lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <174683702875.3851370.14678019061074033156.git-patchwork-notify@kernel.org> Date: Sat, 10 May 2025 00:30:28 +0000 From: patchwork-bot+netdevbpf@...nel.org To: Simon Wunderlich <sw@...onwunderlich.de> Cc: davem@...emloft.net, kuba@...nel.org, netdev@...r.kernel.org, b.a.t.m.a.n@...ts.open-mesh.org, mschiffer@...verse-factory.net Subject: Re: [PATCH net 1/1] batman-adv: fix duplicate MAC address check Hello: This patch was applied to netdev/net.git (main) by Simon Wunderlich <sw@...onwunderlich.de>: On Fri, 9 May 2025 11:02:40 +0200 you wrote: > From: Matthias Schiffer <mschiffer@...verse-factory.net> > > batadv_check_known_mac_addr() is both too lenient and too strict: > > - It is called from batadv_hardif_add_interface(), which means that it > checked interfaces that are not used for batman-adv at all. Move it > to batadv_hardif_enable_interface(). Also, restrict it to hardifs of > the same mesh interface; different mesh interfaces should not interact > at all. The batadv_check_known_mac_addr() argument is changed from > `struct net_device` to `struct batadv_hard_iface` to achieve this. > - The check only cares about hardifs in BATADV_IF_ACTIVE and > BATADV_IF_TO_BE_ACTIVATED states, but interfaces in BATADV_IF_INACTIVE > state should be checked as well, or the following steps will not > result in a warning then they should: > > [...] Here is the summary with links: - [net,1/1] batman-adv: fix duplicate MAC address check https://git.kernel.org/netdev/net/c/8772cc49e0b8 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists