lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 28 May 2015 07:58:48 +0200 From: Steffen Klassert <steffen.klassert@...unet.com> To: Alexander Duyck <alexander.h.duyck@...hat.com> CC: <netdev@...r.kernel.org>, <linux-crypto@...r.kernel.org>, <davem@...emloft.net>, <herbert@...dor.apana.org.au> Subject: Re: [ipsec PATCH 0/3] Preserve skb->mark through VTI tunnels On Wed, May 27, 2015 at 07:16:37AM -0700, Alexander Duyck wrote: > These patches are meant to try and address the fact the VTI tunnels are > currently overwriting the skb->mark value. I am generally happy with the > first two patches, however the third patch still modifies the skb->mark, > though it undoes after the fact. > > The main problem I am trying to address is the fact that currently if I use > an v6 over v6 VTI tunnel I cannot receive any traffic on the interface as > the skb->mark is bleeding through and causing the traffic to be dropped. > > --- > > Alexander Duyck (3): > ip_vti/ip6_vti: Do not touch skb->mark on xmit > xfrm: Override skb->mark with tunnel->parm.i_key in xfrm_input > ip_vti/ip6_vti: Preserve skb->mark after rcv_cb call All applied to the ipsec tree, thanks a lot Alexander! -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists