{"id":2234248,"url":"http://patchwork.ozlabs.org/api/1.2/covers/2234248/?format=json","web_url":"http://patchwork.ozlabs.org/project/netfilter-devel/cover/20260507140423.3734545-1-lixiasong1@huawei.com/","project":{"id":26,"url":"http://patchwork.ozlabs.org/api/1.2/projects/26/?format=json","name":"Netfilter Development","link_name":"netfilter-devel","list_id":"netfilter-devel.vger.kernel.org","list_email":"netfilter-devel@vger.kernel.org","web_url":null,"scm_url":null,"webscm_url":null,"list_archive_url":"","list_archive_url_format":"","commit_url_format":""},"msgid":"<20260507140423.3734545-1-lixiasong1@huawei.com>","list_archive_url":null,"date":"2026-05-07T14:04:21","name":"[nft,v2,0/2] netfilter: fix expectation reference leaks","submitter":{"id":93343,"url":"http://patchwork.ozlabs.org/api/1.2/people/93343/?format=json","name":"Li Xiasong","email":"lixiasong1@huawei.com"},"mbox":"http://patchwork.ozlabs.org/project/netfilter-devel/cover/20260507140423.3734545-1-lixiasong1@huawei.com/mbox/","series":[{"id":503182,"url":"http://patchwork.ozlabs.org/api/1.2/series/503182/?format=json","web_url":"http://patchwork.ozlabs.org/project/netfilter-devel/list/?series=503182","date":"2026-05-07T14:04:23","name":"netfilter: fix expectation reference leaks","version":2,"mbox":"http://patchwork.ozlabs.org/series/503182/mbox/"}],"comments":"http://patchwork.ozlabs.org/api/covers/2234248/comments/","headers":{"Return-Path":"\n <netfilter-devel+bounces-12482-incoming=patchwork.ozlabs.org@vger.kernel.org>","X-Original-To":["incoming@patchwork.ozlabs.org","netfilter-devel@vger.kernel.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=huawei.com header.i=@huawei.com header.a=rsa-sha256\n header.s=dkim header.b=wWB6YGPh;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c04:e001:36c::12fc:5321; helo=tor.lore.kernel.org;\n envelope-from=netfilter-devel+bounces-12482-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)","smtp.subspace.kernel.org;\n\tdkim=pass (1024-bit key) header.d=huawei.com header.i=@huawei.com\n header.b=\"wWB6YGPh\"","smtp.subspace.kernel.org;\n arc=none smtp.client-ip=113.46.200.225","smtp.subspace.kernel.org;\n dmarc=pass (p=quarantine dis=none) header.from=huawei.com","smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=huawei.com"],"Received":["from tor.lore.kernel.org (tor.lore.kernel.org\n [IPv6:2600:3c04:e001:36c::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4gBCyv0mP1z1yCg\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 07 May 2026 23:39:19 +1000 (AEST)","from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby tor.lore.kernel.org (Postfix) with ESMTP id 3DBD1300D15B\n\tfor <incoming@patchwork.ozlabs.org>; Thu,  7 May 2026 13:39:06 +0000 (UTC)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 26AFB3F9F46;\n\tThu,  7 May 2026 13:39:01 +0000 (UTC)","from canpmsgout10.his.huawei.com (canpmsgout10.his.huawei.com\n [113.46.200.225])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id C0DD2317715\n\tfor <netfilter-devel@vger.kernel.org>; Thu,  7 May 2026 13:38:57 +0000 (UTC)","from mail.maildlp.com (unknown [172.19.163.127])\n\tby canpmsgout10.his.huawei.com (SkyGuard) with ESMTPS id 4gBCnk1bGDz1K970;\n\tThu,  7 May 2026 21:31:22 +0800 (CST)","from kwepemj500018.china.huawei.com (unknown [7.202.194.48])\n\tby mail.maildlp.com (Postfix) with ESMTPS id 5D65C402AB;\n\tThu,  7 May 2026 21:38:54 +0800 (CST)","from huawei.com (10.50.85.128) by kwepemj500018.china.huawei.com\n (7.202.194.48) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.11; Thu, 7 May\n 2026 21:38:53 +0800"],"ARC-Seal":"i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1778161140; cv=none;\n b=QdLt/heed5HvIZkn2qLqd936HZqOxvR3EFUd+RtRcGvifskboHIJF6Xbot54BNqO06kfi+PySnk+whyZTuGj+IuJcyCNbQDHfhrEZUhVM4Od2UHtIeCNKuuKFqGINqn6zcDGoZ0k70HUwrJwrfTu9WuKd8kOr/rMELhKzyh+aqM=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1778161140; c=relaxed/simple;\n\tbh=yGy4Wwi7es9iLVKBZoDvlzxaFM+IwPuLgPmhLgdjWCQ=;\n\th=From:To:CC:Subject:Date:Message-ID:MIME-Version:Content-Type;\n b=WYZ6Tp0EU7ojDZZe/O+Aun68sIkq+PUmgE6lXR70AGXqSIeaBAbds3bVQOgkmh5iRyZFWSkHalVHuSwmxGzhJlP9P9ZvH9G30CwZ4jlzk/FmHsFHnnv/dUuVuMYqDU1GWfTaIXXebwQqqt4xcqJJch5x8c8JJ4iMqiV7CsN+1zU=","ARC-Authentication-Results":"i=1; smtp.subspace.kernel.org;\n dmarc=pass (p=quarantine dis=none) header.from=huawei.com;\n spf=pass smtp.mailfrom=huawei.com;\n dkim=pass (1024-bit key) header.d=huawei.com header.i=@huawei.com\n header.b=wWB6YGPh; arc=none smtp.client-ip=113.46.200.225","dkim-signature":"v=1; a=rsa-sha256; d=huawei.com; s=dkim;\n\tc=relaxed/relaxed; q=dns/txt;\n\th=From;\n\tbh=baYHPUHTTdZ8AvIrILDW5xP5cVQjBwpw+fctcTzu+n4=;\n\tb=wWB6YGPhaXYeARlu3KOVN3NOKNmPbDrx6CV9sQVT8Dadd/6EOdsBVs/bTIUfHYyADlhpAMmBD\n\tFuec4AOoU5f+tLV0fj7xPTSLt0DFBpCfiDA0W/1hXWb1lpNJt5YK/DqAZaJbebsxP1/8EaGOFRU\n\t5jfqFkcVEPb5v8aOR1ZUMWU=","From":"Li Xiasong <lixiasong1@huawei.com>","To":"<netfilter-devel@vger.kernel.org>","CC":"Pablo Neira Ayuso <pablo@netfilter.org>, Florian Westphal <fw@strlen.de>,\n\tPhil Sutter <phil@nwl.cc>, <coreteam@netfilter.org>, <yuehaibing@huawei.com>,\n\t<zhangchangzhong@huawei.com>, <weiyongjun1@huawei.com>","Subject":"[PATCH nft v2 0/2] netfilter: fix expectation reference leaks","Date":"Thu, 7 May 2026 22:04:21 +0800","Message-ID":"<20260507140423.3734545-1-lixiasong1@huawei.com>","X-Mailer":"git-send-email 2.34.1","Precedence":"bulk","X-Mailing-List":"netfilter-devel@vger.kernel.org","List-Id":"<netfilter-devel.vger.kernel.org>","List-Subscribe":"<mailto:netfilter-devel+subscribe@vger.kernel.org>","List-Unsubscribe":"<mailto:netfilter-devel+unsubscribe@vger.kernel.org>","MIME-Version":"1.0","Content-Transfer-Encoding":"8bit","Content-Type":"text/plain","X-ClientProxiedBy":"kwepems200002.china.huawei.com (7.221.188.68) To\n kwepemj500018.china.huawei.com (7.202.194.48)"},"content":"this series fixes two expectation reference leaks in netfilter.\n\nThe first patch simplifies SIP REGISTER handling by validating helper\navailability before expectation allocation, removing an early-return\nleak path.\n\nThe second patch adds a missing nf_ct_expect_put() in nft_ct expectation\nobject evaluation to balance the allocation reference.\n\nChanges in v2:\n  - Patch 2/2: in process_register_request(), check helper before\n    nf_ct_expect_alloc() as suggested.\n\nLink to v1:\n  - https://lore.kernel.org/netfilter-devel/20260506121618.578443-1-lixiasong1@huawei.com/\n\nLi Xiasong (2):\n  netfilter: nf_conntrack_sip: get helper before allocating expectation\n  netfilter: nft_ct: fix missing expect put in obj eval\n\n net/netfilter/nf_conntrack_sip.c | 8 ++++----\n net/netfilter/nft_ct.c           | 2 ++\n 2 files changed, 6 insertions(+), 4 deletions(-)"}