[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20240306100438.3953516-1-steffen.klassert@secunet.com>
Date: Wed, 6 Mar 2024 11:04:33 +0100
From: Steffen Klassert <steffen.klassert@...unet.com>
To: David Miller <davem@...emloft.net>, Jakub Kicinski <kuba@...nel.org>
CC: Herbert Xu <herbert@...dor.apana.org.au>, Steffen Klassert
<steffen.klassert@...unet.com>, <netdev@...r.kernel.org>
Subject: [PATCH 0/5] pull request (net): ipsec 2024-03-06
1) Clear the ECN bits flowi4_tos in decode_session4().
This was already fixed but the bug was reintroduced
when decode_session4() switched to us the flow dissector.
From Guillaume Nault.
2) Fix UDP encapsulation in the TX path with packet offload mode.
From Leon Romanovsky,
3) Avoid clang fortify warning in copy_to_user_tmpl().
From Nathan Chancellor.
4) Fix inter address family tunnel in packet offload mode.
From Mike Yu.
Please pull or let me know if there are problems.
Thanks!
The following changes since commit e327b2372bc0f18c30433ac40be07741b59231c5:
net: ravb: Fix dma_addr_t truncation in error case (2024-01-14 16:41:51 +0000)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec.git tags/ipsec-2024-03-06
for you to fetch changes up to 2ce0eae694cfa8d0f5e4fa396015fc68c5958e8d:
Merge branch 'Improve packet offload for dual stack' (2024-03-06 10:33:24 +0100)
----------------------------------------------------------------
ipsec-2024-03-06
----------------------------------------------------------------
Guillaume Nault (1):
xfrm: Clear low order bits of ->flowi4_tos in decode_session4().
Leon Romanovsky (1):
xfrm: Pass UDP encapsulation in TX packet offload
Mike Yu (2):
xfrm: fix xfrm child route lookup for packet offload
xfrm: set skb control buffer based on packet offload as well
Nathan Chancellor (1):
xfrm: Avoid clang fortify warning in copy_to_user_tmpl()
Steffen Klassert (1):
Merge branch 'Improve packet offload for dual stack'
net/xfrm/xfrm_device.c | 2 +-
net/xfrm/xfrm_output.c | 6 +++++-
net/xfrm/xfrm_policy.c | 6 ++++--
net/xfrm/xfrm_user.c | 3 +++
4 files changed, 13 insertions(+), 4 deletions(-)
Powered by blists - more mailing lists