lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <bd5bda6c-8bb2-98ae-e020-f31eeeec9134@gmail.com>
Date:   Sun, 23 Jun 2019 21:47:46 -0600
From:   David Ahern <dsahern@...il.com>
To:     David Miller <davem@...emloft.net>, liuzhiqiang26@...wei.com
Cc:     luoshijie1@...wei.com, tgraf@...g.ch, netdev@...r.kernel.org,
        wangxiaogang3@...wei.com, mingfangsen@...wei.com,
        zhoukang7@...wei.com
Subject: Re: [PATCH v2 0/3] fix bugs when enable route_localnet

On 6/22/19 6:46 AM, David Miller wrote:
> From: Zhiqiang Liu <liuzhiqiang26@...wei.com>
> Date: Sat, 22 Jun 2019 16:41:49 +0800
> 
>> Friendly ping ...
> 
> I'm not applying this patch series without someone reviewing it.
> 

I have stared at it a few times since the patches were sent and can not
find anything obviously wrong about it. The fallout seems limited to
users of route_localnet which I have to believe is small (I only know of
2 other users of 127/8 for non-loopback and those were almost 10 years ago).

Putting in net-next is the safest.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ