search for: xfrm_state

Displaying 15 results from an estimated 15 matches for "xfrm_state".

2014 Sep 05
2
[PATCH 1/3] virtio_net: pass well-formed sgs to virtqueue_add_*()
...oad1) - * 3. skb_to_sgvec_nomark(payload2) + * 3. skb_to_sgvec(payload2) * * This is equivalent to: * 1. sg_init_table diff --git a/net/ipv4/ah4.c b/net/ipv4/ah4.c index a2afa89513a0..9ae5756d9e5f 100644 --- a/net/ipv4/ah4.c +++ b/net/ipv4/ah4.c @@ -227,6 +227,7 @@ static int ah_output(struct xfrm_state *x, struct sk_buff *skb) *seqhi = htonl(XFRM_SKB_CB(skb)->seq.output.hi); sg_set_buf(seqhisg, seqhi, seqhi_len); } + sg_mark_end(&sg[nfrags + sglists]); ahash_request_set_crypt(req, sg, icv, skb->len + seqhi_len); ahash_request_set_callback(req, 0, ah_output_done, skb); @@ -...
2014 Sep 05
2
[PATCH 1/3] virtio_net: pass well-formed sgs to virtqueue_add_*()
...oad1) - * 3. skb_to_sgvec_nomark(payload2) + * 3. skb_to_sgvec(payload2) * * This is equivalent to: * 1. sg_init_table diff --git a/net/ipv4/ah4.c b/net/ipv4/ah4.c index a2afa89513a0..9ae5756d9e5f 100644 --- a/net/ipv4/ah4.c +++ b/net/ipv4/ah4.c @@ -227,6 +227,7 @@ static int ah_output(struct xfrm_state *x, struct sk_buff *skb) *seqhi = htonl(XFRM_SKB_CB(skb)->seq.output.hi); sg_set_buf(seqhisg, seqhi, seqhi_len); } + sg_mark_end(&sg[nfrags + sglists]); ahash_request_set_crypt(req, sg, icv, skb->len + seqhi_len); ahash_request_set_callback(req, 0, ah_output_done, skb); @@ -...
2014 Sep 07
0
[PATCH 1/3] virtio_net: pass well-formed sgs to virtqueue_add_*()
...t; + * 3. skb_to_sgvec(payload2) > * > * This is equivalent to: > * 1. sg_init_table > diff --git a/net/ipv4/ah4.c b/net/ipv4/ah4.c > index a2afa89513a0..9ae5756d9e5f 100644 > --- a/net/ipv4/ah4.c > +++ b/net/ipv4/ah4.c > @@ -227,6 +227,7 @@ static int ah_output(struct xfrm_state *x, struct sk_buff *skb) > *seqhi = htonl(XFRM_SKB_CB(skb)->seq.output.hi); > sg_set_buf(seqhisg, seqhi, seqhi_len); > } > + sg_mark_end(&sg[nfrags + sglists]); > ahash_request_set_crypt(req, sg, icv, skb->len + seqhi_len); > ahash_request_set_callback(req, 0...
2008 Sep 12
4
Custom build kernel patch fails big time.
...s to file net/ipv6/udp.c.rej 1 out of 1 hunk FAILED -- saving rejects to file net/ipv6/tcp_ipv6.c.rej 1 out of 1 hunk FAILED -- saving rejects to file net/ipv6/esp6.c.rej 2 out of 2 hunks FAILED -- saving rejects to file net/ipv6/icmp.c.rej 2 out of 2 hunks FAILED -- saving rejects to file net/xfrm/xfrm_state.c.rej 1 out of 2 hunks FAILED -- saving rejects to file include/net/xfrm.h.rej Reversed (or previously applied) patch detected! Assume -R? [n] Apply anyway? [n] 1 out of 1 hunk ignored -- saving rejects to file include/linux/net.h.rej I've asked for help on the hipl list, but there is no real...
2005 Oct 04
4
iproute2-050929 ERORR compiling
...GNU_SOURCE -O2 -Wstrict-prototypes -Wall -I../include -DRESOLVE_HOSTNAMES -c -o ipprefix.o ipprefix.c gcc -D_GNU_SOURCE -O2 -Wstrict-prototypes -Wall -I../include -DRESOLVE_HOSTNAMES -c -o ipxfrm.o ipxfrm.c gcc -D_GNU_SOURCE -O2 -Wstrict-prototypes -Wall -I../include -DRESOLVE_HOSTNAMES -c -o xfrm_state.o xfrm_state.c gcc -D_GNU_SOURCE -O2 -Wstrict-prototypes -Wall -I../include -DRESOLVE_HOSTNAMES -c -o xfrm_policy.o xfrm_policy.c gcc -D_GNU_SOURCE -O2 -Wstrict-prototypes -Wall -I../include -DRESOLVE_HOSTNAMES -c -o xfrm_monitor.o xfrm_monitor.c gcc ip.o ipaddress.o iproute.o iprule.o rtm_ma...
2007 Mar 21
7
how can i compile tc
Hi, i''m just new here, i''m searching for how to compile tc (if i''ve understood correctly, i must compile the whole iproute2 thing). So i did like the read me file said: ------ 1. Look at start of Makefile and set correct values for: KERNEL_INCLUDE ----- i did that, and then i doesn''t understand a damn thing about the reste of the the 1st step about ADDLIB
2006 May 09
4
[PATCH] Fix checksum errors when firewalling in domU
...#include <net/icmp.h> @@ -51,7 +51,7 @@ /* Add encapsulation header. * * In transport mode, the IP header will be moved forward to make space -@@ -103,6 +105,10 @@ static int xfrm4_output_one(struct sk_bu +@@ -103,10 +105,15 @@ static int xfrm4_output_one(struct sk_bu struct xfrm_state *x = dst->xfrm; int err; @@ -62,3 +62,8 @@ if (skb->ip_summed == CHECKSUM_HW) { err = skb_checksum_help(skb, 0); if (err) + goto error_nolock; ++ reset_proto_csum_blank(skb); + } + + if (x->prop...
2008 Sep 16
2
Kernel source - linux -2.6.18 i386 or i686
As I plow through the Kernel source to figure out why the BEET patch is not working, I notice that there are two similar directories under ~/rpmbuild/BUILD/kernel-2.6.18: linux-2.16.18.i386 and linux-2.16.18.i686 So which one am I suppose to be patching? Currently, the patch starts out with: diff -urN a/net/ipv4/xfrm4_input.c b/net/ipv4/xfrm4_input.c I followed the kernel source setup
2023 Jan 29
3
[Bridge] [PATCH net-next v2] netlink: provide an ability to set default extack message
...upported"); err = 0; } err = notifier_from_errno(err); diff --git a/net/xfrm/xfrm_device.c b/net/xfrm/xfrm_device.c index 562b9d951598..95f1436bf6a2 100644 --- a/net/xfrm/xfrm_device.c +++ b/net/xfrm/xfrm_device.c @@ -325,8 +325,10 @@ int xfrm_dev_state_add(struct net *net, struct xfrm_state *x, * authors to do not return -EOPNOTSUPP in packet offload mode. */ WARN_ON(err == -EOPNOTSUPP && is_packet_offload); - if (err != -EOPNOTSUPP || is_packet_offload) + if (err != -EOPNOTSUPP || is_packet_offload) { + NL_SET_ERR_MSG_WEAK(extack, "Device failed to offload...
2006 Feb 22
0
Re: [PATCH] Fix IPSec for Xen checksum offload packets (Jon Mason)
...int xen_checksum_setup(struct sk_buff *skb); >++ >+ /* Add encapsulation header. >+ * >+ * In transport mode, the IP header will be moved forward to make space >+@@ -102,7 +104,11 @@ static int xfrm4_output_one(struct sk_bu >+ struct dst_entry *dst = skb->dst; >+ struct xfrm_state *x = dst->xfrm; >+ int err; >+- >++ >++ err = xen_checksum_setup(skb); >++ if (err) >++ goto error_nolock; >++ >+ if (skb->ip_summed == CHECKSUM_HW) { >+ err = skb_checksum_help(skb, 0); >+ if (err) > > > > > > > ________________...
2009 Nov 17
11
[Bridge] [PATCH 0/3] macvlan: add vepa and bridge mode
This is based on an earlier patch from Eric Biederman adding forwarding between macvlans. I extended his approach to allow the administrator to choose the mode for each macvlan, and to implement a functional VEPA between macvlan. Still missing from this is support for communication between the lower device that the macvlans are based on. This would be extremely useful but as others have found out
2009 Nov 17
11
[Bridge] [PATCH 0/3] macvlan: add vepa and bridge mode
This is based on an earlier patch from Eric Biederman adding forwarding between macvlans. I extended his approach to allow the administrator to choose the mode for each macvlan, and to implement a functional VEPA between macvlan. Still missing from this is support for communication between the lower device that the macvlans are based on. This would be extremely useful but as others have found out
2009 Nov 17
11
[Bridge] [PATCH 0/3] macvlan: add vepa and bridge mode
This is based on an earlier patch from Eric Biederman adding forwarding between macvlans. I extended his approach to allow the administrator to choose the mode for each macvlan, and to implement a functional VEPA between macvlan. Still missing from this is support for communication between the lower device that the macvlans are based on. This would be extremely useful but as others have found out
2018 Jun 07
0
[PATCH v2 1/2] compiler-gcc.h: add gnu_inline to all inline declarations
...ne @@ -1327 +1327 @@ xfrm_address_t *xfrm_flowi_saddr(const struct flowi *fl, unsigned short family) -static __inline__ +static inline @@ -1344 +1344 @@ void xfrm_flowi_addr_get(const struct flowi *fl, -static __inline__ int +static inline int @@ -1354 +1354 @@ __xfrm4_state_addr_check(const struct xfrm_state *x, -static __inline__ int +static inline int @@ -1366 +1366 @@ __xfrm6_state_addr_check(const struct xfrm_state *x, -static __inline__ int +static inline int @@ -1380 +1380 @@ xfrm_state_addr_check(const struct xfrm_state *x, -static __inline__ int +static inline int diff --git a/include/video/new...
2009 Jul 22
109
Unable to Configure Xen Dom 0 in Jeremy''s PVOPS Kernel
Hi All, I followed the instructions here at http://bderzhavets.wordpress.com/2009/06/10/setup-fedora-11-pv-domu-at-xen-3-4-1-dom0-kernel-2-6-30-rc6-tip-on-top-of-fedora-11/ However, when I do a "make menuconfig", I cannot see any XEN related configuration options. What am I missing? Thank you. Mr. Teo En Ming Dip(Mechatronics Engineering) BEng(Hons)(Mechanical Engineering)