lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20240129145807.8773-1-fw@strlen.de>
Date: Mon, 29 Jan 2024 15:57:50 +0100
From: Florian Westphal <fw@...len.de>
To: <netdev@...r.kernel.org>
Cc: Paolo Abeni <pabeni@...hat.com>,
	"David S. Miller" <davem@...emloft.net>,
	Eric Dumazet <edumazet@...gle.com>,
	Jakub Kicinski <kuba@...nel.org>,
	<netfilter-devel@...r.kernel.org>
Subject: [PATCH nf-next 0/9] netfilter updates for -next

Hello,

This batch contains updates for your *next* tree.

First three changes, from Phil Sutter, allow userspace to define
a table that is exclusively owned by a daemon (via netlink socket
aliveness) without auto-removing this table when the userspace program
exits.  Such table gets marked as orphaned and a restarting management
daemon may re-attach/reassume ownership.

Next patch, from Pablo, passes already-validated flags variable around
rather than having called code re-fetch it from netlnik message.

Patches 5 and 6 update ipvs and nf_conncount to use the recently
introduced KMEM_CACHE() macro.

Last three patches, from myself, tweak kconfig logic a little to
permit a kernel configuration that can run iptables-over-nftables
but not classic (setsockopt) iptables.

Such builds lack the builtin-filter/mangle/raw/nat/security tables,
the set/getsockopt interface and the "old blob format"
interpreter/traverser.  For now, this is 'oldconfig friendly', users
need to manually deselect existing config options for this.

The following changes since commit 723de3ebef03bc14bd72531f00f9094337654009:

  net: free altname using an RCU callback (2024-01-29 14:40:38 +0000)

are available in the Git repository at:

  https://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf-next.git tags/nf-next-24-01-29

for you to fetch changes up to 7ad269787b6615ca56bb161063331991fce51abf:

  netfilter: ebtables: allow xtables-nft only builds (2024-01-29 15:43:21 +0100)

----------------------------------------------------------------
nf-next pr 2024-01-29

----------------------------------------------------------------
Florian Westphal (3):
      netfilter: arptables: allow xtables-nft only builds
      netfilter: xtables: allow xtables-nft only builds
      netfilter: ebtables: allow xtables-nft only builds

Kunwu Chan (2):
      netfilter: nf_conncount: Use KMEM_CACHE instead of kmem_cache_create()
      ipvs: Simplify the allocation of ip_vs_conn slab caches

Pablo Neira Ayuso (1):
      netfilter: nf_tables: pass flags to set backend selection routine

Phil Sutter (3):
      netfilter: uapi: Document NFT_TABLE_F_OWNER flag
      netfilter: nf_tables: Introduce NFT_TABLE_F_PERSIST
      netfilter: nf_tables: Implement table adoption support

 include/net/netfilter/nf_tables.h        |  6 +++++
 include/uapi/linux/netfilter/nf_tables.h |  6 ++++-
 net/bridge/netfilter/Kconfig             |  7 ++++++
 net/bridge/netfilter/Makefile            |  2 +-
 net/ipv4/netfilter/Kconfig               | 43 +++++++++++++++++++-------------
 net/ipv4/netfilter/Makefile              |  2 +-
 net/ipv6/netfilter/Kconfig               | 20 ++++++++++-----
 net/ipv6/netfilter/Makefile              |  2 +-
 net/netfilter/Kconfig                    | 12 ++++-----
 net/netfilter/ipvs/ip_vs_conn.c          |  4 +--
 net/netfilter/nf_conncount.c             |  8 ++----
 net/netfilter/nf_tables_api.c            | 35 ++++++++++++++++++--------
 12 files changed, 94 insertions(+), 53 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ