From nobody Mon Feb 9 14:31:38 2026 Received: from mail-pf1-f182.google.com (mail-pf1-f182.google.com [209.85.210.182]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 8C2EC25A2AE for ; Sat, 1 Nov 2025 09:48:01 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.210.182 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1761990483; cv=none; b=VNW4P4T9Lfy9Zw33qGR/OhzhiJLeYCUn0zNFnH8j04H9U45l5lgsxLqS2Hd5bBoLidc9l5flTNaPMOl7lBW6Ei2oa7OHeSbg/lpbtuNOmTk0vkeKEib6dKNwQldCkn22LULO+Xo99p1MiP1xAK6P+KbQl5pg5qVTfvnbn3iidXs= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1761990483; c=relaxed/simple; bh=jBrlYcqe70CRFPI8eWpEHN0i3WJ0kusKzZ2MB0TsxBA=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=pqdJ+P5jx8tJ/fiEn6y1df8dS8Q1LLCCEUXIg132Nxzmv3lHz7UcXRwAjFt2ZIm5rZSYGErln8N6AhCelRXyedNBp8DiLR6LvCsJp1zbCsRfv5N7P7IVCnkl6T3+nFl2KSjEjfe9eaCiFIGBfLEnO74NDXSPmLPDuSfUKjfT4Kg= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=iWI0kLND; arc=none smtp.client-ip=209.85.210.182 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="iWI0kLND" Received: by mail-pf1-f182.google.com with SMTP id d2e1a72fcca58-7a27053843bso4433685b3a.1 for ; Sat, 01 Nov 2025 02:48:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1761990481; x=1762595281; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=Lh5XxpkroE5dbbQU8eQ46vBGwFwM21sJCPsPPmpqn7w=; b=iWI0kLNDq0YVYUEvGD4n/ernbNX8wov24hfn67Ze73ActdyyW5tCL2kuidCd311M+v pJbDsUxjSBOTtnjF2g608v5CSqTh2Ce9J58jzkgQIgJKgeV0/P7s4ZYXnnqMJLAK7IJ9 YohKRbGe/Cyoe7B+h2ZgZtgCEcmarpv3rjE81wceIFVTFxB2WqpXzvwumAK/l2qht3xS Fwlo+qOy5PREHWLXXK50+Fui6kOzMEIAS1Bm4mDw3KyOxHT2u+TL+QU0E2vEEcJaTdtz QEyXPSbmw5kf0FSZQ4yI/0vTz9maHolKlmCyTO0C2IVx/ugemoW2gvceiNP8mdYl91sy oDmQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1761990481; x=1762595281; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=Lh5XxpkroE5dbbQU8eQ46vBGwFwM21sJCPsPPmpqn7w=; b=qjRpvPCRlK3LIFFyGjykYfBme+kABIDnttEnU++9jMcweeOeBqCpdvQ6Qv6PBj5a10 aBT0R+FOXyUODQ6AdBKKnHpH6kbuSmaAPyw7CgbYED799EKHPtyQ3JnA2He7D44EAifp i3PiYvOECSdQ+0EeFCADZq1QTfn1krnVFcXFleP+2XU8Xs7b4R+lTTmA48fDzk8znVtF 7YBnCTlBSktcekbMeB6eqLBqyLL+qfinDqCapW5Ew+2MVF6/gdX4JaFR5eKqNxMVgBDV 3AlYWJQeRJw4DpHVXqe0NDKufp4+IVfZ4KewywmcuILtheJQc+IvUewQzrTGQjPaqqtm fXjA== X-Gm-Message-State: AOJu0YwQ0dt8MpFD1w8Bf9WcLjNi5G70E0EkQXYv4lNSzN0fTPVnsxMB vdVfi6mzTFn37JA0eY4QolHEB2wILi8HpWM5AXD4PjdfMCyq2DAhNvQt X-Gm-Gg: ASbGnctvS8EjCovbM8TFJ6zJWQEhc+emKiLO9cwFFKm8fs9V42RfbKBTg/CwRZd5AOp U0mEGCsYY1BuoltD857HjOhtOHOXpf1tUlz0JXIUk6YwtIA/2AtjfAjIPvvdSTmLjFHToVja1yV PXBMnW9JiOQBNyDSsyt4GboYxxThMPxrh3GdGH/tm1JkRAia9zd0izsDrurXGWOhEU/QVOR30V+ zPTU2uv5yDjKFsUb0XhbfqkjVfNYAVRK7OAsXg5Kcg904yKAhXWbzHadGnlTuXhHBh6y1lacPyQ cci028sqSjaY0uxZgP00aTOD7nnCkh6EfklfmsZzSAHCBvSZQypv4cGp2flLR7y7nR3iS55BZ6v uHy4iID5SO+f20J08n3jtOp/XMluItybvQgdfWRC5FGl8XuCQ+t7DF/NgdCSB/1vL6FhE48BLmN aH X-Google-Smtp-Source: AGHT+IGpZ8T1BxXQj+tbJHhY/gv3ZX3xWUHXlnenPWSDSg5J509xuNLz5YpbVfswDuRWy+McMfmuBg== X-Received: by 2002:a05:6a20:4308:b0:340:fbd5:15ae with SMTP id adf61e73a8af0-348cca03eb6mr8335718637.47.1761990480655; Sat, 01 Nov 2025 02:48:00 -0700 (PDT) Received: from archie.me ([210.87.74.117]) by smtp.gmail.com with ESMTPSA id d2e1a72fcca58-7a7db67cbdfsm4802995b3a.49.2025.11.01.02.47.58 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 01 Nov 2025 02:47:59 -0700 (PDT) Received: by archie.me (Postfix, from userid 1000) id 7E23C4201B81; Sat, 01 Nov 2025 16:47:56 +0700 (WIB) From: Bagas Sanjaya To: Linux Kernel Mailing List , Linux Documentation , Linux Networking Cc: "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Simon Horman , Jonathan Corbet , Steffen Klassert , Herbert Xu , Bagas Sanjaya , Randy Dunlap Subject: [PATCH net-next v2 2/8] Documentation: xfrm_device: Use numbered list for offloading steps Date: Sat, 1 Nov 2025 16:47:38 +0700 Message-ID: <20251101094744.46932-3-bagasdotme@gmail.com> X-Mailer: git-send-email 2.51.1 In-Reply-To: <20251101094744.46932-1-bagasdotme@gmail.com> References: <20251101094744.46932-1-bagasdotme@gmail.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Developer-Signature: v=1; a=openpgp-sha256; l=1791; i=bagasdotme@gmail.com; h=from:subject; bh=jBrlYcqe70CRFPI8eWpEHN0i3WJ0kusKzZ2MB0TsxBA=; b=owGbwMvMwCX2bWenZ2ig32LG02pJDJms13J35gp+ZJa+2bAoSvDmR+96dvEwhfae2W3d39dl1 ukkzdzbUcrCIMbFICumyDIpka/p9C4jkQvtax1h5rAygQxh4OIUgIloeTH8Myn1yi+4rL9gmeQe 2WtnAuqnr5HkjrzZ1P1ZyPy4TM0sE0aGF7tjvMTqzaYFzHguxN/9N/N0SfwippfKF3kjv/QuWmX MDQA= X-Developer-Key: i=bagasdotme@gmail.com; a=openpgp; fpr=701B806FDCA5D3A58FFB8F7D7C276C64A5E44A1D Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Format xfrm offloading steps as numbered list. Reviewed-by: Randy Dunlap Tested-by: Randy Dunlap Signed-off-by: Bagas Sanjaya --- Documentation/networking/xfrm_device.rst | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/Documentation/networking/xfrm_device.rst b/Documentation/netwo= rking/xfrm_device.rst index 7a13075b5bf06a..86db3f42552dd0 100644 --- a/Documentation/networking/xfrm_device.rst +++ b/Documentation/networking/xfrm_device.rst @@ -153,26 +153,26 @@ the packet's skb. At this point the data should be d= ecrypted but the IPsec headers are still in the packet data; they are removed later up the stack in xfrm_input(). =20 - find and hold the SA that was used to the Rx skb:: +1. Find and hold the SA that was used to the Rx skb:: =20 - get spi, protocol, and destination IP from packet headers + /* get spi, protocol, and destination IP from packet headers */ xs =3D find xs from (spi, protocol, dest_IP) xfrm_state_hold(xs); =20 - store the state information into the skb:: +2. Store the state information into the skb:: =20 sp =3D secpath_set(skb); if (!sp) return; sp->xvec[sp->len++] =3D xs; sp->olen++; =20 - indicate the success and/or error status of the offload:: +3. Indicate the success and/or error status of the offload:: =20 xo =3D xfrm_offload(skb); xo->flags =3D CRYPTO_DONE; xo->status =3D crypto_status; =20 - hand the packet to napi_gro_receive() as usual +4. Hand the packet to napi_gro_receive() as usual. =20 In ESN mode, xdo_dev_state_advance_esn() is called from xfrm_replay_advance_esn() for RX, and xfrm_replay_overflow_offload_esn for= TX. --=20 An old man doll... just what I always wanted! - Clara