From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-1.0 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_PASS autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 05037C282D7 for ; Wed, 30 Jan 2019 23:20:00 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id B513420881 for ; Wed, 30 Jan 2019 23:19:59 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730555AbfA3XT7 (ORCPT ); Wed, 30 Jan 2019 18:19:59 -0500 Received: from shards.monkeyblade.net ([23.128.96.9]:52364 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725613AbfA3XT6 (ORCPT ); Wed, 30 Jan 2019 18:19:58 -0500 Received: from localhost (unknown [IPv6:2601:601:9f80:35cd::bf5]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client did not present a certificate) (Authenticated sender: davem-davemloft) by shards.monkeyblade.net (Postfix) with ESMTPSA id 378941403ED31; Wed, 30 Jan 2019 14:00:16 -0800 (PST) Date: Wed, 30 Jan 2019 14:00:15 -0800 (PST) Message-Id: <20190130.140015.952684081153964450.davem@davemloft.net> To: lorenzo.bianconi@redhat.com Cc: netdev@vger.kernel.org, u9012063@gmail.com Subject: Re: [PATCH net 0/2] erspan: always reports output key to userspace From: David Miller In-Reply-To: References: X-Mailer: Mew version 6.8 on Emacs 26.1 Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.12 (shards.monkeyblade.net [149.20.54.216]); Wed, 30 Jan 2019 14:00:16 -0800 (PST) Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org From: Lorenzo Bianconi Date: Mon, 28 Jan 2019 22:23:47 +0100 > Erspan protocol relies on output key to set session id header field. > However TUNNEL_KEY bit is cleared in order to not add key field to > the external GRE header and so the configured o_key is not reported > to userspace. > Fix the issue adding TUNNEL_KEY bit to the o_flags parameter dumping > device info Series applied, thanks!