* netfilter 00/05: netfilter fixes @ 2009-12-15 16:14 Patrick McHardy 2009-12-15 16:14 ` netfilter 01/05: xtables: document minimal required version Patrick McHardy ` (5 more replies) 0 siblings, 6 replies; 23+ messages in thread From: Patrick McHardy @ 2009-12-15 16:14 UTC (permalink / raw) To: davem; +Cc: netdev, Patrick McHardy, netfilter-devel Hi Dave, the following patches fix a couple of bugs in netfilter and IPVS: - a fix for a crash triggered by fragmentes received by bridge netfilter being combined with fragments received on non-bridge devices from myself - a fix for IPVS synchronization on connection close from Xiaotian Feng - a fix for use of uninitialized fields in IPVS from Simon Horman - a patch to document the minimal required iptables version from Jan Engelhardt I'll also push the fragment fix to stable (forgot to add CC before committing) once it hits mainline. Please apply or pull from: git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6.git master Thanks! Documentation/Changes | 2 ++ include/net/ip.h | 1 + include/net/ipv6.h | 8 ++++++++ include/net/netfilter/ipv6/nf_conntrack_ipv6.h | 2 +- net/ipv4/netfilter/nf_defrag_ipv4.c | 21 +++++++++++++++++---- net/ipv6/netfilter/nf_conntrack_l3proto_ipv6.c | 19 +++++++++++++++++-- net/ipv6/netfilter/nf_conntrack_reasm.c | 7 ++++--- net/ipv6/reassembly.c | 5 ++++- net/netfilter/ipvs/ip_vs_core.c | 1 + net/netfilter/ipvs/ip_vs_ctl.c | 4 ++++ 10 files changed, 59 insertions(+), 11 deletions(-) Jan Engelhardt (1): netfilter: xtables: document minimal required version Patrick McHardy (2): ipv6: reassembly: use seperate reassembly queues for conntrack and local delivery netfilter: fix crashes in bridge netfilter caused by fragment jumps Simon Horman (1): ipvs: zero usvc and udest Xiaotian Feng (1): ipvs: fix synchronization on connection close ^ permalink raw reply [flat|nested] 23+ messages in thread
* netfilter 01/05: xtables: document minimal required version 2009-12-15 16:14 netfilter 00/05: netfilter fixes Patrick McHardy @ 2009-12-15 16:14 ` Patrick McHardy 2009-12-15 16:14 ` ipvs 02/05: fix synchronization on connection close Patrick McHardy ` (4 subsequent siblings) 5 siblings, 0 replies; 23+ messages in thread From: Patrick McHardy @ 2009-12-15 16:14 UTC (permalink / raw) To: davem; +Cc: netdev, Patrick McHardy, netfilter-devel commit 7a92263705435d046d37a0990d0edfcb517f7ad3 Author: Jan Engelhardt <jengelh@medozas.de> Date: Mon Dec 14 14:52:10 2009 +0100 netfilter: xtables: document minimal required version For both .33 and .32-stable. Signed-off-by: Jan Engelhardt <jengelh@medozas.de> Cc: stable@kernel.org Signed-off-by: Patrick McHardy <kaber@trash.net> diff --git a/Documentation/Changes b/Documentation/Changes index 6d0f1ef..f08b313 100644 --- a/Documentation/Changes +++ b/Documentation/Changes @@ -49,6 +49,8 @@ o oprofile 0.9 # oprofiled --version o udev 081 # udevinfo -V o grub 0.93 # grub --version o mcelog 0.6 +o iptables 1.4.1 # iptables -V + Kernel compilation ================== ^ permalink raw reply related [flat|nested] 23+ messages in thread
* ipvs 02/05: fix synchronization on connection close 2009-12-15 16:14 netfilter 00/05: netfilter fixes Patrick McHardy 2009-12-15 16:14 ` netfilter 01/05: xtables: document minimal required version Patrick McHardy @ 2009-12-15 16:14 ` Patrick McHardy 2009-12-15 16:14 ` ipv6 03/05: reassembly: use seperate reassembly queues for conntrack and local delivery Patrick McHardy ` (3 subsequent siblings) 5 siblings, 0 replies; 23+ messages in thread From: Patrick McHardy @ 2009-12-15 16:14 UTC (permalink / raw) To: davem; +Cc: netdev, Patrick McHardy, netfilter-devel commit 9abfe315de96aa5c9878b2f627542bc54901c6e9 Author: Xiaotian Feng <dfeng@redhat.com> Date: Mon Dec 14 16:38:21 2009 +0100 ipvs: fix synchronization on connection close commit 9d3a0de makes slaves expire as they would do on the master with much shorter timeouts. But it introduces another problem: When we close a connection, on master server the connection became CLOSE_WAIT/TIME_WAIT, it was synced to slaves, but if master is finished within it's timeouts (CLOSE), it will not be synced to slaves. Then slaves will be kept on CLOSE_WAIT/TIME_WAIT until timeout reaches. Thus we should also sync with CLOSE. Cc: Wensong Zhang <wensong@linux-vs.org> Cc: Simon Horman <horms@verge.net.au> Cc: Julian Anastasov <ja@ssi.bg> Cc: David S. Miller <davem@davemloft.net> Signed-off-by: Xiaotian Feng <dfeng@redhat.com> Acked-by: Simon Horman <horms@verge.net.au> Signed-off-by: Patrick McHardy <kaber@trash.net> diff --git a/net/netfilter/ipvs/ip_vs_core.c b/net/netfilter/ipvs/ip_vs_core.c index b95699f..847ffca 100644 --- a/net/netfilter/ipvs/ip_vs_core.c +++ b/net/netfilter/ipvs/ip_vs_core.c @@ -1366,6 +1366,7 @@ ip_vs_in(unsigned int hooknum, struct sk_buff *skb, == sysctl_ip_vs_sync_threshold[0])) || ((cp->protocol == IPPROTO_TCP) && (cp->old_state != cp->state) && ((cp->state == IP_VS_TCP_S_FIN_WAIT) || + (cp->state == IP_VS_TCP_S_CLOSE) || (cp->state == IP_VS_TCP_S_CLOSE_WAIT) || (cp->state == IP_VS_TCP_S_TIME_WAIT))))) ip_vs_sync_conn(cp); ^ permalink raw reply related [flat|nested] 23+ messages in thread
* ipv6 03/05: reassembly: use seperate reassembly queues for conntrack and local delivery 2009-12-15 16:14 netfilter 00/05: netfilter fixes Patrick McHardy 2009-12-15 16:14 ` netfilter 01/05: xtables: document minimal required version Patrick McHardy 2009-12-15 16:14 ` ipvs 02/05: fix synchronization on connection close Patrick McHardy @ 2009-12-15 16:14 ` Patrick McHardy 2009-12-15 16:14 ` netfilter 04/05: fix crashes in bridge netfilter caused by fragment jumps Patrick McHardy ` (2 subsequent siblings) 5 siblings, 0 replies; 23+ messages in thread From: Patrick McHardy @ 2009-12-15 16:14 UTC (permalink / raw) To: davem; +Cc: netdev, Patrick McHardy, netfilter-devel commit 0b5ccb2ee250136dd7385b1c7da28417d0d4d32d Author: Patrick McHardy <kaber@trash.net> Date: Tue Dec 15 16:59:18 2009 +0100 ipv6: reassembly: use seperate reassembly queues for conntrack and local delivery Currently the same reassembly queue might be used for packets reassembled by conntrack in different positions in the stack (PREROUTING/LOCAL_OUT), as well as local delivery. This can cause "packet jumps" when the fragment completing a reassembled packet is queued from a different position in the stack than the previous ones. Add a "user" identifier to the reassembly queue key to seperate the queues of each caller, similar to what we do for IPv4. Signed-off-by: Patrick McHardy <kaber@trash.net> diff --git a/include/net/ipv6.h b/include/net/ipv6.h index 92db861..d691603 100644 --- a/include/net/ipv6.h +++ b/include/net/ipv6.h @@ -350,8 +350,15 @@ static inline int ipv6_prefix_equal(const struct in6_addr *a1, struct inet_frag_queue; +enum ip6_defrag_users { + IP6_DEFRAG_LOCAL_DELIVER, + IP6_DEFRAG_CONNTRACK_IN, + IP6_DEFRAG_CONNTRACK_OUT, +}; + struct ip6_create_arg { __be32 id; + u32 user; struct in6_addr *src; struct in6_addr *dst; }; diff --git a/include/net/netfilter/ipv6/nf_conntrack_ipv6.h b/include/net/netfilter/ipv6/nf_conntrack_ipv6.h index abc55ad..1ee717e 100644 --- a/include/net/netfilter/ipv6/nf_conntrack_ipv6.h +++ b/include/net/netfilter/ipv6/nf_conntrack_ipv6.h @@ -9,7 +9,7 @@ extern struct nf_conntrack_l4proto nf_conntrack_l4proto_icmpv6; extern int nf_ct_frag6_init(void); extern void nf_ct_frag6_cleanup(void); -extern struct sk_buff *nf_ct_frag6_gather(struct sk_buff *skb); +extern struct sk_buff *nf_ct_frag6_gather(struct sk_buff *skb, u32 user); extern void nf_ct_frag6_output(unsigned int hooknum, struct sk_buff *skb, struct net_device *in, struct net_device *out, diff --git a/net/ipv6/netfilter/nf_conntrack_l3proto_ipv6.c b/net/ipv6/netfilter/nf_conntrack_l3proto_ipv6.c index 5f2ec20..c0a82fe 100644 --- a/net/ipv6/netfilter/nf_conntrack_l3proto_ipv6.c +++ b/net/ipv6/netfilter/nf_conntrack_l3proto_ipv6.c @@ -187,6 +187,16 @@ out: return nf_conntrack_confirm(skb); } +static enum ip6_defrag_users nf_ct6_defrag_user(unsigned int hooknum, + struct sk_buff *skb) +{ + if (hooknum == NF_INET_PRE_ROUTING) + return IP6_DEFRAG_CONNTRACK_IN; + else + return IP6_DEFRAG_CONNTRACK_OUT; + +} + static unsigned int ipv6_defrag(unsigned int hooknum, struct sk_buff *skb, const struct net_device *in, @@ -199,8 +209,7 @@ static unsigned int ipv6_defrag(unsigned int hooknum, if (skb->nfct) return NF_ACCEPT; - reasm = nf_ct_frag6_gather(skb); - + reasm = nf_ct_frag6_gather(skb, nf_ct6_defrag_user(hooknum, skb)); /* queued */ if (reasm == NULL) return NF_STOLEN; diff --git a/net/ipv6/netfilter/nf_conntrack_reasm.c b/net/ipv6/netfilter/nf_conntrack_reasm.c index e0b9424..312c20a 100644 --- a/net/ipv6/netfilter/nf_conntrack_reasm.c +++ b/net/ipv6/netfilter/nf_conntrack_reasm.c @@ -168,13 +168,14 @@ out: /* Creation primitives. */ static __inline__ struct nf_ct_frag6_queue * -fq_find(__be32 id, struct in6_addr *src, struct in6_addr *dst) +fq_find(__be32 id, u32 user, struct in6_addr *src, struct in6_addr *dst) { struct inet_frag_queue *q; struct ip6_create_arg arg; unsigned int hash; arg.id = id; + arg.user = user; arg.src = src; arg.dst = dst; @@ -559,7 +560,7 @@ find_prev_fhdr(struct sk_buff *skb, u8 *prevhdrp, int *prevhoff, int *fhoff) return 0; } -struct sk_buff *nf_ct_frag6_gather(struct sk_buff *skb) +struct sk_buff *nf_ct_frag6_gather(struct sk_buff *skb, u32 user) { struct sk_buff *clone; struct net_device *dev = skb->dev; @@ -605,7 +606,7 @@ struct sk_buff *nf_ct_frag6_gather(struct sk_buff *skb) if (atomic_read(&nf_init_frags.mem) > nf_init_frags.high_thresh) nf_ct_frag6_evictor(); - fq = fq_find(fhdr->identification, &hdr->saddr, &hdr->daddr); + fq = fq_find(fhdr->identification, user, &hdr->saddr, &hdr->daddr); if (fq == NULL) { pr_debug("Can't find and can't create new queue\n"); goto ret_orig; diff --git a/net/ipv6/reassembly.c b/net/ipv6/reassembly.c index 4d98549..3b3a956 100644 --- a/net/ipv6/reassembly.c +++ b/net/ipv6/reassembly.c @@ -72,6 +72,7 @@ struct frag_queue struct inet_frag_queue q; __be32 id; /* fragment id */ + u32 user; struct in6_addr saddr; struct in6_addr daddr; @@ -141,7 +142,7 @@ int ip6_frag_match(struct inet_frag_queue *q, void *a) struct ip6_create_arg *arg = a; fq = container_of(q, struct frag_queue, q); - return (fq->id == arg->id && + return (fq->id == arg->id && fq->user == arg->user && ipv6_addr_equal(&fq->saddr, arg->src) && ipv6_addr_equal(&fq->daddr, arg->dst)); } @@ -163,6 +164,7 @@ void ip6_frag_init(struct inet_frag_queue *q, void *a) struct ip6_create_arg *arg = a; fq->id = arg->id; + fq->user = arg->user; ipv6_addr_copy(&fq->saddr, arg->src); ipv6_addr_copy(&fq->daddr, arg->dst); } @@ -243,6 +245,7 @@ fq_find(struct net *net, __be32 id, struct in6_addr *src, struct in6_addr *dst, unsigned int hash; arg.id = id; + arg.user = IP6_DEFRAG_LOCAL_DELIVER; arg.src = src; arg.dst = dst; ^ permalink raw reply related [flat|nested] 23+ messages in thread
* netfilter 04/05: fix crashes in bridge netfilter caused by fragment jumps 2009-12-15 16:14 netfilter 00/05: netfilter fixes Patrick McHardy ` (2 preceding siblings ...) 2009-12-15 16:14 ` ipv6 03/05: reassembly: use seperate reassembly queues for conntrack and local delivery Patrick McHardy @ 2009-12-15 16:14 ` Patrick McHardy 2009-12-15 16:14 ` ipvs 05/05: zero usvc and udest Patrick McHardy 2009-12-16 5:12 ` netfilter 00/05: netfilter fixes David Miller 5 siblings, 0 replies; 23+ messages in thread From: Patrick McHardy @ 2009-12-15 16:14 UTC (permalink / raw) To: davem; +Cc: netdev, Patrick McHardy, netfilter-devel commit 8fa9ff6849bb86c59cc2ea9faadf3cb2d5223497 Author: Patrick McHardy <kaber@trash.net> Date: Tue Dec 15 16:59:59 2009 +0100 netfilter: fix crashes in bridge netfilter caused by fragment jumps When fragments from bridge netfilter are passed to IPv4 or IPv6 conntrack and a reassembly queue with the same fragment key already exists from reassembling a similar packet received on a different device (f.i. with multicasted fragments), the reassembled packet might continue on a different codepath than where the head fragment originated. This can cause crashes in bridge netfilter when a fragment received on a non-bridge device (and thus with skb->nf_bridge == NULL) continues through the bridge netfilter code. Add a new reassembly identifier for packets originating from bridge netfilter and use it to put those packets in insolated queues. Fixes http://bugzilla.kernel.org/show_bug.cgi?id=14805 Reported-and-Tested-by: Chong Qiao <qiaochong@loongson.cn> Signed-off-by: Patrick McHardy <kaber@trash.net> diff --git a/include/net/ip.h b/include/net/ip.h index e6b9d12..85108cf 100644 --- a/include/net/ip.h +++ b/include/net/ip.h @@ -337,6 +337,7 @@ enum ip_defrag_users { IP_DEFRAG_CALL_RA_CHAIN, IP_DEFRAG_CONNTRACK_IN, IP_DEFRAG_CONNTRACK_OUT, + IP_DEFRAG_CONNTRACK_BRIDGE_IN, IP_DEFRAG_VS_IN, IP_DEFRAG_VS_OUT, IP_DEFRAG_VS_FWD diff --git a/include/net/ipv6.h b/include/net/ipv6.h index d691603..ccab594 100644 --- a/include/net/ipv6.h +++ b/include/net/ipv6.h @@ -354,6 +354,7 @@ enum ip6_defrag_users { IP6_DEFRAG_LOCAL_DELIVER, IP6_DEFRAG_CONNTRACK_IN, IP6_DEFRAG_CONNTRACK_OUT, + IP6_DEFRAG_CONNTRACK_BRIDGE_IN, }; struct ip6_create_arg { diff --git a/net/ipv4/netfilter/nf_defrag_ipv4.c b/net/ipv4/netfilter/nf_defrag_ipv4.c index fa2d6b6..331ead3 100644 --- a/net/ipv4/netfilter/nf_defrag_ipv4.c +++ b/net/ipv4/netfilter/nf_defrag_ipv4.c @@ -14,6 +14,7 @@ #include <net/route.h> #include <net/ip.h> +#include <linux/netfilter_bridge.h> #include <linux/netfilter_ipv4.h> #include <net/netfilter/ipv4/nf_defrag_ipv4.h> @@ -34,6 +35,20 @@ static int nf_ct_ipv4_gather_frags(struct sk_buff *skb, u_int32_t user) return err; } +static enum ip_defrag_users nf_ct_defrag_user(unsigned int hooknum, + struct sk_buff *skb) +{ +#ifdef CONFIG_BRIDGE_NETFILTER + if (skb->nf_bridge && + skb->nf_bridge->mask & BRNF_NF_BRIDGE_PREROUTING) + return IP_DEFRAG_CONNTRACK_BRIDGE_IN; +#endif + if (hooknum == NF_INET_PRE_ROUTING) + return IP_DEFRAG_CONNTRACK_IN; + else + return IP_DEFRAG_CONNTRACK_OUT; +} + static unsigned int ipv4_conntrack_defrag(unsigned int hooknum, struct sk_buff *skb, const struct net_device *in, @@ -50,10 +65,8 @@ static unsigned int ipv4_conntrack_defrag(unsigned int hooknum, #endif /* Gather fragments. */ if (ip_hdr(skb)->frag_off & htons(IP_MF | IP_OFFSET)) { - if (nf_ct_ipv4_gather_frags(skb, - hooknum == NF_INET_PRE_ROUTING ? - IP_DEFRAG_CONNTRACK_IN : - IP_DEFRAG_CONNTRACK_OUT)) + enum ip_defrag_users user = nf_ct_defrag_user(hooknum, skb); + if (nf_ct_ipv4_gather_frags(skb, user)) return NF_STOLEN; } return NF_ACCEPT; diff --git a/net/ipv6/netfilter/nf_conntrack_l3proto_ipv6.c b/net/ipv6/netfilter/nf_conntrack_l3proto_ipv6.c index c0a82fe..0956eba 100644 --- a/net/ipv6/netfilter/nf_conntrack_l3proto_ipv6.c +++ b/net/ipv6/netfilter/nf_conntrack_l3proto_ipv6.c @@ -20,6 +20,7 @@ #include <net/ipv6.h> #include <net/inet_frag.h> +#include <linux/netfilter_bridge.h> #include <linux/netfilter_ipv6.h> #include <net/netfilter/nf_conntrack.h> #include <net/netfilter/nf_conntrack_helper.h> @@ -190,6 +191,11 @@ out: static enum ip6_defrag_users nf_ct6_defrag_user(unsigned int hooknum, struct sk_buff *skb) { +#ifdef CONFIG_BRIDGE_NETFILTER + if (skb->nf_bridge && + skb->nf_bridge->mask & BRNF_NF_BRIDGE_PREROUTING) + return IP6_DEFRAG_CONNTRACK_BRIDGE_IN; +#endif if (hooknum == NF_INET_PRE_ROUTING) return IP6_DEFRAG_CONNTRACK_IN; else ^ permalink raw reply related [flat|nested] 23+ messages in thread
* ipvs 05/05: zero usvc and udest 2009-12-15 16:14 netfilter 00/05: netfilter fixes Patrick McHardy ` (3 preceding siblings ...) 2009-12-15 16:14 ` netfilter 04/05: fix crashes in bridge netfilter caused by fragment jumps Patrick McHardy @ 2009-12-15 16:14 ` Patrick McHardy 2009-12-16 5:12 ` netfilter 00/05: netfilter fixes David Miller 5 siblings, 0 replies; 23+ messages in thread From: Patrick McHardy @ 2009-12-15 16:14 UTC (permalink / raw) To: davem; +Cc: netdev, Patrick McHardy, netfilter-devel commit 258c889362aa95d0ab534b38ce8c15d3009705b1 Author: Simon Horman <horms@verge.net.au> Date: Tue Dec 15 17:01:25 2009 +0100 ipvs: zero usvc and udest Make sure that any otherwise uninitialised fields of usvc are zero. This has been obvserved to cause a problem whereby the port of fwmark services may end up as a non-zero value which causes scheduling of a destination server to fail for persisitent services. As observed by Deon van der Merwe <dvdm@truteq.co.za>. This fix suggested by Julian Anastasov <ja@ssi.bg>. For good measure also zero udest. Cc: Deon van der Merwe <dvdm@truteq.co.za> Acked-by: Julian Anastasov <ja@ssi.bg> Signed-off-by: Simon Horman <horms@verge.net.au> Cc: stable@kernel.org Signed-off-by: Patrick McHardy <kaber@trash.net> diff --git a/net/netfilter/ipvs/ip_vs_ctl.c b/net/netfilter/ipvs/ip_vs_ctl.c index e55a686..6bde12d 100644 --- a/net/netfilter/ipvs/ip_vs_ctl.c +++ b/net/netfilter/ipvs/ip_vs_ctl.c @@ -2714,6 +2714,8 @@ static int ip_vs_genl_parse_service(struct ip_vs_service_user_kern *usvc, if (!(nla_af && (nla_fwmark || (nla_port && nla_protocol && nla_addr)))) return -EINVAL; + memset(usvc, 0, sizeof(*usvc)); + usvc->af = nla_get_u16(nla_af); #ifdef CONFIG_IP_VS_IPV6 if (usvc->af != AF_INET && usvc->af != AF_INET6) @@ -2901,6 +2903,8 @@ static int ip_vs_genl_parse_dest(struct ip_vs_dest_user_kern *udest, if (!(nla_addr && nla_port)) return -EINVAL; + memset(udest, 0, sizeof(*udest)); + nla_memcpy(&udest->addr, nla_addr, sizeof(udest->addr)); udest->port = nla_get_u16(nla_port); ^ permalink raw reply related [flat|nested] 23+ messages in thread
* Re: netfilter 00/05: netfilter fixes 2009-12-15 16:14 netfilter 00/05: netfilter fixes Patrick McHardy ` (4 preceding siblings ...) 2009-12-15 16:14 ` ipvs 05/05: zero usvc and udest Patrick McHardy @ 2009-12-16 5:12 ` David Miller 5 siblings, 0 replies; 23+ messages in thread From: David Miller @ 2009-12-16 5:12 UTC (permalink / raw) To: kaber; +Cc: netdev, netfilter-devel From: Patrick McHardy <kaber@trash.net> Date: Tue, 15 Dec 2009 17:14:27 +0100 (MET) > git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6.git master Pulled, thanks a lot Patrick. ^ permalink raw reply [flat|nested] 23+ messages in thread
* netfilter 00/05: netfilter fixes @ 2010-02-08 17:10 Patrick McHardy 2010-02-08 19:15 ` David Miller 0 siblings, 1 reply; 23+ messages in thread From: Patrick McHardy @ 2010-02-08 17:10 UTC (permalink / raw) To: davem; +Cc: netdev, Patrick McHardy, netfilter-devel Hi Dave, following are the bugfixes for nf_conntrack discussed over the past days, as well as a bugfix for the use of pointer to a local variable outside the scope of the variable: - a fix for use count initialization of the "untracked" conntrack, fixing freeing of memory in the data section - a patch for per netns conntrack cache pointers to fix issues with SLAB_DESTROY_BY_RCU - a patch to disable conntrack expect hash size modification at runtime - a patch for xtables to fix out of scope usage of a local variable - a patch to fix conntrack hash resizing with multiple namespaces by moving the hashsize into the per netns data Please apply or pull from: git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6.git master Please note: I forgot to add "Cc: stable@kernel.org" to two of these patches and manually added it to the patch files, so I'd appreciate if you could apply the patches manually instead of pulling from the git tree this time. Thanks! include/net/netns/conntrack.h | 3 + include/net/netns/ipv4.h | 1 + net/ipv4/netfilter/arp_tables.c | 4 +- net/ipv4/netfilter/ip_tables.c | 4 +- net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c | 2 +- .../netfilter/nf_conntrack_l3proto_ipv4_compat.c | 4 +- net/ipv4/netfilter/nf_nat_core.c | 22 ++-- net/ipv6/netfilter/ip6_tables.c | 4 +- net/netfilter/nf_conntrack_core.c | 116 +++++++++++--------- net/netfilter/nf_conntrack_expect.c | 4 +- net/netfilter/nf_conntrack_helper.c | 2 +- net/netfilter/nf_conntrack_netlink.c | 2 +- net/netfilter/nf_conntrack_standalone.c | 7 +- 13 files changed, 93 insertions(+), 82 deletions(-) Alexey Dobriyan (2): netfilter: nf_conntrack: restrict runtime expect hashsize modifications netfilter: xtables: compat out of scope fix Eric Dumazet (1): netfilter: nf_conntrack: per netns nf_conntrack_cachep Patrick McHardy (2): netfilter: nf_conntrack: fix memory corruption with multiple namespaces netfilter: nf_conntrack: fix hash resizing with namespaces ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: netfilter 00/05: netfilter fixes 2010-02-08 17:10 Patrick McHardy @ 2010-02-08 19:15 ` David Miller 2010-02-09 17:33 ` Patrick McHardy 0 siblings, 1 reply; 23+ messages in thread From: David Miller @ 2010-02-08 19:15 UTC (permalink / raw) To: kaber; +Cc: netdev, netfilter-devel From: Patrick McHardy <kaber@trash.net> Date: Mon, 8 Feb 2010 18:10:26 +0100 (MET) > Please apply or pull from: > > git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6.git master > > Please note: I forgot to add "Cc: stable@kernel.org" to two of these > patches and manually added it to the patch files, so I'd appreciate > if you could apply the patches manually instead of pulling from the > git tree this time. Ok, I'll apply these by hand. Thanks Patrick. ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: netfilter 00/05: netfilter fixes 2010-02-08 19:15 ` David Miller @ 2010-02-09 17:33 ` Patrick McHardy 2010-02-09 18:19 ` Jan Engelhardt 2010-02-09 20:38 ` David Miller 0 siblings, 2 replies; 23+ messages in thread From: Patrick McHardy @ 2010-02-09 17:33 UTC (permalink / raw) To: David Miller; +Cc: netdev, netfilter-devel David Miller wrote: > From: Patrick McHardy <kaber@trash.net> > Date: Mon, 8 Feb 2010 18:10:26 +0100 (MET) > >> Please apply or pull from: >> >> git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6.git master >> >> Please note: I forgot to add "Cc: stable@kernel.org" to two of these >> patches and manually added it to the patch files, so I'd appreciate >> if you could apply the patches manually instead of pulling from the >> git tree this time. > > Ok, I'll apply these by hand. Thanks Dave. I plan to submit a first batch of patches queued for net-next-2.6 soon, however these fixes introduced a large number of conflicts. If you could merge net-2.6 into net-next-2.6 I'll resolve them and send a pull request. Thanks! ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: netfilter 00/05: netfilter fixes 2010-02-09 17:33 ` Patrick McHardy @ 2010-02-09 18:19 ` Jan Engelhardt 2010-02-10 13:52 ` Patrick McHardy 2010-02-09 20:38 ` David Miller 1 sibling, 1 reply; 23+ messages in thread From: Jan Engelhardt @ 2010-02-09 18:19 UTC (permalink / raw) To: Patrick McHardy; +Cc: David Miller, netdev, netfilter-devel On Tuesday 2010-02-09 18:33, Patrick McHardy wrote: >David Miller wrote: >> From: Patrick McHardy <kaber@trash.net> >> Date: Mon, 8 Feb 2010 18:10:26 +0100 (MET) >> >>> Please apply or pull from: >>> >>> git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6.git master >>> >>> Please note: I forgot to add "Cc: stable@kernel.org" to two of these >>> patches and manually added it to the patch files, so I'd appreciate >>> if you could apply the patches manually instead of pulling from the >>> git tree this time. >> >> Ok, I'll apply these by hand. > >Thanks Dave. I plan to submit a first batch of patches queued for >net-next-2.6 soon, however these fixes introduced a large number >of conflicts. If you could merge net-2.6 into net-next-2.6 I'll >resolve them and send a pull request. Ah that is a good opportunity then to rebase my pending -next patches, to reduce conflicts you would have to solve when merging things after the conflict resolution. ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: netfilter 00/05: netfilter fixes 2010-02-09 18:19 ` Jan Engelhardt @ 2010-02-10 13:52 ` Patrick McHardy 0 siblings, 0 replies; 23+ messages in thread From: Patrick McHardy @ 2010-02-10 13:52 UTC (permalink / raw) To: Jan Engelhardt; +Cc: David Miller, netdev, netfilter-devel Jan Engelhardt wrote: > On Tuesday 2010-02-09 18:33, Patrick McHardy wrote: > >> Thanks Dave. I plan to submit a first batch of patches queued for >> net-next-2.6 soon, however these fixes introduced a large number >> of conflicts. If you could merge net-2.6 into net-next-2.6 I'll >> resolve them and send a pull request. > > Ah that is a good opportunity then to rebase my pending -next patches, > to reduce conflicts you would have to solve when merging things after > the conflict resolution. I've merged the current net-next tree and pushed it out. ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: netfilter 00/05: netfilter fixes 2010-02-09 17:33 ` Patrick McHardy 2010-02-09 18:19 ` Jan Engelhardt @ 2010-02-09 20:38 ` David Miller 1 sibling, 0 replies; 23+ messages in thread From: David Miller @ 2010-02-09 20:38 UTC (permalink / raw) To: kaber; +Cc: netdev, netfilter-devel From: Patrick McHardy <kaber@trash.net> Date: Tue, 09 Feb 2010 18:33:17 +0100 > If you could merge net-2.6 into net-next-2.6 I'll > resolve them and send a pull request. Done. ^ permalink raw reply [flat|nested] 23+ messages in thread
* netfilter 00/05: netfilter fixes @ 2009-04-24 15:44 Patrick McHardy 2009-04-26 0:57 ` David Miller 0 siblings, 1 reply; 23+ messages in thread From: Patrick McHardy @ 2009-04-24 15:44 UTC (permalink / raw) To: davem; +Cc: netdev, Patrick McHardy, netfilter-devel Hi Dave, the following patches fix a couple of netfilter bugs: - fix for use of unintialized values in the recent match compat proc handling from Jan Engelhardt - Removal of an incorrect TProxy dependency on conntrack from Laszlo Attila Toth - Addition of missing netlink options for the DCCP conntrack protocol, from Pablo - Fix for a conntrack protocol registration regression in 2.6.30-rc from myself - A fix for bridge-netfilter re-fragmentation of VLAN packets defragmented by conntrack from Saikiran Madugula Please apply or pull from: git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6.git Thanks! include/linux/netfilter/nfnetlink_conntrack.h | 1 + net/bridge/br_netfilter.c | 10 +++++++++- net/netfilter/Kconfig | 4 ++-- net/netfilter/nf_conntrack_proto_dccp.c | 16 +++++++++++++++- net/netfilter/nf_conntrack_proto_udplite.c | 1 + net/netfilter/xt_recent.c | 9 ++++----- 6 files changed, 32 insertions(+), 9 deletions(-) Jan Engelhardt (1): netfilter: xt_recent: fix stack overread in compat code Laszlo Attila Toth (1): netfilter: Kconfig: TProxy doesn't depend on NF_CONNTRACK Pablo Neira Ayuso (1): netfilter: nf_ct_dccp: add missing role attributes for DCCP Patrick McHardy (1): netfilter: nf_ct_dccp/udplite: fix protocol registration error hummerbliss@gmail.com (1): netfilter: bridge: allow fragmentation of VLAN packets traversing a bridge ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: netfilter 00/05: netfilter fixes 2009-04-24 15:44 Patrick McHardy @ 2009-04-26 0:57 ` David Miller 2009-05-05 12:33 ` Patrick McHardy 0 siblings, 1 reply; 23+ messages in thread From: David Miller @ 2009-04-26 0:57 UTC (permalink / raw) To: kaber; +Cc: netdev, netfilter-devel From: Patrick McHardy <kaber@trash.net> Date: Fri, 24 Apr 2009 17:44:01 +0200 (MEST) > Please apply or pull from: > > git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6.git Pulled, thanks Patrick. It would be nice to see this fixed: CHECK include/linux/netfilter (57 files) /home/davem/src/GIT/net-2.6/usr/include/linux/netfilter/xt_LED.h:6: found __[us]{8,16,32,64} type without #include <linux/types.h> LD vmlinux Thanks! ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: netfilter 00/05: netfilter fixes 2009-04-26 0:57 ` David Miller @ 2009-05-05 12:33 ` Patrick McHardy 0 siblings, 0 replies; 23+ messages in thread From: Patrick McHardy @ 2009-05-05 12:33 UTC (permalink / raw) To: David Miller; +Cc: netdev, netfilter-devel David Miller wrote: > From: Patrick McHardy <kaber@trash.net> > Date: Fri, 24 Apr 2009 17:44:01 +0200 (MEST) > >> Please apply or pull from: >> >> git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6.git > > Pulled, thanks Patrick. > > It would be nice to see this fixed: > > CHECK include/linux/netfilter (57 files) > /home/davem/src/GIT/net-2.6/usr/include/linux/netfilter/xt_LED.h:6: found __[us]{8,16,32,64} type without #include <linux/types.h> Appologies for my silence over the past week, holidays and a swine cold kept me away from the computer .) I've queued a fix for this, thanks. ^ permalink raw reply [flat|nested] 23+ messages in thread
* netfilter 00/05: netfilter fixes @ 2009-02-09 16:39 Patrick McHardy 2009-02-09 22:32 ` David Miller 0 siblings, 1 reply; 23+ messages in thread From: Patrick McHardy @ 2009-02-09 16:39 UTC (permalink / raw) To: davem; +Cc: netdev, Patrick McHardy, netfilter-devel Hi Dave, the following five patches contain netfilter fixes for 2.6.29: - a patch from Eric Leblond to fix tuple inversion for IPv6 Node Information Requests in IPv6 conntrack - a patch from Eric Leblond to ignore ICMPv6 negotiation messages in IPv6 conntrack since it can't track multicast communication. This prevents those packets from getting marked as INVALID. - two ctnetlink fixes from Pablo to fix a small inconsistency in conntrack creation wrt. NAT sequence number adjustment settings and to fix netlink unicast delivery of responses messages. - a patch from Qu Haoran to fix the SCTP match when matching on the entire chunkmap. Please apply or pull from: git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6.git Thanks! net/ipv6/netfilter/nf_conntrack_proto_icmpv6.c | 25 ++++++++++++++++++++++- net/netfilter/nf_conntrack_netlink.c | 15 ++++++++++++- net/netfilter/xt_sctp.c | 2 +- 3 files changed, 37 insertions(+), 5 deletions(-) Eric Leblond (2): netfilter: fix tuple inversion for Node information request netfilter: nf_conntrack_ipv6: don't track ICMPv6 negotiation message Pablo Neira Ayuso (2): netfilter: ctnetlink: allow changing NAT sequence adjustment in creation netfilter: ctnetlink: fix echo if not subscribed to any multicast group Qu Haoran (1): netfilter: xt_sctp: sctp chunk mapping doesn't work ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: netfilter 00/05: netfilter fixes 2009-02-09 16:39 Patrick McHardy @ 2009-02-09 22:32 ` David Miller 2009-02-09 22:47 ` Patrick McHardy 0 siblings, 1 reply; 23+ messages in thread From: David Miller @ 2009-02-09 22:32 UTC (permalink / raw) To: kaber; +Cc: netdev, netfilter-devel From: Patrick McHardy <kaber@trash.net> Date: Mon, 9 Feb 2009 17:39:27 +0100 (MET) > Please apply or pull from: > > git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6.git I was going to pull from your tree and take it like that, but when I pulled I got 5 real changes and 50 merges with net-2.6, yikes! :-) If there was one or two merge changesets in there, I would have taken it. But anything more than that for a tree containing 5 bug fixes is excessive. I'll apply these as patches, but I really do want to be able to pull from your trees so please try to provide a cleaner tree next time. Thanks! ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: netfilter 00/05: netfilter fixes 2009-02-09 22:32 ` David Miller @ 2009-02-09 22:47 ` Patrick McHardy 2009-02-09 23:18 ` David Miller 0 siblings, 1 reply; 23+ messages in thread From: Patrick McHardy @ 2009-02-09 22:47 UTC (permalink / raw) To: David Miller; +Cc: netdev, netfilter-devel David Miller wrote: > From: Patrick McHardy <kaber@trash.net> > Date: Mon, 9 Feb 2009 17:39:27 +0100 (MET) > >> Please apply or pull from: >> >> git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6.git > > I was going to pull from your tree and take it like that, but when I > pulled I got 5 real changes and 50 merges with net-2.6, yikes! :-) Ugh sorry, thats happening automatically, but it usually doesn't show up since it should be fast forwards. I'll have a look at what went wrong. > If there was one or two merge changesets in there, I would have > taken it. But anything more than that for a tree containing > 5 bug fixes is excessive. > > I'll apply these as patches, but I really do want to be able to > pull from your trees so please try to provide a cleaner tree > next time. I'll make sure of it, sorry. ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: netfilter 00/05: netfilter fixes 2009-02-09 22:47 ` Patrick McHardy @ 2009-02-09 23:18 ` David Miller 2009-02-09 23:36 ` Patrick McHardy 0 siblings, 1 reply; 23+ messages in thread From: David Miller @ 2009-02-09 23:18 UTC (permalink / raw) To: kaber; +Cc: netdev, netfilter-devel From: Patrick McHardy <kaber@trash.net> Date: Mon, 09 Feb 2009 23:47:07 +0100 > David Miller wrote: > > From: Patrick McHardy <kaber@trash.net> > > Date: Mon, 9 Feb 2009 17:39:27 +0100 (MET) > > > >> Please apply or pull from: > >> > >> git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6.git > > I was going to pull from your tree and take it like that, but when I > > pulled I got 5 real changes and 50 merges with net-2.6, yikes! :-) > > Ugh sorry, thats happening automatically, but it usually doesn't show > up since it should be fast forwards. I'll have a look at what went > wrong. I think you got a change into your tree locally, this went via net-2.6 and thereafterwards it started using merges. But that's just a guess. > > If there was one or two merge changesets in there, I would have > > taken it. But anything more than that for a tree containing > > 5 bug fixes is excessive. > > I'll apply these as patches, but I really do want to be able to > > pull from your trees so please try to provide a cleaner tree > > next time. > > I'll make sure of it, sorry. Want some suggestions for work flow? :-) 1) For net-2.6 just clone Linus's tree, pull net-2.6 once as it is right now, then leave it alone. Periodically sync your origin (which is Linus's tree) via "git fetch origin". This just grabs the objects. Then you can just go "git request-pull origin $(GIT_URL)" and it'll just work. Since the likelyhood for conflicts in the net-2.6 tree with your netfilter work is incredibly unlikely, doing a merge should never be necessary. But if it is just go "git pull origin". 2) For net-next-2.6 use net-next-2.6 as your "origin" (you can change this in .git/config), conflicts are more likely so every once in a while a "git pull origin" will be necessary. If that doesn't work out or feel comfortable for you, that's fine. ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: netfilter 00/05: netfilter fixes 2009-02-09 23:18 ` David Miller @ 2009-02-09 23:36 ` Patrick McHardy 2009-02-10 0:28 ` David Miller 0 siblings, 1 reply; 23+ messages in thread From: Patrick McHardy @ 2009-02-09 23:36 UTC (permalink / raw) To: David Miller; +Cc: netdev, netfilter-devel David Miller wrote: > From: Patrick McHardy <kaber@trash.net> > Date: Mon, 09 Feb 2009 23:47:07 +0100 > >> David Miller wrote: >>> From: Patrick McHardy <kaber@trash.net> >>> Date: Mon, 9 Feb 2009 17:39:27 +0100 (MET) >>> >>>> Please apply or pull from: >>>> >>>> git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6.git >>> I was going to pull from your tree and take it like that, but when I >>> pulled I got 5 real changes and 50 merges with net-2.6, yikes! :-) >> Ugh sorry, thats happening automatically, but it usually doesn't show >> up since it should be fast forwards. I'll have a look at what went >> wrong. > > I think you got a change into your tree locally, this went via net-2.6 > and thereafterwards it started using merges. But that's just a guess. Yes, probably, although I really never commit to my mirrored trees. It might have something to do with my disk dying last week and the restore I did :) > Want some suggestions for work flow? :-) > > 1) For net-2.6 just clone Linus's tree, pull net-2.6 once as it is > right now, then leave it alone. > > Periodically sync your origin (which is Linus's tree) via > "git fetch origin". This just grabs the objects. > > Then you can just go "git request-pull origin $(GIT_URL)" and > it'll just work. > > Since the likelyhood for conflicts in the net-2.6 tree with > your netfilter work is incredibly unlikely, doing a merge > should never be necessary. But if it is just go > "git pull origin". > > 2) For net-next-2.6 use net-next-2.6 as your "origin" (you can change > this in .git/config), conflicts are more likely so every once in > a while a "git pull origin" will be necessary. > > If that doesn't work out or feel comfortable for you, that's > fine. I'll try that, maybe starting with net-2.6 since that tree is easier to maintain for me. My workflow is quite out of sync with modern git commands, some of my scripts are still adapted from bitkeeper times :) ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: netfilter 00/05: netfilter fixes 2009-02-09 23:36 ` Patrick McHardy @ 2009-02-10 0:28 ` David Miller 2009-02-10 0:31 ` Patrick McHardy 0 siblings, 1 reply; 23+ messages in thread From: David Miller @ 2009-02-10 0:28 UTC (permalink / raw) To: kaber; +Cc: netdev, netfilter-devel From: Patrick McHardy <kaber@trash.net> Date: Tue, 10 Feb 2009 00:36:06 +0100 > My workflow is quite out of sync with modern git commands, some of > my scripts are still adapted from bitkeeper times :) You poor thing, I should buy you some beer :-) But to be honest I had a caveman like mentality about using GIT and it took me a long time to get to the current way I do things: 1) Dark ages: Fresh git clone, add patches, push to Linus. Repeat, rebasing every time. 2) Brain enabled: Stable git clone, used over and over again. After Linus pulls, remember HEAD and use that as base for next pull request. Pull in Linus's tree occaisionally when conflicts might be possible. 3) Full enlightenment: Stable git clone, used over and over again. Track Linus's tree using "git fetch origin" When conflicts are possible "git pull origin" All pull requests are sent using "origin" as the base. ^ permalink raw reply [flat|nested] 23+ messages in thread
* Re: netfilter 00/05: netfilter fixes 2009-02-10 0:28 ` David Miller @ 2009-02-10 0:31 ` Patrick McHardy 0 siblings, 0 replies; 23+ messages in thread From: Patrick McHardy @ 2009-02-10 0:31 UTC (permalink / raw) To: David Miller; +Cc: netdev, netfilter-devel David Miller wrote: > From: Patrick McHardy <kaber@trash.net> > Date: Tue, 10 Feb 2009 00:36:06 +0100 > >> My workflow is quite out of sync with modern git commands, some of >> my scripts are still adapted from bitkeeper times :) > > You poor thing, I should buy you some beer :-) > > But to be honest I had a caveman like mentality about > using GIT and it took me a long time to get to the > current way I do things: > > 1) Dark ages: > > Fresh git clone, add patches, push to Linus. > Repeat, rebasing every time. > > 2) Brain enabled: > > Stable git clone, used over and over again. > > After Linus pulls, remember HEAD and use that as > base for next pull request. > > Pull in Linus's tree occaisionally when conflicts > might be possible. > > 3) Full enlightenment: > > Stable git clone, used over and over again. > > Track Linus's tree using "git fetch origin" > > When conflicts are possible "git pull origin" > > All pull requests are sent using "origin" as > the base. I'll skip step 2 and will send a perfect pull request soon :) ^ permalink raw reply [flat|nested] 23+ messages in thread
end of thread, other threads:[~2010-02-10 13:52 UTC | newest] Thread overview: 23+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2009-12-15 16:14 netfilter 00/05: netfilter fixes Patrick McHardy 2009-12-15 16:14 ` netfilter 01/05: xtables: document minimal required version Patrick McHardy 2009-12-15 16:14 ` ipvs 02/05: fix synchronization on connection close Patrick McHardy 2009-12-15 16:14 ` ipv6 03/05: reassembly: use seperate reassembly queues for conntrack and local delivery Patrick McHardy 2009-12-15 16:14 ` netfilter 04/05: fix crashes in bridge netfilter caused by fragment jumps Patrick McHardy 2009-12-15 16:14 ` ipvs 05/05: zero usvc and udest Patrick McHardy 2009-12-16 5:12 ` netfilter 00/05: netfilter fixes David Miller -- strict thread matches above, loose matches on Subject: below -- 2010-02-08 17:10 Patrick McHardy 2010-02-08 19:15 ` David Miller 2010-02-09 17:33 ` Patrick McHardy 2010-02-09 18:19 ` Jan Engelhardt 2010-02-10 13:52 ` Patrick McHardy 2010-02-09 20:38 ` David Miller 2009-04-24 15:44 Patrick McHardy 2009-04-26 0:57 ` David Miller 2009-05-05 12:33 ` Patrick McHardy 2009-02-09 16:39 Patrick McHardy 2009-02-09 22:32 ` David Miller 2009-02-09 22:47 ` Patrick McHardy 2009-02-09 23:18 ` David Miller 2009-02-09 23:36 ` Patrick McHardy 2009-02-10 0:28 ` David Miller 2009-02-10 0:31 ` Patrick McHardy
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).