lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20231026094106.1505892-1-razor@blackwall.org> Date: Thu, 26 Oct 2023 12:41:04 +0300 From: Nikolay Aleksandrov <razor@...ckwall.org> To: bpf@...r.kernel.org Cc: jiri@...nulli.us, netdev@...r.kernel.org, martin.lau@...ux.dev, ast@...nel.org, andrii@...nel.org, john.fastabend@...il.com, kuba@...nel.org, andrew@...n.ch, toke@...nel.org, toke@...hat.com, sdf@...gle.com, daniel@...earbox.net, Nikolay Aleksandrov <razor@...ckwall.org> Subject: [PATCH bpf-next 0/2] netkit: two minor cleanups Hi, This set does two minor cleanups mentioned by Jiri. The first patch removes explicit NULLing of primary/peer pointers and relies on the implicit mem zeroing done at net device alloc. The second patch switches netkit's mode and primary/peer policy netlink attributes to use NLA_POLICY_VALIDATE_FN() type and sets the custom validate function to return better user errors. This way netlink's policy is used to validate the attributes and simplifies the code a bit. No functional changes are intended. Thanks, Nik Nikolay Aleksandrov (2): netkit: remove explicit active/peer ptr initialization netkit: use netlink policy for mode and policy attributes validation drivers/net/netkit.c | 70 ++++++++++++++------------------------------ 1 file changed, 22 insertions(+), 48 deletions(-) -- 2.38.1
Powered by blists - more mailing lists