From: David S. Miller Date: Mon, 3 Oct 2022 06:46:08 +0000 (+0100) Subject: Merge branch 'master' of git://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec... X-Git-Tag: v6.1-rc5~319^2~20 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=42e8e6d906dabb58a0e0ea53443b0e0a0821f1d5;p=platform%2Fkernel%2Flinux-starfive.git Merge branch 'master' of git://git./linux/kernel/git/klassert/ipsec-next Steffen Klassert says: ==================== 1) Refactor selftests to use an array of structs in xfrm_fill_key(). From Gautam Menghani. 2) Drop an unused argument from xfrm_policy_match. From Hongbin Wang. 3) Support collect metadata mode for xfrm interfaces. From Eyal Birger. 4) Add netlink extack support to xfrm. From Sabrina Dubroca. Please note, there is a merge conflict in: include/net/dst_metadata.h between commit: 0a28bfd4971f ("net/macsec: Add MACsec skb_metadata_dst Tx Data path support") from the net-next tree and commit: 5182a5d48c3d ("net: allow storing xfrm interface metadata in metadata_dst") from the ipsec-next tree. Can be solved as done in linux-next. Please pull or let me know if there are problems. ==================== Signed-off-by: David S. Miller --- 42e8e6d906dabb58a0e0ea53443b0e0a0821f1d5 diff --cc include/net/dst_metadata.h index 22a6924,57f7596..a454cf4 --- a/include/net/dst_metadata.h +++ b/include/net/dst_metadata.h @@@ -10,7 -9,7 +10,8 @@@ enum metadata_type { METADATA_IP_TUNNEL, METADATA_HW_PORT_MUX, + METADATA_MACSEC, + METADATA_XFRM, }; struct hw_port_info { @@@ -18,17 -17,18 +19,23 @@@ u32 port_id; }; +struct macsec_info { + sci_t sci; +}; + + struct xfrm_md_info { + u32 if_id; + int link; + }; + struct metadata_dst { struct dst_entry dst; enum metadata_type type; union { struct ip_tunnel_info tun_info; struct hw_port_info port_info; + struct macsec_info macsec_info; + struct xfrm_md_info xfrm_info; } u; }; @@@ -89,9 -110,9 +117,12 @@@ static inline int skb_metadata_dst_cmp( return memcmp(&a->u.tun_info, &b->u.tun_info, sizeof(a->u.tun_info) + a->u.tun_info.options_len); + case METADATA_MACSEC: + return memcmp(&a->u.macsec_info, &b->u.macsec_info, + sizeof(a->u.macsec_info)); + case METADATA_XFRM: + return memcmp(&a->u.xfrm_info, &b->u.xfrm_info, + sizeof(a->u.xfrm_info)); default: return 1; }