[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20220309130839.3263912-1-steffen.klassert@secunet.com>
Date: Wed, 9 Mar 2022 14:08:34 +0100
From: Steffen Klassert <steffen.klassert@...unet.com>
To: David Miller <davem@...emloft.net>,
Jakub Kicinski <kuba@...nel.org>
CC: Herbert Xu <herbert@...dor.apana.org.au>,
Steffen Klassert <steffen.klassert@...unet.com>,
<netdev@...r.kernel.org>
Subject: pull request (net): ipsec 2022-03-09
1) Fix IPv6 PMTU discovery for xfrm interfaces.
From Lina Wang.
2) Revert failing for policies and states that are
configured with XFRMA_IF_ID 0. It broke a
user configuration. From Kai Lueke.
3) Fix a possible buffer overflow in the ESP output path.
4) Fix ESP GSO for tunnel and BEET mode on inter address
family tunnels.
Please pull or let me know if there are problems.
Thanks!
The following changes since commit 519ca6fa960587d02904a9f8f79d587ac874fb03:
Merge branch '40GbE' of git://git.kernel.org/pub/scm/linux/kernel/git/tnguy/net-queue (2022-02-26 12:50:20 +0000)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec.git master
for you to fetch changes up to 23c7f8d7989e1646aac82f75761b7648c355cb8a:
net: Fix esp GSO on inter address family tunnels. (2022-03-07 13:14:04 +0100)
----------------------------------------------------------------
Kai Lueke (1):
Revert "xfrm: state and policy should fail if XFRMA_IF_ID 0"
Lina Wang (1):
xfrm: fix tunnel model fragmentation behavior
Steffen Klassert (3):
esp: Fix possible buffer overflow in ESP transformation
esp: Fix BEET mode inter address family tunneling on GSO
net: Fix esp GSO on inter address family tunnels.
include/linux/netdevice.h | 2 ++
include/net/esp.h | 2 ++
net/core/gro.c | 25 +++++++++++++++++++++++++
net/ipv4/esp4.c | 5 +++++
net/ipv4/esp4_offload.c | 6 ++++--
net/ipv6/esp6.c | 5 +++++
net/ipv6/esp6_offload.c | 6 ++++--
net/ipv6/xfrm6_output.c | 16 ++++++++++++++++
net/xfrm/xfrm_interface.c | 5 ++++-
net/xfrm/xfrm_user.c | 21 +++------------------
10 files changed, 70 insertions(+), 23 deletions(-)
Powered by blists - more mailing lists