lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: 
 <174827946424.985160.18100606742772677450.git-patchwork-notify@kernel.org>
Date: Mon, 26 May 2025 17:11:04 +0000
From: patchwork-bot+netdevbpf@...nel.org
To: Pablo Neira Ayuso <pablo@...filter.org>
Cc: netfilter-devel@...r.kernel.org, davem@...emloft.net,
 netdev@...r.kernel.org, kuba@...nel.org, pabeni@...hat.com,
 edumazet@...gle.com, fw@...len.de, horms@...nel.org
Subject: Re: [PATCH net-next 01/26] selftests: netfilter: nft_concat_range.sh: add
 coverage for 4bit group representation

Hello:

This series was applied to netdev/net-next.git (main)
by Pablo Neira Ayuso <pablo@...filter.org>:

On Fri, 23 May 2025 15:26:47 +0200 you wrote:
> From: Florian Westphal <fw@...len.de>
> 
> Pipapo supports a more compact '4 bit group' format that is chosen when
> the memory needed for the default exceeds a threshold (2mb).
> 
> Add coverage for those code paths, the existing tests use small sets that
> are handled by the default representation.
> 
> [...]

Here is the summary with links:
  - [net-next,01/26] selftests: netfilter: nft_concat_range.sh: add coverage for 4bit group representation
    https://git.kernel.org/netdev/net-next/c/d31c1cafc4a7
  - [net-next,02/26] netfilter: xtables: support arpt_mark and ipv6 optstrip for iptables-nft only builds
    https://git.kernel.org/netdev/net-next/c/c38eb2973c18
  - [net-next,03/26] selftests: netfilter: nft_fib.sh: add 'type' mode tests
    https://git.kernel.org/netdev/net-next/c/839340f7c7bb
  - [net-next,04/26] selftests: netfilter: move fib vrf test to nft_fib.sh
    https://git.kernel.org/netdev/net-next/c/98287045c979
  - [net-next,05/26] netfilter: nf_tables: nft_fib_ipv6: fix VRF ipv4/ipv6 result discrepancy
    https://git.kernel.org/netdev/net-next/c/8b53f46eb430
  - [net-next,06/26] netfilter: nf_tables: nft_fib: consistent l3mdev handling
    https://git.kernel.org/netdev/net-next/c/9a119669fb19
  - [net-next,07/26] selftests: netfilter: nft_fib.sh: add type and oif tests with and without VRFs
    https://git.kernel.org/netdev/net-next/c/996d62ece031
  - [net-next,08/26] netfilter: nft_tunnel: fix geneve_opt dump
    https://git.kernel.org/netdev/net-next/c/22a9613de4c2
  - [net-next,09/26] netfilter: nf_dup{4, 6}: Move duplication check to task_struct
    https://git.kernel.org/netdev/net-next/c/a1f1acb9c5db
  - [net-next,10/26] netfilter: nft_inner: Use nested-BH locking for nft_pcpu_tun_ctx
    https://git.kernel.org/netdev/net-next/c/ba36fada9ab4
  - [net-next,11/26] netfilter: nf_dup_netdev: Move the recursion counter struct netdev_xmit
    https://git.kernel.org/netdev/net-next/c/f37ad9127039
  - [net-next,12/26] netfilter: conntrack: make nf_conntrack_id callable without a module dependency
    https://git.kernel.org/netdev/net-next/c/90869f43d06d
  - [net-next,13/26] netfilter: nf_tables: add packets conntrack state to debug trace info
    https://git.kernel.org/netdev/net-next/c/7e5c6aa67e6f
  - [net-next,14/26] netfilter: nf_tables: Introduce functions freeing nft_hook objects
    https://git.kernel.org/netdev/net-next/c/75e20bcdce24
  - [net-next,15/26] netfilter: nf_tables: Introduce nft_hook_find_ops{,_rcu}()
    https://git.kernel.org/netdev/net-next/c/e225376d78fb
  - [net-next,16/26] netfilter: nf_tables: Introduce nft_register_flowtable_ops()
    https://git.kernel.org/netdev/net-next/c/21aa0a03eb53
  - [net-next,17/26] netfilter: nf_tables: Pass nf_hook_ops to nft_unregister_flowtable_hook()
    https://git.kernel.org/netdev/net-next/c/91a089d0569d
  - [net-next,18/26] netfilter: nf_tables: Have a list of nf_hook_ops in nft_hook
    https://git.kernel.org/netdev/net-next/c/73319a8ee18b
  - [net-next,19/26] netfilter: nf_tables: Prepare for handling NETDEV_REGISTER events
    https://git.kernel.org/netdev/net-next/c/104031ac8980
  - [net-next,20/26] netfilter: nf_tables: Respect NETDEV_REGISTER events
    https://git.kernel.org/netdev/net-next/c/a331b78a5525
  - [net-next,21/26] netfilter: nf_tables: Wrap netdev notifiers
    https://git.kernel.org/netdev/net-next/c/9669c1105b16
  - [net-next,22/26] netfilter: nf_tables: Handle NETDEV_CHANGENAME events
    https://git.kernel.org/netdev/net-next/c/7b4856493d78
  - [net-next,23/26] netfilter: nf_tables: Sort labels in nft_netdev_hook_alloc()
    https://git.kernel.org/netdev/net-next/c/6f670935b470
  - [net-next,24/26] netfilter: nf_tables: Support wildcard netdev hook specs
    https://git.kernel.org/netdev/net-next/c/6d07a289504a
  - [net-next,25/26] netfilter: nf_tables: Add notifications for hook changes
    https://git.kernel.org/netdev/net-next/c/465b9ee0ee7b
  - [net-next,26/26] selftests: netfilter: Torture nftables netdev hooks
    https://git.kernel.org/netdev/net-next/c/73db1b5dab6f

You are awesome, thank you!
-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ