From patchwork Mon Dec 12 07:54:03 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Leon Romanovsky X-Patchwork-Id: 13070814 X-Patchwork-Delegate: dsahern@gmail.com Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7E8E5C4332F for ; Mon, 12 Dec 2022 07:54:33 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231336AbiLLHyb (ORCPT ); Mon, 12 Dec 2022 02:54:31 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38300 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231194AbiLLHy2 (ORCPT ); Mon, 12 Dec 2022 02:54:28 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id EA0F2B86A for ; Sun, 11 Dec 2022 23:54:27 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id AA4EBB80B83 for ; Mon, 12 Dec 2022 07:54:26 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id D9965C433EF; Mon, 12 Dec 2022 07:54:24 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1670831665; bh=5iNQHIrtbx5fBZUVOQRKW2JfC3gJUjQV8lLSrcoRTrA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Es+sZLQnZ3lEmTzDCVNVqaFwk8gBo+dIFIZatqVkG7QnyG7YxhK2QEQOV7P9LXnVR Ix9/PUESlfIx8Yf4mG1URNJkDMYZ0OOEugRjDfL5dpJrfni320U9U/miTidBoIkUAJ oWafJ8iqcs65NIyTDEe/Ts+JOR6QgXvfCa7WdpJar3SXttLQ10KrQ8uBup/EED8BDE J/ADwO8PCfaaB8sv9jbZ/IrW0rY5UvdiKxneUeYNy11MAzjsR1E7XGC5wPLvab4TqD votqP0DKISCr1Aaa5o4KYMtx17NO8PKS6s2gu0NCMJL4hCxTHqVpJmqqejNrTfUlhs 7ZLmawW8JbDsg== From: Leon Romanovsky To: Steffen Klassert , David Ahern Cc: Leon Romanovsky , Stephen Hemminger , netdev@vger.kernel.org, Raed Salem Subject: [PATCH iproute2-next v1 1/4] Update XFRM kernel header Date: Mon, 12 Dec 2022 09:54:03 +0200 Message-Id: <416ac3c4ca63a7747ed83e1b722f98c17a50bea2.1670830561.git.leonro@nvidia.com> X-Mailer: git-send-email 2.38.1 In-Reply-To: References: MIME-Version: 1.0 Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org X-Patchwork-Delegate: dsahern@gmail.com From: Leon Romanovsky Sync XFRM header upto kernel commit d14f28b8c1de ("xfrm: add new packet offload flag") Signed-off-by: Leon Romanovsky --- include/uapi/linux/xfrm.h | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/include/uapi/linux/xfrm.h b/include/uapi/linux/xfrm.h index 4809f9be..23543c33 100644 --- a/include/uapi/linux/xfrm.h +++ b/include/uapi/linux/xfrm.h @@ -519,6 +519,12 @@ struct xfrm_user_offload { */ #define XFRM_OFFLOAD_IPV6 1 #define XFRM_OFFLOAD_INBOUND 2 +/* Two bits above are relevant for state path only, while + * offload is used for both policy and state flows. + * + * In policy offload mode, they are free and can be safely reused. + */ +#define XFRM_OFFLOAD_PACKET 4 struct xfrm_userpolicy_default { #define XFRM_USERPOLICY_UNSPEC 0 @@ -529,12 +535,14 @@ struct xfrm_userpolicy_default { __u8 out; }; +#ifndef __KERNEL__ /* backwards compatibility for userspace */ #define XFRMGRP_ACQUIRE 1 #define XFRMGRP_EXPIRE 2 #define XFRMGRP_SA 4 #define XFRMGRP_POLICY 8 #define XFRMGRP_REPORT 0x20 +#endif enum xfrm_nlgroups { XFRMNLGRP_NONE,