diff options
author | Jakub Kicinski <kuba@kernel.org> | 2022-11-24 06:12:56 +0300 |
---|---|---|
committer | Jakub Kicinski <kuba@kernel.org> | 2022-11-24 06:12:57 +0300 |
commit | 0830b1effdf92b488c24aa03bc277090c8447527 (patch) | |
tree | 1a861bb73968900fedfeef5bd66ab6b94ef29850 /Kconfig | |
parent | b6e7c196ac2f90f08955ca4db568a52160876407 (diff) | |
parent | bcd9e3c1656d0f7dd9743598c65c3ae24efb38d0 (diff) | |
download | linux-0830b1effdf92b488c24aa03bc277090c8447527.tar.xz |
Merge git://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf
Pablo Neira Ayuso says:
====================
Netfilter fixes for net
1) Fix regression in ipset hash:ip with IPv4 range, from Vishwanath Pai.
This is fixing up a bug introduced in the 6.0 release.
2) The "netfilter: ipset: enforce documented limit to prevent allocating
huge memory" patch contained a wrong condition which makes impossible to
add up to 64 clashing elements to a hash:net,iface type of set while it
is the documented feature of the set type. The patch fixes the condition
and thus makes possible to add the elements while keeps preventing
allocating huge memory, from Jozsef Kadlecsik. This has been broken
for several releases.
3) Missing locking when updating the flow block list which might lead
a reader to crash. This has been broken since the introduction of the
flowtable hardware offload support.
* git://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf:
netfilter: flowtable_offload: add missing locking
netfilter: ipset: restore allowing 64 clashing elements in hash:net,iface
netfilter: ipset: regression in ip_set_hash_ip.c
====================
Link: https://lore.kernel.org/r/20221122212814.63177-1-pablo@netfilter.org
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Diffstat (limited to 'Kconfig')
0 files changed, 0 insertions, 0 deletions