From: Steffen Klassert <steffen.klassert@secunet.com>
To: David Miller <davem@davemloft.net>, Jakub Kicinski <kuba@kernel.org>
Cc: Herbert Xu <herbert@gondor.apana.org.au>,
Steffen Klassert <steffen.klassert@secunet.com>,
<netdev@vger.kernel.org>
Subject: [PATCH 0/6] pull request (net): ipsec 2022-11-23
Date: Wed, 23 Nov 2022 10:31:10 +0100 [thread overview]
Message-ID: <20221123093117.434274-1-steffen.klassert@secunet.com> (raw)
1) Fix "disable_policy" on ipv4 early demuxP Packets after
the initial packet in a flow might be incorectly dropped
on early demux if there are no matching policies.
From Eyal Birger.
2) Fix a kernel warning in case XFRM encap type is not
available. From Eyal Birger.
3) Fix ESN wrap around for GSO to avoid a double usage of a
sequence number. From Christian Langrock.
4) Fix a send_acquire race with pfkey_register.
From Herbert Xu.
5) Fix a list corruption panic in __xfrm_state_delete().
Thomas Jarosch.
6) Fix an unchecked return value in xfrm6_init().
Chen Zhongjin.
Please pull or let me know if there are problems.
Thanks!
The following changes since commit 1d22f78d05737ce21bff7b88b6e58873f35e65ba:
Merge tag 'ieee802154-for-net-2022-10-05' of git://git.kernel.org/pub/scm/linux/kernel/git/sschmidt/wpan (2022-10-05 20:38:46 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec.git master
for you to fetch changes up to 40781bfb836eda57d19c0baa37c7e72590e05fdc:
xfrm: Fix ignored return value in xfrm6_init() (2022-11-22 07:16:34 +0100)
----------------------------------------------------------------
Chen Zhongjin (1):
xfrm: Fix ignored return value in xfrm6_init()
Christian Langrock (1):
xfrm: replay: Fix ESN wrap around for GSO
Eyal Birger (2):
xfrm: fix "disable_policy" on ipv4 early demux
xfrm: lwtunnel: squelch kernel warning in case XFRM encap type is not available
Herbert Xu (1):
af_key: Fix send_acquire race with pfkey_register
Thomas Jarosch (1):
xfrm: Fix oops in __xfrm_state_delete()
net/core/lwtunnel.c | 4 +++-
net/ipv4/esp4_offload.c | 3 +++
net/ipv4/ip_input.c | 5 +++++
net/ipv6/esp6_offload.c | 3 +++
net/ipv6/xfrm6_policy.c | 6 +++++-
net/key/af_key.c | 34 +++++++++++++++++++++++-----------
net/xfrm/xfrm_device.c | 15 ++++++++++++++-
net/xfrm/xfrm_replay.c | 2 +-
8 files changed, 57 insertions(+), 15 deletions(-)
next reply other threads:[~2022-11-23 9:33 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-11-23 9:31 Steffen Klassert [this message]
2022-11-23 9:31 ` [PATCH 1/6] xfrm: fix "disable_policy" on ipv4 early demux Steffen Klassert
2022-11-24 3:30 ` patchwork-bot+netdevbpf
2022-11-23 9:31 ` [PATCH 2/6] xfrm: lwtunnel: squelch kernel warning in case XFRM encap type is not available Steffen Klassert
2022-11-23 9:31 ` [PATCH 3/6] xfrm: replay: Fix ESN wrap around for GSO Steffen Klassert
2022-11-23 9:31 ` [PATCH 4/6] af_key: Fix send_acquire race with pfkey_register Steffen Klassert
2022-11-23 9:31 ` [PATCH 5/6] xfrm: Fix oops in __xfrm_state_delete() Steffen Klassert
2022-11-23 9:31 ` [PATCH 6/6] xfrm: Fix ignored return value in xfrm6_init() Steffen Klassert
2022-11-24 17:38 ` [PATCH 0/6] pull request (net): ipsec 2022-11-23 Alexander Lobakin
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20221123093117.434274-1-steffen.klassert@secunet.com \
--to=steffen.klassert@secunet.com \
--cc=davem@davemloft.net \
--cc=herbert@gondor.apana.org.au \
--cc=kuba@kernel.org \
--cc=netdev@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.