From: Pablo Neira Ayuso <pablo@netfilter.org>
To: netfilter-devel@vger.kernel.org
Cc: davem@davemloft.net, netdev@vger.kernel.org, kuba@kernel.org,
pabeni@redhat.com, edumazet@google.com, fw@strlen.de,
horms@kernel.org
Subject: [PATCH net 0/3] Netfilter/IPVS fixes for net
Date: Thu, 13 Mar 2025 00:18:09 +0100 [thread overview]
Message-ID: <20250312231812.4091-1-pablo@netfilter.org> (raw)
Hi,
The following patchset contains Netfilter/IPVS fixes for net:
1) Missing initialization of cpu and jiffies32 fields in conncount,
from Kohei Enju.
2) Skip several tests in case kernel is tainted, otherwise tests bogusly
report failure too as they also check for tainted kernel,
from Florian Westphal.
3) Fix a hyphothetical integer overflow in do_ip_vs_get_ctl() leading
to bogus error logs, from Dan Carpenter.
Please, pull these changes from:
git://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git nf-25-03-12
Thanks.
----------------------------------------------------------------
The following changes since commit 77b2ab31fc65c595ca0a339f6c5b8ef3adfae5c6:
MAINTAINERS: sfc: remove Martin Habets (2025-03-10 13:34:15 -0700)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf.git nf-25-03-12
for you to fetch changes up to 80b78c39eb86e6b55f56363b709eb817527da5aa:
ipvs: prevent integer overflow in do_ip_vs_get_ctl() (2025-03-12 15:48:26 +0100)
----------------------------------------------------------------
netfilter pull request 25-03-12
----------------------------------------------------------------
Dan Carpenter (1):
ipvs: prevent integer overflow in do_ip_vs_get_ctl()
Florian Westphal (1):
selftests: netfilter: skip br_netfilter queue tests if kernel is tainted
Kohei Enju (1):
netfilter: nf_conncount: Fully initialize struct nf_conncount_tuple in insert_tree()
net/netfilter/ipvs/ip_vs_ctl.c | 8 ++++----
net/netfilter/nf_conncount.c | 2 ++
tools/testing/selftests/net/netfilter/br_netfilter.sh | 7 +++++++
tools/testing/selftests/net/netfilter/br_netfilter_queue.sh | 7 +++++++
tools/testing/selftests/net/netfilter/nft_queue.sh | 1 +
5 files changed, 21 insertions(+), 4 deletions(-)
next reply other threads:[~2025-03-12 23:18 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-03-12 23:18 Pablo Neira Ayuso [this message]
2025-03-12 23:18 ` [PATCH net 1/3] netfilter: nf_conncount: Fully initialize struct nf_conncount_tuple in insert_tree() Pablo Neira Ayuso
2025-03-12 23:18 ` [PATCH net 2/3] selftests: netfilter: skip br_netfilter queue tests if kernel is tainted Pablo Neira Ayuso
2025-03-12 23:18 ` [PATCH net 3/3] ipvs: prevent integer overflow in do_ip_vs_get_ctl() Pablo Neira Ayuso
-- strict thread matches above, loose matches on Subject: below --
2022-12-13 14:09 [PATCH net 0/3] Netfilter/IPVS fixes for net Pablo Neira Ayuso
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20250312231812.4091-1-pablo@netfilter.org \
--to=pablo@netfilter.org \
--cc=davem@davemloft.net \
--cc=edumazet@google.com \
--cc=fw@strlen.de \
--cc=horms@kernel.org \
--cc=kuba@kernel.org \
--cc=netdev@vger.kernel.org \
--cc=netfilter-devel@vger.kernel.org \
--cc=pabeni@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).