<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/net/bridge/netfilter, branch v3.1</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/net/bridge/netfilter?h=v3.1</id>
<link rel='self' href='https://git.amat.us/linux/atom/net/bridge/netfilter?h=v3.1'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2011-08-30T21:43:56Z</updated>
<entry>
<title>Merge branch 'master' of git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6</title>
<updated>2011-08-30T21:43:56Z</updated>
<author>
<name>David S. Miller</name>
<email>davem@davemloft.net</email>
</author>
<published>2011-08-30T21:43:56Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=785824165508a65478474f0c87f6b8c3ad048c62'/>
<id>urn:sha1:785824165508a65478474f0c87f6b8c3ad048c62</id>
<content type='text'>
</content>
</entry>
<entry>
<title>net/bridge/netfilter/ebtables.c: use available error handling code</title>
<updated>2011-08-11T12:52:57Z</updated>
<author>
<name>Julia Lawall</name>
<email>julia@diku.dk</email>
</author>
<published>2011-08-11T01:59:38Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=5189054dd7ff18576446edc270b6b69fa8285336'/>
<id>urn:sha1:5189054dd7ff18576446edc270b6b69fa8285336</id>
<content type='text'>
Free the locally allocated table and newinfo as done in adjacent error
handling code.

Signed-off-by: Julia Lawall &lt;julia@diku.dk&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>netfilter: ebtables: fix ebtables build dependency</title>
<updated>2011-07-29T14:40:30Z</updated>
<author>
<name>Bart De Schuymer</name>
<email>bdschuym@pandora.be</email>
</author>
<published>2011-07-29T14:40:30Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=9823d9ff483af4ce8804a9eb69600ca739cd1f58'/>
<id>urn:sha1:9823d9ff483af4ce8804a9eb69600ca739cd1f58</id>
<content type='text'>
The configuration of ebtables shouldn't depend on
CONFIG_BRIDGE_NETFILTER, only on CONFIG_NETFILTER.

Reported-by: Sébastien Laveze &lt;slaveze@gmail.com&gt;
Signed-off-by: Bart De Schuymer &lt;bdschuym@pandora.be&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
</content>
</entry>
<entry>
<title>net, netfilter: Remove redundant goto in ebt_ulog_packet</title>
<updated>2011-07-21T12:02:17Z</updated>
<author>
<name>Jesper Juhl</name>
<email>jj@chaosbits.net</email>
</author>
<published>2011-07-17T17:56:38Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=f0da7ee410e63a1521af734c3970acc1470e8c50'/>
<id>urn:sha1:f0da7ee410e63a1521af734c3970acc1470e8c50</id>
<content type='text'>
In net/bridge/netfilter/ebt_ulog.c:ebt_ulog_packet() the 'goto unlock'
before the 'alloc_failure' label is completely redundant. This patch
removes it.

Signed-off-by: Jesper Juhl &lt;jj@chaosbits.net&gt;
Signed-off-by: Jiri Kosina &lt;jkosina@suse.cz&gt;
</content>
</entry>
<entry>
<title>netfilter: Fix several warnings in compat_mtw_from_user().</title>
<updated>2011-05-26T17:09:07Z</updated>
<author>
<name>David Miller</name>
<email>davem@davemloft.net</email>
</author>
<published>2011-05-19T22:14:39Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=97242c85a2c8160eac5a6e945209b5b6ae8ab5a3'/>
<id>urn:sha1:97242c85a2c8160eac5a6e945209b5b6ae8ab5a3</id>
<content type='text'>
Kill set but not used 'entry_offset'.

Add a default case to the switch statement so the compiler
can see that we always initialize off and size_kern before
using them.

Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>netfilter: ebtables: only call xt_compat_add_offset once per rule</title>
<updated>2011-05-10T07:52:17Z</updated>
<author>
<name>Florian Westphal</name>
<email>fw@strlen.de</email>
</author>
<published>2011-04-21T08:58:25Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=103a9778e07bcc0cd34b5c35a87281454eec719e'/>
<id>urn:sha1:103a9778e07bcc0cd34b5c35a87281454eec719e</id>
<content type='text'>
The optimizations in commit 255d0dc34068a976
(netfilter: x_table: speedup compat operations) assume that
xt_compat_add_offset is called once per rule.

ebtables however called it for each match/target found in a rule.

The match/watcher/target parser already returns the needed delta, so it
is sufficient to move the xt_compat_add_offset call to a more reasonable
location.

While at it, also get rid of the unused COMPAT iterator macros.

Signed-off-by: Florian Westphal &lt;fw@strlen.de&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
</content>
</entry>
<entry>
<title>netfilter: fix ebtables compat support</title>
<updated>2011-05-10T07:48:59Z</updated>
<author>
<name>Eric Dumazet</name>
<email>eric.dumazet@gmail.com</email>
</author>
<published>2011-04-21T08:57:21Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=5a6351eecf8c87afed9c883bb6341d09406d74ba'/>
<id>urn:sha1:5a6351eecf8c87afed9c883bb6341d09406d74ba</id>
<content type='text'>
commit 255d0dc34068a976 (netfilter: x_table: speedup compat operations)
made ebtables not working anymore.

1) xt_compat_calc_jump() is not an exact match lookup
2) compat_table_info() has a typo in xt_compat_init_offsets() call
3) compat_do_replace() misses a xt_compat_init_offsets() call

Reported-by: dann frazier &lt;dannf@dannf.org&gt;
Signed-off-by: Eric Dumazet &lt;eric.dumazet@gmail.com&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
</content>
</entry>
<entry>
<title>bridge: netfilter: fix information leak</title>
<updated>2011-02-14T15:49:23Z</updated>
<author>
<name>Vasiliy Kulikov</name>
<email>segoon@openwall.com</email>
</author>
<published>2011-02-14T15:49:23Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=d846f71195d57b0bbb143382647c2c6638b04c5a'/>
<id>urn:sha1:d846f71195d57b0bbb143382647c2c6638b04c5a</id>
<content type='text'>
Struct tmp is copied from userspace.  It is not checked whether the "name"
field is NULL terminated.  This may lead to buffer overflow and passing
contents of kernel stack as a module name to try_then_request_module() and,
consequently, to modprobe commandline.  It would be seen by all userspace
processes.

Signed-off-by: Vasiliy Kulikov &lt;segoon@openwall.com&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
</content>
</entry>
<entry>
<title>netfilter: ebt_ip6: allow matching on ipv6-icmp types/codes</title>
<updated>2011-01-13T11:05:12Z</updated>
<author>
<name>Florian Westphal</name>
<email>fw@strlen.de</email>
</author>
<published>2010-12-20T14:57:47Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=6faee60a4e82075853a437831768cc9e2e563e4e'/>
<id>urn:sha1:6faee60a4e82075853a437831768cc9e2e563e4e</id>
<content type='text'>
To avoid adding a new match revision icmp type/code are stored
in the sport/dport area.

Signed-off-by: Florian Westphal &lt;fw@strlen.de&gt;
Reviewed-by: Holger Eitzenberger &lt;holger@eitzenberger.org&gt;
Reviewed-by: Bart De Schuymer&lt;bdschuym@pandora.be&gt;
Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>netfilter: x_table: speedup compat operations</title>
<updated>2011-01-13T11:05:12Z</updated>
<author>
<name>Eric Dumazet</name>
<email>eric.dumazet@gmail.com</email>
</author>
<published>2010-12-18T17:35:15Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=255d0dc34068a976550ce555e153c0bfcfec7cc6'/>
<id>urn:sha1:255d0dc34068a976550ce555e153c0bfcfec7cc6</id>
<content type='text'>
One iptables invocation with 135000 rules takes 35 seconds of cpu time
on a recent server, using a 32bit distro and a 64bit kernel.

We eventually trigger NMI/RCU watchdog.

INFO: rcu_sched_state detected stall on CPU 3 (t=6000 jiffies)

COMPAT mode has quadratic behavior and consume 16 bytes of memory per
rule.

Switch the xt_compat algos to use an array instead of list, and use a
binary search to locate an offset in the sorted array.

This halves memory need (8 bytes per rule), and removes quadratic
behavior [ O(N*N) -&gt; O(N*log2(N)) ]

Time of iptables goes from 35 s to 150 ms.

Signed-off-by: Eric Dumazet &lt;eric.dumazet@gmail.com&gt;
Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
</feed>
