{"id":2235205,"url":"http://patchwork.ozlabs.org/api/1.2/covers/2235205/?format=json","web_url":"http://patchwork.ozlabs.org/project/netfilter-devel/cover/20260508205903.10238-1-kadlec@netfilter.org/","project":{"id":26,"url":"http://patchwork.ozlabs.org/api/1.2/projects/26/?format=json","name":"Netfilter Development","link_name":"netfilter-devel","list_id":"netfilter-devel.vger.kernel.org","list_email":"netfilter-devel@vger.kernel.org","web_url":null,"scm_url":null,"webscm_url":null,"list_archive_url":"","list_archive_url_format":"","commit_url_format":""},"msgid":"<20260508205903.10238-1-kadlec@netfilter.org>","list_archive_url":null,"date":"2026-05-08T20:58:55","name":"[v6,0/8] netfilter: ipset fixes","submitter":{"id":77226,"url":"http://patchwork.ozlabs.org/api/1.2/people/77226/?format=json","name":"Jozsef Kadlecsik","email":"kadlec@netfilter.org"},"mbox":"http://patchwork.ozlabs.org/project/netfilter-devel/cover/20260508205903.10238-1-kadlec@netfilter.org/mbox/","series":[{"id":503447,"url":"http://patchwork.ozlabs.org/api/1.2/series/503447/?format=json","web_url":"http://patchwork.ozlabs.org/project/netfilter-devel/list/?series=503447","date":"2026-05-08T20:58:57","name":"netfilter: ipset fixes","version":6,"mbox":"http://patchwork.ozlabs.org/series/503447/mbox/"}],"comments":"http://patchwork.ozlabs.org/api/covers/2235205/comments/","headers":{"Return-Path":"\n <netfilter-devel+bounces-12515-incoming=patchwork.ozlabs.org@vger.kernel.org>","X-Original-To":["incoming@patchwork.ozlabs.org","netfilter-devel@vger.kernel.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=blackhole.kfki.hu header.i=@blackhole.kfki.hu\n header.a=rsa-sha256 header.s=20151130 header.b=Tti836hJ;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c0a:e001:db::12fc:5321; helo=sea.lore.kernel.org;\n envelope-from=netfilter-devel+bounces-12515-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)","smtp.subspace.kernel.org;\n\tdkim=pass (1024-bit key) header.d=blackhole.kfki.hu\n header.i=@blackhole.kfki.hu header.b=\"Tti836hJ\"","smtp.subspace.kernel.org;\n arc=none smtp.client-ip=148.6.0.49","smtp.subspace.kernel.org;\n dmarc=none (p=none dis=none) header.from=netfilter.org","smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=blackhole.kfki.hu"],"Received":["from sea.lore.kernel.org (sea.lore.kernel.org\n [IPv6:2600:3c0a:e001:db::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4gC1pq57pRz1yHW\n\tfor <incoming@patchwork.ozlabs.org>; Sat, 09 May 2026 07:05:07 +1000 (AEST)","from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sea.lore.kernel.org (Postfix) with ESMTP id 94B46304DCA8\n\tfor <incoming@patchwork.ozlabs.org>; Fri,  8 May 2026 21:04:23 +0000 (UTC)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 74183423163;\n\tFri,  8 May 2026 21:04:22 +0000 (UTC)","from smtp-out.kfki.hu (smtp-out.kfki.hu [148.6.0.49])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 32A0F36403B\n\tfor <netfilter-devel@vger.kernel.org>; Fri,  8 May 2026 21:04:19 +0000 (UTC)","from localhost (localhost [127.0.0.1])\n\tby smtp0.kfki.hu (Postfix) with ESMTP id 4gC1gw3Rvwz3sb8r;\n\tFri,  8 May 2026 22:59:08 +0200 (CEST)","from smtp0.kfki.hu ([127.0.0.1])\n by localhost (smtp0.kfki.hu [127.0.0.1]) (amavis, port 10026) with ESMTP\n id FxK_9KEdxti3; Fri,  8 May 2026 22:59:06 +0200 (CEST)","from mentat.rmki.kfki.hu (254C131D.nat.pool.telekom.hu\n [37.76.19.29])\n\t(Authenticated sender: kadlecsik.jozsef@wigner.hu)\n\tby smtp0.kfki.hu (Postfix) with ESMTPSA id 4gC1gr5MkSz3sb9B;\n\tFri,  8 May 2026 22:59:04 +0200 (CEST)","by mentat.rmki.kfki.hu (Postfix, from userid 1000)\n\tid E6D55141C70; Fri,  8 May 2026 22:59:03 +0200 (CEST)"],"ARC-Seal":"i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1778274262; cv=none;\n b=RGwqSMIPi4zfq5OPaupmcCGjzBB4W+3STBnCR6W9b5OU3bzjRpcK89H6L2MGaKguFXtqxrJZs8ZCWLuPxm4xHuWJbgaOXQfvZiSNpBMQb3iKEAsm1XOXFlRpyqN++1NqTPXiajrmHTNoBWvQOHJHILlylci3CyZnjMTqiNMbxPs=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1778274262; c=relaxed/simple;\n\tbh=VBmWw4K90l56etN30cLzQrR5qMRXpdUUw0kfS9vRVKI=;\n\th=From:To:Cc:Subject:Date:Message-Id:MIME-Version;\n b=FcsQtMnQRDlvZovPeEKeXBcNesGwd10KGdJiWuH9QJ6k02RHPEC8f2tzU0vinqM09Z1+VgwqTngw4ry7Ns/JsppfDsJMBBRNSOqDWtulaA+R49Hjm4zeKo5VA2IP5HSksdF/7ot73l2AUwCLqSOHAKkKRldV/vLnm7dhxAnPDv4=","ARC-Authentication-Results":"i=1; smtp.subspace.kernel.org;\n dmarc=none (p=none dis=none) header.from=netfilter.org;\n spf=pass smtp.mailfrom=blackhole.kfki.hu;\n dkim=pass (1024-bit key) header.d=blackhole.kfki.hu\n header.i=@blackhole.kfki.hu header.b=Tti836hJ;\n arc=none smtp.client-ip=148.6.0.49","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=\n\tblackhole.kfki.hu; h=mime-version:x-mailer:message-id:date:date\n\t:from:from:received:received:received; s=20151130; t=1778273946;\n\t x=1780088347; bh=oGb96l/S8WijJSk1sUQGzB7IrwGLZO5aEkXTV3YzVDE=; b=\n\tTti836hJ3EuHs3+lA5M67HiM5ylQTJzUuxrKq/X/D/h+WOOwQfmrFToeWzU+jsLI\n\tAMWLXC9gki6vYt93C8OtBPEE0h9CM81oy4TEVLqGor7j+uh14MRyxzba7TDTN2CQ\n\t0zSECxzTpvpmCoM7rJ6cCf0Cn6UXjKa+BtzdcdTJJEM=","X-Virus-Scanned":"Debian amavis at smtp0.kfki.hu","From":"Jozsef Kadlecsik <kadlec@netfilter.org>","To":"netfilter-devel@vger.kernel.org","Cc":"Pablo Neira Ayuso <pablo@netfilter.org>","Subject":"[PATCH v6 0/8] netfilter: ipset fixes","Date":"Fri,  8 May 2026 22:58:55 +0200","Message-Id":"<20260508205903.10238-1-kadlec@netfilter.org>","X-Mailer":"git-send-email 2.39.5","Precedence":"bulk","X-Mailing-List":"netfilter-devel@vger.kernel.org","List-Id":"<netfilter-devel.vger.kernel.org>","List-Subscribe":"<mailto:netfilter-devel+subscribe@vger.kernel.org>","List-Unsubscribe":"<mailto:netfilter-devel+unsubscribe@vger.kernel.org>","MIME-Version":"1.0","X-deepspam":"ham 1%","Content-Transfer-Encoding":"quoted-printable"},"content":"Hi Pablo,\n\nHere follows the new revision of the fixes for the current list\nof ipset related issues. If sashiko won't find any issues in \nthe patches themselves, then please consider applying them.\n\nBest regards,\nJozsef\n\nJozsef Kadlecsik (8):\n  netfilter: ipset: fix a potential dump-destroy race\n  netfilter: ipset: Fix data race between add and list header in all\n    hash types\n  netfilter: ipset: Fix data race between add and dump in all hash types\n  netfilter: ipset: annotate \"pos\" for concurrent readers/writers\n  netfilter: ipset: Don't use test_bit() in lockless RCU readers\n  netfilter: ipset: fix potential torn read in reuse/forceadd cases\n  netfilter: ipset: skip gc when resize is in progress\n  netfilter: ipset: fix order of usage counters\n\n net/netfilter/ipset/ip_set_core.c     |  5 +-\n net/netfilter/ipset/ip_set_hash_gen.h | 82 ++++++++++++++++++---------\n 2 files changed, 58 insertions(+), 29 deletions(-)"}