<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/net/ipv4/netfilter, branch v3.8</title>
<subtitle>Mirror of https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/
</subtitle>
<id>https://git.shady.money/linux/atom?h=v3.8</id>
<link rel='self' href='https://git.shady.money/linux/atom?h=v3.8'/>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/'/>
<updated>2012-12-16T22:28:30Z</updated>
<entry>
<title>netfilter: nf_nat: Also handle non-ESTABLISHED routing changes in MASQUERADE</title>
<updated>2012-12-16T22:28:30Z</updated>
<author>
<name>Andrew Collins</name>
<email>bsderandrew@gmail.com</email>
</author>
<published>2012-12-12T14:23:49Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=c65ef8dc7b1c16379b9fc29e925716a10804af43'/>
<id>urn:sha1:c65ef8dc7b1c16379b9fc29e925716a10804af43</id>
<content type='text'>
Since (a0ecb85 netfilter: nf_nat: Handle routing changes in MASQUERADE
target), the MASQUERADE target handles routing changes which affect
the output interface of a connection, but only for ESTABLISHED
connections.  It is also possible for NEW connections which
already have a conntrack entry to be affected by routing changes.

This adds a check to drop entries in the NEW+conntrack state
when the oif has changed.

Signed-off-by: Andrew Collins &lt;bsderandrew@gmail.com&gt;
Acked-by: Jozsef Kadlecsik &lt;kadlec@blackhole.kfki.hu&gt;
Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>netfilter: ip[6]t_REJECT: fix wrong transport header pointer in TCP reset</title>
<updated>2012-12-16T22:27:35Z</updated>
<author>
<name>Mukund Jampala</name>
<email>jbmukund@gmail.com</email>
</author>
<published>2012-12-16T18:25:58Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=c6f408996c625cb950cad024f90e50519f94713c'/>
<id>urn:sha1:c6f408996c625cb950cad024f90e50519f94713c</id>
<content type='text'>
The problem occurs when iptables constructs the tcp reset packet.
It doesn't initialize the pointer to the tcp header within the skb.
When the skb is passed to the ixgbe driver for transmit, the ixgbe
driver attempts to access the tcp header and crashes.
Currently, other drivers (such as our 1G e1000e or igb drivers) don't
access the tcp header on transmit unless the TSO option is turned on.

&lt;1&gt;BUG: unable to handle kernel NULL pointer dereference at 0000000d
&lt;1&gt;IP: [&lt;d081621c&gt;] ixgbe_xmit_frame_ring+0x8cc/0x2260 [ixgbe]
&lt;4&gt;*pdpt = 0000000085e5d001 *pde = 0000000000000000
&lt;0&gt;Oops: 0000 [#1] SMP
[...]
&lt;4&gt;Pid: 0, comm: swapper Tainted: P            2.6.35.12 #1 Greencity/Thurley
&lt;4&gt;EIP: 0060:[&lt;d081621c&gt;] EFLAGS: 00010246 CPU: 16
&lt;4&gt;EIP is at ixgbe_xmit_frame_ring+0x8cc/0x2260 [ixgbe]
&lt;4&gt;EAX: c7628820 EBX: 00000007 ECX: 00000000 EDX: 00000000
&lt;4&gt;ESI: 00000008 EDI: c6882180 EBP: dfc6b000 ESP: ced95c48
&lt;4&gt; DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068
&lt;0&gt;Process swapper (pid: 0, ti=ced94000 task=ced73bd0 task.ti=ced94000)
&lt;0&gt;Stack:
&lt;4&gt; cbec7418 c779e0d8 c77cc888 c77cc8a8 0903010a 00000000 c77c0008 00000002
&lt;4&gt;&lt;0&gt; cd4997c0 00000010 dfc6b000 00000000 d0d176c9 c77cc8d8 c6882180 cbec7318
&lt;4&gt;&lt;0&gt; 00000004 00000004 cbec7230 cbec7110 00000000 cbec70c0 c779e000 00000002
&lt;0&gt;Call Trace:
&lt;4&gt; [&lt;d0d176c9&gt;] ? 0xd0d176c9
&lt;4&gt; [&lt;d0d18a4d&gt;] ? 0xd0d18a4d
&lt;4&gt; [&lt;411e243e&gt;] ? dev_hard_start_xmit+0x218/0x2d7
&lt;4&gt; [&lt;411f03d7&gt;] ? sch_direct_xmit+0x4b/0x114
&lt;4&gt; [&lt;411f056a&gt;] ? __qdisc_run+0xca/0xe0
&lt;4&gt; [&lt;411e28b0&gt;] ? dev_queue_xmit+0x2d1/0x3d0
&lt;4&gt; [&lt;411e8120&gt;] ? neigh_resolve_output+0x1c5/0x20f
&lt;4&gt; [&lt;411e94a1&gt;] ? neigh_update+0x29c/0x330
&lt;4&gt; [&lt;4121cf29&gt;] ? arp_process+0x49c/0x4cd
&lt;4&gt; [&lt;411f80c9&gt;] ? nf_hook_slow+0x3f/0xac
&lt;4&gt; [&lt;4121ca8d&gt;] ? arp_process+0x0/0x4cd
&lt;4&gt; [&lt;4121ca8d&gt;] ? arp_process+0x0/0x4cd
&lt;4&gt; [&lt;4121c6d5&gt;] ? T.901+0x38/0x3b
&lt;4&gt; [&lt;4121c918&gt;] ? arp_rcv+0xa3/0xb4
&lt;4&gt; [&lt;4121ca8d&gt;] ? arp_process+0x0/0x4cd
&lt;4&gt; [&lt;411e1173&gt;] ? __netif_receive_skb+0x32b/0x346
&lt;4&gt; [&lt;411e19e1&gt;] ? netif_receive_skb+0x5a/0x5f
&lt;4&gt; [&lt;411e1ea9&gt;] ? napi_skb_finish+0x1b/0x30
&lt;4&gt; [&lt;d0816eb4&gt;] ? ixgbe_xmit_frame_ring+0x1564/0x2260 [ixgbe]
&lt;4&gt; [&lt;41013468&gt;] ? lapic_next_event+0x13/0x16
&lt;4&gt; [&lt;410429b2&gt;] ? clockevents_program_event+0xd2/0xe4
&lt;4&gt; [&lt;411e1b03&gt;] ? net_rx_action+0x55/0x127
&lt;4&gt; [&lt;4102da1a&gt;] ? __do_softirq+0x77/0xeb
&lt;4&gt; [&lt;4102dab1&gt;] ? do_softirq+0x23/0x27
&lt;4&gt; [&lt;41003a67&gt;] ? do_IRQ+0x7d/0x8e
&lt;4&gt; [&lt;41002a69&gt;] ? common_interrupt+0x29/0x30
&lt;4&gt; [&lt;41007bcf&gt;] ? mwait_idle+0x48/0x4d
&lt;4&gt; [&lt;4100193b&gt;] ? cpu_idle+0x37/0x4c
&lt;0&gt;Code: df 09 d7 0f 94 c2 0f b6 d2 e9 e7 fb ff ff 31 db 31 c0 e9 38
ff ff ff 80 78 06 06 0f 85 3e fb ff ff 8b 7c 24 38 8b 8f b8 00 00 00
&lt;0f&gt; b6 51 0d f6 c2 01 0f 85 27 fb ff ff 80 e2 02 75 0d 8b 6c 24
&lt;0&gt;EIP: [&lt;d081621c&gt;] ixgbe_xmit_frame_ring+0x8cc/0x2260 [ixgbe] SS:ESP

Signed-off-by: Mukund Jampala &lt;jbmukund@gmail.com&gt;
Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>net: remove obsolete simple_strto&lt;foo&gt;</title>
<updated>2012-12-10T19:09:00Z</updated>
<author>
<name>Abhijit Pawar</name>
<email>abhi.c.pawar@gmail.com</email>
</author>
<published>2012-12-09T23:12:28Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=4b5511ebc7e1cf94e4f13be19c2cf3e90edc3395'/>
<id>urn:sha1:4b5511ebc7e1cf94e4f13be19c2cf3e90edc3395</id>
<content type='text'>
This patch replace the obsolete simple_strto&lt;foo&gt; with kstrto&lt;foo&gt;

Signed-off-by: Abhijit Pawar &lt;abhi.c.pawar@gmail.com&gt;
Acked-by: Neil Horman &lt;nhorman@tuxdriver.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>netfilter: nf_nat: Handle routing changes in MASQUERADE target</title>
<updated>2012-12-03T14:14:20Z</updated>
<author>
<name>Jozsef Kadlecsik</name>
<email>kadlec@blackhole.kfki.hu</email>
</author>
<published>2012-11-30T12:37:26Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=a0ecb85a2c3af73c63b6d44ce82aea52347ccf55'/>
<id>urn:sha1:a0ecb85a2c3af73c63b6d44ce82aea52347ccf55</id>
<content type='text'>
When the route changes (backup default route, VPNs) which affect a
masqueraded target, the packets were sent out with the outdated source
address. The patch addresses the issue by comparing the outgoing interface
directly with the masqueraded interface in the nat table.

Events are inefficient in this case, because it'd require adding route
events to the network core and then scanning the whole conntrack table
and re-checking the route for all entry.

Signed-off-by: Jozsef Kadlecsik &lt;kadlec@blackhole.kfki.hu&gt;
Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>net: Allow userns root to control ipv4</title>
<updated>2012-11-19T01:32:45Z</updated>
<author>
<name>Eric W. Biederman</name>
<email>ebiederm@xmission.com</email>
</author>
<published>2012-11-16T03:03:05Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=52e804c6dfaa5df1e4b0e290357b82ad4e4cda2c'/>
<id>urn:sha1:52e804c6dfaa5df1e4b0e290357b82ad4e4cda2c</id>
<content type='text'>
Allow an unpriviled user who has created a user namespace, and then
created a network namespace to effectively use the new network
namespace, by reducing capable(CAP_NET_ADMIN) and
capable(CAP_NET_RAW) calls to be ns_capable(net-&gt;user_ns,
CAP_NET_ADMIN), or capable(net-&gt;user_ns, CAP_NET_RAW) calls.

Settings that merely control a single network device are allowed.
Either the network device is a logical network device where
restrictions make no difference or the network device is hardware NIC
that has been explicity moved from the initial network namespace.

In general policy and network stack state changes are allowed
while resource control is left unchanged.

Allow creating raw sockets.
Allow the SIOCSARP ioctl to control the arp cache.
Allow the SIOCSIFFLAG ioctl to allow setting network device flags.
Allow the SIOCSIFADDR ioctl to allow setting a netdevice ipv4 address.
Allow the SIOCSIFBRDADDR ioctl to allow setting a netdevice ipv4 broadcast address.
Allow the SIOCSIFDSTADDR ioctl to allow setting a netdevice ipv4 destination address.
Allow the SIOCSIFNETMASK ioctl to allow setting a netdevice ipv4 netmask.
Allow the SIOCADDRT and SIOCDELRT ioctls to allow adding and deleting ipv4 routes.

Allow the SIOCADDTUNNEL, SIOCCHGTUNNEL and SIOCDELTUNNEL ioctls for
adding, changing and deleting gre tunnels.

Allow the SIOCADDTUNNEL, SIOCCHGTUNNEL and SIOCDELTUNNEL ioctls for
adding, changing and deleting ipip tunnels.

Allow the SIOCADDTUNNEL, SIOCCHGTUNNEL and SIOCDELTUNNEL ioctls for
adding, changing and deleting ipsec virtual tunnel interfaces.

Allow setting the MRT_INIT, MRT_DONE, MRT_ADD_VIF, MRT_DEL_VIF, MRT_ADD_MFC,
MRT_DEL_MFC, MRT_ASSERT, MRT_PIM, MRT_TABLE socket options on multicast routing
sockets.

Allow setting and receiving IPOPT_CIPSO, IP_OPT_SEC, IP_OPT_SID and
arbitrary ip options.

Allow setting IP_SEC_POLICY/IP_XFRM_POLICY ipv4 socket option.
Allow setting the IP_TRANSPARENT ipv4 socket option.
Allow setting the TCP_REPAIR socket option.
Allow setting the TCP_CONGESTION socket option.

Signed-off-by: "Eric W. Biederman" &lt;ebiederm@xmission.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>Merge branch 'master' of git://1984.lsi.us.es/nf-next</title>
<updated>2012-11-16T17:42:43Z</updated>
<author>
<name>David S. Miller</name>
<email>davem@davemloft.net</email>
</author>
<published>2012-11-16T17:42:43Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=545b29019c8959c805abfe8194d47e989f1a6e5f'/>
<id>urn:sha1:545b29019c8959c805abfe8194d47e989f1a6e5f</id>
<content type='text'>
Conflicts:
	net/ipv6/netfilter/nf_conntrack_l3proto_ipv6.c

Minor conflict due to some IS_ENABLED conversions done
in net-next.

Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>netfilter: nf_nat: use PTR_RET</title>
<updated>2012-10-29T08:59:59Z</updated>
<author>
<name>Wu Fengguang</name>
<email>fengguang.wu@intel.com</email>
</author>
<published>2012-10-28T14:40:44Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=6229b75d8da5a4eed7bb668de757e252986c2305'/>
<id>urn:sha1:6229b75d8da5a4eed7bb668de757e252986c2305</id>
<content type='text'>
Use PTR_RET rather than if(IS_ERR(...)) + PTR_ERR

Generated by: coccinelle/api/ptr_ret.cocci

Reported-by: Fengguang Wu &lt;fengguang.wu@intel.com&gt;
Signed-off-by: Fengguang Wu &lt;fengguang.wu@intel.com&gt;
Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>netfilter: nf_nat: don't check for port change on ICMP tuples</title>
<updated>2012-10-28T21:43:34Z</updated>
<author>
<name>Ulrich Weber</name>
<email>ulrich.weber@sophos.com</email>
</author>
<published>2012-10-25T05:34:45Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=38fe36a248ec3228f8e6507955d7ceb0432d2000'/>
<id>urn:sha1:38fe36a248ec3228f8e6507955d7ceb0432d2000</id>
<content type='text'>
ICMP tuples have id in src and type/code in dst.
So comparing src.u.all with dst.u.all will always fail here
and ip_xfrm_me_harder() is called for every ICMP packet,
even if there was no NAT.

Signed-off-by: Ulrich Weber &lt;ulrich.weber@sophos.com&gt;
Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>netfilter: combine ipt_REDIRECT and ip6t_REDIRECT</title>
<updated>2012-09-21T10:12:05Z</updated>
<author>
<name>Jan Engelhardt</name>
<email>jengelh@inai.de</email>
</author>
<published>2012-09-21T09:41:34Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=2cbc78a29e76a2e92c172651204f3117491877d2'/>
<id>urn:sha1:2cbc78a29e76a2e92c172651204f3117491877d2</id>
<content type='text'>
Combine more modules since the actual code is so small anyway that the
kmod metadata and the module in its loaded state totally outweighs the
combined actual code size.

IP_NF_TARGET_REDIRECT becomes a compat option; IP6_NF_TARGET_REDIRECT
is completely eliminated since it has not see a release yet.

Signed-off-by: Jan Engelhardt &lt;jengelh@inai.de&gt;
Acked-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>netfilter: combine ipt_NETMAP and ip6t_NETMAP</title>
<updated>2012-09-21T10:11:08Z</updated>
<author>
<name>Jan Engelhardt</name>
<email>jengelh@inai.de</email>
</author>
<published>2012-09-21T09:37:59Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=b3d54b3e406b5d6ac391590bf7524e887e8e13c3'/>
<id>urn:sha1:b3d54b3e406b5d6ac391590bf7524e887e8e13c3</id>
<content type='text'>
Combine more modules since the actual code is so small anyway that the
kmod metadata and the module in its loaded state totally outweighs the
combined actual code size.

IP_NF_TARGET_NETMAP becomes a compat option; IP6_NF_TARGET_NETMAP
is completely eliminated since it has not see a release yet.

Signed-off-by: Jan Engelhardt &lt;jengelh@inai.de&gt;
Acked-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
</feed>
