lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20241115083343.2340827-1-steffen.klassert@secunet.com>
Date: Fri, 15 Nov 2024 09:33:32 +0100
From: Steffen Klassert <steffen.klassert@...unet.com>
To: David Miller <davem@...emloft.net>, Jakub Kicinski <kuba@...nel.org>
CC: Herbert Xu <herbert@...dor.apana.org.au>, Steffen Klassert
	<steffen.klassert@...unet.com>, <netdev@...r.kernel.org>
Subject: [PATCH 0/11] pull request (net-next): ipsec-next 2024-11-15

1) Add support for RFC 9611 per cpu xfrm state handling.

2) Add inbound and outbound xfrm state caches to speed up
   state lookups.

3) Convert xfrm to dscp_t. From Guillaume Nault.

4) Fix error handling in build_aevent.
   From Everest K.C.

5) Replace strncpy with strscpy_pad in copy_to_user_auth.
   From Daniel Yang.

6) Fix an uninitialized symbol during acquire state insertion.

Please pull or let me know if there are problems.

Thanks!

The following changes since commit ab101c553bc1f76a839163d1dc0d1e715ad6bb4e:

  neighbour: use kvzalloc()/kvfree() (2024-10-28 18:12:06 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git tags/ipsec-next-2024-11-15

for you to fetch changes up to a35672819f8d85e2ae38b80d40b923e3ef81e4ea:

  xfrm: Fix acquire state insertion. (2024-11-15 07:25:14 +0100)

----------------------------------------------------------------
ipsec-next-2024-11-15

----------------------------------------------------------------
Daniel Yang (1):
      xfrm: replace deprecated strncpy with strscpy_pad

Everest K.C (1):
      xfrm: Add error handling when nla_put_u32() returns an error

Guillaume Nault (4):
      xfrm: Convert xfrm_get_tos() to dscp_t.
      xfrm: Convert xfrm_bundle_create() to dscp_t.
      xfrm: Convert xfrm_dst_lookup() to dscp_t.
      xfrm: Convert struct xfrm_dst_lookup_params -> tos to dscp_t.

Steffen Klassert (6):
      xfrm: Add support for per cpu xfrm state handling.
      xfrm: Cache used outbound xfrm states at the policy.
      xfrm: Add an inbound percpu state cache.
      xfrm: Restrict percpu SA attribute to specific netlink message types
      Merge branch 'xfrm: Convert __xfrm4_dst_lookup() and its callers to dscp_t.'
      xfrm: Fix acquire state insertion.

 include/net/netns/xfrm.h  |   1 +
 include/net/xfrm.h        |  17 ++++-
 include/uapi/linux/xfrm.h |   2 +
 net/ipv4/esp4_offload.c   |   6 +-
 net/ipv4/xfrm4_policy.c   |   3 +-
 net/ipv6/esp6_offload.c   |   6 +-
 net/key/af_key.c          |   7 +-
 net/xfrm/xfrm_compat.c    |   6 +-
 net/xfrm/xfrm_input.c     |   2 +-
 net/xfrm/xfrm_policy.c    |  28 +++++---
 net/xfrm/xfrm_state.c     | 171 +++++++++++++++++++++++++++++++++++++++++++---
 net/xfrm/xfrm_user.c      |  75 ++++++++++++++++++--
 12 files changed, 284 insertions(+), 40 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ