lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <416ac3c4ca63a7747ed83e1b722f98c17a50bea2.1670830561.git.leonro@nvidia.com> Date: Mon, 12 Dec 2022 09:54:03 +0200 From: Leon Romanovsky <leon@...nel.org> To: Steffen Klassert <steffen.klassert@...unet.com>, David Ahern <dsahern@...il.com> Cc: Leon Romanovsky <leonro@...dia.com>, Stephen Hemminger <stephen@...workplumber.org>, netdev@...r.kernel.org, Raed Salem <raeds@...dia.com> Subject: [PATCH iproute2-next v1 1/4] Update XFRM kernel header From: Leon Romanovsky <leonro@...dia.com> Sync XFRM header upto kernel commit d14f28b8c1de ("xfrm: add new packet offload flag") Signed-off-by: Leon Romanovsky <leonro@...dia.com> --- include/uapi/linux/xfrm.h | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/include/uapi/linux/xfrm.h b/include/uapi/linux/xfrm.h index 4809f9be..23543c33 100644 --- a/include/uapi/linux/xfrm.h +++ b/include/uapi/linux/xfrm.h @@ -519,6 +519,12 @@ struct xfrm_user_offload { */ #define XFRM_OFFLOAD_IPV6 1 #define XFRM_OFFLOAD_INBOUND 2 +/* Two bits above are relevant for state path only, while + * offload is used for both policy and state flows. + * + * In policy offload mode, they are free and can be safely reused. + */ +#define XFRM_OFFLOAD_PACKET 4 struct xfrm_userpolicy_default { #define XFRM_USERPOLICY_UNSPEC 0 @@ -529,12 +535,14 @@ struct xfrm_userpolicy_default { __u8 out; }; +#ifndef __KERNEL__ /* backwards compatibility for userspace */ #define XFRMGRP_ACQUIRE 1 #define XFRMGRP_EXPIRE 2 #define XFRMGRP_SA 4 #define XFRMGRP_POLICY 8 #define XFRMGRP_REPORT 0x20 +#endif enum xfrm_nlgroups { XFRMNLGRP_NONE, -- 2.38.1
Powered by blists - more mailing lists