mbox

[0/5] pull request (net-next): ipsec-next 2024-07-13

Message ID 20240713102416.3272997-1-steffen.klassert@secunet.com (mailing list archive)
State Accepted
Delegated to: Netdev Maintainers
Headers show

Pull-request

git://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git tags/ipsec-next-2024-07-13

Message

Steffen Klassert July 13, 2024, 10:24 a.m. UTC
1) Support sending NAT keepalives in ESP in UDP states.
   Userspace IKE daemon had to do this before, but the
   kernel can better keep track of it.
   From Eyal Birger.

2) Support IPsec crypto offload for IPv6 ESP and IPv4 UDP-encapsulated
   ESP data paths. Currently, IPsec crypto offload is enabled for GRO
   code path only. This patchset support UDP encapsulation for the non
   GRO path. From Mike Yu.

Please pull or let me know if there are problems.

Thanks!

The following changes since commit 5233a55a5254ea38dcdd8d836a0f9ee886c3df51:

  mISDN: remove unused struct 'bf_ctx' (2024-05-27 16:48:00 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git tags/ipsec-next-2024-07-13

for you to fetch changes up to d5b60c6517d227b044674718a993caae19080f7b:

  Merge  branch 'Support IPsec crypto offload for IPv6 ESP and IPv4 UDP-encapsulated ESP data paths' (2024-07-13 11:14:04 +0200)

----------------------------------------------------------------
ipsec-next-2024-07-13

----------------------------------------------------------------
Eyal Birger (1):
      xfrm: support sending NAT keepalives in ESP in UDP states

Mike Yu (4):
      xfrm: Support crypto offload for inbound IPv6 ESP packets not in GRO path
      xfrm: Allow UDP encapsulation in crypto offload control path
      xfrm: Support crypto offload for inbound IPv4 UDP-encapsulated ESP packet
      xfrm: Support crypto offload for outbound IPv4 UDP-encapsulated ESP packet

Steffen Klassert (1):
      Merge  branch 'Support IPsec crypto offload for IPv6 ESP and IPv4 UDP-encapsulated ESP data paths'

 include/net/ipv6_stubs.h      |   3 +
 include/net/netns/xfrm.h      |   1 +
 include/net/xfrm.h            |  10 ++
 include/uapi/linux/xfrm.h     |   1 +
 net/ipv4/esp4.c               |   8 +-
 net/ipv4/esp4_offload.c       |  17 ++-
 net/ipv6/af_inet6.c           |   1 +
 net/ipv6/xfrm6_policy.c       |   7 +
 net/xfrm/Makefile             |   3 +-
 net/xfrm/xfrm_compat.c        |   6 +-
 net/xfrm/xfrm_device.c        |   6 +-
 net/xfrm/xfrm_input.c         |   3 +-
 net/xfrm/xfrm_nat_keepalive.c | 292 ++++++++++++++++++++++++++++++++++++++++++
 net/xfrm/xfrm_policy.c        |  13 +-
 net/xfrm/xfrm_state.c         |  17 +++
 net/xfrm/xfrm_user.c          |  15 +++
 16 files changed, 393 insertions(+), 10 deletions(-)
 create mode 100644 net/xfrm/xfrm_nat_keepalive.c

Comments

Jakub Kicinski July 15, 2024, 1:57 p.m. UTC | #1
On Sat, 13 Jul 2024 12:24:11 +0200 Steffen Klassert wrote:
> ipsec-next-2024-07-13

...this too. And I meant to say "pulled" rather than "applied"
in the previous email. Thanks!