[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20250521054348.4057269-1-steffen.klassert@secunet.com>
Date: Wed, 21 May 2025 07:43:43 +0200
From: Steffen Klassert <steffen.klassert@...unet.com>
To: David Miller <davem@...emloft.net>, Jakub Kicinski <kuba@...nel.org>
CC: Herbert Xu <herbert@...dor.apana.org.au>, Steffen Klassert
<steffen.klassert@...unet.com>, <netdev@...r.kernel.org>
Subject: [PATCH 0/5] pull request (net): ipsec 2025-05-21
1) Fix some missing kfree_skb in the error paths of espintcp.
From Sabrina Dubroca.
2) Fix a reference leak in espintcp.
From Sabrina Dubroca.
3) Fix UDP GRO handling for ESPINUDP.
From Tobias Brunner.
4) Fix ipcomp truesize computation on the receive path.
From Sabrina Dubroca.
5) Sanitize marks before policy/state insertation.
From Paul Chaignon.
Please pull or let me know if there are problems.
Thanks!
The following changes since commit cfe82469a00f0c0983bf4652de3a2972637dfc56:
ipv6: add exception routes to GC list in rt6_insert_exception (2025-04-10 20:09:05 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec.git tags/ipsec-2025-05-21
for you to fetch changes up to 0b91fda3a1f044141e1e615456ff62508c32b202:
xfrm: Sanitize marks before insert (2025-05-14 07:18:58 +0200)
----------------------------------------------------------------
ipsec-2025-05-21
----------------------------------------------------------------
Paul Chaignon (1):
xfrm: Sanitize marks before insert
Sabrina Dubroca (3):
espintcp: fix skb leaks
espintcp: remove encap socket caching to avoid reference leak
xfrm: ipcomp: fix truesize computation on receive
Tobias Brunner (1):
xfrm: Fix UDP GRO handling for some corner cases
include/net/xfrm.h | 1 -
net/ipv4/esp4.c | 53 +++++++-------------------------------------------
net/ipv4/xfrm4_input.c | 18 +++++++++--------
net/ipv6/esp6.c | 53 +++++++-------------------------------------------
net/ipv6/xfrm6_input.c | 18 +++++++++--------
net/xfrm/espintcp.c | 4 +++-
net/xfrm/xfrm_ipcomp.c | 3 +--
net/xfrm/xfrm_policy.c | 3 +++
net/xfrm/xfrm_state.c | 6 +++---
9 files changed, 44 insertions(+), 115 deletions(-)
Powered by blists - more mailing lists