<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src/sys/netipsec, branch main</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src/atom?h=main</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src/atom?h=main'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/'/>
<updated>2026-02-25T17:19:36Z</updated>
<entry>
<title>ipsec_offload: add comment stating why ipsec_accel_sa_newkey_cb() returns 0</title>
<updated>2026-02-25T17:19:36Z</updated>
<author>
<name>Konstantin Belousov</name>
<email>kib@FreeBSD.org</email>
</author>
<published>2026-02-04T02:34:59Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=0e5caac7d543687d540fa83a7125726c7c9e6e58'/>
<id>urn:sha1:0e5caac7d543687d540fa83a7125726c7c9e6e58</id>
<content type='text'>
Reviewed by:	slavash
Tested by:      Wafa Hamzah &lt;wafah@nvidia.com&gt;
Sponsored by:	NVidia networking
MFC after:	1 week
</content>
</entry>
<entry>
<title>netipsec/ipsec_offload.c: handle failures to install SA nicely</title>
<updated>2026-02-25T17:19:36Z</updated>
<author>
<name>Konstantin Belousov</name>
<email>kib@FreeBSD.org</email>
</author>
<published>2026-01-27T01:00:36Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=477f020c7b5453bcd3bff7f1491e9830027b271e'/>
<id>urn:sha1:477f020c7b5453bcd3bff7f1491e9830027b271e</id>
<content type='text'>
If driver refused to install SA, record rejected handle for SA on the
interface always, not only for EOPNOTSUPP case.  The
ipsec_accel_output() function did the right thing if there is no
rejection handle, but not having the handle allows further attempts to
install the SA on the interface.

If driver installed the SA, but ipsec_accel_handle_sav() returned error,
uninstall the SA from the interface.  Hardware must not be set up to
process packets for which kernel expects no processing is done.

In both cases, free the drv_spi if a handle was not installed.  But keep
drv_spi allocated if the deinstall returned an error from the driver.

Reviewed by:	slavash
Tested by:	Wafa Hamzah &lt;wafah@nvidia.com&gt;
Sponsored by:	NVidia networking
MFC after:	1 week
</content>
</entry>
<entry>
<title>net: Remove the IFF_RENAMING flag</title>
<updated>2026-02-10T13:45:06Z</updated>
<author>
<name>Mark Johnston</name>
<email>markj@FreeBSD.org</email>
</author>
<published>2026-02-09T23:24:02Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=93075bdb813a9956e66c711eda2c83fb596711fd'/>
<id>urn:sha1:93075bdb813a9956e66c711eda2c83fb596711fd</id>
<content type='text'>
This used to be needed when interface renames were broadcast using the
ifnet_departure_event eventhandler, but since commit 349fcf079ca3
("net: add ifnet_rename_event EVENTHANDLER(9) for interface renaming"),
it has no purpose.  Remove it.

Reviewed by:	pouria, zlei
Sponsored by:	Klara, Inc.
Differential Revision:	https://reviews.freebsd.org/D55171
</content>
</entry>
<entry>
<title>sys/netipsec: ensure sah stability during input callback processing</title>
<updated>2025-12-22T12:31:25Z</updated>
<author>
<name>Konstantin Belousov</name>
<email>kib@FreeBSD.org</email>
</author>
<published>2025-12-09T08:55:11Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=183513d15f2290a42b542753aaffe9de2152575b'/>
<id>urn:sha1:183513d15f2290a42b542753aaffe9de2152575b</id>
<content type='text'>
Citing ae: this fixes some rare panics, that are reported in
derived projects: `panic: esp_input_cb: Unexpected address family'.

Reported by:	ae
Tested by:	ae, Daniel Dubnikov &lt;ddaniel@nvidia.com&gt;
Reviewed by:	ae, Ariel Ehrenberg &lt;aehrenberg@nvidia.com&gt; (previous version)
Sponsored by:	NVidia networking
MFC after:	1 week
Differential revision:	https://reviews.freebsd.org/D54325
</content>
</entry>
<entry>
<title>ipsec: Fix typos in references to IPsec's ESP</title>
<updated>2025-12-04T15:17:12Z</updated>
<author>
<name>Mateusz Piotrowski</name>
<email>0mp@FreeBSD.org</email>
</author>
<published>2025-12-04T15:17:11Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=15afd75e67102f81c37adbf11966e48685bd7be7'/>
<id>urn:sha1:15afd75e67102f81c37adbf11966e48685bd7be7</id>
<content type='text'>
ESP is "Encapsulating Security Payload",
not "Encapsulated Security Payload".

This patch fixes all the place in the tree I could find
with `grep -i encapsulated security`.

MFC after:	3 days
Reviewed by:	ae
Differential Revision:	https://reviews.freebsd.org/D53769
</content>
</entry>
<entry>
<title>ipsec_offload: do not leak drv_spi unr</title>
<updated>2025-11-04T19:20:39Z</updated>
<author>
<name>Konstantin Belousov</name>
<email>kib@FreeBSD.org</email>
</author>
<published>2025-10-30T14:50:22Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=4accefc998e731581549163cf1a582948b2ad0de'/>
<id>urn:sha1:4accefc998e731581549163cf1a582948b2ad0de</id>
<content type='text'>
in the ipsec_accel_sa_newkey_cb() when the SA offload is only enabled
on a specific different interface, not the current one.

Also remove no longer relevant XXX comment.

Noted and reviewed by:	slavash
Sponsored by:	NVidia networking
MFC after:	1 week
</content>
</entry>
<entry>
<title>ipsec offload: never return error from the newkey/spdadd callbacks</title>
<updated>2025-10-30T14:54:36Z</updated>
<author>
<name>Konstantin Belousov</name>
<email>kib@FreeBSD.org</email>
</author>
<published>2025-10-29T16:37:17Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=8b2f4e6b3a478faaa4b0b23efc9c65f5db913df4'/>
<id>urn:sha1:8b2f4e6b3a478faaa4b0b23efc9c65f5db913df4</id>
<content type='text'>
Returning an error causes premature termination of if_foreach_sleep()
loop over the interfaces.  Whatever problem we have with the specific
interface trying to install an element, should not prevent an attempt to
install the same element into all other interfaces.

Noted by:	Ariel Ehrenberg
Sponsored by:	NVidia networking
MFC after:	1 week
</content>
</entry>
<entry>
<title>netipsec: Use proper prototype for SYSINIT functions</title>
<updated>2025-10-13T10:12:33Z</updated>
<author>
<name>Zhenlei Huang</name>
<email>zlei@FreeBSD.org</email>
</author>
<published>2025-10-13T10:12:33Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=360bb45690d918fac5bae78ab44f45d11327067a'/>
<id>urn:sha1:360bb45690d918fac5bae78ab44f45d11327067a</id>
<content type='text'>
MFC after:	1 week
</content>
</entry>
<entry>
<title>ipsec offload: ipsec_accel_fill_xh() should indirect through fn pointer</title>
<updated>2025-07-17T10:57:35Z</updated>
<author>
<name>Konstantin Belousov</name>
<email>kib@FreeBSD.org</email>
</author>
<published>2025-07-17T10:57:35Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=39598c2a9f5d074b1365e5ba97441fb5b4f8476b'/>
<id>urn:sha1:39598c2a9f5d074b1365e5ba97441fb5b4f8476b</id>
<content type='text'>
The config with IPSEC_SUPPORT + IPSEC_OFFLOAD is the valid one.

Fixes:	5be5a0bde5f990dbc680272eee74132bcde815f2
Sponsored by:	Nvidia networking
</content>
</entry>
<entry>
<title>ipsec offload: make hw-decrypted plain text packet like sw decrypted.</title>
<updated>2025-07-17T09:36:30Z</updated>
<author>
<name>Konstantin Belousov</name>
<email>kib@FreeBSD.org</email>
</author>
<published>2025-07-07T18:01:34Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=5be5a0bde5f990dbc680272eee74132bcde815f2'/>
<id>urn:sha1:5be5a0bde5f990dbc680272eee74132bcde815f2</id>
<content type='text'>
Mark hw-decrypted mbufs with M_DECRYPTED in the CHECK_POLICY() hook,
when the flag is owned by IPSEC.

Convert PACKET_TAG_IPSEC_ACCEL_IN to PACKET_TAG_IPSEC_IN_DONE to
provide the xform history for ipsec transform history check.

The hw-decrypted packets are then subject to exactly the same checks at
CHECK_POLICY() hooks as the sw-decrypted packet.  This includes the
policy checking, and updating the corresponding policy' lastused field,
needed for IKE daemons to track association lifetime.

Reviewed by:	Ariel Ehrenberg &lt;aehrenberg@nvidia.com&gt;, slavash
Sponsored by:	Nvidia networking
</content>
</entry>
</feed>
