lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:   Thu, 18 Aug 2022 05:00:17 +0000
From:   patchwork-bot+netdevbpf@...nel.org
To:     Florian Westphal <fw@...len.de>
Cc:     netdev@...r.kernel.org, netfilter-devel@...r.kernel.org,
        pablo@...filter.org, pabeni@...hat.com, davem@...emloft.net,
        edumazet@...gle.com, kuba@...nel.org
Subject: Re: [PATCH net 01/17] netfilter: nf_tables: use READ_ONCE and WRITE_ONCE
 for shared generation id access

Hello:

This series was applied to netdev/net.git (master)
by Florian Westphal <fw@...len.de>:

On Wed, 17 Aug 2022 15:59:59 +0200 you wrote:
> From: Pablo Neira Ayuso <pablo@...filter.org>
> 
> The generation ID is bumped from the commit path while holding the
> mutex, however, netlink dump operations rely on RCU.
> 
> This patch also adds missing cb->base_eq initialization in
> nf_tables_dump_set().
> 
> [...]

Here is the summary with links:
  - [net,01/17] netfilter: nf_tables: use READ_ONCE and WRITE_ONCE for shared generation id access
    https://git.kernel.org/netdev/net/c/340027832828
  - [net,02/17] netfilter: nf_tables: disallow NFTA_SET_ELEM_KEY_END with NFT_SET_ELEM_INTERVAL_END flag
    https://git.kernel.org/netdev/net/c/4963674c2e71
  - [net,03/17] netfilter: nf_tables: possible module reference underflow in error path
    https://git.kernel.org/netdev/net/c/c485c35ff678
  - [net,04/17] netfilter: nf_ct_sane: remove pseudo skb linearization
    https://git.kernel.org/netdev/net/c/a664375da76c
  - [net,05/17] netfilter: nf_ct_h323: cap packet size at 64k
    https://git.kernel.org/netdev/net/c/f3e124c36f70
  - [net,06/17] netfilter: nf_ct_ftp: prefer skb_linearize
    https://git.kernel.org/netdev/net/c/c783a29c7e59
  - [net,07/17] netfilter: nf_ct_irc: cap packet search space to 4k
    https://git.kernel.org/netdev/net/c/976bf59c69cd
  - [net,08/17] netfilter: nf_tables: fix scheduling-while-atomic splat
    https://git.kernel.org/netdev/net/c/2024439bd5ce
  - [net,09/17] netfilter: nfnetlink: re-enable conntrack expectation events
    https://git.kernel.org/netdev/net/c/0b2f3212b551
  - [net,10/17] netfilter: nf_tables: really skip inactive sets when allocating name
    https://git.kernel.org/netdev/net/c/271c5ca826e0
  - [net,11/17] netfilter: nf_tables: validate NFTA_SET_ELEM_OBJREF based on NFT_SET_OBJECT flag
    https://git.kernel.org/netdev/net/c/5a2f3dc31811
  - [net,12/17] netfilter: nf_tables: NFTA_SET_ELEM_KEY_END requires concat and interval flags
    https://git.kernel.org/netdev/net/c/88cccd908d51
  - [net,13/17] netfilter: nf_tables: disallow NFT_SET_ELEM_CATCHALL and NFT_SET_ELEM_INTERVAL_END
    https://git.kernel.org/netdev/net/c/fc0ae524b5fd
  - [net,14/17] netfilter: nf_tables: check NFT_SET_CONCAT flag if field_count is specified
    https://git.kernel.org/netdev/net/c/1b6345d4160e
  - [net,15/17] netfilter: conntrack: NF_CONNTRACK_PROCFS should no longer default to y
    https://git.kernel.org/netdev/net/c/aa5762c34213
  - [net,16/17] testing: selftests: nft_flowtable.sh: use random netns names
    https://git.kernel.org/netdev/net/c/b71b7bfeac38
  - [net,17/17] testing: selftests: nft_flowtable.sh: rework test to detect offload failure
    https://git.kernel.org/netdev/net/c/c8550b9077d2

You are awesome, thank you!
-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ