<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/net/ipv4/netfilter, branch v3.13</title>
<subtitle>Mirror of https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/
</subtitle>
<id>https://git.shady.money/linux/atom?h=v3.13</id>
<link rel='self' href='https://git.shady.money/linux/atom?h=v3.13'/>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/'/>
<updated>2013-12-12T08:37:39Z</updated>
<entry>
<title>netfilter: nft_reject: fix endianness in dump function</title>
<updated>2013-12-12T08:37:39Z</updated>
<author>
<name>Eric Leblond</name>
<email>eric@regit.org</email>
</author>
<published>2013-12-12T07:51:59Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=a3adadf3018102c24754e0b53a5515c40fbaff4a'/>
<id>urn:sha1:a3adadf3018102c24754e0b53a5515c40fbaff4a</id>
<content type='text'>
The dump function in nft_reject_ipv4 was not converting a u32
field to network order before sending it to userspace, this
needs to happen for consistency with other nf_tables and
nfnetlink subsystems.

Signed-off-by: Eric Leblond &lt;eric@regit.org&gt;
Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>netfilter: SYNPROXY target: restrict to INPUT/FORWARD</title>
<updated>2013-12-11T10:30:25Z</updated>
<author>
<name>Patrick McHardy</name>
<email>kaber@trash.net</email>
</author>
<published>2013-12-08T16:52:31Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=f01b3926ee645974f549f4a6921268142047717c'/>
<id>urn:sha1:f01b3926ee645974f549f4a6921268142047717c</id>
<content type='text'>
Fix a crash in synproxy_send_tcp() when using the SYNPROXY target in the
PREROUTING chain caused by missing routing information.

Reported-by: Nicki P. &lt;xastx@gmx.de&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>netfilter: synproxy: send mss option to backend</title>
<updated>2013-11-18T11:53:36Z</updated>
<author>
<name>Martin Topholm</name>
<email>mph@one.com</email>
</author>
<published>2013-11-14T14:35:30Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=a6441b7a39f18acb68c83cd738f1310881aa8a0b'/>
<id>urn:sha1:a6441b7a39f18acb68c83cd738f1310881aa8a0b</id>
<content type='text'>
When the synproxy_parse_options is called on the client ack the mss
option will not be present. Consequently mss wont be included in the
backend syn packet, which falls back to 536 bytes mss.

Therefore XT_SYNPROXY_OPT_MSS is explicitly flagged when recovering mss
value from cookie.

Signed-off-by: Martin Topholm &lt;mph@one.com&gt;
Reviewed-by: Jesper Dangaard Brouer &lt;brouer@redhat.com&gt;
Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>Merge branch 'master' of git://git.kernel.org/pub/scm/linux/kernel/git/pablo/nftables</title>
<updated>2013-11-05T00:48:57Z</updated>
<author>
<name>David S. Miller</name>
<email>davem@davemloft.net</email>
</author>
<published>2013-11-05T00:48:57Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=f8785c55141d698d988c6a1ffe4530bc7fa6e886'/>
<id>urn:sha1:f8785c55141d698d988c6a1ffe4530bc7fa6e886</id>
<content type='text'>
Pablo Neira Ayuso says:

====================
This batch contains fives nf_tables patches for your net-next tree,
they are:

* Fix possible use after free in the module removal path of the
  x_tables compatibility layer, from Dan Carpenter.

* Add filter chain type for the bridge family, from myself.

* Fix Kconfig dependencies of the nf_tables bridge family with
  the core, from myself.

* Fix sparse warnings in nft_nat, from Tomasz Bursztyka.

* Remove duplicated include in the IPv4 family support for nf_tables,
  from Wei Yongjun.
====================

Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>Merge branch 'master' of git://git.kernel.org/pub/scm/linux/kernel/git/pablo/nf-next</title>
<updated>2013-11-05T00:46:58Z</updated>
<author>
<name>David S. Miller</name>
<email>davem@davemloft.net</email>
</author>
<published>2013-11-05T00:46:58Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=72c39a0ade6229a938736fe1aa1d5e471fc7face'/>
<id>urn:sha1:72c39a0ade6229a938736fe1aa1d5e471fc7face</id>
<content type='text'>
Pablo Neira Ayuso says:

====================
This is another batch containing Netfilter/IPVS updates for your net-next
tree, they are:

* Six patches to make the ipt_CLUSTERIP target support netnamespace,
  from Gao feng.

* Two cleanups for the nf_conntrack_acct infrastructure, introducing
  a new structure to encapsulate conntrack counters, from Holger
  Eitzenberger.

* Fix missing verdict in SCTP support for IPVS, from Daniel Borkmann.

* Skip checksum recalculation in SCTP support for IPVS, also from
  Daniel Borkmann.

* Fix behavioural change in xt_socket after IP early demux, from
  Florian Westphal.

* Fix bogus large memory allocation in the bitmap port set type in ipset,
  from Jozsef Kadlecsik.

* Fix possible compilation issues in the hash netnet set type in ipset,
  also from Jozsef Kadlecsik.

* Define constants to identify netlink callback data in ipset dumps,
  again from Jozsef Kadlecsik.

* Use sock_gen_put() in xt_socket to replace xt_socket_put_sk,
  from Eric Dumazet.

* Improvements for the SH scheduler in IPVS, from Alexander Frolkin.

* Remove extra delay due to unneeded rcu barrier in IPVS net namespace
  cleanup path, from Julian Anastasov.

* Save some cycles in ip6t_REJECT by skipping checksum validation in
  packets leaving from our stack, from Stanislav Fomichev.

* Fix IPVS_CMD_ATTR_MAX definition in IPVS, larger that required, from
  Julian Anastasov.
====================

Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net</title>
<updated>2013-11-04T18:48:30Z</updated>
<author>
<name>David S. Miller</name>
<email>davem@davemloft.net</email>
</author>
<published>2013-11-04T18:48:30Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=394efd19d5fcae936261bd48e5b33b21897aacf8'/>
<id>urn:sha1:394efd19d5fcae936261bd48e5b33b21897aacf8</id>
<content type='text'>
Conflicts:
	drivers/net/ethernet/emulex/benet/be.h
	drivers/net/netconsole.c
	net/bridge/br_private.h

Three mostly trivial conflicts.

The net/bridge/br_private.h conflict was a function signature (argument
addition) change overlapping with the extern removals from Joe Perches.

In drivers/net/netconsole.c we had one change adjusting a printk message
whilst another changed "printk(KERN_INFO" into "pr_info(".

Lastly, the emulex change was a new inline function addition overlapping
with Joe Perches's extern removals.

Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>netfilter: nf_tables: remove duplicated include from nf_tables_ipv4.c</title>
<updated>2013-11-03T21:36:25Z</updated>
<author>
<name>Wei Yongjun</name>
<email>yongjun_wei@trendmicro.com.cn</email>
</author>
<published>2013-10-30T05:31:30Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=ca0e8bd68bae3d0bad758b5a82dbf9327b75325c'/>
<id>urn:sha1:ca0e8bd68bae3d0bad758b5a82dbf9327b75325c</id>
<content type='text'>
Remove duplicated include.

Signed-off-by: Wei Yongjun &lt;yongjun_wei@trendmicro.com.cn&gt;
Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>netfilter: x_tables: fix ordering of jumpstack allocation and table update</title>
<updated>2013-10-22T08:11:29Z</updated>
<author>
<name>Will Deacon</name>
<email>will.deacon@arm.com</email>
</author>
<published>2013-10-21T12:14:53Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=b416c144f46af1a30ddfa4e4319a8f077381ad63'/>
<id>urn:sha1:b416c144f46af1a30ddfa4e4319a8f077381ad63</id>
<content type='text'>
During kernel stability testing on an SMP ARMv7 system, Yalin Wang
reported the following panic from the netfilter code:

  1fe0: 0000001c 5e2d3b10 4007e779 4009e110 60000010 00000032 ff565656 ff545454
  [&lt;c06c48dc&gt;] (ipt_do_table+0x448/0x584) from [&lt;c0655ef0&gt;] (nf_iterate+0x48/0x7c)
  [&lt;c0655ef0&gt;] (nf_iterate+0x48/0x7c) from [&lt;c0655f7c&gt;] (nf_hook_slow+0x58/0x104)
  [&lt;c0655f7c&gt;] (nf_hook_slow+0x58/0x104) from [&lt;c0683bbc&gt;] (ip_local_deliver+0x88/0xa8)
  [&lt;c0683bbc&gt;] (ip_local_deliver+0x88/0xa8) from [&lt;c0683718&gt;] (ip_rcv_finish+0x418/0x43c)
  [&lt;c0683718&gt;] (ip_rcv_finish+0x418/0x43c) from [&lt;c062b1c4&gt;] (__netif_receive_skb+0x4cc/0x598)
  [&lt;c062b1c4&gt;] (__netif_receive_skb+0x4cc/0x598) from [&lt;c062b314&gt;] (process_backlog+0x84/0x158)
  [&lt;c062b314&gt;] (process_backlog+0x84/0x158) from [&lt;c062de84&gt;] (net_rx_action+0x70/0x1dc)
  [&lt;c062de84&gt;] (net_rx_action+0x70/0x1dc) from [&lt;c0088230&gt;] (__do_softirq+0x11c/0x27c)
  [&lt;c0088230&gt;] (__do_softirq+0x11c/0x27c) from [&lt;c008857c&gt;] (do_softirq+0x44/0x50)
  [&lt;c008857c&gt;] (do_softirq+0x44/0x50) from [&lt;c0088614&gt;] (local_bh_enable_ip+0x8c/0xd0)
  [&lt;c0088614&gt;] (local_bh_enable_ip+0x8c/0xd0) from [&lt;c06b0330&gt;] (inet_stream_connect+0x164/0x298)
  [&lt;c06b0330&gt;] (inet_stream_connect+0x164/0x298) from [&lt;c061d68c&gt;] (sys_connect+0x88/0xc8)
  [&lt;c061d68c&gt;] (sys_connect+0x88/0xc8) from [&lt;c000e340&gt;] (ret_fast_syscall+0x0/0x30)
  Code: 2a000021 e59d2028 e59de01c e59f011c (e7824103)
  ---[ end trace da227214a82491bd ]---
  Kernel panic - not syncing: Fatal exception in interrupt

This comes about because CPU1 is executing xt_replace_table in response
to a setsockopt syscall, resulting in:

	ret = xt_jumpstack_alloc(newinfo);
		--&gt; newinfo-&gt;jumpstack = kzalloc(size, GFP_KERNEL);

	[...]

	table-&gt;private = newinfo;
	newinfo-&gt;initial_entries = private-&gt;initial_entries;

Meanwhile, CPU0 is handling the network receive path and ends up in
ipt_do_table, resulting in:

	private = table-&gt;private;

	[...]

	jumpstack  = (struct ipt_entry **)private-&gt;jumpstack[cpu];

On weakly ordered memory architectures, the writes to table-&gt;private
and newinfo-&gt;jumpstack from CPU1 can be observed out of order by CPU0.
Furthermore, on architectures which don't respect ordering of address
dependencies (i.e. Alpha), the reads from CPU0 can also be re-ordered.

This patch adds an smp_wmb() before the assignment to table-&gt;private
(which is essentially publishing newinfo) to ensure that all writes to
newinfo will be observed before plugging it into the table structure.
A dependent-read barrier is also added on the consumer sides, to ensure
the same ordering requirements are also respected there.

Cc: Paul E. McKenney &lt;paulmck@linux.vnet.ibm.com&gt;
Reported-by: Wang, Yalin &lt;Yalin.Wang@sonymobile.com&gt;
Tested-by: Wang, Yalin &lt;Yalin.Wang@sonymobile.com&gt;
Signed-off-by: Will Deacon &lt;will.deacon@arm.com&gt;
Acked-by: Eric Dumazet &lt;edumazet@google.com&gt;
Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>netfilter: ipt_CLUSTERIP: use proper net namespace to operate CLUSTERIP</title>
<updated>2013-10-17T08:48:47Z</updated>
<author>
<name>Gao feng</name>
<email>gaofeng@cn.fujitsu.com</email>
</author>
<published>2013-09-25T07:38:49Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=d86946d2c5b4e519ffe435c2deeb2c9436ceb04f'/>
<id>urn:sha1:d86946d2c5b4e519ffe435c2deeb2c9436ceb04f</id>
<content type='text'>
we can allow users in uninit net namespace to operate ipt_CLUSTERIP
now.

Signed-off-by: Gao feng &lt;gaofeng@cn.fujitsu.com&gt;
Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>netfilter: ipt_CLUSTERIP: create proc entry under proper ipt_CLUSTERIP directory</title>
<updated>2013-10-17T08:48:25Z</updated>
<author>
<name>Gao feng</name>
<email>gaofeng@cn.fujitsu.com</email>
</author>
<published>2013-09-25T07:38:48Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=f58d7866018dedae7ec67e152402b8ede17ce39e'/>
<id>urn:sha1:f58d7866018dedae7ec67e152402b8ede17ce39e</id>
<content type='text'>
Create proc entries under the ipt_CLUSTERIP directory of proper
net namespace.

Signed-off-by: Gao feng &lt;gaofeng@cn.fujitsu.com&gt;
Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
</feed>
