lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: 
 <171982443077.24948.16419049555710785067.git-patchwork-notify@kernel.org>
Date: Mon, 01 Jul 2024 09:00:30 +0000
From: patchwork-bot+netdevbpf@...nel.org
To: Pablo Neira Ayuso <pablo@...filter.org>
Cc: netfilter-devel@...r.kernel.org, davem@...emloft.net,
 netdev@...r.kernel.org, kuba@...nel.org, pabeni@...hat.com,
 edumazet@...gle.com, fw@...len.de
Subject: Re: [PATCH net-next 01/17] netfilter: nf_tables: make struct nft_trans
 first member of derived subtypes

Hello:

This series was applied to netdev/net-next.git (main)
by Pablo Neira Ayuso <pablo@...filter.org>:

On Fri, 28 Jun 2024 18:04:49 +0200 you wrote:
> From: Florian Westphal <fw@...len.de>
> 
> There is 'struct nft_trans', the basic structure for all transactional
> objects, and the the various different transactional objects, such as
> nft_trans_table, chain, set, set_elem and so on.
> 
> Right now 'struct nft_trans' uses a flexible member at the tail
> (data[]), and casting is needed to access the actual type-specific
> members.
> 
> [...]

Here is the summary with links:
  - [net-next,01/17] netfilter: nf_tables: make struct nft_trans first member of derived subtypes
    https://git.kernel.org/netdev/net-next/c/605efd54b504
  - [net-next,02/17] netfilter: nf_tables: move bind list_head into relevant subtypes
    https://git.kernel.org/netdev/net-next/c/17d8f3ad36a5
  - [net-next,03/17] netfilter: nf_tables: compact chain+ft transaction objects
    https://git.kernel.org/netdev/net-next/c/b3f4c216f7af
  - [net-next,04/17] netfilter: nf_tables: reduce trans->ctx.table references
    https://git.kernel.org/netdev/net-next/c/06fcaca2ed1f
  - [net-next,05/17] netfilter: nf_tables: pass nft_chain to destroy function, not nft_ctx
    https://git.kernel.org/netdev/net-next/c/8965d42bcf54
  - [net-next,06/17] netfilter: nf_tables: pass more specific nft_trans_chain where possible
    https://git.kernel.org/netdev/net-next/c/0c2e0ee861de
  - [net-next,07/17] netfilter: nf_tables: avoid usage of embedded nft_ctx
    https://git.kernel.org/netdev/net-next/c/d4f6f3994e13
  - [net-next,08/17] netfilter: nf_tables: store chain pointer in rule transaction
    https://git.kernel.org/netdev/net-next/c/13f20bc9ec4f
  - [net-next,09/17] netfilter: nf_tables: reduce trans->ctx.chain references
    https://git.kernel.org/netdev/net-next/c/551b3886401c
  - [net-next,10/17] netfilter: nf_tables: pass nft_table to destroy function
    https://git.kernel.org/netdev/net-next/c/0be908750162
  - [net-next,11/17] netfilter: nf_tables: do not store nft_ctx in transaction objects
    https://git.kernel.org/netdev/net-next/c/e169285f8c56
  - [net-next,12/17] ipvs: Avoid unnecessary calls to skb_is_gso_sctp
    https://git.kernel.org/netdev/net-next/c/53796b03295c
  - [net-next,13/17] netfilter: nf_conncount: fix wrong variable type
    https://git.kernel.org/netdev/net-next/c/0b88d1654d55
  - [net-next,14/17] netfilter: cttimeout: remove 'l3num' attr check
    https://git.kernel.org/netdev/net-next/c/fe87a8deaad4
  - [net-next,15/17] netfilter: nf_tables: rise cap on SELinux secmark context
    https://git.kernel.org/netdev/net-next/c/e29630247be2
  - [net-next,16/17] selftests: netfilter: nft_queue.sh: add test for disappearing listener
    https://git.kernel.org/netdev/net-next/c/742ad979f500
  - [net-next,17/17] netfilter: xt_recent: Lift restrictions on max hitcount value
    https://git.kernel.org/netdev/net-next/c/f4ebd03496f6

You are awesome, thank you!
-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ