[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id:
<168429602430.23839.11062789710575476505.git-patchwork-notify@kernel.org>
Date: Wed, 17 May 2023 04:00:24 +0000
From: patchwork-bot+netdevbpf@...nel.org
To: Steffen Klassert <steffen.klassert@...unet.com>
Cc: davem@...emloft.net, kuba@...nel.org, herbert@...dor.apana.org.au,
netdev@...r.kernel.org
Subject: Re: [PATCH 1/7] xfrm: don't check the default policy if the policy allows
the packet
Hello:
This series was applied to netdev/net.git (main)
by Steffen Klassert <steffen.klassert@...unet.com>:
On Tue, 16 May 2023 07:23:59 +0200 you wrote:
> From: Sabrina Dubroca <sd@...asysnail.net>
>
> The current code doesn't let a simple "allow" policy counteract a
> default policy blocking all incoming packets:
>
> ip x p setdefault in block
> ip x p a src 192.168.2.1/32 dst 192.168.2.2/32 dir in action allow
>
> [...]
Here is the summary with links:
- [1/7] xfrm: don't check the default policy if the policy allows the packet
https://git.kernel.org/netdev/net/c/430cac487400
- [2/7] xfrm: release all offloaded policy memory
https://git.kernel.org/netdev/net/c/94b95dfaa814
- [3/7] xfrm: Fix leak of dev tracker
https://git.kernel.org/netdev/net/c/ec8f32ad9a65
- [4/7] Revert "Fix XFRM-I support for nested ESP tunnels"
https://git.kernel.org/netdev/net/c/5fc46f94219d
- [5/7] xfrm: Reject optional tunnel/BEET mode templates in outbound policies
https://git.kernel.org/netdev/net/c/3d776e31c841
- [6/7] af_key: Reject optional tunnel/BEET mode templates in outbound policies
https://git.kernel.org/netdev/net/c/cf3128a7aca5
- [7/7] xfrm: Check if_id in inbound policy/secpath match
https://git.kernel.org/netdev/net/c/8680407b6f8f
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists