[FEATURE] Hirsute: support TLS device offload for Bond
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Ubuntu) |
Fix Released
|
Undecided
|
Jeff Lane | ||
Hirsute |
Fix Released
|
Undecided
|
Jeff Lane |
Bug Description
The request here is to pull needed patches to support tls rx/tx offload for bond interfaces.
patch set:
4e5a73329051 net/tls: Except bond interface from some TLS checks
153cbd137f0a net/tls: Device offload to use lowest netdevice in chain
dc5809f9e2b6 net/bonding: Declare TLS RX device offload support
89df6a810470 net/bonding: Implement TLS TX device offload
f45583de361d net/bonding: Take update_features call out of XFRM funciton
007feb87fb15 net/bonding: Implement ndo_sk_
5b99854540e3 net/bonding: Take IP hash logic into a helper
719a402cf603 net: netdevice: Add operation ndo_sk_
https:/
https:/
*
the set was originally applied to net/net-next
(hashes above are from net-next tree cloned from git://git.
*
The set is cleanly applied on ubuntu-unstable branch
(cloned from git://git.
*
the set is accepted to upstream v5.12 and thus not natively in 21.04
UPDATE
Pathches identified upstream in mainline at 5.12-rc1
All patches pick cleanly from mainline into our 5.11 Hirsute tree
CVE References
tags: | added: hwcert-server |
description: | updated |
description: | updated |
description: | updated |
Changed in linux (Ubuntu Hirsute): | |
status: | In Progress → Fix Committed |
This bug is missing log files that will aid in diagnosing the problem. While running an Ubuntu kernel (not a mainline or third-party kernel) please enter the following command in a terminal window:
apport-collect 1915717
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'.
This change has been made by an automated script, maintained by the Ubuntu Kernel Team.