Hi, The following batch contains Netfilter updates for net-next: Patch #1 fix checksum calculation in nfnetlink_queue with SCTP, segment GSO packet since skb_zerocopy() does not support GSO_BY_FRAGS, from Antonio Ojea. Patch #2 extend nfnetlink_queue coverage to handle SCTP packets, from Antonio Ojea. Patch #3 uses consume_skb() instead of kfree_skb() in nfnetlink, from Donald Hunter. Patch #4 adds a dedicate commit list for sets to speed up intra-transaction lookups, from Florian Westphal. Patch #5 skips removal of element from abort path for the pipapo backend, ditching the shadow copy of this datastructure is sufficient. Patch #6 moves nf_ct_netns_get() out of nf_conncount_init() to let users of conncoiunt decide when to enable conntrack, this is needed by openvswitch, from Xin Long. Patch #7 pass context to all nft_parse_register_load() in preparation for the next patch. Patches #8 and #9 reject loads from uninitialized registers from control plane to remove register initialization from datapath. From Florian Westphal. Please, pull these changes from: git://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf-next.git nf-next-24-08-23 Thanks. ---------------------------------------------------------------- The following changes since commit 1bf8e07c382bd4f04ede81ecc05267a8ffd60999: dt-binding: ptp: fsl,ptp: add pci1957,ee02 compatible string for fsl,enetc-ptp (2024-08-19 09:48:53 +0100) are available in the Git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf-next.git tags/nf-next-24-08-23 for you to fetch changes up to c88baabf16d1ef74ab8832de9761226406af5507: netfilter: nf_tables: don't initialize registers in nft_do_chain() (2024-08-20 12:37:25 +0200) ---------------------------------------------------------------- netfilter pull request 24-08-23 ---------------------------------------------------------------- Antonio Ojea (2): netfilter: nfnetlink_queue: unbreak SCTP traffic selftests: netfilter: nft_queue.sh: sctp coverage Donald Hunter (1): netfilter: nfnetlink: convert kfree_skb to consume_skb Florian Westphal (4): netfilter: nf_tables: store new sets in dedicated list netfilter: nf_tables: pass context structure to nft_parse_register_load netfilter: nf_tables: allow loads only when register is initialized netfilter: nf_tables: don't initialize registers in nft_do_chain() Pablo Neira Ayuso (1): netfilter: nf_tables: do not remove elements if set backend implements .abort Xin Long (1): netfilter: move nf_ct_netns_get out of nf_conncount_init include/net/netfilter/nf_conntrack_count.h | 6 +- include/net/netfilter/nf_tables.h | 6 +- net/bridge/netfilter/nft_meta_bridge.c | 2 +- net/core/dev.c | 1 + net/ipv4/netfilter/nft_dup_ipv4.c | 4 +- net/ipv6/netfilter/nft_dup_ipv6.c | 4 +- net/netfilter/nf_conncount.c | 15 +--- net/netfilter/nf_tables_api.c | 75 +++++++++++++++---- net/netfilter/nf_tables_core.c | 2 +- net/netfilter/nfnetlink.c | 14 ++-- net/netfilter/nfnetlink_queue.c | 12 ++- net/netfilter/nft_bitwise.c | 4 +- net/netfilter/nft_byteorder.c | 2 +- net/netfilter/nft_cmp.c | 6 +- net/netfilter/nft_ct.c | 2 +- net/netfilter/nft_dup_netdev.c | 2 +- net/netfilter/nft_dynset.c | 4 +- net/netfilter/nft_exthdr.c | 2 +- net/netfilter/nft_fwd_netdev.c | 6 +- net/netfilter/nft_hash.c | 2 +- net/netfilter/nft_lookup.c | 2 +- net/netfilter/nft_masq.c | 4 +- net/netfilter/nft_meta.c | 2 +- net/netfilter/nft_nat.c | 8 +- net/netfilter/nft_objref.c | 2 +- net/netfilter/nft_payload.c | 2 +- net/netfilter/nft_queue.c | 2 +- net/netfilter/nft_range.c | 2 +- net/netfilter/nft_redir.c | 4 +- net/netfilter/nft_tproxy.c | 4 +- net/netfilter/xt_connlimit.c | 15 +++- net/openvswitch/conntrack.c | 5 +- tools/testing/selftests/net/netfilter/config | 2 + tools/testing/selftests/net/netfilter/nft_queue.sh | 85 +++++++++++++++++++++- 34 files changed, 226 insertions(+), 84 deletions(-)