From: Steffen Klassert <steffen.klassert@secunet.com>
To: David Miller <davem@davemloft.net>, Jakub Kicinski <kuba@kernel.org>
Cc: Herbert Xu <herbert@gondor.apana.org.au>,
Steffen Klassert <steffen.klassert@secunet.com>,
<netdev@vger.kernel.org>
Subject: [PATCH 0/3] pull request (net): ipsec 2026-02-20
Date: Fri, 20 Feb 2026 10:41:14 +0100 [thread overview]
Message-ID: <20260220094133.14219-1-steffen.klassert@secunet.com> (raw)
1) Check the value of ipv6_dev_get_saddr() to fix an
uninitialized saddr in xfrm6_get_saddr().
From Jiayuan Chen.
2) Skip the templates check for packet offload in tunnel
mode. Is was already done by the hardware and causes
an unexpected XfrmInTmplMismatch increase.
From Leon Romanovsky.
3) Fix a unregister_netdevice stall due to not dropped
refcounts by always flushing xfrm state and policy
on a NETDEV_UNREGISTER event.
From Tetsuo Handa.
Please pull or let me know if there are problems.
Thanks!
The following changes since commit fdf3f6800be36377e045e2448087f12132b88d2f:
net: don't touch dev->stats in BPF redirect paths (2026-01-31 12:35:27 -0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec.git tags/ipsec-2026-02-20
for you to fetch changes up to 4efa91a28576054aae0e6dad9cba8fed8293aef8:
xfrm: always flush state and policy upon NETDEV_UNREGISTER event (2026-02-09 10:28:05 +0100)
----------------------------------------------------------------
ipsec-2026-02-20
----------------------------------------------------------------
Jiayuan Chen (1):
xfrm6: fix uninitialized saddr in xfrm6_get_saddr()
Leon Romanovsky (1):
xfrm: skip templates check for packet offload tunnel mode
Tetsuo Handa (1):
xfrm: always flush state and policy upon NETDEV_UNREGISTER event
net/ipv6/xfrm6_policy.c | 7 +++++--
net/xfrm/xfrm_device.c | 12 +++++++++++-
net/xfrm/xfrm_policy.c | 11 +++++++++--
3 files changed, 25 insertions(+), 5 deletions(-)
next reply other threads:[~2026-02-20 9:41 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-02-20 9:41 Steffen Klassert [this message]
2026-02-20 9:41 ` [PATCH 1/3] xfrm6: fix uninitialized saddr in xfrm6_get_saddr() Steffen Klassert
2026-02-21 0:10 ` patchwork-bot+netdevbpf
2026-02-20 9:41 ` [PATCH 2/3] xfrm: skip templates check for packet offload tunnel mode Steffen Klassert
2026-02-20 9:41 ` [PATCH 3/3] xfrm: always flush state and policy upon NETDEV_UNREGISTER event Steffen Klassert
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20260220094133.14219-1-steffen.klassert@secunet.com \
--to=steffen.klassert@secunet.com \
--cc=davem@davemloft.net \
--cc=herbert@gondor.apana.org.au \
--cc=kuba@kernel.org \
--cc=netdev@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox