lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <168429602430.23839.11062789710575476505.git-patchwork-notify@kernel.org> Date: Wed, 17 May 2023 04:00:24 +0000 From: patchwork-bot+netdevbpf@...nel.org To: Steffen Klassert <steffen.klassert@...unet.com> Cc: davem@...emloft.net, kuba@...nel.org, herbert@...dor.apana.org.au, netdev@...r.kernel.org Subject: Re: [PATCH 1/7] xfrm: don't check the default policy if the policy allows the packet Hello: This series was applied to netdev/net.git (main) by Steffen Klassert <steffen.klassert@...unet.com>: On Tue, 16 May 2023 07:23:59 +0200 you wrote: > From: Sabrina Dubroca <sd@...asysnail.net> > > The current code doesn't let a simple "allow" policy counteract a > default policy blocking all incoming packets: > > ip x p setdefault in block > ip x p a src 192.168.2.1/32 dst 192.168.2.2/32 dir in action allow > > [...] Here is the summary with links: - [1/7] xfrm: don't check the default policy if the policy allows the packet https://git.kernel.org/netdev/net/c/430cac487400 - [2/7] xfrm: release all offloaded policy memory https://git.kernel.org/netdev/net/c/94b95dfaa814 - [3/7] xfrm: Fix leak of dev tracker https://git.kernel.org/netdev/net/c/ec8f32ad9a65 - [4/7] Revert "Fix XFRM-I support for nested ESP tunnels" https://git.kernel.org/netdev/net/c/5fc46f94219d - [5/7] xfrm: Reject optional tunnel/BEET mode templates in outbound policies https://git.kernel.org/netdev/net/c/3d776e31c841 - [6/7] af_key: Reject optional tunnel/BEET mode templates in outbound policies https://git.kernel.org/netdev/net/c/cf3128a7aca5 - [7/7] xfrm: Check if_id in inbound policy/secpath match https://git.kernel.org/netdev/net/c/8680407b6f8f You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists