Cover Letter Detail
Show a cover letter.
GET /api/covers/1168599/?format=api
{ "id": 1168599, "url": "http://patchwork.ozlabs.org/api/covers/1168599/?format=api", "web_url": "http://patchwork.ozlabs.org/project/netdev/cover/cover.1569491461.git.sd@queasysnail.net/", "project": { "id": 7, "url": "http://patchwork.ozlabs.org/api/projects/7/?format=api", "name": "Linux network development", "link_name": "netdev", "list_id": "netdev.vger.kernel.org", "list_email": "netdev@vger.kernel.org", "web_url": null, "scm_url": null, "webscm_url": null, "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<cover.1569491461.git.sd@queasysnail.net>", "list_archive_url": null, "date": "2019-09-27T14:58:55", "name": "[ipsec-next,v3,0/6] ipsec: add TCP encapsulation support (RFC 8229)", "submitter": { "id": 47767, "url": "http://patchwork.ozlabs.org/api/people/47767/?format=api", "name": "Sabrina Dubroca", "email": "sd@queasysnail.net" }, "mbox": "http://patchwork.ozlabs.org/project/netdev/cover/cover.1569491461.git.sd@queasysnail.net/mbox/", "series": [ { "id": 132948, "url": "http://patchwork.ozlabs.org/api/series/132948/?format=api", "web_url": "http://patchwork.ozlabs.org/project/netdev/list/?series=132948", "date": "2019-09-27T14:58:55", "name": "ipsec: add TCP encapsulation support (RFC 8229)", "version": 3, "mbox": "http://patchwork.ozlabs.org/series/132948/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/covers/1168599/comments/", "headers": { "Return-Path": "<netdev-owner@vger.kernel.org>", "X-Original-To": "patchwork-incoming-netdev@ozlabs.org", "Delivered-To": "patchwork-incoming-netdev@ozlabs.org", "Authentication-Results": [ "ozlabs.org;\n\tspf=none (mailfrom) smtp.mailfrom=vger.kernel.org\n\t(client-ip=209.132.180.67; helo=vger.kernel.org;\n\tenvelope-from=netdev-owner@vger.kernel.org;\n\treceiver=<UNKNOWN>)", "ozlabs.org; dmarc=none (p=none dis=none)\n\theader.from=queasysnail.net" ], "Received": [ "from vger.kernel.org (vger.kernel.org [209.132.180.67])\n\tby ozlabs.org (Postfix) with ESMTP id 46fw0V42yFz9sNf\n\tfor <patchwork-incoming-netdev@ozlabs.org>;\n\tSat, 28 Sep 2019 00:58:34 +1000 (AEST)", "(majordomo@vger.kernel.org) by vger.kernel.org via listexpand\n\tid S1727703AbfI0O6d (ORCPT\n\t<rfc822;patchwork-incoming-netdev@ozlabs.org>);\n\tFri, 27 Sep 2019 10:58:33 -0400", "from mx1.redhat.com ([209.132.183.28]:34038 \"EHLO mx1.redhat.com\"\n\trhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP\n\tid S1726843AbfI0O6c (ORCPT <rfc822;netdev@vger.kernel.org>);\n\tFri, 27 Sep 2019 10:58:32 -0400", "from smtp.corp.redhat.com\n\t(int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13])\n\t(using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))\n\t(No client certificate requested)\n\tby mx1.redhat.com (Postfix) with ESMTPS id 684513086E27;\n\tFri, 27 Sep 2019 14:58:32 +0000 (UTC)", "from hog.localdomain, (unknown [10.40.206.20])\n\tby smtp.corp.redhat.com (Postfix) with ESMTP id 0219A8DC00;\n\tFri, 27 Sep 2019 14:58:30 +0000 (UTC)" ], "From": "Sabrina Dubroca <sd@queasysnail.net>", "To": "netdev@vger.kernel.org", "Cc": "Herbert Xu <herbert@gondor.apana.org.au>,\n\tSteffen Klassert <steffen.klassert@secunet.com>,\n\tSabrina Dubroca <sd@queasysnail.net>", "Subject": "[PATCH ipsec-next v3 0/6] ipsec: add TCP encapsulation support (RFC\n\t8229)", "Date": "Fri, 27 Sep 2019 16:58:55 +0200", "Message-Id": "<cover.1569491461.git.sd@queasysnail.net>", "MIME-Version": "1.0", "Content-Transfer-Encoding": "8bit", "X-Scanned-By": "MIMEDefang 2.79 on 10.5.11.13", "X-Greylist": "Sender IP whitelisted, not delayed by milter-greylist-4.5.16\n\t(mx1.redhat.com [10.5.110.44]);\n\tFri, 27 Sep 2019 14:58:32 +0000 (UTC)", "Sender": "netdev-owner@vger.kernel.org", "Precedence": "bulk", "List-ID": "<netdev.vger.kernel.org>", "X-Mailing-List": "netdev@vger.kernel.org" }, "content": "This patchset introduces support for TCP encapsulation of IKE and ESP\nmessages, as defined by RFC 8229 [0]. It is an evolution of what\nHerbert Xu proposed in January 2018 [1] that addresses the main\ncriticism against it, by not interfering with the TCP implementation\nat all. The networking stack now has infrastructure for this: TCP ULPs\nand Stream Parsers.\n\nThe first patches are preparation and refactoring, and the final patch\nadds the feature.\n\nThe main omission in this submission is IPv6 support. ESP\nencapsulation over UDP with IPv6 is currently not supported in the\nkernel either, as UDP encapsulation is aimed at NAT traversal, and NAT\nis not frequently used with IPv6.\n\nSome of the code is taken directly, or slightly modified, from Herbert\nXu's original submission [1]. The ULP and strparser pieces are\nnew. This work was presented and discussed at the IPsec workshop and\nnetdev 0x13 conference [2] in Prague, last March.\n\n[0] https://tools.ietf.org/html/rfc8229\n[1] https://patchwork.ozlabs.org/patch/859107/\n[2] https://netdevconf.org/0x13/session.html?talk-ipsec-encap\n\nChanges since v2:\n - rename config option to INET_ESPINTCP and move it to\n net/ipv4/Kconfig (patch 6/6)\n\nChanges since v1:\n - drop patch 1, already present in the tree as commit bd95e678e0f6\n (\"bpf: sockmap, fix use after free from sleep in psock backlog\n workqueue\")\n - patch 1/6: fix doc error reported by kbuild test robot <lkp@intel.com>\n - patch 6/6, fix things reported by Steffen Klassert:\n - remove unneeded goto and improve error handling in\n esp_output_tcp_finish\n - clean up the ifdefs by providing dummy implementations of those\n functions\n - fix Kconfig select, missing NET_SOCK_MSG\n\nSabrina Dubroca (6):\n net: add queue argument to __skb_wait_for_more_packets and\n __skb_{,try_}recv_datagram\n xfrm: introduce xfrm_trans_queue_net\n xfrm: add route lookup to xfrm4_rcv_encap\n esp4: prepare esp_input_done2 for non-UDP encapsulation\n esp4: split esp_output_udp_encap and introduce esp_output_encap\n xfrm: add espintcp (RFC 8229)\n\n include/linux/skbuff.h | 11 +-\n include/net/espintcp.h | 38 +++\n include/net/xfrm.h | 4 +\n include/uapi/linux/udp.h | 1 +\n net/core/datagram.c | 27 +-\n net/ipv4/Kconfig | 11 +\n net/ipv4/esp4.c | 264 ++++++++++++++++++--\n net/ipv4/udp.c | 3 +-\n net/ipv4/xfrm4_protocol.c | 9 +\n net/unix/af_unix.c | 7 +-\n net/xfrm/Makefile | 1 +\n net/xfrm/espintcp.c | 505 ++++++++++++++++++++++++++++++++++++++\n net/xfrm/xfrm_input.c | 21 +-\n net/xfrm/xfrm_policy.c | 7 +\n net/xfrm/xfrm_state.c | 3 +\n 15 files changed, 866 insertions(+), 46 deletions(-)\n create mode 100644 include/net/espintcp.h\n create mode 100644 net/xfrm/espintcp.c" }