lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: 
 <176351822157.182718.3296790077935029617.git-patchwork-notify@kernel.org>
Date: Wed, 19 Nov 2025 02:10:21 +0000
From: patchwork-bot+netdevbpf@...nel.org
To: Steffen Klassert <steffen.klassert@...unet.com>
Cc: davem@...emloft.net, kuba@...nel.org, herbert@...dor.apana.org.au,
 netdev@...r.kernel.org
Subject: Re: [PATCH 01/10] xfrm: drop SA reference in xfrm_state_update if dir
 doesn't match

Hello:

This series was applied to netdev/net.git (main)
by Steffen Klassert <steffen.klassert@...unet.com>:

On Tue, 18 Nov 2025 09:52:34 +0100 you wrote:
> From: Sabrina Dubroca <sd@...asysnail.net>
> 
> We're not updating x1, but we still need to put() it.
> 
> Fixes: a4a87fa4e96c ("xfrm: Add Direction to the SA in or out")
> Signed-off-by: Sabrina Dubroca <sd@...asysnail.net>
> Signed-off-by: Steffen Klassert <steffen.klassert@...unet.com>
> 
> [...]

Here is the summary with links:
  - [01/10] xfrm: drop SA reference in xfrm_state_update if dir doesn't match
    https://git.kernel.org/netdev/net/c/8d2a2a49c30f
  - [02/10] xfrm: also call xfrm_state_delete_tunnel at destroy time for states that were never added
    https://git.kernel.org/netdev/net/c/10deb6986484
  - [03/10] xfrm: make state as DEAD before final put when migrate fails
    https://git.kernel.org/netdev/net/c/5502bc4746e8
  - [04/10] xfrm: call xfrm_dev_state_delete when xfrm_state_migrate fails to add the state
    https://git.kernel.org/netdev/net/c/7f0228576479
  - [05/10] xfrm: set err and extack on failure to create pcpu SA
    https://git.kernel.org/netdev/net/c/1dcf617bec5c
  - [06/10] xfrm: check all hash buckets for leftover states during netns deletion
    https://git.kernel.org/netdev/net/c/f2bc8231fd43
  - [07/10] xfrm: Check inner packet family directly from skb_dst
    https://git.kernel.org/netdev/net/c/082ef944e55d
  - [08/10] xfrm: Determine inner GSO type from packet inner protocol
    https://git.kernel.org/netdev/net/c/61fafbee6cfe
  - [09/10] xfrm: Prevent locally generated packets from direct output in tunnel mode
    https://git.kernel.org/netdev/net/c/59630e2ccd72
  - [10/10] xfrm: fix memory leak in xfrm_add_acquire()
    https://git.kernel.org/netdev/net/c/a55ef3bff84f

You are awesome, thank you!
-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ