lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20240910065507.2436394-1-steffen.klassert@secunet.com>
Date: Tue, 10 Sep 2024 08:54:54 +0200
From: Steffen Klassert <steffen.klassert@...unet.com>
To: David Miller <davem@...emloft.net>, Jakub Kicinski <kuba@...nel.org>
CC: Herbert Xu <herbert@...dor.apana.org.au>, Steffen Klassert
	<steffen.klassert@...unet.com>, <netdev@...r.kernel.org>
Subject: [PATCH 0/13] pull request (net-next): ipsec-next 2024-09-10

1) Remove an unneeded WARN_ON on packet offload.
   From Patrisious Haddad.

2) Add a copy from skb_seq_state to buffer function.
   This is needed for the upcomming IPTFS patchset.
   From Christian Hopps.

3) Spelling fix in xfrm.h.
   From Simon Horman.

4) Speed up xfrm policy insertions.
   From Florian Westphal.

5) Add and revert a patch to support xfrm interfaces
   for packet offload. This patch was just half coocked.

6) Extend usage of the new xfrm_policy_is_dead_or_sk helper.
   From Florian Westphal.

7) Update comments on sdb and xfrm_policy.
   From Florian Westphal.

8) Fix a null pointer dereference in the new policy insertion
   code From Florian Westphal.

9) Fix an uninitialized variable in the new policy insertion
   code. From Nathan Chancellor.

Please pull or let me know if there are problems.

Thanks!

The following changes since commit 8e0c0ec9b7dc2aec84f141c26c501e24906ff765:

  Merge branch 'ethernet-convert-from-tasklet-to-bh-workqueue' (2024-07-31 19:05:20 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git tags/ipsec-next-2024-09-10

for you to fetch changes up to e62d39332d4b9400a69ba902797aa17a1a0037e7:

  xfrm: policy: Restore dir assignments in xfrm_hash_rebuild() (2024-09-09 15:30:44 +0200)

----------------------------------------------------------------
ipsec-next-2024-09-10

----------------------------------------------------------------
Christian Hopps (1):
      net: add copy from skb_seq_state to buffer function

Florian Westphal (7):
      selftests: add xfrm policy insertion speed test script
      xfrm: policy: don't iterate inexact policies twice at insert time
      xfrm: switch migrate to xfrm_policy_lookup_bytype
      xfrm: policy: remove remaining use of inexact list
      xfrm: policy: use recently added helper in more places
      xfrm: minor update to sdb and xfrm_policy comments
      xfrm: policy: fix null dereference

Nathan Chancellor (1):
      xfrm: policy: Restore dir assignments in xfrm_hash_rebuild()

Patrisious Haddad (1):
      xfrm: Remove documentation WARN_ON to limit return values for offloaded SA

Simon Horman (1):
      xfrm: Correct spelling in xfrm.h

Steffen Klassert (2):
      Merge branch 'xfrm: speed up policy insertions'
      Revert "xfrm: add SA information to the offloaded packet"

wangfe (1):
      xfrm: add SA information to the offloaded packet

 include/linux/skbuff.h                             |   1 +
 include/net/xfrm.h                                 |  45 ++++-
 net/core/skbuff.c                                  |  35 ++++
 net/xfrm/xfrm_device.c                             |   6 +-
 net/xfrm/xfrm_policy.c                             | 222 ++++++++++-----------
 tools/testing/selftests/net/Makefile               |   2 +-
 .../testing/selftests/net/xfrm_policy_add_speed.sh |  83 ++++++++
 7 files changed, 258 insertions(+), 136 deletions(-)
 create mode 100755 tools/testing/selftests/net/xfrm_policy_add_speed.sh

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ