lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <20131017.161258.343998972337901996.davem@davemloft.net>
Date:	Thu, 17 Oct 2013 16:12:58 -0400 (EDT)
From:	David Miller <davem@...emloft.net>
To:	herbert@...dor.apana.org.au
Cc:	vyasevic@...hat.com, netdev@...r.kernel.org, shemminger@...tta.com
Subject: Re: [PATCH] bridge: Correctly clamp MAX forward_delay when
 enabling STP

From: Herbert Xu <herbert@...dor.apana.org.au>
Date: Wed, 16 Oct 2013 08:56:57 +0800

> On Tue, Oct 15, 2013 at 02:57:45PM -0400, Vlad Yasevich wrote:
>> Commit be4f154d5ef0ca147ab6bcd38857a774133f5450
>> 	bridge: Clamp forward_delay when enabling STP
>> had a typo when attempting to clamp maximum forward delay.
>> 
>> It is possible to set bridge_forward_delay to be higher then
>> permitted maximum when STP is off.  When turning STP on, the
>> higher then allowed delay has to be clamed down to max value.
>> 
>> CC: Herbert Xu <herbert@...dor.apana.org.au>
>> CC: Stephen Hemminger <shemminger@...tta.com>
>> Signed-off-by: Vlad Yasevich <vyasevic@...hat.com>
> 
> Good catch!
> 
> Acked-by: Herbert Xu <herbert@...dor.apana.org.au>

Applied and queued up for -stable, thanks.
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ