{"id":2229651,"url":"http://patchwork.ozlabs.org/api/1.1/covers/2229651/?format=json","web_url":"http://patchwork.ozlabs.org/project/netfilter-devel/cover/20260428151913.584739-1-kadlec@netfilter.org/","project":{"id":26,"url":"http://patchwork.ozlabs.org/api/1.1/projects/26/?format=json","name":"Netfilter Development","link_name":"netfilter-devel","list_id":"netfilter-devel.vger.kernel.org","list_email":"netfilter-devel@vger.kernel.org","web_url":null,"scm_url":null,"webscm_url":null},"msgid":"<20260428151913.584739-1-kadlec@netfilter.org>","date":"2026-04-28T15:19:08","name":"[0/5] netfilter: ipset fixes","submitter":{"id":77226,"url":"http://patchwork.ozlabs.org/api/1.1/people/77226/?format=json","name":"Jozsef Kadlecsik","email":"kadlec@netfilter.org"},"mbox":"http://patchwork.ozlabs.org/project/netfilter-devel/cover/20260428151913.584739-1-kadlec@netfilter.org/mbox/","series":[{"id":501876,"url":"http://patchwork.ozlabs.org/api/1.1/series/501876/?format=json","web_url":"http://patchwork.ozlabs.org/project/netfilter-devel/list/?series=501876","date":"2026-04-28T15:19:09","name":"netfilter: ipset fixes","version":1,"mbox":"http://patchwork.ozlabs.org/series/501876/mbox/"}],"comments":"http://patchwork.ozlabs.org/api/covers/2229651/comments/","headers":{"Return-Path":"\n <netfilter-devel+bounces-12261-incoming=patchwork.ozlabs.org@vger.kernel.org>","X-Original-To":["incoming@patchwork.ozlabs.org","netfilter-devel@vger.kernel.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=blackhole.kfki.hu header.i=@blackhole.kfki.hu\n header.a=rsa-sha256 header.s=20151130 header.b=sRPHGJxT;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=172.232.135.74; helo=sto.lore.kernel.org;\n envelope-from=netfilter-devel+bounces-12261-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)","smtp.subspace.kernel.org;\n\tdkim=pass (1024-bit key) header.d=blackhole.kfki.hu\n header.i=@blackhole.kfki.hu header.b=\"sRPHGJxT\"","smtp.subspace.kernel.org;\n arc=none smtp.client-ip=148.6.0.51","smtp.subspace.kernel.org;\n dmarc=none (p=none dis=none) header.from=netfilter.org","smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=blackhole.kfki.hu"],"Received":["from sto.lore.kernel.org (sto.lore.kernel.org [172.232.135.74])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g4kcm1Sfkz1yJH\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 29 Apr 2026 01:19:36 +1000 (AEST)","from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sto.lore.kernel.org (Postfix) with ESMTP id 10C1B300E5A2\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 28 Apr 2026 15:19:33 +0000 (UTC)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 3CDA3394462;\n\tTue, 28 Apr 2026 15:19:29 +0000 (UTC)","from smtp-out.kfki.hu (smtp-out.kfki.hu [148.6.0.51])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id D19CB31B830\n\tfor <netfilter-devel@vger.kernel.org>; Tue, 28 Apr 2026 15:19:22 +0000 (UTC)","from localhost (localhost [127.0.0.1])\n\tby smtp2.kfki.hu (Postfix) with ESMTP id 4g4kcM4HY1z7s856;\n\tTue, 28 Apr 2026 17:19:15 +0200 (CEST)","from smtp2.kfki.hu ([127.0.0.1])\n by localhost (smtp2.kfki.hu [127.0.0.1]) (amavis, port 10026) with ESMTP\n id 9Tya1Abka0rJ; Tue, 28 Apr 2026 17:19:13 +0200 (CEST)","from mentat.rmki.kfki.hu (unknown [148.6.40.64])\n\t(Authenticated sender: kadlecsik.jozsef@wigner.hu)\n\tby smtp2.kfki.hu (Postfix) with ESMTPSA id 4g4kcK4Tntz7s855;\n\tTue, 28 Apr 2026 17:19:13 +0200 (CEST)","by mentat.rmki.kfki.hu (Postfix, from userid 1000)\n\tid 7719C140E20; Tue, 28 Apr 2026 17:19:13 +0200 (CEST)"],"ARC-Seal":"i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1777389567; cv=none;\n b=TVTkIt4/KTH9Jzs4qid3suD9Ri9iNUyiaBUJ2UR/ZRDMukfFuXP0xgCsZbUOIBUL1tTll4P4KPfZAfU2aCRLRBxxmZb697TwVzbf5FFyn6JP+c4/MvyCBKrz1Vc6MjVWjbY8zXwbWvaL7rVo7lzH9KFlsySA57pQo+kbRhneYrE=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1777389567; c=relaxed/simple;\n\tbh=lWcRySZs9B81ott/+yTC7IJ4zMdKd9aQaZBCUB5BvXY=;\n\th=From:To:Cc:Subject:Date:Message-Id:MIME-Version;\n b=nrjkio+UsWM8gaxMv1/KhniJCOMEW6HbynJYmd4C13GI4BI5tH//AzM/yJZK1Bq+ORiC2NipZna/btjAH11ITfcMgQiTtDzWeIUzGyR1zrBeQcucx2EOUVsL9zS3qdmC4gSw1+WnYlwXjCHFk7nHgfU/6NrlHKy6zNNZ1XSvxWQ=","ARC-Authentication-Results":"i=1; smtp.subspace.kernel.org;\n dmarc=none (p=none dis=none) header.from=netfilter.org;\n spf=pass smtp.mailfrom=blackhole.kfki.hu;\n dkim=pass (1024-bit key) header.d=blackhole.kfki.hu\n header.i=@blackhole.kfki.hu header.b=sRPHGJxT;\n arc=none smtp.client-ip=148.6.0.51","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=\n\tblackhole.kfki.hu; h=mime-version:x-mailer:message-id:date:date\n\t:from:from:received:received:received; s=20151130; t=1777389553;\n\t x=1779203954; bh=QjDmJMjlxJSIZ7Akj62zJfcnEb4+nJqpUBCzcEngXx4=; b=\n\tsRPHGJxTvesQlbRExAGnrwVo5TV5oWErn7OUrBdPtWMRFdOkY4JDxIRZ6SAQH1XT\n\t0oycFUS0SuGmLBFgSnYmnQ+ws2xvkf4y66aOX52vSgk5xPsyZlz7KG8mPiNEkGp3\n\tqgRQx5POyEf5Wrvlgcqwy1v8V1hPgRyNNxOIheT+vsY=","X-Virus-Scanned":"Debian amavis at smtp2.kfki.hu","From":"Jozsef Kadlecsik <kadlec@netfilter.org>","To":"netfilter-devel@vger.kernel.org","Cc":"Pablo Neira Ayuso <pablo@netfilter.org>","Subject":"[PATCH 0/5] netfilter: ipset fixes","Date":"Tue, 28 Apr 2026 17:19:08 +0200","Message-Id":"<20260428151913.584739-1-kadlec@netfilter.org>","X-Mailer":"git-send-email 2.39.5","Precedence":"bulk","X-Mailing-List":"netfilter-devel@vger.kernel.org","List-Id":"<netfilter-devel.vger.kernel.org>","List-Subscribe":"<mailto:netfilter-devel+subscribe@vger.kernel.org>","List-Unsubscribe":"<mailto:netfilter-devel+unsubscribe@vger.kernel.org>","MIME-Version":"1.0","Content-Transfer-Encoding":"quoted-printable"},"content":"Hi Pablo,\n\nHere follows the next version of tentative fixes for the current \nlist of ipset related issues: the previous one was against a wrong\ntree and sashiko could not test it. I'll take into account sashiko \nreports and after that submit the final versions. Thanks!\n\nBest regards,\nJozsef\n\nJozsef Kadlecsik (5):\n  netfilter: ipset: Fix data race between add and list header in all\n    hash types\n  netfilter: ipset: Fix data race between add and dump in all hash types\n  netfilter: ipset: annotate \"pos\" for concurrent readers/writers\n  netfilter: ipset: skip gc when resize is in progress\n  netfilter: ipset: fix order of usage counters\n\n net/netfilter/ipset/ip_set_core.c     |  4 +-\n net/netfilter/ipset/ip_set_hash_gen.h | 67 ++++++++++++++++++---------\n 2 files changed, 47 insertions(+), 24 deletions(-)"}