27 Dec, 2007

1 commit

  • Some users do "modprobe ip_conntrack hashsize=...". Since we have the
    module aliases this loads nf_conntrack_ipv4 and nf_conntrack, the
    hashsize parameter is unknown for nf_conntrack_ipv4 however and makes
    it fail.

    Allow to specify hashsize= for both nf_conntrack and nf_conntrack_ipv4.

    Note: the nf_conntrack message in the ringbuffer will display an
    incorrect hashsize since nf_conntrack is first pulled in as a
    dependency and calculates the size itself, then it gets changed
    through a call to nf_conntrack_set_hashsize().

    Signed-off-by: Patrick McHardy
    Signed-off-by: David S. Miller

    Patrick McHardy
     

21 Dec, 2007

1 commit


15 Dec, 2007

3 commits

  • In order to avoid jiffies wraparound and its effect, special care must
    be taken
    when doing comparisons ...

    Signed-off-by: Eric Dumazet
    Acked-by: Patrick McHardy
    Signed-off-by: David S. Miller

    Eric Dumazet
     
  • When copying entries to user, the kernel makes two passes through the
    data, first copying all the entries, then fixing up names and counters.
    On the second pass it copies the kernel and match data from userspace
    to the kernel again to find the corresponding structures, expecting
    that kernel pointers contained in the data are still valid.

    This is obviously broken, fix by avoiding the second pass completely
    and fixing names and counters while dumping the ruleset, using the
    kernel-internal data structures.

    Signed-off-by: Patrick McHardy
    Signed-off-by: David S. Miller

    Patrick McHardy
     
  • This patch is a fix. It sets IPS_EXPECTED for related conntracks.

    Signed-off-by: Pablo Neira Ayuso
    Signed-off-by: Patrick McHardy
    Signed-off-by: David S. Miller

    Pablo Neira Ayuso
     

30 Nov, 2007

2 commits


16 Nov, 2007

2 commits

  • Reported by Chuck Ebbert as:

    https://bugzilla.redhat.com/show_bug.cgi?id=259501#c14

    This routine is called each time hash should be replaced, nf_conn has
    extension list which contains pointers to connection tracking users
    (like nat, which is right now the only such user), so when replace takes
    place it should copy own extensions. Loop above checks for own
    extension, but tries to move higer-layer one, which can lead to above
    oops.

    Signed-off-by: Evgeniy Polyakov
    Signed-off-by: David S. Miller

    Evgeniy Polyakov
     
  • It should pass opt to the ->get/->set functions, not ops.

    Tested-by: Luca Tettamanti
    Signed-off-by: Patrick McHardy
    Signed-off-by: David S. Miller

    Patrick McHardy
     

13 Nov, 2007

2 commits


07 Nov, 2007

3 commits


31 Oct, 2007

1 commit


30 Oct, 2007

1 commit


20 Oct, 2007

3 commits


19 Oct, 2007

2 commits

  • * 'master' of master.kernel.org:/pub/scm/linux/kernel/git/davem/net-2.6: (51 commits)
    [IPV6]: Fix again the fl6_sock_lookup() fixed locking
    [NETFILTER]: nf_conntrack_tcp: fix connection reopening fix
    [IPV6]: Fix race in ipv6_flowlabel_opt() when inserting two labels
    [IPV6]: Lost locking in fl6_sock_lookup
    [IPV6]: Lost locking when inserting a flowlabel in ipv6_fl_list
    [NETFILTER]: xt_sctp: fix mistake to pass a pointer where array is required
    [NET]: Fix OOPS due to missing check in dev_parse_header().
    [TCP]: Remove lost_retrans zero seqno special cases
    [NET]: fix carrier-on bug?
    [NET]: Fix uninitialised variable in ip_frag_reasm()
    [IPSEC]: Rename mode to outer_mode and add inner_mode
    [IPSEC]: Disallow combinations of RO and AH/ESP/IPCOMP
    [IPSEC]: Use the top IPv4 route's peer instead of the bottom
    [IPSEC]: Store afinfo pointer in xfrm_mode
    [IPSEC]: Add missing BEET checks
    [IPSEC]: Move type and mode map into xfrm_state.c
    [IPSEC]: Fix length check in xfrm_parse_spi
    [IPSEC]: Move ip_summed zapping out of xfrm6_rcv_spi
    [IPSEC]: Get nexthdr from caller in xfrm6_rcv_spi
    [IPSEC]: Move tunnel parsing for IPv4 out of xfrm4_input
    ...

    Linus Torvalds
     
  • No one has bothered to set strategy routine for the the netfilter sysctls that
    return jiffies to be sysctl_jiffies.

    So it appears the sys_sysctl path is unused and untested, so this patch
    removes the binary sysctl numbers.

    Which fixes the netfilter oops in 2.6.23-rc2-mm2 for me.

    Signed-off-by: Eric W. Biederman
    Cc: Patrick McHardy
    Cc: "David S. Miller"
    Signed-off-by: Andrew Morton
    Signed-off-by: Linus Torvalds

    Eric W. Biederman
     

18 Oct, 2007

2 commits


16 Oct, 2007

3 commits


12 Oct, 2007

2 commits

  • The patch will add MODULE_ALIAS("ip6t_") where missing,
    otherwise you will get

    ip6tables: No chain/target/match by that name

    when xt_ is not already loaded.

    Signed-off-by: Jan Engelhardt
    Signed-off-by: Patrick McHardy
    Signed-off-by: David S. Miller

    Jan Engelhardt
     
  • With your description I could reproduce the bug and actually you were
    completely right: the code above is incorrect. Somehow I was able to
    misread RFC1122 and mixed the roles :-(:

    When a connection is >>closed actively<>accept<< a new SYN from the remote TCP to
    reopen the connection directly from TIME-WAIT state, if it:
    [...]

    The fix is as follows: if the receiver initiated an active close, then the
    sender may reopen the connection - otherwise try to figure out if we hold
    a dead connection.

    Signed-off-by: Jozsef Kadlecsik
    Tested-by: Krzysztof Piotr Oledzki
    Signed-off-by: Patrick McHardy
    Signed-off-by: David S. Miller

    Jozsef Kadlecsik
     

11 Oct, 2007

12 commits