lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 14 May 2020 17:29:12 -0700 (PDT) From: David Miller <davem@...emloft.net> To: pablo@...filter.org Cc: ecree@...arflare.com, netfilter-devel@...r.kernel.org, netdev@...r.kernel.org, paulb@...lanox.com, ozsh@...lanox.com, vladbu@...lanox.com, jiri@...nulli.us, kuba@...nel.org, saeedm@...lanox.com, michael.chan@...adcom.com Subject: Re: [PATCH 0/8 net] the indirect flow_block offload, revisited From: Pablo Neira Ayuso <pablo@...filter.org> Date: Fri, 15 May 2020 00:36:27 +0200 > The TC CT action crashes the kernel with an indirect flow_block in place: > > https://lore.kernel.org/netfilter-devel/db9dfe4f-62e7-241b-46a0-d878c89696a8@ucloud.cn/ I've read over this patch set at least three times, and reread the header posting, and there is no clear indication that this patch series fixes a crash at all. You need to be explicit about what bug this is fixing, in the commit messages and introduction posting, with quoted crash logs etc.
Powered by blists - more mailing lists