lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 15 Jan 2020 10:56:52 +0100 From: Steffen Klassert <steffen.klassert@...unet.com> To: Nicolas Dichtel <nicolas.dichtel@...nd.com> CC: <davem@...emloft.net>, <netdev@...r.kernel.org> Subject: Re: [PATCH ipsec v3 0/2] ipsec interfaces: fix sending with bpf_redirect() / AF_PACKET sockets On Mon, Jan 13, 2020 at 09:32:45AM +0100, Nicolas Dichtel wrote: > Before those patches, packets sent to a vti[6]/xfrm interface via > bpf_redirect() or via an AF_PACKET socket were dropped, mostly because > no dst was attached. > > v2 -> v3: > - fix flowi info for the route lookup > > v1 -> v2: > - remove useless check against skb_dst() in xfrmi_xmit2() > - keep incrementing tx_carrier_errors in case of route lookup failure > > net/ipv4/ip_vti.c | 13 +++++++++++-- > net/ipv6/ip6_vti.c | 13 +++++++++++-- > net/xfrm/xfrm_interface.c | 32 +++++++++++++++++++++++++------- > 3 files changed, 47 insertions(+), 11 deletions(-) Applied to the ipsec tree, thanks a lot!
Powered by blists - more mailing lists