[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20250403115752.19608-1-pablo@netfilter.org>
Date: Thu, 3 Apr 2025 13:57:49 +0200
From: Pablo Neira Ayuso <pablo@...filter.org>
To: netfilter-devel@...r.kernel.org
Cc: davem@...emloft.net,
netdev@...r.kernel.org,
kuba@...nel.org,
pabeni@...hat.com,
edumazet@...gle.com,
fw@...len.de,
horms@...nel.org
Subject: [PATCH net 0/3] Netfilter fixes for net
Hi,
The following batch contains Netfilter fixes for net:
1) conncount incorrectly removes element for non-dynamic sets,
these elements represent a static control plane configuration,
leave them in place.
2) syzbot found a way to unregister a basechain that has been never
registered from the chain update path, fix from Florian Westphal.
3) Fix incorrect pointer arithmetics in geneve support for tunnel,
from Lin Ma.
Please, pull these changes from:
git://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git nf-25-04-03
Thanks.
----------------------------------------------------------------
The following changes since commit ed3ba9b6e280e14cc3148c1b226ba453f02fa76c:
net: Remove RTNL dance for SIOCBRADDIF and SIOCBRDELIF. (2025-03-21 22:10:06 +0100)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git tags/nf-25-04-03
for you to fetch changes up to 1b755d8eb1ace3870789d48fbd94f386ad6e30be:
netfilter: nft_tunnel: fix geneve_opt type confusion addition (2025-04-03 13:32:03 +0200)
----------------------------------------------------------------
netfilter pull request 25-04-03
----------------------------------------------------------------
Florian Westphal (1):
netfilter: nf_tables: don't unregister hook when table is dormant
Lin Ma (1):
netfilter: nft_tunnel: fix geneve_opt type confusion addition
Pablo Neira Ayuso (1):
netfilter: nft_set_hash: GC reaps elements with conncount for dynamic sets only
net/netfilter/nf_tables_api.c | 4 ++--
net/netfilter/nft_set_hash.c | 3 ++-
net/netfilter/nft_tunnel.c | 4 ++--
3 files changed, 6 insertions(+), 5 deletions(-)
Powered by blists - more mailing lists