* netfilter 00/03: netfilter fixes
@ 2009-04-08 16:52 Patrick McHardy
2009-04-08 16:52 ` netfilter 01/03: ip6tables regression fix Patrick McHardy
` (3 more replies)
0 siblings, 4 replies; 15+ messages in thread
From: Patrick McHardy @ 2009-04-08 16:52 UTC (permalink / raw)
To: davem; +Cc: netdev, Patrick McHardy, netfilter-devel
Hi Dave,
the following patches fix three netfilter bugs:
- an incorrect dependency for the new LED target, added by myself to fix
the compilation problem reported one or two weeks ago
- a fix for the ip6_tables "lock free counters" regression caused by a
missing return statement
- a fix for a regression in .29, causing conntrack expectation refresh to
create a new expectation instead of refreshing the existing one.
Please apply or pull from:
git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6.git
Please note that the git tree will bring in a merge commit of Linus'
tree from 2 days ago.
Thanks!
include/net/netfilter/nf_conntrack_expect.h | 5 +++-
net/ipv6/netfilter/ip6_tables.c | 2 +
net/netfilter/Kconfig | 2 +-
net/netfilter/nf_conntrack_expect.c | 30 +++++---------------------
4 files changed, 13 insertions(+), 26 deletions(-)
Alex Riesen (1):
netfilter: fix selection of "LED" target in netfilter
Eric Dumazet (1):
netfilter: ip6tables regression fix
Pablo Neira Ayuso (1):
netfilter: ctnetlink: fix regression in expectation handling
^ permalink raw reply [flat|nested] 15+ messages in thread
* netfilter 01/03: ip6tables regression fix
2009-04-08 16:52 netfilter 00/03: netfilter fixes Patrick McHardy
@ 2009-04-08 16:52 ` Patrick McHardy
2009-04-08 16:52 ` netfilter 02/03: fix selection of "LED" target in netfilter Patrick McHardy
` (2 subsequent siblings)
3 siblings, 0 replies; 15+ messages in thread
From: Patrick McHardy @ 2009-04-08 16:52 UTC (permalink / raw)
To: davem; +Cc: netdev, Patrick McHardy, netfilter-devel
commit 49a88d18a1721ac14dbc67cd390db18ee1f3a42f
Author: Eric Dumazet <dada1@cosmosbay.com>
Date: Mon Apr 6 17:06:55 2009 +0200
netfilter: ip6tables regression fix
Commit 7845447 (netfilter: iptables: lock free counters) broke
ip6_tables by unconditionally returning ENOMEM in alloc_counters(),
Reported-by: Graham Murray <graham@gmurray.org.uk>
Signed-off-by: Eric Dumazet <dada1@cosmosbay.com>
Signed-off-by: Patrick McHardy <kaber@trash.net>
diff --git a/net/ipv6/netfilter/ip6_tables.c b/net/ipv6/netfilter/ip6_tables.c
index dfed176..800ae85 100644
--- a/net/ipv6/netfilter/ip6_tables.c
+++ b/net/ipv6/netfilter/ip6_tables.c
@@ -1033,6 +1033,8 @@ static struct xt_counters *alloc_counters(struct xt_table *table)
xt_free_table_info(info);
+ return counters;
+
free_counters:
vfree(counters);
nomem:
^ permalink raw reply related [flat|nested] 15+ messages in thread
* netfilter 02/03: fix selection of "LED" target in netfilter
2009-04-08 16:52 netfilter 00/03: netfilter fixes Patrick McHardy
2009-04-08 16:52 ` netfilter 01/03: ip6tables regression fix Patrick McHardy
@ 2009-04-08 16:52 ` Patrick McHardy
2009-04-08 16:52 ` netfilter 03/03: ctnetlink: fix regression in expectation handling Patrick McHardy
2009-04-08 20:43 ` netfilter 00/03: netfilter fixes David Miller
3 siblings, 0 replies; 15+ messages in thread
From: Patrick McHardy @ 2009-04-08 16:52 UTC (permalink / raw)
To: davem; +Cc: netdev, Patrick McHardy, netfilter-devel
commit 3ae16f13027c26cb4c227392116c2027524a6444
Author: Alex Riesen <fork0@users.sourceforge.net>
Date: Mon Apr 6 17:09:43 2009 +0200
netfilter: fix selection of "LED" target in netfilter
It's plural, not LED_TRIGGERS.
Signed-off-by: Alex Riesen <fork0@users.sourceforge.net>
Signed-off-by: Patrick McHardy <kaber@trash.net>
diff --git a/net/netfilter/Kconfig b/net/netfilter/Kconfig
index bb279bf..2329c5f 100644
--- a/net/netfilter/Kconfig
+++ b/net/netfilter/Kconfig
@@ -374,7 +374,7 @@ config NETFILTER_XT_TARGET_HL
config NETFILTER_XT_TARGET_LED
tristate '"LED" target support'
- depends on LEDS_CLASS && LED_TRIGGERS
+ depends on LEDS_CLASS && LEDS_TRIGGERS
depends on NETFILTER_ADVANCED
help
This option adds a `LED' target, which allows you to blink LEDs in
^ permalink raw reply related [flat|nested] 15+ messages in thread
* netfilter 03/03: ctnetlink: fix regression in expectation handling
2009-04-08 16:52 netfilter 00/03: netfilter fixes Patrick McHardy
2009-04-08 16:52 ` netfilter 01/03: ip6tables regression fix Patrick McHardy
2009-04-08 16:52 ` netfilter 02/03: fix selection of "LED" target in netfilter Patrick McHardy
@ 2009-04-08 16:52 ` Patrick McHardy
2009-04-08 20:43 ` netfilter 00/03: netfilter fixes David Miller
3 siblings, 0 replies; 15+ messages in thread
From: Patrick McHardy @ 2009-04-08 16:52 UTC (permalink / raw)
To: davem; +Cc: netdev, Patrick McHardy, netfilter-devel
commit 83731671d9e6878c0a05d309c68fb71c16d3235a
Author: Pablo Neira Ayuso <pablo@netfilter.org>
Date: Mon Apr 6 17:47:20 2009 +0200
netfilter: ctnetlink: fix regression in expectation handling
This patch fixes a regression (introduced by myself in commit 19abb7b:
netfilter: ctnetlink: deliver events for conntracks changed from
userspace) that results in an expectation re-insertion since
__nf_ct_expect_check() may return 0 for expectation timer refreshing.
This patch also removes a unnecessary refcount bump that
pretended to avoid a possible race condition with event delivery
and expectation timers (as said, not needed since we hold a
reference to the object since until we finish the expectation
setup). This also merges nf_ct_expect_related_report() and
nf_ct_expect_related() which look basically the same.
Reported-by: Patrick McHardy <kaber@trash.net>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Signed-off-by: Patrick McHardy <kaber@trash.net>
diff --git a/include/net/netfilter/nf_conntrack_expect.h b/include/net/netfilter/nf_conntrack_expect.h
index ab17a15..a965280 100644
--- a/include/net/netfilter/nf_conntrack_expect.h
+++ b/include/net/netfilter/nf_conntrack_expect.h
@@ -99,9 +99,12 @@ void nf_ct_expect_init(struct nf_conntrack_expect *, unsigned int, u_int8_t,
const union nf_inet_addr *,
u_int8_t, const __be16 *, const __be16 *);
void nf_ct_expect_put(struct nf_conntrack_expect *exp);
-int nf_ct_expect_related(struct nf_conntrack_expect *expect);
int nf_ct_expect_related_report(struct nf_conntrack_expect *expect,
u32 pid, int report);
+static inline int nf_ct_expect_related(struct nf_conntrack_expect *expect)
+{
+ return nf_ct_expect_related_report(expect, 0, 0);
+}
#endif /*_NF_CONNTRACK_EXPECT_H*/
diff --git a/net/netfilter/nf_conntrack_expect.c b/net/netfilter/nf_conntrack_expect.c
index 3940f99..afde8f9 100644
--- a/net/netfilter/nf_conntrack_expect.c
+++ b/net/netfilter/nf_conntrack_expect.c
@@ -372,7 +372,7 @@ static inline int __nf_ct_expect_check(struct nf_conntrack_expect *expect)
struct net *net = nf_ct_exp_net(expect);
struct hlist_node *n;
unsigned int h;
- int ret = 0;
+ int ret = 1;
if (!master_help->helper) {
ret = -ESHUTDOWN;
@@ -412,41 +412,23 @@ out:
return ret;
}
-int nf_ct_expect_related(struct nf_conntrack_expect *expect)
+int nf_ct_expect_related_report(struct nf_conntrack_expect *expect,
+ u32 pid, int report)
{
int ret;
spin_lock_bh(&nf_conntrack_lock);
ret = __nf_ct_expect_check(expect);
- if (ret < 0)
+ if (ret <= 0)
goto out;
+ ret = 0;
nf_ct_expect_insert(expect);
- atomic_inc(&expect->use);
- spin_unlock_bh(&nf_conntrack_lock);
- nf_ct_expect_event(IPEXP_NEW, expect);
- nf_ct_expect_put(expect);
- return ret;
-out:
spin_unlock_bh(&nf_conntrack_lock);
+ nf_ct_expect_event_report(IPEXP_NEW, expect, pid, report);
return ret;
-}
-EXPORT_SYMBOL_GPL(nf_ct_expect_related);
-
-int nf_ct_expect_related_report(struct nf_conntrack_expect *expect,
- u32 pid, int report)
-{
- int ret;
-
- spin_lock_bh(&nf_conntrack_lock);
- ret = __nf_ct_expect_check(expect);
- if (ret < 0)
- goto out;
- nf_ct_expect_insert(expect);
out:
spin_unlock_bh(&nf_conntrack_lock);
- if (ret == 0)
- nf_ct_expect_event_report(IPEXP_NEW, expect, pid, report);
return ret;
}
EXPORT_SYMBOL_GPL(nf_ct_expect_related_report);
^ permalink raw reply related [flat|nested] 15+ messages in thread
* Re: netfilter 00/03: netfilter fixes
2009-04-08 16:52 netfilter 00/03: netfilter fixes Patrick McHardy
` (2 preceding siblings ...)
2009-04-08 16:52 ` netfilter 03/03: ctnetlink: fix regression in expectation handling Patrick McHardy
@ 2009-04-08 20:43 ` David Miller
3 siblings, 0 replies; 15+ messages in thread
From: David Miller @ 2009-04-08 20:43 UTC (permalink / raw)
To: kaber; +Cc: netdev, netfilter-devel
From: Patrick McHardy <kaber@trash.net>
Date: Wed, 8 Apr 2009 18:52:16 +0200 (MEST)
> Please apply or pull from:
>
> git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6.git
Pulled, thanks Patrick.
^ permalink raw reply [flat|nested] 15+ messages in thread
* netfilter 00/03: netfilter fixes
@ 2010-02-19 17:02 Patrick McHardy
2010-02-19 20:46 ` David Miller
0 siblings, 1 reply; 15+ messages in thread
From: Patrick McHardy @ 2010-02-19 17:02 UTC (permalink / raw)
To: davem; +Cc: netdev, Patrick McHardy, netfilter-devel
Hi Dave,
following are three netfilter fixes for net-next, fixing:
- the NAT issue reported by Stephen, which was caused by inverted logic
in NF_HOOK_COND(), causing it to skip the POST_ROUTING hook invocation
- an assertion in ct_extend, caused by invalid ordering in ctnetlink
when setting up new conntracks. Additionally it is invalid to
attach helpers to existing conntracks, which is disabled by this
patch.
- an skb leak in nf_queue when userspace returns NF_STOLEN as verdict
Please apply or pull from:
git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-next-2.6.git master
Thanks!
include/linux/netfilter.h | 5 +++--
net/netfilter/nf_conntrack_netlink.c | 22 +++++++++++-----------
net/netfilter/nf_queue.c | 2 +-
3 files changed, 15 insertions(+), 14 deletions(-)
Eric Dumazet (1):
netfilter: nf_queue: fix NF_STOLEN skb leak
Pablo Neira Ayuso (1):
netfilter: ctnetlink: fix creation of conntrack with helpers
Patrick McHardy (1):
netfilter: restore POST_ROUTING hook in NF_HOOK_COND
^ permalink raw reply [flat|nested] 15+ messages in thread
* netfilter 00/03: netfilter fixes
@ 2009-07-16 12:26 Patrick McHardy
2009-07-17 0:37 ` David Miller
0 siblings, 1 reply; 15+ messages in thread
From: Patrick McHardy @ 2009-07-16 12:26 UTC (permalink / raw)
To: davem; +Cc: netdev, Patrick McHardy, netfilter-devel
Hi Dave,
following are two netfilter fixes for 2.6.31 and a MAINTAINERS update:
- a fix for the nf_conntrack_alloc() race from Eric
- a fix for incorrect invocation of nf_log_packet() in the new osf match
- a patch to add my netfilter git tree to MAINTAINERS
Please apply or pull from:
git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6.git master
Thanks!
Documentation/RCU/rculist_nulls.txt | 7 ++++++-
MAINTAINERS | 1 +
net/netfilter/nf_conntrack_core.c | 21 ++++++++++++++++++---
net/netfilter/xt_osf.c | 5 +++--
4 files changed, 28 insertions(+), 6 deletions(-)
Eric Dumazet (1):
netfilter: nf_conntrack: nf_conntrack_alloc() fixes
Joe Perches (1):
netfilter: add netfilter git to MAINTAINERS
Patrick McHardy (1):
netfilter: xt_osf: fix nf_log_packet() arguments
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: netfilter 00/03: netfilter fixes
2009-07-16 12:26 Patrick McHardy
@ 2009-07-17 0:37 ` David Miller
0 siblings, 0 replies; 15+ messages in thread
From: David Miller @ 2009-07-17 0:37 UTC (permalink / raw)
To: kaber; +Cc: netdev, netfilter-devel
From: Patrick McHardy <kaber@trash.net>
Date: Thu, 16 Jul 2009 14:26:44 +0200 (MEST)
> following are two netfilter fixes for 2.6.31 and a MAINTAINERS update:
>
> - a fix for the nf_conntrack_alloc() race from Eric
> - a fix for incorrect invocation of nf_log_packet() in the new osf match
> - a patch to add my netfilter git tree to MAINTAINERS
>
> Please apply or pull from:
>
> git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6.git master
Pulled, thanks a lot Patrick!
^ permalink raw reply [flat|nested] 15+ messages in thread
* netfilter 00/03: netfilter fixes
@ 2009-04-16 17:16 Patrick McHardy
2009-04-16 23:33 ` David Miller
0 siblings, 1 reply; 15+ messages in thread
From: Patrick McHardy @ 2009-04-16 17:16 UTC (permalink / raw)
To: davem; +Cc: netdev, Patrick McHardy, netfilter-devel
Hi Dave,
the following three patches fix two netfilter bugs introduced during the merge
window and re-add support for a feature that accidentally got dropped with the
SAME target removal:
- a missing list initialization of the nf_log logger lists
- a missing conversion to use the hlist_nulls list function in connection tracking
helper unregistration
- support for persistent multi-range NAT mappings
Please apply or pull from:
git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6.git
Thanks!
include/net/netfilter/nf_nat.h | 1 +
net/ipv4/netfilter/nf_nat_core.c | 3 ++-
net/netfilter/nf_conntrack_helper.c | 2 +-
net/netfilter/nf_log.c | 4 ++++
4 files changed, 8 insertions(+), 2 deletions(-)
Eric Dumazet (1):
netfilter: nf_log regression fix
Patrick McHardy (2):
netfilter: nf_conntrack: fix crash when unloading helpers
netfilter: nf_nat: add support for persistent mappings
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: netfilter 00/03: netfilter fixes
2009-04-16 17:16 Patrick McHardy
@ 2009-04-16 23:33 ` David Miller
0 siblings, 0 replies; 15+ messages in thread
From: David Miller @ 2009-04-16 23:33 UTC (permalink / raw)
To: kaber; +Cc: netdev, netfilter-devel
From: Patrick McHardy <kaber@trash.net>
Date: Thu, 16 Apr 2009 19:16:22 +0200 (MEST)
> the following three patches fix two netfilter bugs introduced during the merge
> window and re-add support for a feature that accidentally got dropped with the
> SAME target removal:
>
> - a missing list initialization of the nf_log logger lists
>
> - a missing conversion to use the hlist_nulls list function in connection tracking
> helper unregistration
>
> - support for persistent multi-range NAT mappings
>
> Please apply or pull from:
>
> git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6.git
Pulled, thanks a lot!
^ permalink raw reply [flat|nested] 15+ messages in thread
* netfilter 00/03: netfilter fixes
@ 2008-11-24 13:44 Patrick McHardy
0 siblings, 0 replies; 15+ messages in thread
From: Patrick McHardy @ 2008-11-24 13:44 UTC (permalink / raw)
To: davem; +Cc: netdev, Patrick McHardy, netfilter-devel
Hi Dave,
the following three patches for 2.6.28 fix a couple of netfilter issues:
- a conntrack creation race in ctnetlink that can cause NULL pointer
dereferences in ctnetlink and duplicate conntrack entries.
- a missing const qualifier that got lost during the encapsulation of
iptables target parameters
- a crash with bridge netfilter and GRE caused by a missing update_pmtu()
function for the fake dst_entry.
Please apply, thanks.
include/linux/netfilter/x_tables.h | 2 +-
net/bridge/br_netfilter.c | 13 +++++++++++++
net/netfilter/nf_conntrack_core.c | 2 --
net/netfilter/nf_conntrack_netlink.c | 5 +++--
4 files changed, 17 insertions(+), 5 deletions(-)
Herbert Xu (1):
bridge: netfilter: fix update_pmtu crash with GRE
Jan Engelhardt (1):
netfilter: xtables: add missing const qualifier to xt_tgchk_param
Patrick McHardy (1):
netfilter: ctnetlink: fix conntrack creation race
^ permalink raw reply [flat|nested] 15+ messages in thread
* netfilter 00/03: netfilter fixes
@ 2008-10-14 14:48 Patrick McHardy
0 siblings, 0 replies; 15+ messages in thread
From: Patrick McHardy @ 2008-10-14 14:48 UTC (permalink / raw)
To: davem; +Cc: Patrick McHardy, netfilter-devel
Hi Dave,
following are some netfilter fixes for 2.6.28, containing:
- restauration of a lost #ifdef to fix user-triggerable WARN_ONs in the
NAT code. Also queued for -stable.
- restauration of ebtables dependencies that got lost during a Kconfig
restructuring
- a slightly more involved patch from Pablo to remove the bogus NAT module
dependencies from ctnetlink. It could be argued whether this qualifies as
a real bugfix since its mainly a "it shouldn't be like this" thing and
everything works properly, in my opinion it does though because of all
the side effects that even just loading the NAT module causes. A somewhat
fitting analogy would be an IPv6 module dependency in, lets say, TCP :)
Please apply, thanks.
include/linux/netfilter/nfnetlink.h | 3 +
include/net/netfilter/nf_nat_core.h | 8 ++
net/bridge/netfilter/Kconfig | 1 +
net/ipv4/netfilter/nf_defrag_ipv4.c | 3 +-
net/ipv4/netfilter/nf_nat_core.c | 97 ++++++++++++++++++++++
net/netfilter/nf_conntrack_core.c | 7 ++
net/netfilter/nf_conntrack_netlink.c | 151 ++++++++++++++--------------------
net/netfilter/nfnetlink.c | 12 ++-
8 files changed, 188 insertions(+), 94 deletions(-)
Pablo Neira Ayuso (1):
netfilter: ctnetlink: remove bogus module dependency between ctnetlink and nf_nat
Patrick McHardy (2):
netfilter: restore lost #ifdef guarding defrag exception
netfilter: fix ebtables dependencies
^ permalink raw reply [flat|nested] 15+ messages in thread
* netfilter 00/03: netfilter fixes
@ 2008-06-17 14:03 Patrick McHardy
2008-06-17 22:53 ` David Miller
0 siblings, 1 reply; 15+ messages in thread
From: Patrick McHardy @ 2008-06-17 14:03 UTC (permalink / raw)
To: davem; +Cc: Patrick McHardy, netfilter-devel
Hi Dave,
following are three fixes for netfilter:
- fix for NAT RCU races related to ct_extend
- fix for a memory leak in a H.323 module init error path
- fix for a crash when unloading the H.323 module while H.245 expectation
or connections are active
Please apply, thanks.
include/net/netfilter/nf_conntrack_extend.h | 1 +
net/ipv4/netfilter/nf_nat_core.c | 3 +--
net/netfilter/nf_conntrack_extend.c | 9 ++++++++-
net/netfilter/nf_conntrack_h323_main.c | 22 +++++++++++++++-------
4 files changed, 25 insertions(+), 10 deletions(-)
Patrick McHardy (3):
netfilter: nf_nat: fix RCU races
netfilter: nf_conntrack_h323: fix memory leak in module initialization error path
netfilter: nf_conntrack_h323: fix module unload crash
^ permalink raw reply [flat|nested] 15+ messages in thread
* Re: netfilter 00/03: netfilter fixes
2008-06-17 14:03 Patrick McHardy
@ 2008-06-17 22:53 ` David Miller
0 siblings, 0 replies; 15+ messages in thread
From: David Miller @ 2008-06-17 22:53 UTC (permalink / raw)
To: kaber; +Cc: netfilter-devel
From: Patrick McHardy <kaber@trash.net>
Date: Tue, 17 Jun 2008 16:03:51 +0200 (MEST)
> following are three fixes for netfilter:
>
> - fix for NAT RCU races related to ct_extend
> - fix for a memory leak in a H.323 module init error path
> - fix for a crash when unloading the H.323 module while H.245 expectation
> or connections are active
>
> Please apply, thanks.
Applied to net-2.6, and I'll push back out to kernel.org after some
build sanity checks.
Thanks!
^ permalink raw reply [flat|nested] 15+ messages in thread
end of thread, other threads:[~2010-02-19 20:45 UTC | newest]
Thread overview: 15+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2009-04-08 16:52 netfilter 00/03: netfilter fixes Patrick McHardy
2009-04-08 16:52 ` netfilter 01/03: ip6tables regression fix Patrick McHardy
2009-04-08 16:52 ` netfilter 02/03: fix selection of "LED" target in netfilter Patrick McHardy
2009-04-08 16:52 ` netfilter 03/03: ctnetlink: fix regression in expectation handling Patrick McHardy
2009-04-08 20:43 ` netfilter 00/03: netfilter fixes David Miller
-- strict thread matches above, loose matches on Subject: below --
2010-02-19 17:02 Patrick McHardy
2010-02-19 20:46 ` David Miller
2009-07-16 12:26 Patrick McHardy
2009-07-17 0:37 ` David Miller
2009-04-16 17:16 Patrick McHardy
2009-04-16 23:33 ` David Miller
2008-11-24 13:44 Patrick McHardy
2008-10-14 14:48 Patrick McHardy
2008-06-17 14:03 Patrick McHardy
2008-06-17 22:53 ` David Miller
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).