<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/net/netfilter, branch v3.1</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/net/netfilter?h=v3.1</id>
<link rel='self' href='https://git.amat.us/linux/atom/net/netfilter?h=v3.1'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2011-10-17T23:38:03Z</updated>
<entry>
<title>Merge branch 'nf' of git://1984.lsi.us.es/net</title>
<updated>2011-10-17T23:38:03Z</updated>
<author>
<name>David S. Miller</name>
<email>davem@davemloft.net</email>
</author>
<published>2011-10-17T23:38:03Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=ae2a4583154a5b985ed4a81c6259c55bafe6d810'/>
<id>urn:sha1:ae2a4583154a5b985ed4a81c6259c55bafe6d810</id>
<content type='text'>
</content>
</entry>
<entry>
<title>IPVS netns shutdown/startup dead-lock</title>
<updated>2011-10-12T16:32:15Z</updated>
<author>
<name>Hans Schillstrom</name>
<email>hans@schillstrom.com</email>
</author>
<published>2011-10-11T01:54:35Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=ae1d48b23d5e79efbcf0cef4f0ebb9742361af59'/>
<id>urn:sha1:ae1d48b23d5e79efbcf0cef4f0ebb9742361af59</id>
<content type='text'>
ip_vs_mutext is used by both netns shutdown code and startup
and both implicit uses sk_lock-AF_INET mutex.

cleanup CPU-1         startup CPU-2
ip_vs_dst_event()     ip_vs_genl_set_cmd()
 sk_lock-AF_INET     __ip_vs_mutex
                     sk_lock-AF_INET
__ip_vs_mutex
* DEAD LOCK *

A new mutex placed in ip_vs netns struct called sync_mutex is added.

Comments from Julian and Simon added.
This patch has been running for more than 3 month now and it seems to work.

Ver. 3
    IP_VS_SO_GET_DAEMON in do_ip_vs_get_ctl protected by sync_mutex
    instead of __ip_vs_mutex as sugested by Julian.

Signed-off-by: Hans Schillstrom &lt;hans@schillstrom.com&gt;
Acked-by: Julian Anastasov &lt;ja@ssi.bg&gt;
Signed-off-by: Simon Horman &lt;horms@verge.net.au&gt;
Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>netfilter: Use proper rwlock init function</title>
<updated>2011-10-05T21:51:38Z</updated>
<author>
<name>Thomas Gleixner</name>
<email>tglx@linutronix.de</email>
</author>
<published>2011-10-05T03:24:43Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=3458e21c0d384ca04b27a2ea24d9314c1b57530f'/>
<id>urn:sha1:3458e21c0d384ca04b27a2ea24d9314c1b57530f</id>
<content type='text'>
Replace the open coded initialization with the init function.

Signed-off-by: Thomas Gleixner &lt;tglx@linutronix.de&gt;
Acked-by: Hans Schillstrom &lt;hans.schillstrom@ericsson.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>netfilter: nf_conntrack: fix event flooding in GRE protocol tracker</title>
<updated>2011-10-03T10:43:24Z</updated>
<author>
<name>Florian Westphal</name>
<email>fw@strlen.de</email>
</author>
<published>2011-09-30T14:38:29Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=98d9ae841ad620045d653fb05764e4a899f42dbd'/>
<id>urn:sha1:98d9ae841ad620045d653fb05764e4a899f42dbd</id>
<content type='text'>
GRE connections cause ctnetlink event flood because the ASSURED event
is set for every packet received.

Reported-by: Denys Fedoryshchenko &lt;denys@visp.net.lb&gt;
Tested-by: Denys Fedoryshchenko &lt;denys@visp.net.lb&gt;
Signed-off-by: Florian Westphal &lt;fw@strlen.de&gt;
Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>Merge branch 'master' of git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6</title>
<updated>2011-08-30T21:43:56Z</updated>
<author>
<name>David S. Miller</name>
<email>davem@davemloft.net</email>
</author>
<published>2011-08-30T21:43:56Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=785824165508a65478474f0c87f6b8c3ad048c62'/>
<id>urn:sha1:785824165508a65478474f0c87f6b8c3ad048c62</id>
<content type='text'>
</content>
</entry>
<entry>
<title>netfilter: nf_ct_tcp: wrong multiplication of TCPOLEN_TSTAMP_ALIGNED in tcp_sack skips fastpath</title>
<updated>2011-08-30T13:46:13Z</updated>
<author>
<name>Jozsef Kadlecsik</name>
<email>kadlec@blackhole.kfki.hu</email>
</author>
<published>2011-08-30T13:46:13Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=bb9fc37358ffa9de1cc2b2b6f1a559b926ef50d9'/>
<id>urn:sha1:bb9fc37358ffa9de1cc2b2b6f1a559b926ef50d9</id>
<content type='text'>
The wrong multiplication of TCPOLEN_TSTAMP_ALIGNED by 4 skips the fast path
for the timestamp-only option. Bug reported by Michael M. Builov (netfilter
bugzilla #738).

Signed-off-by: Jozsef Kadlecsik &lt;kadlec@blackhole.kfki.hu&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
</content>
</entry>
<entry>
<title>netfilter: nf_ct_tcp: fix incorrect handling of invalid TCP option</title>
<updated>2011-08-30T13:45:10Z</updated>
<author>
<name>Jozsef Kadlecsik</name>
<email>kadlec@blackhole.kfki.hu</email>
</author>
<published>2011-08-30T13:45:10Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=4a5cc84ae7e19fb7a72a30332ba67af43e0ad1ad'/>
<id>urn:sha1:4a5cc84ae7e19fb7a72a30332ba67af43e0ad1ad</id>
<content type='text'>
Michael M. Builov reported that in the tcp_options and tcp_sack functions
of netfilter TCP conntrack the incorrect handling of invalid TCP option
with too big opsize may lead to read access beyond tcp-packet or buffer
allocated on stack (netfilter bugzilla #738). The fix is to stop parsing
the options at detecting the broken option.

Signed-off-by: Jozsef Kadlecsik &lt;kadlec@blackhole.kfki.hu&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
</content>
</entry>
<entry>
<title>netfilter: nf_ct_pptp: fix DNATed PPTP connection address translation</title>
<updated>2011-08-30T13:23:03Z</updated>
<author>
<name>Sanket Shah</name>
<email>sanket.shah@elitecore.com</email>
</author>
<published>2011-08-30T13:23:03Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=4c6e4209662b2a4147cde16c2144a253a7430a49'/>
<id>urn:sha1:4c6e4209662b2a4147cde16c2144a253a7430a49</id>
<content type='text'>
When both the server and the client are NATed, the set-link-info control
packet containing the peer's call-id field is not properly translated.

I have verified that it was working in 2.6.16.13 kernel previously but
due to rewrite, this scenario stopped working (Not knowing exact version
when it stopped working).

Signed-off-by: Sanket Shah &lt;sanket.shah@elitecore.com&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
</content>
</entry>
<entry>
<title>netfilter: nf_queue: reject NF_STOLEN verdicts from userspace</title>
<updated>2011-08-30T13:01:20Z</updated>
<author>
<name>Florian Westphal</name>
<email>fw@strlen.de</email>
</author>
<published>2011-08-30T13:01:20Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=c6675233f9015d3c0460c8aab53ed9b99d915c64'/>
<id>urn:sha1:c6675233f9015d3c0460c8aab53ed9b99d915c64</id>
<content type='text'>
A userspace listener may send (bogus) NF_STOLEN verdict, which causes skb leak.

This problem was previously fixed via
64507fdbc29c3a622180378210ecea8659b14e40 (netfilter:
nf_queue: fix NF_STOLEN skb leak) but this had to be reverted because
NF_STOLEN can also be returned by a netfilter hook when iterating the
rules in nf_reinject.

Reject userspace NF_STOLEN verdict, as suggested by Michal Miroslaw.

This is complementary to commit fad54440438a7c231a6ae347738423cbabc936d9
(netfilter: avoid double free in nf_reinject).

Cc: Julian Anastasov &lt;ja@ssi.bg&gt;
Cc: Eric Dumazet &lt;eric.dumazet@gmail.com&gt;
Signed-off-by: Florian Westphal &lt;fw@strlen.de&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
</content>
</entry>
<entry>
<title>netfilter: avoid double free in nf_reinject</title>
<updated>2011-08-08T05:11:15Z</updated>
<author>
<name>Julian Anastasov</name>
<email>ja@ssi.bg</email>
</author>
<published>2011-08-05T00:36:28Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=fad54440438a7c231a6ae347738423cbabc936d9'/>
<id>urn:sha1:fad54440438a7c231a6ae347738423cbabc936d9</id>
<content type='text'>
NF_STOLEN means skb was already freed

Signed-off-by: Julian Anastasov &lt;ja@ssi.bg&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
</feed>
