diff options
author | David S. Miller <davem@davemloft.net> | 2013-09-17 20:22:53 -0400 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2013-09-17 20:22:53 -0400 |
commit | 61c5923a2f2d8ab98a1e3c76f17e0f4a871ec75b (patch) | |
tree | 0bcacd43538e7e1952f7e8696e48f9ffdbb1e0d0 /include/net | |
parent | 2936b6ab455433a5ad14c7a1d2473afe1fa3faa7 (diff) | |
parent | 0a0d80eb39aa465b7bdf6f7754d0ba687eb3d2a7 (diff) | |
download | linux-61c5923a2f2d8ab98a1e3c76f17e0f4a871ec75b.tar.gz linux-61c5923a2f2d8ab98a1e3c76f17e0f4a871ec75b.tar.xz |
Merge branch 'master' of git://git.kernel.org/pub/scm/linux/kernel/git/pablo/nf
Pablo Neira Ayuso says:
====================
The following patchset contains Netfilter fixes for you net tree,
mostly targeted to ipset, they are:
* Fix ICMPv6 NAT due to wrong comparison, code instead of type, from
Phil Oester.
* Fix RCU race in conntrack extensions release path, from Michal Kubecek.
* Fix missing inversion in the userspace ipset test command match if
the nomatch option is specified, from Jozsef Kadlecsik.
* Skip layer 4 protocol matching in ipset in case of IPv6 fragments,
also from Jozsef Kadlecsik.
* Fix sequence adjustment in nfnetlink_queue due to using the netlink
skb instead of the network skb, from Gao feng.
* Make sure we cannot swap of sets with different layer 3 family in
ipset, from Jozsef Kadlecsik.
* Fix possible bogus matching in ipset if hash sets with net elements
are used, from Oliver Smith.
====================
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'include/net')
-rw-r--r-- | include/net/netfilter/nf_conntrack_extend.h | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/include/net/netfilter/nf_conntrack_extend.h b/include/net/netfilter/nf_conntrack_extend.h index ff95434e50ca..88a1d4060d52 100644 --- a/include/net/netfilter/nf_conntrack_extend.h +++ b/include/net/netfilter/nf_conntrack_extend.h @@ -86,7 +86,7 @@ static inline void nf_ct_ext_destroy(struct nf_conn *ct) static inline void nf_ct_ext_free(struct nf_conn *ct) { if (ct->ext) - kfree(ct->ext); + kfree_rcu(ct->ext, rcu); } /* Add this type, returns pointer to data or NULL. */ |