[{"id":3681351,"web_url":"http://patchwork.ozlabs.org/comment/3681351/","msgid":"<177693661488.73226.2217297170932768226.git-patchwork-notify@kernel.org>","list_archive_url":null,"date":"2026-04-23T09:30:14","subject":"Re: [PATCH net 1/8] netfilter: nft_osf: restrict it to ipv4","submitter":{"id":80291,"url":"http://patchwork.ozlabs.org/api/people/80291/","name":null,"email":"patchwork-bot+netdevbpf@kernel.org"},"content":"Hello:\n\nThis series was applied to netdev/net.git (main)\nby Pablo Neira Ayuso <pablo@netfilter.org>:\n\nOn Tue, 21 Apr 2026 00:02:08 +0200 you wrote:\n> This expression only supports for ipv4, restrict it.\n> \n> Fixes: b96af92d6eaf (\"netfilter: nf_tables: implement Passive OS fingerprint module in nft_osf\")\n> Acked-by: Florian Westphal <fw@strlen.de>\n> Reviewed-by: Fernando Fernandez Mancera <fmancera@suse.de>\n> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>\n> \n> [...]\n\nHere is the summary with links:\n  - [net,1/8] netfilter: nft_osf: restrict it to ipv4\n    https://git.kernel.org/netdev/net/c/b336fdbb7103\n  - [net,2/8] netfilter: nfnetlink_osf: fix divide-by-zero in OSF_WSS_MODULO\n    https://git.kernel.org/netdev/net/c/2195574dc6d9\n  - [net,3/8] netfilter: conntrack: remove sprintf usage\n    https://git.kernel.org/netdev/net/c/6e7066bdb481\n  - [net,4/8] netfilter: xtables: restrict several matches to inet family\n    https://git.kernel.org/netdev/net/c/b6fe26f86a16\n  - [net,5/8] netfilter: nat: use kfree_rcu to release ops\n    https://git.kernel.org/netdev/net/c/6eda0d771f94\n  - [net,6/8] ipvs: fix MTU check for GSO packets in tunnel mode\n    https://git.kernel.org/netdev/net/c/67bf42cae41d\n  - [net,7/8] netfilter: nfnetlink_osf: fix out-of-bounds read on option matching\n    https://git.kernel.org/netdev/net/c/f5ca450087c3\n  - [net,8/8] netfilter: nfnetlink_osf: fix potential NULL dereference in ttl check\n    https://git.kernel.org/netdev/net/c/711987ba281f\n\nYou are awesome, thank you!","headers":{"Return-Path":"\n <netfilter-devel+bounces-12150-incoming=patchwork.ozlabs.org@vger.kernel.org>","X-Original-To":["incoming@patchwork.ozlabs.org","netfilter-devel@vger.kernel.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256\n header.s=k20201202 header.b=CaunIDfd;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=172.234.253.10; helo=sea.lore.kernel.org;\n envelope-from=netfilter-devel+bounces-12150-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)","smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org\n header.b=\"CaunIDfd\"","smtp.subspace.kernel.org;\n arc=none smtp.client-ip=10.30.226.201"],"Received":["from sea.lore.kernel.org (sea.lore.kernel.org [172.234.253.10])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g1W9N359vz1yD5\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 23 Apr 2026 19:33:12 +1000 (AEST)","from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sea.lore.kernel.org (Postfix) with ESMTP id 9576930948E0\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 23 Apr 2026 09:30:55 +0000 (UTC)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 2F9993E51E9;\n\tThu, 23 Apr 2026 09:30:54 +0000 (UTC)","from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org\n [10.30.226.201])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id B02AF3E4C8E;\n\tThu, 23 Apr 2026 09:30:53 +0000 (UTC)","by smtp.kernel.org (Postfix) with ESMTPSA id 4C639C2BCAF;\n\tThu, 23 Apr 2026 09:30:53 +0000 (UTC)","from [10.30.226.235] (localhost [IPv6:::1])\n\tby aws-us-west-2-korg-oddjob-rhel9-1.codeaurora.org (Postfix) with ESMTP id\n 3FD82380CFF9;\n\tThu, 23 Apr 2026 09:30:16 +0000 (UTC)"],"ARC-Seal":"i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1776936653; cv=none;\n b=Vp47YiG2ajUhaXIMNuEXWH91LAHyOjELG3oO3O+LG2XPtwIBTh52nDn9CA/uFWyg9iyWFgAfvY+dPOiaFLIC+i1TJ8o6adqA79f0dzqNiG1Ym5ztYt4UEYhvGtmSszw2rIvVi3B1jFkMuCbRu86O02j8y7qmbtGTTkomsuPHg+M=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1776936653; c=relaxed/simple;\n\tbh=xTAI9xIr1VqM9v3nC9pXYRhVtz4waWq5chM0ORi9Wbg=;\n\th=Content-Type:MIME-Version:Subject:From:Message-Id:Date:References:\n\t In-Reply-To:To:Cc;\n b=Q78ZwQCNkapRA6EyqsmO6GuKrDCqfdF6S/C7vDZS1uWzG5Ni9s8gMmtSeWTWQTfcsWQc/2OHSuEj8fveqlpNyI8sO3FAcLjPkc2ZvjsyD0cB4KMBoYMYDgJ174UKtmLOerirha9jzxEuAxS2C1xdXjhyUPdkF14Sgjx9EkbToec=","ARC-Authentication-Results":"i=1; smtp.subspace.kernel.org;\n dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org\n header.b=CaunIDfd; arc=none smtp.client-ip=10.30.226.201","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;\n\ts=k20201202; t=1776936653;\n\tbh=xTAI9xIr1VqM9v3nC9pXYRhVtz4waWq5chM0ORi9Wbg=;\n\th=Subject:From:Date:References:In-Reply-To:To:Cc:From;\n\tb=CaunIDfd4/pt10XfBFZ0GfjQRfAXfNICMw6MfenaiMV35NlnfkZj3YBQQ60H3wmyI\n\t Z0cYjgZgdEP3jzd7bZ8eF1+cpp+qalyX8N5bjOhOvwF9TvTeT/deNo0nRrV/wOLV4D\n\t h7EW3qu7V7Bd0FK2yKa5j0DOmhv9FTs/PYAbfeEYZ8+/DIRrNAaBBZiXS0YwyLgdWy\n\t KVjZVPZFdcWql7CkDSXYMkEJuBGkw9nrokRP9QhA9OcweJMbxJHHgbBFTtr/NVQiw1\n\t kzwYmCQHDnGrL/2PDGNUWMxdnaB76crtp8H7naXdQOcWORsQDY0NfCs3dMRV9o+cZM\n\t +cMi399n851uw==","Content-Type":"text/plain; charset=\"utf-8\"","Precedence":"bulk","X-Mailing-List":"netfilter-devel@vger.kernel.org","List-Id":"<netfilter-devel.vger.kernel.org>","List-Subscribe":"<mailto:netfilter-devel+subscribe@vger.kernel.org>","List-Unsubscribe":"<mailto:netfilter-devel+unsubscribe@vger.kernel.org>","MIME-Version":"1.0","Content-Transfer-Encoding":"8bit","Subject":"Re: [PATCH net 1/8] netfilter: nft_osf: restrict it to ipv4","From":"patchwork-bot+netdevbpf@kernel.org","Message-Id":"\n <177693661488.73226.2217297170932768226.git-patchwork-notify@kernel.org>","Date":"Thu, 23 Apr 2026 09:30:14 +0000","References":"<20260420220215.111510-2-pablo@netfilter.org>","In-Reply-To":"<20260420220215.111510-2-pablo@netfilter.org>","To":"Pablo Neira Ayuso <pablo@netfilter.org>","Cc":"netfilter-devel@vger.kernel.org, davem@davemloft.net,\n netdev@vger.kernel.org, kuba@kernel.org, pabeni@redhat.com,\n edumazet@google.com, fw@strlen.de, horms@kernel.org"}}]