1. 22 Sep, 2014 3 commits
  2. 19 Sep, 2014 9 commits
  3. 18 Sep, 2014 8 commits
  4. 16 Sep, 2014 5 commits
  5. 15 Sep, 2014 12 commits
  6. 13 Sep, 2014 3 commits
    • David S. Miller's avatar
      Merge branch 'bridge_vlan_filtering' · 9e07a422
      David S. Miller authored
      Vladislav Yasevich says:
      
      ====================
      bridge: Two small fixes to vlan filtering code.
      
      This series corrects 2 small issues that I've ran across recently
      while doing more work with vlan filtering changes.
      ====================
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      9e07a422
    • Vlad Yasevich's avatar
      bridge: Allow clearing of pvid and untagged bitmap · 635126b7
      Vlad Yasevich authored
      Currently, it is possible to modify the vlan filter
      configuration to add pvid or untagged support.
      For example:
        bridge vlan add vid 10 dev eth0
        bridge vlan add vid 10 dev eth0 untagged pvid
      
      The second statement will modify vlan 10 to
      include untagged and pvid configuration.
      However, it is currently impossible to go backwards
        bridge vlan add vid 10 dev eth0 untagged pvid
        bridge vlan add vid 10 dev eth0
      
      Here nothing happens.  This patch correct this so
      that any modifiers not supplied are removed from
      the configuration.
      Signed-off-by: default avatarVlad Yasevich <vyasevic@redhat.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      635126b7
    • Vlad Yasevich's avatar
      bridge: Check if vlan filtering is enabled only once. · 20adfa1a
      Vlad Yasevich authored
      The bridge code checks if vlan filtering is enabled on both
      ingress and egress.   When the state flip happens, it
      is possible for the bridge to currently be forwarding packets
      and forwarding behavior becomes non-deterministic.  Bridge
      may drop packets on some interfaces, but not others.
      
      This patch solves this by caching the filtered state of the
      packet into skb_cb on ingress.  The skb_cb is guaranteed to
      not be over-written between the time packet entres bridge
      forwarding path and the time it leaves it.  On egress, we
      can then check the cached state to see if we need to
      apply filtering information.
      Signed-off-by: default avatarVladislav Yasevich <vyasevic@redhat.com>
      Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
      20adfa1a