From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mx1.secunet.com (mx1.secunet.com [62.96.220.36]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 291009443; Thu, 30 Apr 2026 07:58:02 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=62.96.220.36 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1777535885; cv=none; b=P6WekeArd6Xda9zij3N+Db/OraYCI9MBBk2pReF9ckvnANz8TMgKd/tWAaepJ4d3r2C4vAQAa+wZyiGlNDQHMr6IKL9bxeOpDestxciSP80HaoU20Zdsvzu6qcmOWLV9TTTPU6RwzJr36CfmCggFYPHR/TjBb+FcDZ/hhTnp6Ig= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1777535885; c=relaxed/simple; bh=r5C8Cg1mYU9s9UUlveXWoyy7PAxw7sktLyLjMTpD2zg=; h=Date:From:To:CC:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=nw5Cnlwq4oXbunOKWOCL/5fiS65+GgPuncw15Pflss3vZkddyHei/sVuKb6A2xH3wrSQ12iF4X6UooiAhHgOFZL00laPE6giI4iP0Gf0AGcDyrUlVEcR8Lyq2CAIVEC8341sqgjSk6Zilf4XYofDaasuDTpIae8HYjz8JTiJGU0= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=secunet.com; spf=pass smtp.mailfrom=secunet.com; dkim=pass (2048-bit key) header.d=secunet.com header.i=@secunet.com header.b=sfeCanKi; arc=none smtp.client-ip=62.96.220.36 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=secunet.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=secunet.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=secunet.com header.i=@secunet.com header.b="sfeCanKi" Received: from localhost (localhost [127.0.0.1]) by mx1.secunet.com (Postfix) with ESMTP id 39EC220892; Thu, 30 Apr 2026 09:58:01 +0200 (CEST) X-Virus-Scanned: by secunet Received: from mx1.secunet.com ([127.0.0.1]) by localhost (mx1.secunet.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vMTW1Sh5fsaM; Thu, 30 Apr 2026 09:58:00 +0200 (CEST) Received: from EXCH-01.secunet.de (rl1.secunet.de [10.32.0.231]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.secunet.com (Postfix) with ESMTPS id B2A2D207D1; Thu, 30 Apr 2026 09:58:00 +0200 (CEST) DKIM-Filter: OpenDKIM Filter v2.11.0 mx1.secunet.com B2A2D207D1 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=secunet.com; s=202301; t=1777535880; bh=tsqKCY7Dtt+su3qgJymaCiSR+uTrjT1EvUwHf1dIJps=; h=Date:From:To:CC:Subject:References:In-Reply-To:From; b=sfeCanKiVT5KuEZpijgsGqv008TFZ/1aLIcey5zXKIPKMxpdrRpGeu6WgMboov98g FEcQjWrj+aYeaFeHXyDfe41AsWcDYZxci7bTBSDeH4YbuQ4j8arppkqH0b6MwuYwNy QYrqM8bHC3pWfB7EMFbAQ2xr3iW8IkoaYVU1ECpfedgEhujdx71HHKSllwpW8iXTDx o5kwTZs7bZDlctFxFigXPQOdWCZPd+Y9UHchY08KO/DwwuWtV74eVzhGf3qx79LmvV uQwAewT0KLsPWCoIxWnxtTfSpJiCdChbZxa4EYH6MqcZtKBt3xkcNp+N0xSdE3VQLy UqaHh2RaItK5w== Received: from secunet.com (10.182.7.193) by EXCH-01.secunet.de (10.32.0.171) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Thu, 30 Apr 2026 09:57:59 +0200 Received: (nullmailer pid 2406770 invoked by uid 1000); Thu, 30 Apr 2026 07:57:58 -0000 Date: Thu, 30 Apr 2026 09:57:58 +0200 From: Steffen Klassert To: Michal Kosiorek CC: Herbert Xu , "David S . Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Simon Horman , Greg Kroah-Hartman , Sabrina Dubroca , , , Subject: Re: [PATCH ipsec v2] xfrm: defensively unhash xfrm_state lists in __xfrm_state_delete Message-ID: References: <20260429085451.93944-1-mkosiorek121@gmail.com> Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Disposition: inline In-Reply-To: <20260429085451.93944-1-mkosiorek121@gmail.com> X-ClientProxiedBy: EXCH-03.secunet.de (10.32.0.183) To EXCH-01.secunet.de (10.32.0.171) On Wed, Apr 29, 2026 at 10:54:51AM +0200, Michal Kosiorek wrote: ... > > Fixes: fe9f1d8779cb ("xfrm: add state hashtable keyed by seq") > Fixes: 7b4dc3600e48 ("[XFRM]: Do not add a state whose SPI is zero to the SPI hash.") > Reported-by: Michal Kosiorek > Tested-by: Michal Kosiorek > Cc: stable@vger.kernel.org > Signed-off-by: Michal Kosiorek Applied, thanks Michal!