lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <169827542464.7495.6756157867363734179.git-patchwork-notify@kernel.org> Date: Wed, 25 Oct 2023 23:10:24 +0000 From: patchwork-bot+netdevbpf@...nel.org To: Pablo Neira Ayuso <pablo@...filter.org> Cc: netfilter-devel@...r.kernel.org, davem@...emloft.net, netdev@...r.kernel.org, kuba@...nel.org, pabeni@...hat.com, edumazet@...gle.com, fw@...len.de Subject: Re: [PATCH net 1/2] netfilter: flowtable: GC pushes back packets to classic path Hello: This series was applied to netdev/net.git (main) by Pablo Neira Ayuso <pablo@...filter.org>: On Wed, 25 Oct 2023 12:08:18 +0200 you wrote: > Since 41f2c7c342d3 ("net/sched: act_ct: Fix promotion of offloaded > unreplied tuple"), flowtable GC pushes back flows with IPS_SEEN_REPLY > back to classic path in every run, ie. every second. This is because of > a new check for NF_FLOW_HW_ESTABLISHED which is specific of sched/act_ct. > > In Netfilter's flowtable case, NF_FLOW_HW_ESTABLISHED never gets set on > and IPS_SEEN_REPLY is unreliable since users decide when to offload the > flow before, such bit might be set on at a later stage. > > [...] Here is the summary with links: - [net,1/2] netfilter: flowtable: GC pushes back packets to classic path https://git.kernel.org/netdev/net/c/735795f68b37 - [net,2/2] net/sched: act_ct: additional checks for outdated flows https://git.kernel.org/netdev/net/c/a63b6622120c You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists