flags to vf_cap_flags to make it more generic.
Second patch then adds a flag to vf_cap_flags to give the VF information on
whether it runs in trusted mode and makes use of the flag in i40evf.

Patches are against jkirshers dev-queue branch.

Stefan Assmann (2):
  i40e/i40evf: rename vf_offload_flags to vf_cap_flags in struct
    virtchnl_vf_resource
  i40e/i40evf: add virtchnl flag to indicate trusted VF

 drivers/net/ethernet/intel/i40e/i40e_virtchnl_pf.c | 25 ++++++++++++----------
 drivers/net/ethernet/intel/i40evf/i40e_common.c    |  2 +-
 drivers/net/ethernet/intel/i40evf/i40evf.h         | 10 ++++-----
 drivers/net/ethernet/intel/i40evf/i40evf_main.c    | 15 +++++++------
 include/linux/avf/virtchnl.h                       |  5 +++--
 5 files changed, 31 insertions(+), 26 deletions(-)

-- 
2.9.4

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ