<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/net/netfilter, branch v2.6.16</title>
<subtitle>Mirror of https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/
</subtitle>
<id>https://git.shady.money/linux/atom?h=v2.6.16</id>
<link rel='self' href='https://git.shady.money/linux/atom?h=v2.6.16'/>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/'/>
<updated>2006-03-13T04:39:35Z</updated>
<entry>
<title>[NETFILTER]: nfnetlink_queue: fix possible NULL-ptr dereference</title>
<updated>2006-03-13T04:39:35Z</updated>
<author>
<name>Patrick McHardy</name>
<email>kaber@trash.net</email>
</author>
<published>2006-03-13T04:32:47Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=406dbfc9ae0e6b7eb4da4a52c0a6556a0d7e6a2f'/>
<id>urn:sha1:406dbfc9ae0e6b7eb4da4a52c0a6556a0d7e6a2f</id>
<content type='text'>
Fix NULL-ptr dereference when a config message for a non-existant
queue containing only an NFQA_CFG_PARAMS attribute is received.

Coverity #433

Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: nf_queue: fix end-of-list check</title>
<updated>2006-02-27T21:03:55Z</updated>
<author>
<name>Patrick McHardy</name>
<email>kaber@trash.net</email>
</author>
<published>2006-02-27T21:03:55Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=45fe4dc08cbf9510074b97a16606366c1d405f4d'/>
<id>urn:sha1:45fe4dc08cbf9510074b97a16606366c1d405f4d</id>
<content type='text'>
The comparison wants to find out if the last list iteration reached the
end of the list. It needs to compare the iterator with the list head to
do this, not the element it is looking for.

Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: nf_queue: remove unnecessary check for outfn</title>
<updated>2006-02-27T21:03:39Z</updated>
<author>
<name>Patrick McHardy</name>
<email>kaber@trash.net</email>
</author>
<published>2006-02-27T21:03:39Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=e121e9ecb08c3a9843243f461290869ff08be900'/>
<id>urn:sha1:e121e9ecb08c3a9843243f461290869ff08be900</id>
<content type='text'>
The only point of registering a queue handler is to provide an outfn,
so there is no need to check for it.

Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: nf_queue: fix rerouting after packet mangling</title>
<updated>2006-02-27T21:03:24Z</updated>
<author>
<name>Patrick McHardy</name>
<email>kaber@trash.net</email>
</author>
<published>2006-02-27T21:03:24Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=7a11b9848ae27e571f219fab5541bd84700f0d68'/>
<id>urn:sha1:7a11b9848ae27e571f219fab5541bd84700f0d68</id>
<content type='text'>
Packets should be rerouted when they come back from userspace, not before.
Also move the queue_rerouters to RCU to avoid taking the queue_handler_lock
for each reinjected packet.

Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: nf_queue: check if rerouter is present before using it</title>
<updated>2006-02-27T21:03:10Z</updated>
<author>
<name>Patrick McHardy</name>
<email>kaber@trash.net</email>
</author>
<published>2006-02-27T21:03:10Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=f92f871989c97a24d284ac60b0f880222ddf87ac'/>
<id>urn:sha1:f92f871989c97a24d284ac60b0f880222ddf87ac</id>
<content type='text'>
Every rerouter needs to provide a save and a reroute function, we don't
need to check for them. But we do need to check if a rerouter is registered
at all for the current family, with bridging for example packets of
unregistered families can hit nf_queue.

Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: nf_queue: don't copy registered rerouter data</title>
<updated>2006-02-27T21:02:52Z</updated>
<author>
<name>Patrick McHardy</name>
<email>kaber@trash.net</email>
</author>
<published>2006-02-27T21:02:52Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=e02f7d1603c955126e88cc08149509d00be25cb9'/>
<id>urn:sha1:e02f7d1603c955126e88cc08149509d00be25cb9</id>
<content type='text'>
Use the registered data structure instead of copying it.

Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: nf_conntrack: Fix TCP/UDP HW checksum handling for IPv6 packet</title>
<updated>2006-02-15T23:25:18Z</updated>
<author>
<name>Yasuyuki Kozakai</name>
<email>yasuyuki.kozakai@toshiba.co.jp</email>
</author>
<published>2006-02-15T23:25:18Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=7c6de05884b9fcc7ef621e2ab198ba93d85f46aa'/>
<id>urn:sha1:7c6de05884b9fcc7ef621e2ab198ba93d85f46aa</id>
<content type='text'>
If skb-&gt;ip_summed is CHECKSUM_HW here, skb-&gt;csum includes checksum
of actual IPv6 header and extension headers. Then such excess
checksum must be subtruct when nf_conntrack calculates TCP/UDP checksum
with pseudo IPv6 header. Spotted by Ben Skeggs.

Signed-off-by: Yasuyuki Kozakai &lt;yasuyuki.kozakai@toshiba.co.jp&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: nf_conntrack: move registration of __nf_ct_attach</title>
<updated>2006-02-15T23:22:21Z</updated>
<author>
<name>Yasuyuki Kozakai</name>
<email>yasuyuki.kozakai@toshiba.co.jp</email>
</author>
<published>2006-02-15T23:22:21Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=7d3cdc6b554137a7a0534ce38b155a63a3117f27'/>
<id>urn:sha1:7d3cdc6b554137a7a0534ce38b155a63a3117f27</id>
<content type='text'>
Move registration of __nf_ct_attach to nf_conntrack_core to make it usable
for IPv6 connection tracking as well.

Signed-off-by: Yasuyuki Kozakai &lt;yasuyuki.kozakai@toshiba.co.jp&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: x_tables: fix dependencies of conntrack related modules</title>
<updated>2006-02-15T23:21:31Z</updated>
<author>
<name>Yasuyuki Kozakai</name>
<email>yasuyuki.kozakai@toshiba.co.jp</email>
</author>
<published>2006-02-15T23:21:31Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=deac0ccdb4da16b68539d75edecf26162de05150'/>
<id>urn:sha1:deac0ccdb4da16b68539d75edecf26162de05150</id>
<content type='text'>
NF_CONNTRACK_MARK is bool and depends on NF_CONNTRACK which is
tristate.  If a variable depends on NF_CONNTRACK_MARK and doesn't take
care about NF_CONNTRACK, it can be y even if NF_CONNTRACK isn't y.
NF_CT_ACCT have same issue, too.

Signed-off-by: Yasuyuki Kozakai &lt;yasuyuki.kozakai@toshiba.co.jp&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER] Fix Kconfig menu level for x_tables</title>
<updated>2006-02-13T23:42:48Z</updated>
<author>
<name>Harald Welte</name>
<email>laforge@netfilter.org</email>
</author>
<published>2006-02-13T23:42:48Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=a6c1cd572642478528165ac44db4d2daae125a21'/>
<id>urn:sha1:a6c1cd572642478528165ac44db4d2daae125a21</id>
<content type='text'>
The new x_tables related Kconfig options appear at the wrong menu level
without this patch.

Signed-off-by: Harald Welte &lt;laforge@netfilter.org&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
</feed>
