<feed xmlns='http://www.w3.org/2005/Atom'>
<title>pm24.git/include/linux/netfilter, branch v3.19-rc7</title>
<subtitle>Unnamed repository; edit this file 'description' to name the repository.
</subtitle>
<id>https://git.kobert.dev/pm24.git/atom?h=v3.19-rc7</id>
<link rel='self' href='https://git.kobert.dev/pm24.git/atom?h=v3.19-rc7'/>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/'/>
<updated>2014-09-15T20:20:21Z</updated>
<entry>
<title>netfilter: ipset: send nonzero skbinfo extensions only</title>
<updated>2014-09-15T20:20:21Z</updated>
<author>
<name>Jozsef Kadlecsik</name>
<email>kadlec@blackhole.kfki.hu</email>
</author>
<published>2014-09-15T15:30:54Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=aef96193fe7b2791c4a3b19fe75426b929769471'/>
<id>urn:sha1:aef96193fe7b2791c4a3b19fe75426b929769471</id>
<content type='text'>
Do not send zero valued skbinfo extensions to userspace at listing.

Signed-off-by: Jozsef Kadlecsik &lt;kadlec@blackhole.kfki.hu&gt;
</content>
</entry>
<entry>
<title>netfilter: ipset: Add skbinfo extension kernel support in the ipset core.</title>
<updated>2014-09-15T20:20:20Z</updated>
<author>
<name>Anton Danilov</name>
<email>littlesmilingcloud@gmail.com</email>
</author>
<published>2014-08-28T06:11:27Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=0e9871e3f79fd17c691b50a9669220c54ff084a2'/>
<id>urn:sha1:0e9871e3f79fd17c691b50a9669220c54ff084a2</id>
<content type='text'>
Skbinfo extension provides mapping of metainformation with lookup in the ipset tables.
This patch defines the flags, the constants, the functions and the structures
for the data type independent support of the extension.
Note the firewall mark stores in the kernel structures as two 32bit values,
but transfered through netlink as one 64bit value.

Signed-off-by: Anton Danilov &lt;littlesmilingcloud@gmail.com&gt;
Signed-off-by: Jozsef Kadlecsik &lt;kadlec@blackhole.kfki.hu&gt;
</content>
</entry>
<entry>
<title>netfilter: ipset: Fix warn: integer overflows 'sizeof(*map) + size * set-&gt;dsize'</title>
<updated>2014-08-24T17:33:10Z</updated>
<author>
<name>Jozsef Kadlecsik</name>
<email>kadlec@blackhole.kfki.hu</email>
</author>
<published>2014-08-05T20:02:34Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=1b05756c48ea07ced9604ef01d11194d936da163'/>
<id>urn:sha1:1b05756c48ea07ced9604ef01d11194d936da163</id>
<content type='text'>
Dan Carpenter reported that the static checker emits the warning

        net/netfilter/ipset/ip_set_list_set.c:600 init_list_set()
        warn: integer overflows 'sizeof(*map) + size * set-&gt;dsize'

Limit the maximal number of elements in list type of sets.

Signed-off-by: Jozsef Kadlecsik &lt;kadlec@blackhole.kfki.hu&gt;
</content>
</entry>
<entry>
<title>netfilter: nfnetlink_acct: Adding quota support to accounting framework</title>
<updated>2014-04-29T16:25:14Z</updated>
<author>
<name>Mathieu Poirier</name>
<email>mathieu.poirier@linaro.org</email>
</author>
<published>2014-04-21T00:57:36Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=683399eddb9fff742b1a14c5a5d03e12bfc0afff'/>
<id>urn:sha1:683399eddb9fff742b1a14c5a5d03e12bfc0afff</id>
<content type='text'>
nfacct objects already support accounting at the byte and packet
level.  As such it is a natural extension to add the possiblity to
define a ceiling limit for both metrics.

All the support for quotas itself is added to nfnetlink acctounting
framework to stay coherent with current accounting object management.
Quota limit checks are implemented in xt_nfacct filter where
statistic collection is already done.

Pablo Neira Ayuso has also contributed to this feature.

Signed-off-by: Mathieu Poirier &lt;mathieu.poirier@linaro.org&gt;
Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>netfilter: nf_conntrack: flush net_gre-&gt;keymap_list only from gre helper</title>
<updated>2014-04-08T08:56:12Z</updated>
<author>
<name>Andrey Vagin</name>
<email>avagin@openvz.org</email>
</author>
<published>2014-03-31T14:14:18Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=8142b227ef43119e19acf6122a9eea1a82492645'/>
<id>urn:sha1:8142b227ef43119e19acf6122a9eea1a82492645</id>
<content type='text'>
nf_ct_gre_keymap_flush() removes a nf_ct_gre_keymap object from
net_gre-&gt;keymap_list and frees the object. But it doesn't clean
a reference on this object from ct_pptp_info-&gt;keymap[dir].
Then nf_ct_gre_keymap_destroy() may release the same object again.

So nf_ct_gre_keymap_flush() can be called only when we are sure that
when nf_ct_gre_keymap_destroy will not be called.

nf_ct_gre_keymap is created by nf_ct_gre_keymap_add() and the right way
to destroy it is to call nf_ct_gre_keymap_destroy().

This patch marks nf_ct_gre_keymap_flush() as static, so this patch can
break compilation of third party modules, which use
nf_ct_gre_keymap_flush. I'm not sure this is the right way to deprecate
this function.

[  226.540793] general protection fault: 0000 [#1] SMP
[  226.541750] Modules linked in: nf_nat_pptp nf_nat_proto_gre
nf_conntrack_pptp nf_conntrack_proto_gre ip_gre ip_tunnel gre
ppp_deflate bsd_comp ppp_async crc_ccitt ppp_generic slhc xt_nat
iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat
nf_conntrack veth tun bridge stp llc ppdev microcode joydev pcspkr
serio_raw virtio_console virtio_balloon floppy parport_pc parport
pvpanic i2c_piix4 virtio_net drm_kms_helper ttm ata_generic virtio_pci
virtio_ring virtio drm i2c_core pata_acpi [last unloaded: ip_tunnel]
[  226.541776] CPU: 0 PID: 49 Comm: kworker/u4:2 Not tainted 3.14.0-rc8+ #101
[  226.541776] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
[  226.541776] Workqueue: netns cleanup_net
[  226.541776] task: ffff8800371e0000 ti: ffff88003730c000 task.ti: ffff88003730c000
[  226.541776] RIP: 0010:[&lt;ffffffff81389ba9&gt;]  [&lt;ffffffff81389ba9&gt;] __list_del_entry+0x29/0xd0
[  226.541776] RSP: 0018:ffff88003730dbd0  EFLAGS: 00010a83
[  226.541776] RAX: 6b6b6b6b6b6b6b6b RBX: ffff8800374e6c40 RCX: dead000000200200
[  226.541776] RDX: 6b6b6b6b6b6b6b6b RSI: ffff8800371e07d0 RDI: ffff8800374e6c40
[  226.541776] RBP: ffff88003730dbd0 R08: 0000000000000000 R09: 0000000000000000
[  226.541776] R10: 0000000000000001 R11: ffff88003730d92e R12: 0000000000000002
[  226.541776] R13: ffff88007a4c42d0 R14: ffff88007aef0000 R15: ffff880036cf0018
[  226.541776] FS:  0000000000000000(0000) GS:ffff88007fc00000(0000) knlGS:0000000000000000
[  226.541776] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[  226.541776] CR2: 00007f07f643f7d0 CR3: 0000000036fd2000 CR4: 00000000000006f0
[  226.541776] Stack:
[  226.541776]  ffff88003730dbe8 ffffffff81389c5d ffff8800374ffbe4 ffff88003730dc28
[  226.541776]  ffffffffa0162a43 ffffffffa01627c5 ffff88007a4c42d0 ffff88007aef0000
[  226.541776]  ffffffffa01651c0 ffff88007a4c45e0 ffff88007aef0000 ffff88003730dc40
[  226.541776] Call Trace:
[  226.541776]  [&lt;ffffffff81389c5d&gt;] list_del+0xd/0x30
[  226.541776]  [&lt;ffffffffa0162a43&gt;] nf_ct_gre_keymap_destroy+0x283/0x2d0 [nf_conntrack_proto_gre]
[  226.541776]  [&lt;ffffffffa01627c5&gt;] ? nf_ct_gre_keymap_destroy+0x5/0x2d0 [nf_conntrack_proto_gre]
[  226.541776]  [&lt;ffffffffa0162ab7&gt;] gre_destroy+0x27/0x70 [nf_conntrack_proto_gre]
[  226.541776]  [&lt;ffffffffa0117de3&gt;] destroy_conntrack+0x83/0x200 [nf_conntrack]
[  226.541776]  [&lt;ffffffffa0117d87&gt;] ? destroy_conntrack+0x27/0x200 [nf_conntrack]
[  226.541776]  [&lt;ffffffffa0117d60&gt;] ? nf_conntrack_hash_check_insert+0x2e0/0x2e0 [nf_conntrack]
[  226.541776]  [&lt;ffffffff81630142&gt;] nf_conntrack_destroy+0x72/0x180
[  226.541776]  [&lt;ffffffff816300d5&gt;] ? nf_conntrack_destroy+0x5/0x180
[  226.541776]  [&lt;ffffffffa011ef80&gt;] ? kill_l3proto+0x20/0x20 [nf_conntrack]
[  226.541776]  [&lt;ffffffffa011847e&gt;] nf_ct_iterate_cleanup+0x14e/0x170 [nf_conntrack]
[  226.541776]  [&lt;ffffffffa011f74b&gt;] nf_ct_l4proto_pernet_unregister+0x5b/0x90 [nf_conntrack]
[  226.541776]  [&lt;ffffffffa0162409&gt;] proto_gre_net_exit+0x19/0x30 [nf_conntrack_proto_gre]
[  226.541776]  [&lt;ffffffff815edf89&gt;] ops_exit_list.isra.1+0x39/0x60
[  226.541776]  [&lt;ffffffff815eecc0&gt;] cleanup_net+0x100/0x1d0
[  226.541776]  [&lt;ffffffff810a608a&gt;] process_one_work+0x1ea/0x4f0
[  226.541776]  [&lt;ffffffff810a6028&gt;] ? process_one_work+0x188/0x4f0
[  226.541776]  [&lt;ffffffff810a64ab&gt;] worker_thread+0x11b/0x3a0
[  226.541776]  [&lt;ffffffff810a6390&gt;] ? process_one_work+0x4f0/0x4f0
[  226.541776]  [&lt;ffffffff810af42d&gt;] kthread+0xed/0x110
[  226.541776]  [&lt;ffffffff8173d4dc&gt;] ? _raw_spin_unlock_irq+0x2c/0x40
[  226.541776]  [&lt;ffffffff810af340&gt;] ? kthread_create_on_node+0x200/0x200
[  226.541776]  [&lt;ffffffff8174747c&gt;] ret_from_fork+0x7c/0xb0
[  226.541776]  [&lt;ffffffff810af340&gt;] ? kthread_create_on_node+0x200/0x200
[  226.541776] Code: 00 00 55 48 8b 17 48 b9 00 01 10 00 00 00 ad de
48 8b 47 08 48 89 e5 48 39 ca 74 29 48 b9 00 02 20 00 00 00 ad de 48
39 c8 74 7a &lt;4c&gt; 8b 00 4c 39 c7 75 53 4c 8b 42 08 4c 39 c7 75 2b 48 89
42 08
[  226.541776] RIP  [&lt;ffffffff81389ba9&gt;] __list_del_entry+0x29/0xd0
[  226.541776]  RSP &lt;ffff88003730dbd0&gt;
[  226.612193] ---[ end trace 985ae23ddfcc357c ]---

Cc: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
Cc: Patrick McHardy &lt;kaber@trash.net&gt;
Cc: Jozsef Kadlecsik &lt;kadlec@blackhole.kfki.hu&gt;
Cc: "David S. Miller" &lt;davem@davemloft.net&gt;
Signed-off-by: Andrey Vagin &lt;avagin@openvz.org&gt;
Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>netfilter: ipset: add forceadd kernel support for hash set types</title>
<updated>2014-03-06T08:31:43Z</updated>
<author>
<name>Josh Hunt</name>
<email>johunt@akamai.com</email>
</author>
<published>2014-03-01T03:14:57Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=07cf8f5ae2657ac495b906c68ff3441ff8ba80ba'/>
<id>urn:sha1:07cf8f5ae2657ac495b906c68ff3441ff8ba80ba</id>
<content type='text'>
Adds a new property for hash set types, where if a set is created
with the 'forceadd' option and the set becomes full the next addition
to the set may succeed and evict a random entry from the set.

To keep overhead low eviction is done very simply. It checks to see
which bucket the new entry would be added. If the bucket's pos value
is non-zero (meaning there's at least one entry in the bucket) it
replaces the first entry in the bucket. If pos is zero, then it continues
down the normal add process.

This property is useful if you have a set for 'ban' lists where it may
not matter if you release some entries from the set early.

Signed-off-by: Josh Hunt &lt;johunt@akamai.com&gt;
Signed-off-by: Jozsef Kadlecsik &lt;kadlec@blackhole.kfki.hu&gt;
</content>
</entry>
<entry>
<title>netfilter: ipset: Prepare the kernel for create option flags when no extension is needed</title>
<updated>2014-03-06T08:31:42Z</updated>
<author>
<name>Jozsef Kadlecsik</name>
<email>kadlec@blackhole.kfki.hu</email>
</author>
<published>2014-02-13T11:19:56Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=af284ece87365f3a69723f5bcc1bcdb505b5eb5d'/>
<id>urn:sha1:af284ece87365f3a69723f5bcc1bcdb505b5eb5d</id>
<content type='text'>
Signed-off-by: Jozsef Kadlecsik &lt;kadlec@blackhole.kfki.hu&gt;
</content>
</entry>
<entry>
<title>netfilter: ipset: add hash:ip,mark data type to ipset</title>
<updated>2014-03-06T08:31:42Z</updated>
<author>
<name>Vytas Dauksa</name>
<email>vytas.dauksa@smoothwall.net</email>
</author>
<published>2013-12-17T14:01:43Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=3b02b56cd5988d569731f6c0c26992296e46b758'/>
<id>urn:sha1:3b02b56cd5988d569731f6c0c26992296e46b758</id>
<content type='text'>
Introduce packet mark support with new ip,mark hash set. This includes
userspace and kernelspace code, hash:ip,mark set tests and man page
updates.

The intended use of ip,mark set is similar to the ip:port type, but for
protocols which don't use a predictable port number. Instead of port
number it matches a firewall mark determined by a layer 7 filtering
program like opendpi.

As well as allowing or blocking traffic it will also be used for
accounting packets and bytes sent for each protocol.

Signed-off-by: Jozsef Kadlecsik &lt;kadlec@blackhole.kfki.hu&gt;
</content>
</entry>
<entry>
<title>netfilter: nfnetlink: add rcu_dereference_protected() helpers</title>
<updated>2014-02-25T10:29:21Z</updated>
<author>
<name>Patrick McHardy</name>
<email>kaber@trash.net</email>
</author>
<published>2014-02-18T18:06:48Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=0eb5db7ad302a24fe6f0eb4bfd235357047a28db'/>
<id>urn:sha1:0eb5db7ad302a24fe6f0eb4bfd235357047a28db</id>
<content type='text'>
Add a lockdep_nfnl_is_held() function and a nfnl_dereference() macro for
RCU dereferences protected by a NFNL subsystem mutex.

Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>netfilter: ipset: remove unused code</title>
<updated>2014-01-03T22:41:35Z</updated>
<author>
<name>stephen hemminger</name>
<email>stephen@networkplumber.org</email>
</author>
<published>2013-12-31T01:13:10Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=02eca9d2cc541806e8f03b4131c7ee9120246df7'/>
<id>urn:sha1:02eca9d2cc541806e8f03b4131c7ee9120246df7</id>
<content type='text'>
Function never used in current upstream code.

Signed-off-by: Stephen Hemminger &lt;stephen@networkplumber.org&gt;
Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
</feed>
