Re: [PATCH 2/7][RFC] netfilter: add xt_qtaguid matching module

2012-09-23 Thread Pablo Neira Ayuso
Hi John, Cc'ing netfilter-devel (better than only netdev, to attract the attention from other Netfilter hacker fellows). Some comments on this: On Fri, Sep 21, 2012 at 10:10:48PM -0400, John Stultz wrote: From: JP Abgrall j...@google.com This module allows tracking stats at the socket level

Re: [PATCH 6/7][RFC] netfilter: xt_IDLETIMER: Add new netlink msg type

2012-09-23 Thread Pablo Neira Ayuso
On Fri, Sep 21, 2012 at 10:10:52PM -0400, John Stultz wrote: From: JP Abgrall j...@google.com Send notifications when the label becomes active after an idle period. Send netlink message notifications in addition to sysfs notifications. Using a uevent with subsystem=xt_idletimer

Re: amd64, v3.6.0: Kernel panic + BUG at net/netfilter/nf_conntrack_core.c:220!

2012-10-11 Thread Pablo Neira Ayuso
On Thu, Oct 11, 2012 at 11:27:33PM +0200, Borislav Petkov wrote: On Thu, Oct 11, 2012 at 12:13:33PM -0700, Ian Applegate wrote: On machines serving mainly http traffic we are seeing the following panic, which is not yet reproducible. Must be this BUG_ON: if

Re: [PATCH] netfilter: use PTR_RET

2012-10-29 Thread Pablo Neira Ayuso
On Mon, Oct 29, 2012 at 08:40:44AM +0800, Fengguang Wu wrote: Use PTR_RET rather than if(IS_ERR(...)) + PTR_ERR Generated by: coccinelle/api/ptr_ret.cocci Applied, thanks. I have collapsed this patch and the one for ipv6/iptable_nat.c. They are pretty small and description is the same. -- To

Re: amd64, v3.6.0: Kernel panic + BUG at net/netfilter/nf_conntrack_core.c:220!

2012-10-16 Thread Pablo Neira Ayuso
On Fri, Oct 12, 2012 at 01:32:06AM +0200, Pablo Neira Ayuso wrote: On Thu, Oct 11, 2012 at 11:27:33PM +0200, Borislav Petkov wrote: On Thu, Oct 11, 2012 at 12:13:33PM -0700, Ian Applegate wrote: On machines serving mainly http traffic we are seeing the following panic, which is not yet

Re: [PATCH] ipv4: netfilter: use PTR_RET instead of IS_ERR + PTR_ERR

2013-03-15 Thread Pablo Neira Ayuso
On Tue, Mar 12, 2013 at 08:07:55PM +0200, Silviu-Mihai Popescu wrote: This uses PTR_RET instead of IS_ERR and PTR_ERR in order to increase readability. Applied, thanks. -- To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to majord...@vger.kernel.org

Re: [PATCH] bridge: netfilter: use PTR_RET instead of IS_ERR + PTR_ERR

2013-03-15 Thread Pablo Neira Ayuso
On Tue, Mar 12, 2013 at 08:11:33PM +0200, Silviu-Mihai Popescu wrote: This uses PTR_RET instead of IS_ERR and PTR_ERR in order to increase readability. Also applied, thanks. -- To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to

Re: [PATCH] netfilter: nf_conntrack: Batch cleanup

2013-03-19 Thread Pablo Neira Ayuso
On Thu, Mar 14, 2013 at 01:40:14PM +0400, Vladimir Davydov wrote: The patch introduces nf_conntrack_cleanup_net_list(), which cleanups nf_conntrack for a list of netns and calls synchronize_net() only once for them all. This should reduce netns destruction time. Applied, thanks. -- To

Re: [PATCH] netfilter: remove unused config IP_NF_QUEUE

2013-03-19 Thread Pablo Neira Ayuso
On Wed, Mar 20, 2013 at 12:09:59AM +0100, Paul Bolle wrote: Kconfig symbol IP_NF_QUEUE is unused since commit d16cf20e2f2f13411eece7f7fb72c17d141c4a84 (netfilter: remove ip_queue support). Let's remove it too. Applied, thanks for catching up this leftover. -- To unsubscribe from this list:

Re: Android netfilter patches (xt_IDLETIMER) [1/3]

2013-03-26 Thread Pablo Neira Ayuso
Hi Dmitry, On Mon, Mar 25, 2013 at 11:09:06PM +0100, dmitry pervushin wrote: Fix the case in which timer has expired and we refresh it without sending the notification Signed-off-by: Ashish Sharma ashishsha...@google.com Signed-off-by: JP Abgrall j...@google.com Signed-off-by: John Stultz

Re: Android netfilter patches (xt_IDLETIMER) [2/3]

2013-03-26 Thread Pablo Neira Ayuso
On Mon, Mar 25, 2013 at 11:09:16PM +0100, dmitry pervushin wrote: Send notifications when the label becomes active after an idle period. Send netlink message notifications in addition to sysfs notifications. Using a uevent with subsystem=xt_idletimer INTERFACE=...

Re: [PATCH] netfilter: nfnetlink: silence warning if CONFIG_PROVE_RCU isn't set

2013-03-04 Thread Pablo Neira Ayuso
On Mon, Mar 04, 2013 at 01:45:41PM +0100, Paul Bolle wrote: Since commit c14b78e7decd0d1d5add6a4604feb8609fe920a9 (netfilter: nfnetlink: add mutex per subsystem) building nefnetlink.o without CONFIG_PROVE_RCU set, triggers this GCC warning: net/netfilter/nfnetlink.c:65:22: warning:

Re: [PATCH] net: netfilter: nfnetlink: Fixed warning for nfnl_get_lock

2013-03-04 Thread Pablo Neira Ayuso
On Mon, Mar 04, 2013 at 10:05:51PM +0100, Borislav Petkov wrote: On Mon, Mar 04, 2013 at 09:43:11PM +0200, Alexandru Gheorghiu wrote: Removed unused function nfnl_get_lock which fixed the following warning: net/netfilter/nfnetlink.c:65:22: warning: ‘nfnl_get_lock’ defined but not used

Re: [PATCH nf-next] netfilter: nf_ct_reasm: fix per-netns sysctl initialization

2013-02-13 Thread Pablo Neira Ayuso
On Wed, Feb 13, 2013 at 10:46:09AM +0100, Michal Kubecek wrote: Adjusting of data pointers in net/netfilter/nf_conntrack_frag6_* sysctl table for other namespaces points to wrong netns_frags structure and has reversed order of entries. Problem introduced by commit c038a767cd69 in 3.7-rc1

Re: [PATCH] netfilter: fix missing dependencies for NETFILTER_XT_MATCH_CONNLABEL

2013-02-04 Thread Pablo Neira Ayuso
On Sun, Feb 03, 2013 at 08:04:35AM -0800, Randy Dunlap wrote: On 02/03/13 03:24, Florian Westphal wrote: It was possible to set NF_CONNTRACK=n NF_CONNTRACK_LABELS=y via NETFILTER_XT_MATCH_CONNLABEL=y: warning: (NETFILTER_XT_MATCH_CONNLABEL) selects NF_CONNTRACK_LABELS which has

Re: [ 82/89] netfilter: xt_hashlimit: fix race that results in duplicated entries

2013-02-01 Thread Pablo Neira Ayuso
On Fri, Feb 01, 2013 at 11:04:36PM +0800, Feng Gao wrote: Hi Greg, I have a question. There are two duplicated lines now. dh-expires = now + msecs_to_jiffies(hinfo-cfg.expire); rateinfo_recalc(dh, now, hinfo-cfg.mode); 1#

Re: [ 82/89] netfilter: xt_hashlimit: fix race that results in duplicated entries

2013-02-01 Thread Pablo Neira Ayuso
On Sat, Feb 02, 2013 at 12:56:17AM +0800, Feng Gao wrote: [...] So I wonder How could I commit the patch to kernel directly or how to let owner could adopt my fix directly next time? There is no file owners in the Linux kernel, we have subsystem maintainers that take care of entire source code

Re: [PATCH v4] netfilter: nf_conntrack_sip: Handle Cisco 7941/7945 IP phones

2013-01-17 Thread Pablo Neira Ayuso
On Mon, Dec 17, 2012 at 08:33:58PM -0800, Kevin Cernekee wrote: Most SIP devices use a source port of 5060/udp on SIP requests, so the response automatically comes back to port 5060: phone_ip:5060 - proxy_ip:5060 REGISTER proxy_ip:5060 - phone_ip:5060 100 Trying The newer

Re: skb-h not initialized

2006-12-28 Thread Pablo Neira Ayuso
Jan Engelhardt wrote: while writing a netfilter match module I found that, when run, skb-h.th is not set to the TCP header (it is assured that the packet _is_ TCP), as this printk shows me: skb: h.th=cb5bc4dc nh.iph=cb5bc4dc mac.raw=cb5bc4ce head=cb5bc400 data=cb5bc4dc tail=cb5bc510

Re: linux-next: Tree for Sept 18 (netfilter)

2012-09-18 Thread Pablo Neira Ayuso
78c2b7d8b8978e77fde5b11b3f27a0cd1031fe94 Mon Sep 17 00:00:00 2001 From: Pablo Neira Ayuso pa...@netfilter.org Date: Tue, 18 Sep 2012 21:03:39 +0200 Subject: [PATCH] netfilter: fix IPv6 NAT dependencies in Kconfig * NF_NAT_IPV6 requires IP6_NF_IPTABLES * IP6_NF_TARGET_MASQUERADE, IP6_NF_TARGET_NETMAP, IP6_NF_TARGET_REDIRECT

Re: xt_nat_init: BUG: unable to handle kernel NULL pointer dereference at 00000000000000e0

2012-09-13 Thread Pablo Neira Ayuso
: registering with nfnetlink. [1.836202] BUG: unable to handle kernel NULL pointer dereference at 00e0 [1.837539] IP: [81a19123] mutex_lock_interruptible+0x23/0x70 Should be fixed by commit 00545bec9412d130c77f72a08d6c8b6ad21d4a1e Author: Pablo Neira Ayuso pa

Re: [PATCH 1/7] ipvs: fix error return code

2012-08-29 Thread Pablo Neira Ayuso
On Wed, Aug 29, 2012 at 06:49:11PM +0200, Julia Lawall wrote: From: Julia Lawall julia.law...@lip6.fr Initialize return variable before exiting on an error path. A simplified version of the semantic match that finds this problem is as follows: (http://coccinelle.lip6.fr/) // smpl (

Re: [PATCH 7/7] net/netfilter/nf_conntrack_netlink.c: fix error return code

2012-08-29 Thread Pablo Neira Ayuso
On Wed, Aug 29, 2012 at 06:49:16PM +0200, Julia Lawall wrote: From: Julia Lawall julia.law...@lip6.fr Initialize return variable before exiting on an error path. A simplified version of the semantic match that finds this problem is as follows: (http://coccinelle.lip6.fr/) // smpl (

Re: [PATCH 6/7] net/netfilter/nfnetlink_log.c: fix error return code

2012-08-29 Thread Pablo Neira Ayuso
On Wed, Aug 29, 2012 at 06:49:17PM +0200, Julia Lawall wrote: From: Julia Lawall julia.law...@lip6.fr Initialize return variable before exiting on an error path. A simplified version of the semantic match that finds this problem is as follows: (http://coccinelle.lip6.fr/) // smpl (

Re: [PATCH 1/2] netfilter: pass 'nf_hook_ops' instead of 'list_head' to nf_iterate()

2012-09-03 Thread Pablo Neira Ayuso
On Thu, Aug 23, 2012 at 01:59:57PM +0800, Michael Wang wrote: From: Michael Wang wang...@linux.vnet.ibm.com Since 'list_for_each_continue_rcu' has already been replaced by 'list_for_each_entry_continue_rcu', pass 'list_head' to nf_iterate() as a parameter can not benefit us any more. This

Re: [PATCH 2/2] netfilter: pass 'nf_hook_ops' instead of 'list_head' to nf_queue()

2012-09-03 Thread Pablo Neira Ayuso
On Thu, Aug 23, 2012 at 02:00:06PM +0800, Michael Wang wrote: From: Michael Wang wang...@linux.vnet.ibm.com Since 'list_for_each_continue_rcu' has already been replaced by 'list_for_each_entry_continue_rcu', pass 'list_head' to nf_queue() as a parameter can not benefit us any more. This

Re: [PATCH 3/3] netfilter: replace list_for_each_continue_rcu with new interface

2012-08-22 Thread Pablo Neira Ayuso
On Fri, Aug 17, 2012 at 12:33:39PM +0800, Michael Wang wrote: From: Michael Wang wang...@linux.vnet.ibm.com This patch replaces list_for_each_continue_rcu() with list_for_each_entry_continue_rcu() to allow removing list_for_each_continue_rcu(). Applied, thanks. -- To unsubscribe from this

Re: [PATCH] netfilter: PTR_RET can be used

2012-08-20 Thread Pablo Neira Ayuso
On Sun, Jul 29, 2012 at 08:14:49PM +0800, Fengguang Wu wrote: --- linux.orig/net/bridge/netfilter/ebtable_filter.c 2012-07-29 08:41:09.703759534 +0800 +++ linux/net/bridge/netfilter/ebtable_filter.c 2012-07-29 08:41:14.255759643 +0800 @@ -100,9 +100,7 @@ static struct

Re: problem: [PATCH] iptable_REJECT doesn't constructs the tcp reset packet cleanly

2012-12-10 Thread Pablo Neira Ayuso
Hi Mukund, On Mon, Dec 10, 2012 at 12:48:49PM -0800, Mukund Jampala wrote: problem description: The problem occurs when iptables constructs the tcp reset packet. It doesn't initialize the pointer to the tcp header within the skb. When the skb is passed to the ixgbe driver for transmit, the

Re: [PATCH] netfilter: Don't leak 'exp' in ctnetlink_create_expect()

2012-12-26 Thread Pablo Neira Ayuso
On Wed, Dec 26, 2012 at 10:49:40PM +0100, Jesper Juhl wrote: 'if ((!help) (!cda[CTA_EXPECT_TIMEOUT]))' then we should remember to free 'exp' that was allocated by 'nf_ct_expect_alloc()' by jumping to the 'err_out' label rather than the 'out' label in ctnetlink_create_expect(). This patch

Re: linux-next: Tree for Jan 2 (netfilter)

2013-01-02 Thread Pablo Neira Ayuso
Hi, On Wed, Jan 02, 2013 at 10:39:43AM -0800, Randy Dunlap wrote: On 01/01/13 20:12, Stephen Rothwell wrote: Hi all, Changes since 20121224: when NF_CONNTRACK is not enabled (build was on i386): CC [M] net/netfilter/xt_CT.o In file included from net/netfilter/xt_CT.c:16:0:

Re: linux-next: Tree for Jan 2 (netfilter)

2013-01-02 Thread Pablo Neira Ayuso
On Thu, Jan 03, 2013 at 02:35:59AM +0100, Pablo Neira Ayuso wrote: when NF_CONNTRACK is not enabled (build was on i386): CC [M] net/netfilter/xt_CT.o In file included from net/netfilter/xt_CT.c:16:0: include/net/netfilter/nf_conntrack.h:77:22: error: field 'ct_general' has

Re: problem: [PATCH] iptable_REJECT doesn't constructs the tcp reset packet cleanly

2012-12-16 Thread Pablo Neira Ayuso
On Tue, Dec 11, 2012 at 01:58:02AM +0100, Pablo Neira Ayuso wrote: [...] On Mon, Dec 10, 2012 at 12:48:49PM -0800, Mukund Jampala wrote: problem description: The problem occurs when iptables constructs the tcp reset packet. It doesn't initialize the pointer to the tcp header within the skb

Re: [PATCH v3] netfilter: nf_conntrack_sip: Handle Cisco 7941/7945 IP phones

2012-12-16 Thread Pablo Neira Ayuso
Hi David, On Mon, Dec 17, 2012 at 12:17:21AM +, David Woodhouse wrote: On Mon, 2010-11-22 at 08:52 +0100, Eric Dumazet wrote: Le dimanche 21 novembre 2010 à 18:40 -0800, Kevin Cernekee a écrit : [v3: Only activate the new forced_dport logic if the IP matches, but the port does

Re: [PATCH v3] netfilter: nf_conntrack_sip: Handle Cisco 7941/7945 IP phones

2012-12-17 Thread Pablo Neira Ayuso
On Sun, Dec 16, 2012 at 11:26:31PM -0800, Kevin Cernekee wrote: On Sun, Dec 16, 2012 at 4:44 PM, Pablo Neira Ayuso pa...@netfilter.org wrote: What happened to this? OpenWRT is still carrying it, and it broke in 3.7. Here's a completely untested update... I requested Kevin to resend

Re: [PATCH] net: netfilter/xt_CT.c: fix uninitialized variable

2013-01-15 Thread Pablo Neira Ayuso
Hi Cong, On Tue, Jan 15, 2013 at 07:58:34PM +0100, Cong Ding wrote: If CONFIG_NF_CONNTRACK_ZONES is not defined, the variable ret might be uninitialized when it goes to err1 through line 125 and 263 respectively. So I change these goto err1 to return -EINVAL directly. This is already fixed in

Re: v3.8-rc3: uninitialized warnings in net/netfilter/xt_CT.c

2013-01-10 Thread Pablo Neira Ayuso
: In function ‘xt_ct_tg_check_v0’: net/netfilter/xt_CT.c:112:6: warning: ‘ret’ may be used uninitialized in this function [-Wmaybe-uninitialized] Patch attached to address this issue. From 3ceaa3b1baa660aaeef63b86ea9771dcab6d0acd Mon Sep 17 00:00:00 2001 From: Pablo Neira Ayuso pa...@netfilter.org Date

Re: v3.8-rc3: uninitialized warnings in net/netfilter/xt_CT.c

2013-01-10 Thread Pablo Neira Ayuso
On Thu, Jan 10, 2013 at 01:01:21PM +0100, Borislav Petkov wrote: On Thu, Jan 10, 2013 at 12:47:42PM +0100, Pablo Neira Ayuso wrote: Patch attached to address this issue. From 3ceaa3b1baa660aaeef63b86ea9771dcab6d0acd Mon Sep 17 00:00:00 2001 From: Pablo Neira Ayuso pa...@netfilter.org

Re: [PATCH v3 11/11] netfilter: use ns_printk in iptable context

2013-08-07 Thread Pablo Neira Ayuso
Hi, On Wed, Aug 07, 2013 at 03:37:15PM +0800, Rui Xiang wrote: To containerise iptables log, use ns_printk to report individual logs to container as getting syslog_ns from net-user_ns. This patch is missing the removal of a couple of LOC at the very beginning of ipt_log_packet and

Re: linux-next: manual merge of the trivial tree

2013-10-16 Thread Pablo Neira Ayuso
On Wed, Oct 16, 2013 at 11:20:04AM +0200, Jiri Kosina wrote: On Wed, 16 Oct 2013, Jozsef Kadlecsik wrote: Today's linux-next merge of the trivial tree got conflicts in net/netfilter/xt_set.c caused by commits 3f79410 (treewide: Fix common typo in identify) and bd3129f

Re: [PATCH] netfilter: fix ordering of jumpstack allocation and table update

2013-10-18 Thread Pablo Neira Ayuso
On Thu, Oct 17, 2013 at 02:24:33PM +0100, Will Deacon wrote: During kernel stability testing on an SMP ARMv7 system, Yalin Wang reported the following panic from the netfilter code: 1fe0: 001c 5e2d3b10 4007e779 4009e110 6010 0032 ff565656 ff545454 [c06c48dc]

Re: netfilter: active obj WARN when cleaning up

2013-11-26 Thread Pablo Neira Ayuso
On Tue, Nov 26, 2013 at 02:11:57PM -0500, Sasha Levin wrote: Ping? I still see this warning. Did your test include patch 0c3c6c00c6? On 09/07/2013 09:10 AM, Sasha Levin wrote: Hi all, While fuzzing with trinity inside a KVM tools guest, running latest -next kernel, I've stumbled on the

Re: [PATCH RFC 0/9] socket filtering using nf_tables

2014-03-13 Thread Pablo Neira Ayuso
On Wed, Mar 12, 2014 at 08:29:07PM -0700, Alexei Starovoitov wrote: On Wed, Mar 12, 2014 at 2:15 AM, Pablo Neira Ayuso pa...@netfilter.org wrote: [...] The patches don't explain the reasons to do nft socket filtering. OK, some reasons from the interface point of view: 1) It provides

Re: [PATCH net-next 5/6] netfilter: Convert uses of __constant_foo to foo

2014-03-13 Thread Pablo Neira Ayuso
On Wed, Mar 12, 2014 at 03:28:55PM -0400, David Miller wrote: From: Joe Perches j...@perches.com Date: Wed, 12 Mar 2014 10:04:19 -0700 The use of __constant_foo has been unnecessary for quite awhile now. Make these uses consistent with the rest of the kernel. Signed-off-by: Joe

Re: [PATCH v10 net-next 1/3] filter: add Extended BPF interpreter and converter

2014-03-14 Thread Pablo Neira Ayuso
On Wed, Mar 12, 2014 at 02:43:32PM -0700, Alexei Starovoitov wrote: diff --git a/include/linux/filter.h b/include/linux/filter.h index e568c8ef896b..6e6aab5e062b 100644 --- a/include/linux/filter.h +++ b/include/linux/filter.h @@ -25,20 +25,45 @@ struct sock; struct sk_filter {

Re: [PATCH RFC 0/9] socket filtering using nf_tables

2014-03-14 Thread Pablo Neira Ayuso
On Fri, Mar 14, 2014 at 08:28:05AM -0700, Alexei Starovoitov wrote: On Thu, Mar 13, 2014 at 5:29 AM, Pablo Neira Ayuso pa...@netfilter.org wrote: On Wed, Mar 12, 2014 at 08:29:07PM -0700, Alexei Starovoitov wrote: On Wed, Mar 12, 2014 at 2:15 AM, Pablo Neira Ayuso pa...@netfilter.org

Re: [PATCH RFC 0/9] socket filtering using nf_tables

2014-03-15 Thread Pablo Neira Ayuso
On Fri, Mar 14, 2014 at 09:04:50PM -0700, Alexei Starovoitov wrote: [...] In the patches I sent, ebpf is _not_ exposed to the user. From your last patch: http://patchwork.ozlabs.org/patch/329713/ diff --git a/include/uapi/linux/filter.h b/include/uapi/linux/filter.h index

Re: [PATCH v10 net-next 1/3] filter: add Extended BPF interpreter and converter

2014-03-17 Thread Pablo Neira Ayuso
On Sat, Mar 15, 2014 at 08:53:55PM +0100, Daniel Borkmann wrote: On 03/14/2014 09:08 PM, David Miller wrote: From: Alexei Starovoitov a...@plumgrid.com Date: Fri, 14 Mar 2014 12:51:17 -0700 can you please explain why the status of these patches is 'deferred' in patchwork ? Is it because of

Re: [PATCH] net: inetfilter: LLVMLinux: vlais-netfilter

2014-03-07 Thread Pablo Neira Ayuso
On Thu, Mar 06, 2014 at 11:56:08AM -0800, beh...@converseincode.com wrote: From: Mark Charlebois charl...@gmail.com Replaced non-standard C use of Variable Length Arrays In Structs (VLAIS) in xt_repldata.h with a C99 compliant flexible array member and then calculated offsets to the other

Re: [PATCH RFC 0/9] socket filtering using nf_tables

2014-03-12 Thread Pablo Neira Ayuso
Hi! I'm going to reply to Daniel and you in the same email, see below. On Tue, Mar 11, 2014 at 10:59:42AM -0700, Alexei Starovoitov wrote: On Tue, Mar 11, 2014 at 3:29 AM, Daniel Borkmann dbork...@redhat.com wrote: On 03/11/2014 10:19 AM, Pablo Neira Ayuso wrote: Hi! The following

Re: [PATCH RFC 0/9] socket filtering using nf_tables

2014-03-12 Thread Pablo Neira Ayuso
On Wed, Mar 12, 2014 at 10:15:00AM +0100, Pablo Neira Ayuso wrote: 7/9: whole nft_expr_autoload() looks scary from security point of view. If I'm reading it correctly, the code will do request_module() based on userspace request to attach filter? Only root can invoke that code so far

Re: [PATCH] netfilter: nft_meta: fix typo CONFIG_NET_CLS_ROUTE

2014-02-14 Thread Pablo Neira Ayuso
On Wed, Feb 12, 2014 at 10:53:01AM +0100, Paul Bolle wrote: There are two checks for CONFIG_NET_CLS_ROUTE, but the corresponding Kconfig symbol was dropped in v2.6.39. Since the code guards access to dst_entry.tclassid it seems CONFIG_IP_ROUTE_CLASSID should be used instead. Applied, thanks.

Re: [PATCH 05/15] connection tracking helper for SLP

2013-05-07 Thread Pablo Neira Ayuso
-by: Jiri Slaby jsl...@suse.cz Cc: netfilter-de...@vger.kernel.org Cc: netfil...@vger.kernel.org Cc: coret...@netfilter.org Cc: net...@vger.kernel.org Cc: David S. Miller da...@davemloft.net Cc: Patrick McHardy ka...@trash.net Cc: Pablo Neira Ayuso pa...@netfilter.org --- net/netfilter

Re: [netlink] WARNING: at mm/vmalloc.c:1487 __vunmap()

2013-06-17 Thread Pablo Neira Ayuso
On Sat, Jun 15, 2013 at 06:01:19AM +0800, Fengguang Wu wrote: netlink: allow large data transfers from user-space [...] [ 65.085802] init: plymouth-upstart-bridge main process (345) terminated with status 1 [ 65.138243] [ cut here ] [ 65.140281] WARNING: at

Re: v3.10-rc7 oops soon after boot

2013-06-24 Thread Pablo Neira Ayuso
-by: Pablo Neira Ayuso pa...@netfilter.org --- net/ipv4/netfilter/ipt_ULOG.c | 12 1 file changed, 8 insertions(+), 4 deletions(-) diff --git a/net/ipv4/netfilter/ipt_ULOG.c b/net/ipv4/netfilter/ipt_ULOG.c index ff4b781..32b0e97 100644 --- a/net/ipv4/netfilter/ipt_ULOG.c +++ b/net/ipv4

Re: v3.10-rc7 oops soon after boot

2013-06-24 Thread Pablo Neira Ayuso
On Mon, Jun 24, 2013 at 01:34:41PM +0200, Pablo Neira Ayuso wrote: On Mon, Jun 24, 2013 at 05:52:08PM +0800, Gao feng wrote: On 06/24/2013 05:41 PM, George Spelvin wrote: Please try the patch below, I think this bug is introduced by me :( Thanks! Well, you changed

Re: [PATCH 2/2] netfilter: idletimers - add send_nl_msg field

2013-04-25 Thread Pablo Neira Ayuso
Hi Dmitry, You got some feedback for this patch: https://patchwork.kernel.org/patch/2333851/ This patch still seem not to address some spots I already mention. Please, have a look at my previous email and let me know if you have any question. Thanks. On Sun, Apr 21, 2013 at 11:53:14AM +0200,

Re: [PATCH 1/2] netfilter: idletimers - fix the case of already expired timer

2013-04-25 Thread Pablo Neira Ayuso
Hi, Same thing with this patch: https://patchwork.kernel.org/patch/2333841/ Regards. On Sun, Apr 21, 2013 at 11:53:13AM +0200, dmitry pervushin wrote: From: dmitry pervushin dpervus...@gmail.com Fix the case in which timer has expired and we refresh it without sending the notification

Re: [PATCH ipvs-next v3 1/2] sched: add cond_resched_rcu() helper

2013-05-23 Thread Pablo Neira Ayuso
On Wed, May 22, 2013 at 02:50:31PM +0900, Simon Horman wrote: This is intended for use in loops which read data protected by RCU and may have a large number of iterations. Such an example is dumping the list of connections known to IPVS: ip_vs_conn_array() and ip_vs_conn_seq_next(). The

Re: [PATCH ipvs-next v3 2/2] ipvs: use cond_resched_rcu() helper when walking connections

2013-05-23 Thread Pablo Neira Ayuso
On Wed, May 22, 2013 at 02:50:32PM +0900, Simon Horman wrote: This avoids the situation where walking of a large number of connections may prevent scheduling for a long time while also avoiding excessive calls to rcu_read_unlock() and rcu_read_lock(). Note that in the case of

Re: [PATCH ipvs-next v3 0/2] sched: Add cond_resched_rcu_lock() helper

2013-05-23 Thread Pablo Neira Ayuso
On Wed, May 22, 2013 at 01:31:08AM -0700, David Miller wrote: From: Peter Zijlstra pet...@infradead.org Date: Wed, 22 May 2013 09:54:38 +0200 On Wed, May 22, 2013 at 02:50:30PM +0900, Simon Horman wrote: Add a helper that for use in loops which read data protected by RCU and may have a

Re: [PATCH -resend 4/6] netfilter: Implement RFC 1123 for FTP conntrack

2013-05-27 Thread Pablo Neira Ayuso
On Wed, May 22, 2013 at 02:59:10PM +0200, Jiri Slaby wrote: From: Jeff Mahoney je...@suse.com The FTP conntrack code currently only accepts the following format for the 227 response for PASV: 227 Entering Passive Mode (148,100,81,40,31,161). It doesn't accept the following format from

Re: [BUG 3.12.rc4] Oops: unable to handle kernel paging request during shutdown

2013-10-30 Thread Pablo Neira Ayuso
On Sun, Oct 27, 2013 at 08:39:47PM +, Linus Torvalds wrote: On Sun, Oct 27, 2013 at 8:20 PM, Linus Torvalds torva...@linux-foundation.org wrote: Appended is a warning I get with DEBUG_TIMER_OBJECTS. Seems to be a device-mapper issue. .. and here's another one. This time it looks

Re: [PATCH] netfilter: fix ordering of jumpstack allocation and table update

2013-10-22 Thread Pablo Neira Ayuso
On Mon, Oct 21, 2013 at 01:14:53PM +0100, Will Deacon wrote: On Fri, Oct 18, 2013 at 06:18:13PM +0100, Eric Dumazet wrote: On Fri, 2013-10-18 at 17:57 +0100, Will Deacon wrote: Hi Pablo, We also need fixes for net/ipv6/netfilter/ip6_tables.c and net/ipv4/netfilter/arp_tables.c

Re: linux-next: Tree for Oct 18 (netdev: nf_tables_bridge.c)

2013-10-27 Thread Pablo Neira Ayuso
for reporting. From 2724ade097d59aaa3879ca485ae0fd61994cbc38 Mon Sep 17 00:00:00 2001 From: Pablo Neira Ayuso pa...@netfilter.org Date: Mon, 28 Oct 2013 00:18:33 +0100 Subject: [PATCH] netfilter: bridge: fix nf_tables bridge dependencies with main core when CONFIG_NF_TABLES[_MODULE] is not enabled

Re: [PATCH] [RFC] netfilter: nf_conntrack: don't relase a conntrack with non-zero refcnt

2014-02-02 Thread Pablo Neira Ayuso
On Thu, Jan 16, 2014 at 10:23:01AM +0100, Florian Westphal wrote: Andrew Vagin ava...@parallels.com wrote: I think it would be nice if we could keep it that way. If everything fails we could proably intoduce a 'larval' dummy list similar to the one used by template conntracks? I'm

Re: OOPS in nf_ct_unlink_expect_report using Polycom RealPresence Mobile

2014-02-03 Thread Pablo Neira Ayuso
Dobriyan adobri...@gmail.com Signed-off-by: Pablo Neira Ayuso pa...@netfilter.org --- net/ipv4/netfilter/nf_nat_h323.c |5 - 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/net/ipv4/netfilter/nf_nat_h323.c b/net/ipv4/netfilter/nf_nat_h323.c index 9eea059d..574f7eb 100644 --- a/net

Re: [PATCH] netfilter: nf_conntrack: fix RCU race in nf_conntrack_find_get (v3)

2014-01-29 Thread Pablo Neira Ayuso
: Florian Westphal f...@strlen.de Cc: Pablo Neira Ayuso pa...@netfilter.org Cc: Patrick McHardy ka...@trash.net Cc: Jozsef Kadlecsik kad...@blackhole.kfki.hu Cc: David S. Miller da...@davemloft.net Cc: Cyrill Gorcunov gorcu...@openvz.org Signed-off-by: Andrey Vagin ava...@openvz.org

Re: [PATCH RESEND] netfilter: remove unused variable

2014-01-03 Thread Pablo Neira Ayuso
On Wed, Jan 01, 2014 at 06:27:19AM +0100, Michal Nazarewicz wrote: The nfmsg variable is not used (except in sizeof operator which does not care about its value) between the first and second time it is assigned the value. Furthermore, nlmsg_data has no side effects, so the assignment can be

Re: [PATCH] netlink: simplify nfnetlink_bind

2014-03-24 Thread Pablo Neira Ayuso
On Fri, Mar 21, 2014 at 12:44:09PM -0400, Richard Guy Briggs wrote: Remove duplicity and simplify code flow by moving the rcu_read_unlock() above the condition and let the flow control exit naturally at the end of the function. Signed-off-by: Richard Guy Briggs r...@redhat.com ---

Re: [PATCH 2/5] netfilter: Fix format string mismatch in mangle_content_len()

2014-04-29 Thread Pablo Neira Ayuso
On Tue, Apr 29, 2014 at 03:21:21PM +0100, Patrick McHardy wrote: On Tue, Apr 01, 2014 at 12:43:36AM +0900, Masanari Iida wrote: Fix format string mismatch in mangle_connect_len() All these patches seem like pointless noise to me. In none of these cases can the value legitimately be

Re: [PATCH] [RFC] netfilter: ct: flush net_gre-keymap_list only in nf_conntrack_proto_gre

2014-04-07 Thread Pablo Neira Ayuso
On Mon, Mar 31, 2014 at 06:14:18PM +0400, Andrey Vagin wrote: nf_ct_gre_keymap_flush() removes a nf_ct_gre_keymap object from net_gre-keymap_list and frees the object. But it doesn't clean a reference on this object from ct_pptp_info-keymap[dir]. Then nf_ct_gre_keymap_destroy() may release the

Re: [PATCH] [RFC] netfilter: ct: flush net_gre-keymap_list only in nf_conntrack_proto_gre

2014-04-08 Thread Pablo Neira Ayuso
On Tue, Apr 08, 2014 at 10:56:00AM +0400, Andrew Vagin wrote: On Mon, Apr 07, 2014 at 04:51:58PM +0200, Pablo Neira Ayuso wrote: On Mon, Mar 31, 2014 at 06:14:18PM +0400, Andrey Vagin wrote: nf_ct_gre_keymap_flush() removes a nf_ct_gre_keymap object from net_gre-keymap_list and frees

Re: [PATCH] netfilter: conntrack: initialize net.ct.generation

2014-04-14 Thread Pablo Neira Ayuso
On Sat, Apr 12, 2014 at 04:58:18PM -0400, David Miller wrote: From: Andrey Vagin ava...@openvz.org Date: Fri, 11 Apr 2014 21:34:20 +0400 [ 251.920788] INFO: trying to register non-static key. I'll let Pablo integrate this. Applied, thanks. -- To unsubscribe from this list: send the line

Re: [PATCH] netfilter: nf_conntrack: reserve two bytes for nf_ct_ext-len (v3)

2014-03-30 Thread Pablo Neira Ayuso
On Fri, Mar 28, 2014 at 01:54:32PM +0400, Andrey Vagin wrote: len contains sizeof(nf_ct_ext) and size of extensions. In a worst case it can contain all extensions. Bellow you can find sizes for all types of extensions. Their sum is definitely bigger than 256. nf_ct_ext_types[0]-len = 24

Re: [netlink] WARNING: at mm/vmalloc.c:1487 __vunmap()

2013-06-27 Thread Pablo Neira Ayuso
Hi Eric, Thanks for looking into this. On Wed, Jun 26, 2013 at 05:42:38AM -0700, Eric Dumazet wrote: [...] Nope there are several issues : 1) bug in netlink_alloc_large_skb() because it doesn't account for sizeof(struct skb_shared_info) overhead and initialization. Indeed, I can send a fix

Re: [PATCH 1/1] net/netfilter/nf_conntrack_netlink.c: remove null test before kfree

2014-06-25 Thread Pablo Neira Ayuso
On Fri, Jun 20, 2014 at 10:38:58PM +0200, Fabian Frederick wrote: Fix checkpatch warning: WARNING: kfree(NULL) is safe this check is probably not required Applied, thanks. -- To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to

Re: net/netfilter/xt_LOG.c:43: error: format not a string literal and no format arguments

2014-06-30 Thread Pablo Neira Ayuso
Neira Ayuso 2014-06-18 42 nf_log_packet(net, par-family, par-hooknum, skb, par-in, par-out, fab4085f Pablo Neira Ayuso 2014-06-18 @43li, loginfo-prefix); This needs to be: nf_log_packet(net, par-family, par-hooknum, skb, par-in, par-out, li

Re: [PATCH net-next] net: filter: rename 'struct sk_filter' to 'struct bpf_prog'

2014-07-28 Thread Pablo Neira Ayuso
On Sat, Jul 26, 2014 at 10:41:04PM -0700, Alexei Starovoitov wrote: On Fri, Jul 25, 2014 at 3:17 PM, Pablo Neira Ayuso pa...@netfilter.org wrote: The struct sk_filter is almost providing the generic framework, it just needs to be generalized, a quick layout for it: struct sk_filter

Re: [PATCH v3 net-next] net: filter: cleanup sk_* and bpf_* names

2014-07-29 Thread Pablo Neira Ayuso
On Mon, Jul 28, 2014 at 11:29:40PM -0700, Alexei Starovoitov wrote: clean up names related to socket filtering and bpf in the following way: - everything that deals with sockets keeps 'sk_*' prefix - everything that is pure BPF is changed to 'bpf_*' prefix API for attaching classic BPF to a

Re: [PATCH v3 net-next] net: filter: cleanup sk_* and bpf_* names

2014-07-29 Thread Pablo Neira Ayuso
On Tue, Jul 29, 2014 at 08:55:04AM -0700, Alexei Starovoitov wrote: I don't think this is the right moment to add this, but we have to keep in mind that something similar to this will need to be accomodated in struct sk_filter at some point to avoid sloppy changes that may result in

Re: [PATCH V2 1/1] netfilter/jump_label: HAVE_JUMP_LABEL instead of CONFIG_JUMP_LABEL

2014-08-25 Thread Pablo Neira Ayuso
On Fri, Aug 22, 2014 at 10:40:15AM +0800, Zhouyi Zhou wrote: Use HAVE_JUMP_LABEL as elsewhere in the kernel to ensure that the toolchain has the required support in addition to CONFIG_JUMP_LABEL being set. Applied, thanks. -- To unsubscribe from this list: send the line unsubscribe

Re: [PATCH v4 net-next 5/5] net: filter: split 'struct sk_filter' into socket and bpf parts

2014-07-31 Thread Pablo Neira Ayuso
On Wed, Jul 30, 2014 at 08:34:16PM -0700, Alexei Starovoitov wrote: clean up names related to socket filtering and bpf in the following way: - everything that deals with sockets keeps 'sk_*' prefix - everything that is pure BPF is changed to 'bpf_*' prefix split 'struct sk_filter' into

Re: [PATCH v4 net-next 5/5] net: filter: split 'struct sk_filter' into socket and bpf parts

2014-08-01 Thread Pablo Neira Ayuso
On Thu, Jul 31, 2014 at 02:02:19PM -0700, Alexei Starovoitov wrote: On Thu, Jul 31, 2014 at 12:40 PM, Pablo Neira Ayuso pa...@netfilter.org wrote: On Wed, Jul 30, 2014 at 08:34:16PM -0700, Alexei Starovoitov wrote: clean up names related to socket filtering and bpf in the following way

Re: [PATCH v4 net-next 5/5] net: filter: split 'struct sk_filter' into socket and bpf parts

2014-08-01 Thread Pablo Neira Ayuso
On Fri, Aug 01, 2014 at 09:50:31AM -0700, Alexei Starovoitov wrote: On Fri, Aug 1, 2014 at 9:06 AM, Pablo Neira Ayuso pa...@netfilter.org wrote: On Thu, Jul 31, 2014 at 02:02:19PM -0700, Alexei Starovoitov wrote: On Thu, Jul 31, 2014 at 12:40 PM, Pablo Neira Ayuso pa...@netfilter.org wrote

Re: [PATCH net-next] net: filter: rename 'struct sk_filter' to 'struct bpf_prog'

2014-07-25 Thread Pablo Neira Ayuso
On Fri, Jul 25, 2014 at 01:25:35PM +0200, Daniel Borkmann wrote: [ also Cc'ing Willem, Pablo ] On 07/25/2014 10:04 AM, Alexei Starovoitov wrote: 'sk_filter' name is used as 'struct sk_filter', function sk_filter() and as variable 'sk_filter', which makes code hard to read. Also it's easily

Re: [PATCH] netfilter: nf_conntrack: remove exceptional on function name

2014-07-25 Thread Pablo Neira Ayuso
On Fri, Jul 25, 2014 at 01:47:16AM +0530, Himangi Saraogi wrote: In this file, function names are otherwise used as pointers without . A simplified version of the Coccinelle semantic patch that makes this change is as follows: // smpl @r@ identifier f; @@ f(...) { ... } @@

Re: [PATCH] [linux-next] netfilter: kill remnants of ulog targets

2014-07-25 Thread Pablo Neira Ayuso
On Fri, Jul 25, 2014 at 02:25:31PM +0200, Paul Bolle wrote: The ulog targets were recently killed. A few references to the Kconfig macros CONFIG_IP_NF_TARGET_ULOG and CONFIG_BRIDGE_EBT_ULOG were left untouched. Kill these too. Those were my fault, applied, thanks Paul. -- To unsubscribe from

Re: [PATCH net-next] net: filter: rename 'struct sk_filter' to 'struct bpf_prog'

2014-07-25 Thread Pablo Neira Ayuso
On Fri, Jul 25, 2014 at 10:24:29AM -0700, Alexei Starovoitov wrote: On Fri, Jul 25, 2014 at 6:00 AM, Daniel Borkmann dbork...@redhat.com wrote: On 07/25/2014 01:54 PM, Pablo Neira Ayuso wrote: On Fri, Jul 25, 2014 at 01:25:35PM +0200, Daniel Borkmann wrote: [ also Cc'ing Willem, Pablo

Re: [PATCH net-next] net: filter: rename 'struct sk_filter' to 'struct bpf_prog'

2014-07-25 Thread Pablo Neira Ayuso
On Fri, Jul 25, 2014 at 02:50:32PM -0400, Willem de Bruijn wrote: On Fri, Jul 25, 2014 at 2:43 PM, Alexei Starovoitov a...@plumgrid.com wrote: On Fri, Jul 25, 2014 at 11:32 AM, Willem de Bruijn will...@google.com wrote: This follows a convention in include/uapi/linux/netfilter/*.h that

Re: [PATCH v2 net-next] net: filter: rename 'struct sk_filter' to 'struct bpf_prog'

2014-07-26 Thread Pablo Neira Ayuso
On Fri, Jul 25, 2014 at 12:11:09PM -0700, Alexei Starovoitov wrote: 'sk_filter' name is used as 'struct sk_filter', function sk_filter() and as variable 'sk_filter', which makes code hard to read. Also it's easily confused with 'struct sock_filter' Rename 'struct sk_filter' to 'struct

Re: [PATCH 4/5] netfilter: nf_tables: fix error return code

2014-08-11 Thread Pablo Neira Ayuso
On Thu, Aug 07, 2014 at 02:49:08PM +0200, Julia Lawall wrote: From: Julia Lawall julia.law...@lip6.fr Convert a zero return value on error to a negative one, as returned elsewhere in the function. Applied, thanks Julia. -- To unsubscribe from this list: send the line unsubscribe

Re: [GIT] Networking

2014-10-20 Thread Pablo Neira Ayuso
On Sun, Oct 19, 2014 at 09:03:14PM -0400, David Miller wrote: From: Linus Torvalds torva...@linux-foundation.org Date: Sun, 19 Oct 2014 17:32:15 -0700 Looks like the module license issue was just overlooked when moving the code out in commit c8d7b98bec43 (netfilter: move nf_send_resetX()

Re: [PATCH] netfilter: xt_hashlimit: Enhance the xt_hashlimit to avoid duplicated codes

2014-10-21 Thread Pablo Neira Ayuso
On Tue, Oct 21, 2014 at 11:23:16PM +0800, Feng Gao wrote: Hi all, Enhance the functions dsthash_alloc_init and hashlimit_mt in file xt_hashlimit.c to avoid two duplicated codes following: - dh-expires = now + msecs_to_jiffies(hinfo-cfg.expire); - rateinfo_recalc(dh,

Re: [PATCH v10 net-next 2/2] net: filter: split filter.h and expose eBPF to user space

2014-09-06 Thread Pablo Neira Ayuso
On Thu, Sep 04, 2014 at 10:17:18PM -0700, Alexei Starovoitov wrote: allow user space to generate eBPF programs uapi/linux/bpf.h: eBPF instruction set definition linux/filter.h: the rest This patch only moves macro definitions, but practically it freezes existing eBPF instruction set,

Re: [PATCH v10 net-next 2/2] net: filter: split filter.h and expose eBPF to user space

2014-09-07 Thread Pablo Neira Ayuso
On Sat, Sep 06, 2014 at 09:04:23AM -0700, Alexei Starovoitov wrote: On Sat, Sep 6, 2014 at 7:10 AM, Pablo Neira Ayuso pa...@netfilter.org wrote: On Thu, Sep 04, 2014 at 10:17:18PM -0700, Alexei Starovoitov wrote: allow user space to generate eBPF programs uapi/linux/bpf.h: eBPF

Re: [PATCH] netfilter: xtables: Remove unnecessary initialization of struct ts_state

2014-09-09 Thread Pablo Neira Ayuso
On Mon, Sep 08, 2014 at 09:51:12AM +0200, Bojan Prtvar wrote: The skb_find_text() accepts uninitialized textsearch state variable. Applied, thanks. -- To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to majord...@vger.kernel.org More majordomo info

Re: [PATCH 1/1] bridge: Fix NAT66ed IPv6 packets not being bridged correctly

2014-10-03 Thread Pablo Neira Ayuso
Hi Bernhard, Sorry for taking a bit to get back to you with feedback. We've been discussing recently some changes in br_netfilter. Basically, to modularize it [1] and this has taken a while. Regarding your change. Sven Eckelmann (CC'ed in this email) sent a RFC out of the merge window that have

Re: [PATCH] netfilter: fix nf_conn_nat-masq_index visibility

2014-09-30 Thread Pablo Neira Ayuso
On Tue, Sep 30, 2014 at 01:27:50PM +0200, Arnd Bergmann wrote: A recent change introduced the NF_NAT_MASQUERADE_IPV4/6 symbols and now builds the masquerading code based on this symbol rather than the IP_NF_TARGET_MASQUERADE symbol, however the nf_nat.h header file still uses the old symbol,

Re: [PATCH 1/1] netfilter: Deletion of unnecessary checks before two function calls

2014-11-19 Thread Pablo Neira Ayuso
On Tue, Nov 18, 2014 at 08:47:31PM +0100, SF Markus Elfring wrote: From: Markus Elfring elfr...@users.sourceforge.net Date: Tue, 18 Nov 2014 20:37:05 +0100 The functions free_percpu() and module_put() test whether their argument is NULL and then return immediately. Thus the test around the

  1   2   3   4   5   6   7   8   9   10   >