{"id":2233411,"url":"http://patchwork.ozlabs.org/api/1.1/covers/2233411/?format=json","web_url":"http://patchwork.ozlabs.org/project/netfilter-devel/cover/20260506121618.578443-1-lixiasong1@huawei.com/","project":{"id":26,"url":"http://patchwork.ozlabs.org/api/1.1/projects/26/?format=json","name":"Netfilter Development","link_name":"netfilter-devel","list_id":"netfilter-devel.vger.kernel.org","list_email":"netfilter-devel@vger.kernel.org","web_url":null,"scm_url":null,"webscm_url":null},"msgid":"<20260506121618.578443-1-lixiasong1@huawei.com>","date":"2026-05-06T12:16:16","name":"[nft,0/2] netfilter: fix nf_ct_expect_alloc() reference leaks","submitter":{"id":93343,"url":"http://patchwork.ozlabs.org/api/1.1/people/93343/?format=json","name":"Li Xiasong","email":"lixiasong1@huawei.com"},"mbox":"http://patchwork.ozlabs.org/project/netfilter-devel/cover/20260506121618.578443-1-lixiasong1@huawei.com/mbox/","series":[{"id":502974,"url":"http://patchwork.ozlabs.org/api/1.1/series/502974/?format=json","web_url":"http://patchwork.ozlabs.org/project/netfilter-devel/list/?series=502974","date":"2026-05-06T12:16:16","name":"netfilter: fix nf_ct_expect_alloc() reference leaks","version":1,"mbox":"http://patchwork.ozlabs.org/series/502974/mbox/"}],"comments":"http://patchwork.ozlabs.org/api/covers/2233411/comments/","headers":{"Return-Path":"\n <netfilter-devel+bounces-12462-incoming=patchwork.ozlabs.org@vger.kernel.org>","X-Original-To":["incoming@patchwork.ozlabs.org","netfilter-devel@vger.kernel.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=huawei.com header.i=@huawei.com header.a=rsa-sha256\n header.s=dkim header.b=40NhFgcY;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c0a:e001:db::12fc:5321; helo=sea.lore.kernel.org;\n envelope-from=netfilter-devel+bounces-12462-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)","smtp.subspace.kernel.org;\n\tdkim=pass (1024-bit key) header.d=huawei.com header.i=@huawei.com\n header.b=\"40NhFgcY\"","smtp.subspace.kernel.org;\n arc=none smtp.client-ip=113.46.200.219","smtp.subspace.kernel.org;\n dmarc=pass (p=quarantine dis=none) header.from=huawei.com","smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=huawei.com"],"Received":["from sea.lore.kernel.org (sea.lore.kernel.org\n [IPv6:2600:3c0a:e001:db::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g9Ycb3tHMz1yJq\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 06 May 2026 21:51:11 +1000 (AEST)","from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sea.lore.kernel.org (Postfix) with ESMTP id 5F99F3010513\n\tfor <incoming@patchwork.ozlabs.org>; Wed,  6 May 2026 11:51:02 +0000 (UTC)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id CB76E438FF5;\n\tWed,  6 May 2026 11:51:00 +0000 (UTC)","from canpmsgout04.his.huawei.com (canpmsgout04.his.huawei.com\n [113.46.200.219])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id B3F3C318EC4\n\tfor <netfilter-devel@vger.kernel.org>; Wed,  6 May 2026 11:50:57 +0000 (UTC)","from mail.maildlp.com (unknown [172.19.162.144])\n\tby canpmsgout04.his.huawei.com (SkyGuard) with ESMTPS id 4g9YSh4F3wz1prMX;\n\tWed,  6 May 2026 19:44:20 +0800 (CST)","from kwepemj500018.china.huawei.com (unknown [7.202.194.48])\n\tby mail.maildlp.com (Postfix) with ESMTPS id 8146E4056D;\n\tWed,  6 May 2026 19:50:54 +0800 (CST)","from huawei.com (10.50.85.128) by kwepemj500018.china.huawei.com\n (7.202.194.48) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.11; Wed, 6 May\n 2026 19:50:53 +0800"],"ARC-Seal":"i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1778068260; cv=none;\n b=l+kMw8e7ui0AmScNhDipMOUSYbSmbL9Ky/ms/+4V5ajyFVw7JAFsIwnloDFj5Mx7CaVl2YDFNWxyZpsHlx557B3RsdyZ3ZDPrPP9NuDmeqWfpSxugOG7HT4zsAuzQBEqkg4ZzTeqQTV5liWQZyvMySEssTeWs3Wqxs9QZtd9bs4=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1778068260; c=relaxed/simple;\n\tbh=ZBhRJlRvhHwOxsBveV9/2myckVu9d7QkFIocuHoeGoo=;\n\th=From:To:CC:Subject:Date:Message-ID:MIME-Version:Content-Type;\n b=tsRgc63QjxdkhrdmLYxChXHfcZWC7A2qHKBjLEnYd34eLHDToPCqsnpFKfMYQUrenxxxrcfttQA2ddKAyBGW5oVmx//0VRzUBB3cQvSmM/Tk6dYTrLjh2rldCqv1QedA4QO7FXuOIqAVfgkUVbLV0froU3CNqMOUcg4h+xReGBc=","ARC-Authentication-Results":"i=1; smtp.subspace.kernel.org;\n dmarc=pass (p=quarantine dis=none) header.from=huawei.com;\n spf=pass smtp.mailfrom=huawei.com;\n dkim=pass (1024-bit key) header.d=huawei.com header.i=@huawei.com\n header.b=40NhFgcY; arc=none smtp.client-ip=113.46.200.219","dkim-signature":"v=1; a=rsa-sha256; d=huawei.com; s=dkim;\n\tc=relaxed/relaxed; q=dns/txt;\n\th=From;\n\tbh=vgAB32Cl/HRPnaEedloLwfof9vPAvxAYYFXMsjmfFJY=;\n\tb=40NhFgcY50mXdYoCGEB75VFk55KSNH0dZocNqBgRLBzqfl/bpva/u2V+akEZxxY4atdGLJ8Mx\n\tS1hkruGjrhDTpkfoq0VeDnrr7JFxCu4beik8UEL3UEbLlpHMTVc74qFrCjqonGuCLyXgdpOIB0q\n\t1BO9VGDC3zDk4eLAfmWVpKM=","From":"Li Xiasong <lixiasong1@huawei.com>","To":"<netfilter-devel@vger.kernel.org>","CC":"Pablo Neira Ayuso <pablo@netfilter.org>, Florian Westphal <fw@strlen.de>,\n\tPhil Sutter <phil@nwl.cc>, <coreteam@netfilter.org>, <yuehaibing@huawei.com>,\n\t<zhangchangzhong@huawei.com>, <weiyongjun1@huawei.com>","Subject":"[PATCH nft 0/2] netfilter: fix nf_ct_expect_alloc() reference leaks","Date":"Wed, 6 May 2026 20:16:16 +0800","Message-ID":"<20260506121618.578443-1-lixiasong1@huawei.com>","X-Mailer":"git-send-email 2.34.1","Precedence":"bulk","X-Mailing-List":"netfilter-devel@vger.kernel.org","List-Id":"<netfilter-devel.vger.kernel.org>","List-Subscribe":"<mailto:netfilter-devel+subscribe@vger.kernel.org>","List-Unsubscribe":"<mailto:netfilter-devel+unsubscribe@vger.kernel.org>","MIME-Version":"1.0","Content-Transfer-Encoding":"8bit","Content-Type":"text/plain","X-ClientProxiedBy":"kwepems100002.china.huawei.com (7.221.188.206) To\n kwepemj500018.china.huawei.com (7.202.194.48)"},"content":"this series fixes two nf_ct_expect_alloc() reference leaks in netfilter.\n\nPatch 1 fixes an error path leak in SIP REGISTER handling:\nwhen helper lookup fails after expectation allocation, the function\nreturns without dropping the local reference.\n\nPatch 2 fixes a leak in nft_ct expectation object evaluation:\nthe local reference obtained from nf_ct_expect_alloc() is never put\nafter nf_ct_expect_related(), regardless of success or failure.\n\nLi Xiasong (2):\n  netfilter: nf_conntrack_sip: fix missing expect put in REGISTER path\n  netfilter: nft_ct: fix missing expect put in obj eval\n\n net/netfilter/nf_conntrack_sip.c | 4 +++-\n net/netfilter/nft_ct.c           | 2 ++\n 2 files changed, 5 insertions(+), 1 deletion(-)"}