<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/net/netfilter, branch v3.2.2</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/net/netfilter?h=v3.2.2</id>
<link rel='self' href='https://git.amat.us/linux/atom/net/netfilter?h=v3.2.2'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2011-12-31T15:59:04Z</updated>
<entry>
<title>netfilter: ctnetlink: fix timeout calculation</title>
<updated>2011-12-31T15:59:04Z</updated>
<author>
<name>Xi Wang</name>
<email>xi.wang@gmail.com</email>
</author>
<published>2011-12-30T15:40:17Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=c121638277a71c1e1fb44c3e654ea353357bbc2c'/>
<id>urn:sha1:c121638277a71c1e1fb44c3e654ea353357bbc2c</id>
<content type='text'>
The sanity check (timeout &lt; 0) never works; the dividend is unsigned
and so is the division, which should have been a signed division.

	long timeout = (ct-&gt;timeout.expires - jiffies) / HZ;
	if (timeout &lt; 0)
		timeout = 0;

This patch converts the time values to signed for the division.

Signed-off-by: Xi Wang &lt;xi.wang@gmail.com&gt;
Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>ipvs: try also real server with port 0 in backup server</title>
<updated>2011-12-31T15:06:29Z</updated>
<author>
<name>Julian Anastasov</name>
<email>ja@ssi.bg</email>
</author>
<published>2011-12-30T05:19:02Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=52793dbe3d60bd73bbebe28b2bfc9f6b4b920d4c'/>
<id>urn:sha1:52793dbe3d60bd73bbebe28b2bfc9f6b4b920d4c</id>
<content type='text'>
	We should not forget to try for real server with port 0
in the backup server when processing the sync message. We should
do it in all cases because the backup server can use different
forwarding method.

Signed-off-by: Julian Anastasov &lt;ja@ssi.bg&gt;
Signed-off-by: Simon Horman &lt;horms@verge.net.au&gt;
Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>Merge branch 'nf' of git://1984.lsi.us.es/net</title>
<updated>2011-12-24T21:10:26Z</updated>
<author>
<name>David S. Miller</name>
<email>davem@davemloft.net</email>
</author>
<published>2011-12-24T21:10:26Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=c43c5f39584c0f388a7e5372312c2c48221a4415'/>
<id>urn:sha1:c43c5f39584c0f388a7e5372312c2c48221a4415</id>
<content type='text'>
</content>
</entry>
<entry>
<title>netfilter: ctnetlink: fix scheduling while atomic if helper is autoloaded</title>
<updated>2011-12-24T18:49:04Z</updated>
<author>
<name>Pablo Neira Ayuso</name>
<email>pablo@netfilter.org</email>
</author>
<published>2011-12-24T18:28:47Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=1a31a4a8388a90e9240fb4e5e5c9c909fcfdfd0e'/>
<id>urn:sha1:1a31a4a8388a90e9240fb4e5e5c9c909fcfdfd0e</id>
<content type='text'>
This patch fixes one scheduling while atomic error:

[  385.565186] ctnetlink v0.93: registering with nfnetlink.
[  385.565349] BUG: scheduling while atomic: lt-expect_creat/16163/0x00000200

It can be triggered with utils/expect_create included in
libnetfilter_conntrack if the FTP helper is not loaded.

Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>netfilter: ctnetlink: fix return value of ctnetlink_get_expect()</title>
<updated>2011-12-24T18:49:04Z</updated>
<author>
<name>Pablo Neira Ayuso</name>
<email>pablo@netfilter.org</email>
</author>
<published>2011-12-24T18:03:46Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=81378f728fe560e175fb2e8fd33206793567e896'/>
<id>urn:sha1:81378f728fe560e175fb2e8fd33206793567e896</id>
<content type='text'>
This fixes one bogus error that is returned to user-space:

libnetfilter_conntrack/utils# ./expect_get
TEST: get expectation (-1)(Unknown error 18446744073709551504)

This patch includes the correct handling for EAGAIN (nfnetlink
uses this error value to restart the operation after module
auto-loading).

Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>netfilter: xt_connbytes: handle negation correctly</title>
<updated>2011-12-23T13:50:19Z</updated>
<author>
<name>Florian Westphal</name>
<email>fw@strlen.de</email>
</author>
<published>2011-12-16T17:35:15Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=0354b48f633ae435acbc01b470a1ce8cfeff3e9f'/>
<id>urn:sha1:0354b48f633ae435acbc01b470a1ce8cfeff3e9f</id>
<content type='text'>
"! --connbytes 23:42" should match if the packet/byte count is not in range.

As there is no explict "invert match" toggle in the match structure,
userspace swaps the from and to arguments
(i.e., as if "--connbytes 42:23" were given).

However, "what &lt;= 23 &amp;&amp; what &gt;= 42" will always be false.

Change things so we use "||" in case "from" is larger than "to".

This change may look like it breaks backwards compatibility when "to" is 0.
However, older iptables binaries will refuse "connbytes 42:0",
and current releases treat it to mean "! --connbytes 0:42",
so we should be fine.

Signed-off-by: Florian Westphal &lt;fw@strlen.de&gt;
Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>netfilter: Remove ADVANCED dependency from NF_CONNTRACK_NETBIOS_NS</title>
<updated>2011-12-02T03:19:01Z</updated>
<author>
<name>David S. Miller</name>
<email>davem@davemloft.net</email>
</author>
<published>2011-12-02T03:19:01Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=3ced1be5490f5c415d51a1e5918beeb9239d546b'/>
<id>urn:sha1:3ced1be5490f5c415d51a1e5918beeb9239d546b</id>
<content type='text'>
firewalld in Fedora 16 needs this.

Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>Merge branch 'nf' of git://1984.lsi.us.es/net</title>
<updated>2011-11-29T06:20:55Z</updated>
<author>
<name>David S. Miller</name>
<email>davem@davemloft.net</email>
</author>
<published>2011-11-29T06:20:55Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=c1baa88431fe0fe4fad492dece4177a7735f89cf'/>
<id>urn:sha1:c1baa88431fe0fe4fad492dece4177a7735f89cf</id>
<content type='text'>
</content>
</entry>
<entry>
<title>netfilter: Remove NOTRACK/RAW dependency on NETFILTER_ADVANCED.</title>
<updated>2011-11-23T21:07:00Z</updated>
<author>
<name>David S. Miller</name>
<email>davem@davemloft.net</email>
</author>
<published>2011-11-23T21:07:00Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=46a246c4dff9f248913e791b69f2336cd8d4ec41'/>
<id>urn:sha1:46a246c4dff9f248913e791b69f2336cd8d4ec41</id>
<content type='text'>
Distributions are using this in their default scripts, so don't hide
them behind the advanced setting.

Reported-by: Linus Torvalds &lt;torvalds@linux-foundation.org&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>netfilter: nf_conntrack: make event callback registration per-netns</title>
<updated>2011-11-21T23:34:47Z</updated>
<author>
<name>Pablo Neira Ayuso</name>
<email>pablo@netfilter.org</email>
</author>
<published>2011-11-21T23:16:51Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=70e9942f17a6193e9172a804e6569a8806633d6b'/>
<id>urn:sha1:70e9942f17a6193e9172a804e6569a8806633d6b</id>
<content type='text'>
This patch fixes an oops that can be triggered following this recipe:

0) make sure nf_conntrack_netlink and nf_conntrack_ipv4 are loaded.
1) container is started.
2) connect to it via lxc-console.
3) generate some traffic with the container to create some conntrack
   entries in its table.
4) stop the container: you hit one oops because the conntrack table
   cleanup tries to report the destroy event to user-space but the
   per-netns nfnetlink socket has already gone (as the nfnetlink
   socket is per-netns but event callback registration is global).

To fix this situation, we make the ctnl_notifier per-netns so the
callback is registered/unregistered if the container is
created/destroyed.

Alex Bligh and Alexey Dobriyan originally proposed one small patch to
check if the nfnetlink socket is gone in nfnetlink_has_listeners,
but this is a very visited path for events, thus, it may reduce
performance and it looks a bit hackish to check for the nfnetlink
socket only to workaround this situation. As a result, I decided
to follow the bigger path choice, which seems to look nicer to me.

Cc: Alexey Dobriyan &lt;adobriyan@gmail.com&gt;
Reported-by: Alex Bligh &lt;alex@alex.org.uk&gt;
Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
</feed>
