30 Dec, 2008

2 commits


29 Dec, 2008

1 commit

  • * git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next-2.6: (1429 commits)
    net: Allow dependancies of FDDI & Tokenring to be modular.
    igb: Fix build warning when DCA is disabled.
    net: Fix warning fallout from recent NAPI interface changes.
    gro: Fix potential use after free
    sfc: If AN is enabled, always read speed/duplex from the AN advertising bits
    sfc: When disabling the NIC, close the device rather than unregistering it
    sfc: SFT9001: Add cable diagnostics
    sfc: Add support for multiple PHY self-tests
    sfc: Merge top-level functions for self-tests
    sfc: Clean up PHY mode management in loopback self-test
    sfc: Fix unreliable link detection in some loopback modes
    sfc: Generate unique names for per-NIC workqueues
    802.3ad: use standard ethhdr instead of ad_header
    802.3ad: generalize out mac address initializer
    802.3ad: initialize ports LACPDU from const initializer
    802.3ad: remove typedef around ad_system
    802.3ad: turn ports is_individual into a bool
    802.3ad: turn ports is_enabled into a bool
    802.3ad: make ntt bool
    ixgbe: Fix set_ringparam in ixgbe to use the same memory pools.
    ...

    Fixed trivial IPv4/6 address printing conflicts in fs/cifs/connect.c due
    to the conversion to %pI (in this networking merge) and the addition of
    doing IPv6 addresses (from the earlier merge of CIFS).

    Linus Torvalds
     

25 Dec, 2008

1 commit


16 Dec, 2008

1 commit


15 Dec, 2008

1 commit


11 Dec, 2008

1 commit

  • The patch "don't call nf_log_packet in NFLOG module" make xt_NFLOG
    dependant of nfnetlink_log. This patch forces the dependencies to fix
    compilation in case only xt_NFLOG compilation was asked and modifies the
    help message accordingly to the change.

    Signed-off-by: Eric Leblond
    Signed-off-by: David S. Miller

    Eric Leblond
     

08 Dec, 2008

1 commit


04 Dec, 2008

1 commit


28 Nov, 2008

1 commit


27 Nov, 2008

1 commit


26 Nov, 2008

2 commits

  • The previous fix for the conntrack creation race (netfilter: ctnetlink:
    fix conntrack creation race) missed a GFP_KERNEL allocation that is
    now performed while holding a spinlock. Switch to GFP_ATOMIC.

    Reported-and-tested-by: Zoltan Borbely
    Signed-off-by: Patrick McHardy
    Signed-off-by: David S. Miller

    Patrick McHardy
     
  • this warning:

    net/netfilter/nf_conntrack_ftp.c: In function 'help':
    net/netfilter/nf_conntrack_ftp.c:360: warning: 'matchoff' may be used uninitialized in this function
    net/netfilter/nf_conntrack_ftp.c:360: warning: 'matchlen' may be used uninitialized in this function

    triggers because GCC does not recognize the (correct) error flow
    between find_pattern(), 'found', 'matchoff' and 'matchlen'.

    Annotate it.

    Signed-off-by: Ingo Molnar
    Signed-off-by: Patrick McHardy

    Ingo Molnar
     

25 Nov, 2008

2 commits

  • Conntrack creation through ctnetlink has two races:

    - the timer may expire and free the conntrack concurrently, causing an
    invalid memory access when attempting to put it in the hash tables

    - an identical conntrack entry may be created in the packet processing
    path in the time between the lookup and hash insertion

    Hold the conntrack lock between the lookup and insertion to avoid this.

    Reported-by: Zoltan Borbely
    Signed-off-by: Patrick McHardy
    Signed-off-by: David S. Miller

    Patrick McHardy
     
  • The message triggers when sending non-FTP data on port 21 or with
    certain clients that use multiple syscalls to send the command.

    Change to pr_debug() since users have been complaining.

    Signed-off-by: Patrick McHardy

    Patrick McHardy
     

24 Nov, 2008

1 commit

  • net/netfilter/nf_conntrack_proto_sctp.c: In function 'sctp_packet':
    net/netfilter/nf_conntrack_proto_sctp.c:376: warning: array subscript is above array bounds

    gcc doesn't realize that do_basic_checks() guarantees that there is
    at least one valid chunk and thus new_state is never SCTP_CONNTRACK_MAX
    after the loop. Initialize to SCTP_CONNTRACK_NONE to avoid the warning.

    Based on patch by Wu Fengguang

    Signed-off-by: Patrick McHardy

    Patrick McHardy
     

20 Nov, 2008

2 commits


18 Nov, 2008

4 commits

  • net/netfilter/nf_conntrack_core.c:46:1: warning: symbol 'nfnetlink_parse_nat_setup_hook' was not declared. Should it be static?

    Including the proper header also revealed an incorrect prototype.

    Signed-off-by: Patrick McHardy

    Patrick McHardy
     
  • net/netfilter/nfnetlink_log.c:537:1: warning: symbol 'nfulnl_log_packet' was not declared. Should it be static?

    Including the proper header also revealed an incorrect prototype.

    Signed-off-by: Patrick McHardy

    Patrick McHardy
     
  • As for now, the creation and update of conntracks via ctnetlink do not
    propagate an event to userspace. This can result in inconsistent situations
    if several userspace processes modify the connection tracking table by means
    of ctnetlink at the same time. Specifically, using the conntrack command
    line tool and conntrackd at the same time can trigger unconsistencies.

    This patch also modifies the event cache infrastructure to pass the
    process PID and the ECHO flag to nfnetlink_send() to report back
    to userspace if the process that triggered the change needs so.
    Based on a suggestion from Patrick McHardy.

    Signed-off-by: Pablo Neira Ayuso
    Signed-off-by: Patrick McHardy

    Pablo Neira Ayuso
     
  • This patch adds module loading for helpers via ctnetlink.

    * Creation path: We support explicit and implicit helper assignation. For
    the explicit case, we try to load the module. If the module is correctly
    loaded and the helper is present, we return EAGAIN to re-start the
    creation. Otherwise, we return EOPNOTSUPP.
    * Update path: release the spin lock, load the module and check. If it is
    present, then return EAGAIN to re-start the update.

    This patch provides a refactorized function to lookup-and-set the
    connection tracking helper. The function removes the exported symbol
    __nf_ct_helper_find as it has not clients anymore.

    Signed-off-by: Pablo Neira Ayuso
    Signed-off-by: Patrick McHardy

    Pablo Neira Ayuso
     

17 Nov, 2008

4 commits


14 Nov, 2008

2 commits

  • Conflicts:
    security/keys/internal.h
    security/keys/process_keys.c
    security/keys/request_key.c

    Fixed conflicts above by using the non 'tsk' versions.

    Signed-off-by: James Morris

    James Morris
     
  • Attach creds to file structs and discard f_uid/f_gid.

    file_operations::open() methods (such as hppfs_open()) should use file->f_cred
    rather than current_cred(). At the moment file->f_cred will be current_cred()
    at this point.

    Signed-off-by: David Howells
    Reviewed-by: James Morris
    Signed-off-by: James Morris

    David Howells
     

12 Nov, 2008

1 commit


11 Nov, 2008

1 commit


07 Nov, 2008

2 commits

  • Noticed by sparse:
    net/netfilter/ipvs/ip_vs_proto_tcp.c:195:6: warning: incorrect type in argument 5 (different base types)
    net/netfilter/ipvs/ip_vs_proto_tcp.c:195:6: expected restricted __be16 [usertype] oldlen
    net/netfilter/ipvs/ip_vs_proto_tcp.c:195:6: got restricted __be32 [usertype]
    net/netfilter/ipvs/ip_vs_proto_tcp.c:196:6: warning: incorrect type in argument 6 (different base types)
    net/netfilter/ipvs/ip_vs_proto_tcp.c:196:6: expected restricted __be16 [usertype] newlen
    net/netfilter/ipvs/ip_vs_proto_tcp.c:196:6: got restricted __be32 [usertype]
    net/netfilter/ipvs/ip_vs_proto_tcp.c:270:6: warning: incorrect type in argument 5 (different base types)
    net/netfilter/ipvs/ip_vs_proto_tcp.c:270:6: expected restricted __be16 [usertype] oldlen
    net/netfilter/ipvs/ip_vs_proto_tcp.c:270:6: got restricted __be32 [usertype]
    net/netfilter/ipvs/ip_vs_proto_tcp.c:271:6: warning: incorrect type in argument 6 (different base types)
    net/netfilter/ipvs/ip_vs_proto_tcp.c:271:6: expected restricted __be16 [usertype] newlen
    net/netfilter/ipvs/ip_vs_proto_tcp.c:271:6: got restricted __be32 [usertype]
    net/netfilter/ipvs/ip_vs_proto_udp.c:206:6: warning: incorrect type in argument 5 (different base types)
    net/netfilter/ipvs/ip_vs_proto_udp.c:206:6: expected restricted __be16 [usertype] oldlen
    net/netfilter/ipvs/ip_vs_proto_udp.c:206:6: got restricted __be32 [usertype]
    net/netfilter/ipvs/ip_vs_proto_udp.c:207:6: warning: incorrect type in argument 6 (different base types)
    net/netfilter/ipvs/ip_vs_proto_udp.c:207:6: expected restricted __be16 [usertype] newlen
    net/netfilter/ipvs/ip_vs_proto_udp.c:207:6: got restricted __be32 [usertype]
    net/netfilter/ipvs/ip_vs_proto_udp.c:282:6: warning: incorrect type in argument 5 (different base types)
    net/netfilter/ipvs/ip_vs_proto_udp.c:282:6: expected restricted __be16 [usertype] oldlen
    net/netfilter/ipvs/ip_vs_proto_udp.c:282:6: got restricted __be32 [usertype]
    net/netfilter/ipvs/ip_vs_proto_udp.c:283:6: warning: incorrect type in argument 6 (different base types)
    net/netfilter/ipvs/ip_vs_proto_udp.c:283:6: expected restricted __be16 [usertype] newlen
    net/netfilter/ipvs/ip_vs_proto_udp.c:283:6: got restricted __be32 [usertype]

    Signed-off-by: Harvey Harrison
    Acked-by: Simon Horman
    Signed-off-by: David S. Miller

    Harvey Harrison
     
  • Conflicts:

    drivers/net/wireless/ath5k/base.c
    net/8021q/vlan_core.c

    David S. Miller
     

05 Nov, 2008

1 commit

  • netns list (just list) is under RTNL. But helper and proto unregistration
    happen during rmmod when RTNL is not held, and that's how it was tested:
    modprobe/rmmod vs clone(CLONE_NEWNET)/exit.

    BUG: unable to handle kernel paging request at 0000000000100100 ] nf_conntrack_l4proto_unregister+0x96/0xae [nf_conntrack]
    PGD 15e300067 PUD 15e1d8067 PMD 0
    Oops: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC
    last sysfs file: /sys/kernel/uevent_seqnum
    CPU 0
    Modules linked in: nf_conntrack_proto_sctp(-) nf_conntrack_proto_dccp(-) af_packet iptable_nat nf_nat nf_conntrack_ipv4 nf_conntrack nf_defrag_ipv4 iptable_filter ip_tables xt_tcpudp ip6table_filter ip6_tables x_tables ipv6 sr_mod cdrom [last unloaded: nf_conntrack_proto_sctp]
    Pid: 16758, comm: rmmod Not tainted 2.6.28-rc2-netns-xfrm #3
    RIP: 0010:[] [] nf_conntrack_l4proto_unregister+0x96/0xae [nf_conntrack]
    RSP: 0018:ffff88015dc1fec8 EFLAGS: 00010212
    RAX: 0000000000000000 RBX: 00000000001000f8 RCX: 0000000000000000
    RDX: ffffffffa009575c RSI: 0000000000000003 RDI: ffffffffa00956b5
    RBP: ffff88015dc1fed8 R08: 0000000000000002 R09: 0000000000000000
    R10: 0000000000000000 R11: ffff88015dc1fe48 R12: ffffffffa0458f60
    R13: 0000000000000880 R14: 00007fff4c361d30 R15: 0000000000000880
    FS: 00007f624435a6f0(0000) GS:ffffffff80521580(0000) knlGS:0000000000000000
    CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
    CR2: 0000000000100100 CR3: 0000000168969000 CR4: 00000000000006e0
    DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
    DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
    Process rmmod (pid: 16758, threadinfo ffff88015dc1e000, task ffff880179864218)
    Stack:
    ffffffffa0459100 0000000000000000 ffff88015dc1fee8 ffffffffa0457934
    ffff88015dc1ff78 ffffffff80253fef 746e6e6f635f666e 6f72705f6b636172
    00707463735f6f74 ffffffff8024cb30 00000000023b8010 0000000000000000
    Call Trace:
    [] nf_conntrack_proto_sctp_fini+0x10/0x1e [nf_conntrack_proto_sctp]
    [] sys_delete_module+0x19f/0x1fe
    [] ? trace_hardirqs_on_caller+0xf0/0x114
    [] ? trace_hardirqs_on_thunk+0x3a/0x3f
    [] system_call_fastpath+0x16/0x1b
    Code: 13 35 e0 e8 c4 6c 1a e0 48 8b 1d 6d c6 46 e0 eb 16 48 89 df 4c 89 e2 48 c7 c6 fc 85 09 a0 e8 61 cd ff ff 48 8b 5b 08 48 83 eb 08 8b 43 08 0f 18 08 48 8d 43 08 48 3d 60 4f 50 80 75 d3 5b 41
    RIP [] nf_conntrack_l4proto_unregister+0x96/0xae [nf_conntrack]
    RSP
    CR2: 0000000000100100
    ---[ end trace bde8ac82debf7192 ]---

    Signed-off-by: Alexey Dobriyan
    Signed-off-by: Patrick McHardy
    Signed-off-by: David S. Miller

    Alexey Dobriyan
     

04 Nov, 2008

4 commits

  • This patch modifies xt_NFLOG to suppress the call to nf_log_packet()
    function. The call of this wrapper in xt_NFLOG was causing NFLOG to
    use the first initialized module. Thus, if ipt_ULOG is loaded before
    nfnetlink_log all NFLOG rules are treated as plain LOG rules.

    Signed-off-by: Eric Leblond
    Signed-off-by: Patrick McHardy

    Eric Leblond
     
  • I want to compile out proc_* and sysctl_* handlers totally and
    stub them to NULL depending on config options, however usage of &
    will prevent this, since taking adress of NULL pointer will break
    compilation.

    So, drop & in front of every ->proc_handler and every ->strategy
    handler, it was never needed in fact.

    Signed-off-by: Alexey Dobriyan
    Signed-off-by: David S. Miller

    Alexey Dobriyan
     
  • Remove the 'supports_ipv6' scheduler flag since all schedulers now
    support IPv6.

    Signed-off-by: Julius Volz
    Signed-off-by: David S. Miller

    Julius Volz
     
  • Add IPv6 support to LBLC and LBLCR schedulers. These were the last
    schedulers without IPv6 support, but we might want to keep the
    supports_ipv6 flag in the case of future schedulers without IPv6
    support.

    Signed-off-by: Julius Volz
    Acked-by: Simon Horman
    Signed-off-by: David S. Miller

    Julius Volz
     

03 Nov, 2008

1 commit


31 Oct, 2008

2 commits