From: Pablo Neira Ayuso <pablo@netfilter.org>
To: netfilter-devel@vger.kernel.org
Cc: davem@davemloft.net, netdev@vger.kernel.org
Subject: [PATCH 0/5] nf pull request for net
Date: Tue, 23 Sep 2014 11:24:43 +0200 [thread overview]
Message-ID: <1411464288-18069-1-git-send-email-pablo@netfilter.org> (raw)
Hi David,
This series contains netfilter fixes for net, they are:
1) Fix lockdep splat in nft_hash when releasing sets from the
rcu_callback context. We don't the mutex there anymore.
2) Remove unnecessary spinlock_bh in the destroy path of the nf_tables
rbtree set type from rcu_callback context.
3) Fix another lockdep splat in rhashtable. None of the callers hold
a mutex when calling rhashtable_destroy.
4) Fix duplicated error reporting from nfnetlink when aborting and
replaying a batch.
5) Fix a Kconfig issue reported by kbuild robot.
You can pull these changes from:
git://git.kernel.org/pub/scm/linux/kernel/git/pablo/nf.git
Thanks!
----------------------------------------------------------------
The following changes since commit bec6bfb2437f4676dbaaacba6019e9dafef18962:
amd-xgbe: Fix initialization of the wrong spin lock (2014-09-02 14:03:37 -0700)
are available in the git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/pablo/nf.git master
for you to fetch changes up to 679ab4ddbdfab8af39104e63819db71f428aefd9:
netfilter: xt_TPROXY: undefined reference to `udp6_lib_lookup' (2014-09-07 17:25:16 +0200)
----------------------------------------------------------------
Pablo Neira Ayuso (5):
netfilter: nft_hash: no need for rcu in the hash set destroy path
netfilter: nft_rbtree: no need for spinlock from set destroy path
rhashtable: fix lockdep splat in rhashtable_destroy()
netfilter: nfnetlink: deliver netlink errors on batch completion
netfilter: xt_TPROXY: undefined reference to `udp6_lib_lookup'
lib/rhashtable.c | 8 +++---
net/netfilter/Kconfig | 1 +
net/netfilter/nfnetlink.c | 64 +++++++++++++++++++++++++++++++++++++++++++-
net/netfilter/nft_hash.c | 12 +++++----
net/netfilter/nft_rbtree.c | 2 --
5 files changed, 75 insertions(+), 12 deletions(-)
next reply other threads:[~2014-09-23 9:23 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-09-23 9:24 Pablo Neira Ayuso [this message]
2014-09-23 9:24 ` [PATCH 1/5] netfilter: nft_hash: no need for rcu in the hash set destroy path Pablo Neira Ayuso
2014-09-23 9:24 ` [PATCH 2/5] netfilter: nft_rbtree: no need for spinlock from " Pablo Neira Ayuso
2014-09-23 9:52 ` Eric Dumazet
2014-09-23 11:01 ` Pablo Neira Ayuso
2014-09-23 11:54 ` Eric Dumazet
2014-09-23 16:10 ` Pablo Neira Ayuso
2014-09-23 16:29 ` Eric Dumazet
2014-09-23 9:24 ` [PATCH 3/5] rhashtable: fix lockdep splat in rhashtable_destroy() Pablo Neira Ayuso
2014-09-23 9:24 ` [PATCH 4/5] netfilter: nfnetlink: deliver netlink errors on batch completion Pablo Neira Ayuso
2014-09-23 9:24 ` [PATCH 5/5] netfilter: xt_TPROXY: undefined reference to `udp6_lib_lookup' Pablo Neira Ayuso
2014-09-26 20:21 ` [PATCH 0/5] nf pull request for net David Miller
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1411464288-18069-1-git-send-email-pablo@netfilter.org \
--to=pablo@netfilter.org \
--cc=davem@davemloft.net \
--cc=netdev@vger.kernel.org \
--cc=netfilter-devel@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).