From mboxrd@z Thu Jan 1 00:00:00 1970 From: David Miller Subject: Re: pull request (net): ipsec 2018-01-24 Date: Wed, 24 Jan 2018 10:32:44 -0500 (EST) Message-ID: <20180124.103244.1741453603589266532.davem@davemloft.net> References: <20180124094713.27913-1-steffen.klassert@secunet.com> Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Cc: herbert@gondor.apana.org.au, netdev@vger.kernel.org To: steffen.klassert@secunet.com Return-path: Received: from shards.monkeyblade.net ([184.105.139.130]:45274 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S934042AbeAXPcr (ORCPT ); Wed, 24 Jan 2018 10:32:47 -0500 In-Reply-To: <20180124094713.27913-1-steffen.klassert@secunet.com> Sender: netdev-owner@vger.kernel.org List-ID: From: Steffen Klassert Date: Wed, 24 Jan 2018 10:47:09 +0100 > 1) Only offloads SAs after they are fully initialized. > Otherwise a NIC may receive packets on a SA we can > not yet handle in the stack. > From Yossi Kuperman. > > 2) Fix negative refcount in case of a failing offload. > From Aviad Yehezkel. > > 3) Fix inner IP ptoro version when decapsulating > from interaddress family tunnels. > From Yossi Kuperman. > > 4) Use true or false for boolean variables instead of an > integer value in xfrm_get_type_offload. > From Gustavo A. R. Silva. > > Please pull or let me know if there are problems. Pulled, thanks.