lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 01 Feb 2013 21:13:11 -0500 From: Vlad Yasevich <vyasevic@...hat.com> To: Michał Mirosław <mirqus@...il.com> CC: shemminger@...tta.com, bridge@...ts.linux-foundation.org, davem@...emloft.net, netdev@...r.kernel.org Subject: Re: [PATCH v9 net-next 02/12] bridge: Validate that vlan is permitted on ingress On 02/01/2013 08:04 PM, Michał Mirosław wrote: > 2013/2/1 Vlad Yasevich <vyasevic@...hat.com>: >> When a frame arrives on a port or transmitted by the bridge, >> if we have VLANs configured, validate that a given VLAN is allowed >> to enter the bridge. > [...] >> +static inline struct net_port_vlans *br_get_vlan_info( >> + const struct net_bridge *br) >> +{ >> + return rcu_dereference(br->vlan_info); >> +} >> + >> +static inline struct net_port_vlans *nbp_get_vlan_info( >> + const struct net_bridge_port *p) >> +{ >> + return rcu_dereference(p->vlan_info); >> +} > > Those should go to patch #1. They are not needed till here. I thought it would read/review better if I kept it together. -vlad > > Best Regards, > Michał Mirosław > -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists