Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

Merge branch 'master' of git://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec

Steffen Klassert says:

====================
pull request (net): ipsec 2016-12-01

1) Change the error value when someone tries to run 32bit
userspace on a 64bit host from -ENOTSUPP to the userspace
exported -EOPNOTSUPP. Fix from Yi Zhao.

2) On inbound, ESN sequence numbers are already in network
byte order. So don't try to convert it again, this fixes
integrity verification for ESN. Fixes from Tobias Brunner.

Please pull or let me know if there are problems.
====================

Signed-off-by: David S. Miller <davem@davemloft.net>

+3 -3
+1 -1
net/ipv4/esp4.c
··· 476 476 esph = (void *)skb_push(skb, 4); 477 477 *seqhi = esph->spi; 478 478 esph->spi = esph->seq_no; 479 - esph->seq_no = htonl(XFRM_SKB_CB(skb)->seq.input.hi); 479 + esph->seq_no = XFRM_SKB_CB(skb)->seq.input.hi; 480 480 aead_request_set_callback(req, 0, esp_input_done_esn, skb); 481 481 } 482 482
+1 -1
net/ipv6/esp6.c
··· 418 418 esph = (void *)skb_push(skb, 4); 419 419 *seqhi = esph->spi; 420 420 esph->spi = esph->seq_no; 421 - esph->seq_no = htonl(XFRM_SKB_CB(skb)->seq.input.hi); 421 + esph->seq_no = XFRM_SKB_CB(skb)->seq.input.hi; 422 422 aead_request_set_callback(req, 0, esp_input_done_esn, skb); 423 423 } 424 424
+1 -1
net/xfrm/xfrm_user.c
··· 2450 2450 2451 2451 #ifdef CONFIG_COMPAT 2452 2452 if (in_compat_syscall()) 2453 - return -ENOTSUPP; 2453 + return -EOPNOTSUPP; 2454 2454 #endif 2455 2455 2456 2456 type = nlh->nlmsg_type;