lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20230404172523.451026-1-anthony.l.nguyen@intel.com> Date: Tue, 4 Apr 2023 10:25:20 -0700 From: Tony Nguyen <anthony.l.nguyen@...el.com> To: davem@...emloft.net, kuba@...nel.org, pabeni@...hat.com, edumazet@...gle.com, netdev@...r.kernel.org Cc: Tony Nguyen <anthony.l.nguyen@...el.com>, ahmed.zaki@...el.com Subject: [PATCH net 0/2][pull request] iavf: fix racing in VLANs Ahmed Zaki says: This patchset mainly fixes a racing issue in the iavf where the number of VLANs in the vlan_filter_list might be more than the PF limit. To fix that, we get rid of the cvlans and svlans bitmaps and keep all the required info in the list. The second patch adds two new states that are needed so that we keep the VLAN info while the interface goes DOWN: -- DISABLE (notify PF, but keep the filter in the list) -- INACTIVE (dev is DOWN, filter is removed from PF) Finally, the current code keeps each state in a separate bit field, which is error prone. The first patch refactors that by replacing all bits with a single enum. The changes are minimal where each bit change is replaced with the new state value. The following are changes since commit 218c597325f4faf7b7a6049233a30d7842b5b2dc: net: stmmac: fix up RX flow hash indirection table when setting channels and are available in the git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/tnguy/net-queue 40GbE Ahmed Zaki (2): iavf: refactor VLAN filter states iavf: remove active_cvlans and active_svlans bitmaps drivers/net/ethernet/intel/iavf/iavf.h | 20 +++--- drivers/net/ethernet/intel/iavf/iavf_main.c | 44 +++++------- .../net/ethernet/intel/iavf/iavf_virtchnl.c | 68 ++++++++++--------- 3 files changed, 66 insertions(+), 66 deletions(-) -- 2.38.1
Powered by blists - more mailing lists