lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <6c10216ae0d95aa3fb9e2290830f7196fea9365d.camel@kernel.org>
Date:   Tue, 22 Jun 2021 14:53:43 -0700
From:   Saeed Mahameed <saeed@...nel.org>
To:     Huy Nguyen <huyn@...dia.com>, netdev@...r.kernel.org
Cc:     steffen.klassert@...unet.com, borisp@...dia.com, raeds@...dia.com,
        danielj@...dia.com, yossiku@...dia.com, kuba@...nel.org
Subject: Re: [PATCH net-next v5 0/3] Fix IPsec crypto offloads with vxlan
 tunnel

On Mon, 2021-06-14 at 17:33 +0300, Huy Nguyen wrote:
> v4 -> v5:
>   - Fix double initialization of xo in xfrm_get_inner_ipproto
> 
> v3 -> v4:
>  - Check explicitly for skb->ecapsulation before calling
> xfrm_get_inner_ipproto.
>  - Move patche set to net-next
> 
> v2 -> v3:
>   - Fix bug in patch 003 when checking for xo null pointer in
> mlx5e_ipsec_feature_check
>   - Fix bug of accidentally commenting out memset in patch 003
> 
> v1 -> v2:
>   - Move inner_ipproto into xfrm_offload structure.
>   - Fix static code analysis errors.
>   - skip checking for skb->encapsulation to be more flexible for
> vendor
> 
> This small series fixes ipsec TX offloads with vxlan overlay on top
> of
> the offloaded ipsec packet, the driver (mlx5) was lacking such
> information
> and the skb->encapsulation bit wasn't enough as indication to reach
> the
> vxlan inner headers, as a solution we mark the tunnel in the
> offloaded
> context of ipsec.
> 

Series applied to net-next-mlx5.

Thanks,
Saeed.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ