lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:   Tue, 7 Nov 2017 11:14:31 +0900
From:   Stephen Hemminger <stephen@...workplumber.org>
To:     Thomas Egerer <thomas.egerer@...unet.com>
Cc:     <netdev@...r.kernel.org>
Subject: Re: [PATCH iproute2-resend 0/3] *** SUBJECT HERE ***

On Thu, 2 Nov 2017 14:13:22 +0100
Thomas Egerer <thomas.egerer@...unet.com> wrote:

> Hello *,
> 
> the following set of three patches tries deals with socket policies.
> The first patch adresses the missing filter option for socket
> polices. Especially when dealing with many of those, it is quite
> cumbersome to filter them from the iproute2-output. So an option
> to remove them from the output has been added.
> Also when trying to deleteall policies iproute2 tries to delete
> socket based policies, too. The result is an error message which
> is misleading and unnecessary. So the second patch skips all
> socket policies when deleteall-ing policies.
> The third patch allow to deleteall policies and states even if
> they have a mark. I'm not sure if the current behavior is
> intended but if iproute2 finds a policy or state with a mark
> it tries to delete the corresponding policy/state *without*
> a mark. Also the result is an error and the policy/state is
> not deleted.
> Resend with modifications as requested by Stephen.
> 
> Regards
> Thomas
> 
> Thomas Egerer (3):
>   xfrm_policy: Add filter option for socket policies
>   xfrm_policy: Do not attempt to deleteall a socket policy
>   xfrm_{state,policy}: Allow to deleteall polices/states with marks
> 
>  ip/xfrm.h        |  1 +
>  ip/xfrm_policy.c | 22 +++++++++++++++++++++-
>  ip/xfrm_state.c  | 13 +++++++++++++
>  3 files changed, 35 insertions(+), 1 deletion(-)
> 

Applied.

Powered by blists - more mailing lists