lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20230626064749.75525-1-pablo@netfilter.org>
Date: Mon, 26 Jun 2023 08:47:41 +0200
From: Pablo Neira Ayuso <pablo@...filter.org>
To: netfilter-devel@...r.kernel.org
Cc: davem@...emloft.net,
	netdev@...r.kernel.org,
	kuba@...nel.org,
	pabeni@...hat.com,
	edumazet@...gle.com
Subject: [PATCH net-next 0/8] Netfilter/IPVS updates for net-next

Hi,

The following patchset contains Netfilter/IPVS updates for net-next:

1) Allow slightly larger IPVS connection table size from Kconfig for
   64-bit arch, from Abhijeet Rastogi.

2) Since IPVS connection table might be larger than 2^20 after previous
   patch, allow to limit it depending on the available memory.
   Moreover, use kvmalloc. From Julian Anastasov.

3) Do not rebuild VLAN header in nft_payload when matching source and
   destination MAC address.

4) Remove nested rcu read lock side in ip_set_test(), from Florian Westphal.

5) Allow to update set size, also from Florian.

6) Improve NAT tuple selection when connection is closing,
   from Florian Westphal.

7) Support for resetting set element stateful expression, from Phil Sutter.

8) Use NLA_POLICY_MAX to narrow down maximum attribute value in nf_tables,
   from Florian Westphal.

Please, pull these changes from:

  git://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf-next.git nf-next-23-06-26

Thanks.

----------------------------------------------------------------

The following changes since commit 4ff3dfc91c8458f65366f283167d1cd6f16be06f:

  Merge branch 'splice-net-handle-msg_splice_pages-in-chelsio-tls' (2023-06-01 13:41:40 +0200)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf-next.git nf-next-23-06-26

for you to fetch changes up to a412dbf40ff37515acca4bba666f5386aa37246e:

  netfilter: nf_tables: limit allowed range via nla_policy (2023-06-26 08:05:57 +0200)

----------------------------------------------------------------
netfilter pull request 23-06-26

----------------------------------------------------------------
Abhijeet Rastogi (1):
      ipvs: increase ip_vs_conn_tab_bits range for 64BIT

Florian Westphal (4):
      netfilter: ipset: remove rcu_read_lock_bh pair from ip_set_test
      netfilter: nf_tables: permit update of set size
      netfilter: snat: evict closing tcp entries on reply tuple collision
      netfilter: nf_tables: limit allowed range via nla_policy

Julian Anastasov (1):
      ipvs: dynamically limit the connection hash table

Pablo Neira Ayuso (1):
      netfilter: nft_payload: rebuild vlan header when needed

Phil Sutter (1):
      netfilter: nf_tables: Introduce NFT_MSG_GETSETELEM_RESET

 include/net/netfilter/nf_tables.h        |  3 ++
 include/uapi/linux/netfilter/nf_tables.h |  2 +
 net/netfilter/ipset/ip_set_core.c        |  2 -
 net/netfilter/ipvs/Kconfig               | 27 +++++-----
 net/netfilter/ipvs/ip_vs_conn.c          | 26 +++++----
 net/netfilter/nf_nat_core.c              | 92 ++++++++++++++++++++++++++++++--
 net/netfilter/nf_tables_api.c            | 72 ++++++++++++++++++-------
 net/netfilter/nft_bitwise.c              |  2 +-
 net/netfilter/nft_byteorder.c            |  6 +--
 net/netfilter/nft_ct.c                   |  2 +-
 net/netfilter/nft_dynset.c               |  2 +-
 net/netfilter/nft_exthdr.c               |  4 +-
 net/netfilter/nft_fwd_netdev.c           |  2 +-
 net/netfilter/nft_hash.c                 |  2 +-
 net/netfilter/nft_meta.c                 |  2 +-
 net/netfilter/nft_payload.c              |  3 +-
 net/netfilter/nft_range.c                |  2 +-
 net/netfilter/nft_reject.c               |  2 +-
 net/netfilter/nft_rt.c                   |  2 +-
 net/netfilter/nft_socket.c               |  4 +-
 net/netfilter/nft_tproxy.c               |  2 +-
 net/netfilter/nft_tunnel.c               |  4 +-
 net/netfilter/nft_xfrm.c                 |  4 +-
 23 files changed, 199 insertions(+), 70 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ