lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: 
 <172602123027.463549.4444581460245758467.git-patchwork-notify@kernel.org>
Date: Wed, 11 Sep 2024 02:20:30 +0000
From: patchwork-bot+netdevbpf@...nel.org
To: Steffen Klassert <steffen.klassert@...unet.com>
Cc: davem@...emloft.net, kuba@...nel.org, herbert@...dor.apana.org.au,
 netdev@...r.kernel.org
Subject: Re: [PATCH 01/13] xfrm: Remove documentation WARN_ON to limit return
 values for offloaded SA

Hello:

This series was applied to netdev/net-next.git (main)
by Steffen Klassert <steffen.klassert@...unet.com>:

On Tue, 10 Sep 2024 08:54:55 +0200 you wrote:
> From: Patrisious Haddad <phaddad@...dia.com>
> 
> The original idea to put WARN_ON() on return value from driver code was
> to make sure that packet offload doesn't have silent fallback to
> SW implementation, like crypto offload has.
> 
> In reality, this is not needed as all *swan implementations followed
> this request and used explicit configuration style to make sure that
> "users will get what they ask".
> So instead of forcing drivers to make sure that even their internal flows
> don't return -EOPNOTSUPP, let's remove this WARN_ON.
> 
> [...]

Here is the summary with links:
  - [01/13] xfrm: Remove documentation WARN_ON to limit return values for offloaded SA
    https://git.kernel.org/netdev/net-next/c/9b49f55838b1
  - [02/13] net: add copy from skb_seq_state to buffer function
    https://git.kernel.org/netdev/net-next/c/6ad8bc92a477
  - [03/13] xfrm: Correct spelling in xfrm.h
    https://git.kernel.org/netdev/net-next/c/54f2f78d6b9f
  - [04/13] selftests: add xfrm policy insertion speed test script
    https://git.kernel.org/netdev/net-next/c/9c5b6d4e33dd
  - [05/13] xfrm: policy: don't iterate inexact policies twice at insert time
    https://git.kernel.org/netdev/net-next/c/33f611cf7d52
  - [06/13] xfrm: switch migrate to xfrm_policy_lookup_bytype
    https://git.kernel.org/netdev/net-next/c/563d5ca93e88
  - [07/13] xfrm: policy: remove remaining use of inexact list
    https://git.kernel.org/netdev/net-next/c/a54ad727f745
  - [08/13] xfrm: add SA information to the offloaded packet
    https://git.kernel.org/netdev/net-next/c/e7cd191f83fd
  - [09/13] xfrm: policy: use recently added helper in more places
    https://git.kernel.org/netdev/net-next/c/08c2182cf0b4
  - [10/13] xfrm: minor update to sdb and xfrm_policy comments
    https://git.kernel.org/netdev/net-next/c/17163f23678c
  - [11/13] Revert "xfrm: add SA information to the offloaded packet"
    https://git.kernel.org/netdev/net-next/c/69716a3babe1
  - [12/13] xfrm: policy: fix null dereference
    https://git.kernel.org/netdev/net-next/c/6a13f5afd39d
  - [13/13] xfrm: policy: Restore dir assignments in xfrm_hash_rebuild()
    https://git.kernel.org/netdev/net-next/c/e62d39332d4b

You are awesome, thank you!
-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ