<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="/source/rss.xsl.xml"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
    <title>Changes in ipsec_vxlan.py</title>
    <description></description>
    <language>en</language>
    <copyright>Copyright 2015</copyright>
    <generator>Java</generator><item>
        <title>fcee7d82f27d6a8b1ddc5bbefda59b4e441e9bc0 - Merge tag &apos;net-7.1-rc3&apos; of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/drivers/net/hw/ipsec_vxlan.py#fcee7d82f27d6a8b1ddc5bbefda59b4e441e9bc0</link>
        <description>Merge tag &apos;net-7.1-rc3&apos; of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/netPull networking fixes from Jakub Kicinski: &quot;Including fixes from Netfilter, IPsec, Bluetooth and WiFi.  Current release - fix to a fix:   - ipmr: add __rcu to netns_ipv4.mrt, make sure we hold the RCU lock     in all relevant places  Current release - new code bugs:   - fixes for the recently added resizable hash tables   - ipv6: make sure we default IPv6 tunnel drivers to =m now that IPv6     itself is built in   - drv: octeontx2-af: fixes for parser/CAM fixes  Previous releases - regressions:   - phy: micrel: fix LAN8814 QSGMII soft reset   - wifi:       - cw1200: revert &quot;Fix locking in error paths&quot;       - ath12k: fix crash on WCN7850, due to adding the same queue         buffer to a list multiple times  Previous releases - always broken:   - number of info leak fixes   - ipv6: implement limits on extension header parsing   - wifi: number of fixes for missing bound checks in the drivers   - Bluetooth: fixes for races and locking issues   - af_unix:       - fix an issue between garbage collection and PEEK       - fix yet another issue with OOB data   - xfrm: esp: avoid in-place decrypt on shared skb frags   - netfilter: replace skb_try_make_writable() by skb_ensure_writable()   - openvswitch: vport: fix race between tunnel creation and linking     leading to invalid memory accesses (type confusion)   - drv: amd-xgbe: fix PTP addend overflow causing frozen clock  Misc:   - sched/isolation: make HK_TYPE_KTHREAD an alias of HK_TYPE_DOMAIN     (for relevant IPVS change)&quot;* tag &apos;net-7.1-rc3&apos; of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net: (190 commits)  net: sparx5: configure serdes for 1000BASE-X in sparx5_port_init()  net: sparx5: fix wrong chip ids for TSN SKUs  net: stmmac: dwmac-nuvoton: fix NULL pointer dereference in nvt_set_phy_intf_sel()  tcp: Fix dst leak in tcp_v6_connect().  ipmr: Call ipmr_fib_lookup() under RCU.  net: phy: broadcom: Save PHY counters during suspend  net/smc: fix missing sk_err when TCP handshake fails  af_unix: Reject SIOCATMARK on non-stream sockets  veth: fix OOB txq access in veth_poll() with asymmetric queue counts  eth: fbnic: fix double-free of PCS on phylink creation failure  net: ethernet: cortina: Drop half-assembled SKB  selftests: mptcp: pm: restrict &apos;unknown&apos; check to pm_nl_ctl  selftests: mptcp: check output: catch cmd errors  mptcp: pm: prio: skip closed subflows  mptcp: pm: ADD_ADDR rtx: return early if no retrans  mptcp: pm: ADD_ADDR rtx: skip inactive subflows  mptcp: pm: ADD_ADDR rtx: resched blocked ADD_ADDR quicker  mptcp: pm: ADD_ADDR rtx: free sk if last  mptcp: pm: ADD_ADDR rtx: always decrease sk refcount  mptcp: pm: ADD_ADDR rtx: fix potential data-race  ...

            List of files:
            /linux/tools/testing/selftests/drivers/net/hw/ipsec_vxlan.py</description>
        <pubDate>Thu, 07 May 2026 19:32:03 +0200</pubDate>
        <dc:creator>Linus Torvalds &lt;torvalds@linux-foundation.org&gt;</dc:creator>
    </item>
<item>
        <title>dc61989e37726e0ff3d669e6ad94e62b97149329 - Merge tag &apos;ipsec-2026-05-05&apos; of git://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/drivers/net/hw/ipsec_vxlan.py#dc61989e37726e0ff3d669e6ad94e62b97149329</link>
        <description>Merge tag &apos;ipsec-2026-05-05&apos; of git://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsecSteffen Klassert says:====================pull request (net): ipsec 2026-05-051. Fix an IPv6 encapsulation error path that leaked route references   when UDPv6 ESP decapsulation resolved to an error route.   From Yilin Zhu.2. Fix AH with ESN on async crypto paths by accounting for the extra   high-order sequence number when reconstructing the temporary   authentication layout in the completion callbacks.   From Michael Bomarito.3. Fix XFRM output so it does not overwrite already-correct inner header   pointers when a tunnel layer such as VXLAN has already saved them.   The fix comes with new selftests. From Cosmin Ratiu.4. Add the missing native payload size entry for XFRM_MSG_MAPPING in the   compat translation path. From Ruijie Li.5. Harden __xfrm_state_delete() against repeated or inconsistent unhashing   of state list nodes by keying the removal on actual list membership and   using delete-and-init helpers. From Michal Kosiorek.6. Prevent ESP from decrypting shared splice-backed skb fragments in place   by marking UDP splice frags as shared and forcing copy-on-write in ESP   input when needed. From Kuan-Ting Chen.* tag &apos;ipsec-2026-05-05&apos; of git://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec:  xfrm: esp: avoid in-place decrypt on shared skb frags  xfrm: defensively unhash xfrm_state lists in __xfrm_state_delete  xfrm: provide message size for XFRM_MSG_MAPPING  xfrm: Don&apos;t clobber inner headers when already set  tools/selftests: Add a VXLAN+IPsec traffic test  tools/selftests: Use a sensible timeout value for iperf3 client  xfrm: ah: account for ESN high bits in async callbacks  ipv6: xfrm6: release dst on error in xfrm6_rcv_encap()====================Link: https://patch.msgid.link/20260505132326.1362733-1-steffen.klassert@secunet.comSigned-off-by: Jakub Kicinski &lt;kuba@kernel.org&gt;

            List of files:
            /linux/tools/testing/selftests/drivers/net/hw/ipsec_vxlan.py</description>
        <pubDate>Thu, 07 May 2026 01:49:41 +0200</pubDate>
        <dc:creator>Jakub Kicinski &lt;kuba@kernel.org&gt;</dc:creator>
    </item>
<item>
        <title>e64e03b478e2da7093564819e903932fca2ddfa1 - tools/selftests: Add a VXLAN+IPsec traffic test</title>
        <link>http://kernelsources.org:8080/source/history/linux/tools/testing/selftests/drivers/net/hw/ipsec_vxlan.py#e64e03b478e2da7093564819e903932fca2ddfa1</link>
        <description>tools/selftests: Add a VXLAN+IPsec traffic testThere are VXLAN tests and IPsec tests, but there is no test thatcombines the two protocols and exercises the tunnel-over-ipsec codepaths. Fix that by adding a traffic test with VXLAN and IPsec usingcrypto offload. This is runnable on HW which supports ESP offload (so nonsim unfortunately).Traffic is done with iperf3 and the test validates that there are nopacket drops and iperf3 can get to at least 100 Mbps (a veryconservative value on today&apos;s crypto offload HW, as it can typicallyreach multi-Gbps rates).Ran right now, the test fails due to a recently exposed bug in xfrm,which will be fixed in the next patch: # ./tools/testing/selftests/drivers/net/hw/ipsec_vxlan.py TAP version 13 1..4 # Check| At ./tools/testing/selftests/drivers/net/hw/ipsec_vxlan.py, # line 161, in test_vxlan_ipsec_crypto_offload: # Check|     ksft_eq(drops_after - drops_before, 0, # Check failed 189 != 0 TX drops during VXLAN+IPsec # Check| At ./tools/testing/selftests/drivers/net/hw/ipsec_vxlan.py, # line 163, in test_vxlan_ipsec_crypto_offload: # Check|     ksft_ge(bw_gbps, 0.1, # Check failed 0.0015058278404812596 &lt; 0.1 Minimum 100Mbps over # VXLAN+IPsec not ok 1 ipsec_vxlan.test_vxlan_ipsec_crypto_offload.outer_v4_inner_v4 ...Signed-off-by: Cosmin Ratiu &lt;cratiu@nvidia.com&gt;Signed-off-by: Steffen Klassert &lt;steffen.klassert@secunet.com&gt;

            List of files:
            /linux/tools/testing/selftests/drivers/net/hw/ipsec_vxlan.py</description>
        <pubDate>Wed, 22 Apr 2026 16:06:47 +0200</pubDate>
        <dc:creator>Cosmin Ratiu &lt;cratiu@nvidia.com&gt;</dc:creator>
    </item>
</channel>
</rss>
