lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <e7856766-873d-5df0-a49a-dc9eaf9cce4c@secunet.com>
Date:   Mon, 30 Oct 2017 19:11:42 +0100
From:   Thomas Egerer <thomas.egerer@...unet.com>
To:     <netdev@...r.kernel.org>
Subject: [PATCH iproute2 0/3] various patches for (socket) policies/states

Hello *,

the following set of three patches tries deals with socket policies.
The first patch adresses the missing filter option for socket
polices. Especially when dealing with many of those, it is quite
cumbersome to filter them from the iproute2-output. So an option
to remove them from the output has been added.
Also when trying to deleteall policies iproute2 tries to delete
socket based policies, too. The result is an error message which
is misleading and unnecessary. So the second patch skips all
socket policies when deleteall-ing policies.
The third patch allow to deleteall policies and states even if
they have a mark. I'm not sure if the current behavior is
intended but if iproute2 finds a policy or state with a mark
it tries to delete the corresponding policy/state *without*
a mark. Also the result is an error and the policy/state is
not deleted.
All patches are rebased onto net-next.

Regards
Thomas

Thomas Egerer (3):
  xfrm_policy: Add filter option for socket policies
  xfrm_policy: Do not attempt to deleteall a socket policy
  xfrm_{state,policy}: Allow to deleteall polices/states with marks

 ip/xfrm.h        |  1 +
 ip/xfrm_policy.c | 21 ++++++++++++++++++++-
 ip/xfrm_state.c  | 12 ++++++++++++
 3 files changed, 33 insertions(+), 1 deletion(-)

-- 
2.6.4

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ