<feed xmlns='http://www.w3.org/2005/Atom'>
<title>pm24.git/include/net/netfilter, branch v4.16</title>
<subtitle>Unnamed repository; edit this file 'description' to name the repository.
</subtitle>
<id>https://git.kobert.dev/pm24.git/atom?h=v4.16</id>
<link rel='self' href='https://git.kobert.dev/pm24.git/atom?h=v4.16'/>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/'/>
<updated>2018-03-22T11:57:07Z</updated>
<entry>
<title>netfilter: nf_tables: cache device name in flowtable object</title>
<updated>2018-03-22T11:57:07Z</updated>
<author>
<name>Pablo Neira Ayuso</name>
<email>pablo@netfilter.org</email>
</author>
<published>2018-03-21T12:55:42Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=d92191aa84e5f187d543867c3d54b38f294833fa'/>
<id>urn:sha1:d92191aa84e5f187d543867c3d54b38f294833fa</id>
<content type='text'>
Devices going away have to grab the nfnl_lock from the netdev event path
to avoid races with control plane updates.

However, netlink dumps in netfilter do not hold nfnl_lock mutex. Cache
the device name into the objects to avoid an use-after-free situation
for a device that is going away.

Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>netfilter: nf_flow_offload: fix use-after-free and a resource leak</title>
<updated>2018-02-07T10:55:52Z</updated>
<author>
<name>Felix Fietkau</name>
<email>nbd@nbd.name</email>
</author>
<published>2018-02-07T08:49:02Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=0ff90b6c20340e57616a51ae1a1bf18156d6638a'/>
<id>urn:sha1:0ff90b6c20340e57616a51ae1a1bf18156d6638a</id>
<content type='text'>
flow_offload_del frees the flow, so all associated resource must be
freed before.

Since the ct entry in struct flow_offload_entry was allocated by
flow_offload_alloc, it should be freed by flow_offload_free to take care
of the error handling path when flow_offload_add fails.

While at it, make flow_offload_del static, since it should never be
called directly, only from the gc step

Signed-off-by: Felix Fietkau &lt;nbd@nbd.name&gt;
Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>netfilter: remove useless prototype</title>
<updated>2018-02-07T10:54:52Z</updated>
<author>
<name>Taehee Yoo</name>
<email>ap420073@gmail.com</email>
</author>
<published>2018-02-07T02:50:41Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=d8ed9600581d40d818ae417b3086a333841b0559'/>
<id>urn:sha1:d8ed9600581d40d818ae417b3086a333841b0559</id>
<content type='text'>
prototype nf_ct_nat_offset is not used anymore.

Signed-off-by: Taehee Yoo &lt;ap420073@gmail.com&gt;
</content>
</entry>
<entry>
<title>netfilter: nf_tables: fix flowtable free</title>
<updated>2018-02-06T23:58:57Z</updated>
<author>
<name>Pablo Neira Ayuso</name>
<email>pablo@netfilter.org</email>
</author>
<published>2018-02-06T12:22:47Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=b408c5b04f82fe4e20bceb8e4f219453d4f21f02'/>
<id>urn:sha1:b408c5b04f82fe4e20bceb8e4f219453d4f21f02</id>
<content type='text'>
Every flow_offload entry is added into the table twice. Because of this,
rhashtable_free_and_destroy can't be used, since it would call kfree for
each flow_offload object twice.

This patch cleans up the flowtable via nf_flow_table_iterate() to
schedule removal of entries by setting on the dying bit, then there is
an explicitly invocation of the garbage collector to release resources.

Based on patch from Felix Fietkau.

Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>netfilter: nft_flow_offload: move flowtable cleanup routines to nf_flow_table</title>
<updated>2018-02-06T23:58:57Z</updated>
<author>
<name>Pablo Neira Ayuso</name>
<email>pablo@netfilter.org</email>
</author>
<published>2018-02-06T12:22:44Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=c0ea1bcb39352b57ac5c4b6da8acd65bddeee2c5'/>
<id>urn:sha1:c0ea1bcb39352b57ac5c4b6da8acd65bddeee2c5</id>
<content type='text'>
Move the flowtable cleanup routines to nf_flow_table and expose the
nf_flow_table_cleanup() helper function.

Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>netfilter: nf_tables: allocate handle and delete objects via handle</title>
<updated>2018-01-19T13:00:46Z</updated>
<author>
<name>Harsha Sharma</name>
<email>harshasharmaiitr@gmail.com</email>
</author>
<published>2017-12-26T19:29:00Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=3ecbfd65f50e5ff9c538c1bfa3356ef52cc66586'/>
<id>urn:sha1:3ecbfd65f50e5ff9c538c1bfa3356ef52cc66586</id>
<content type='text'>
This patch allows deletion of objects via unique handle which can be
listed via '-a' option.

Signed-off-by: Harsha Sharma &lt;harshasharmaiitr@gmail.com&gt;
Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>netfilter: nf_tables: get rid of struct nft_af_info abstraction</title>
<updated>2018-01-10T14:32:11Z</updated>
<author>
<name>Pablo Neira Ayuso</name>
<email>pablo@netfilter.org</email>
</author>
<published>2018-01-09T01:48:47Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=98319cb9089844d76e65a6cce5bfbd165e698735'/>
<id>urn:sha1:98319cb9089844d76e65a6cce5bfbd165e698735</id>
<content type='text'>
Remove the infrastructure to register/unregister nft_af_info structure,
this structure stores no useful information anymore.

Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>netfilter: nf_tables: get rid of pernet families</title>
<updated>2018-01-10T14:32:10Z</updated>
<author>
<name>Pablo Neira Ayuso</name>
<email>pablo@netfilter.org</email>
</author>
<published>2018-01-09T01:42:11Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=dd4cbef7235154f163501ffbf396c0dadd830c9c'/>
<id>urn:sha1:dd4cbef7235154f163501ffbf396c0dadd830c9c</id>
<content type='text'>
Now that we have a single table list for each netns, we can get rid of
one pointer per family and the global afinfo list, thus, shrinking
struct netns for nftables that now becomes 64 bytes smaller.

And call __nft_release_afinfo() from __net_exit path accordingly to
release netnamespace objects on removal.

Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>netfilter: nf_tables: add single table list for all families</title>
<updated>2018-01-10T14:32:08Z</updated>
<author>
<name>Pablo Neira Ayuso</name>
<email>pablo@netfilter.org</email>
</author>
<published>2018-01-09T01:38:03Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=36596dadf54a920d26286cf9f421fb4ef648b51f'/>
<id>urn:sha1:36596dadf54a920d26286cf9f421fb4ef648b51f</id>
<content type='text'>
Place all existing user defined tables in struct net *, instead of
having one list per family. This saves us from one level of indentation
in netlink dump functions.

Place pointer to struct nft_af_info in struct nft_table temporarily, as
we still need this to put back reference module reference counter on
table removal.

This patch comes in preparation for the removal of struct nft_af_info.

Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
<entry>
<title>netfilter: nf_tables: remove flag field from struct nft_af_info</title>
<updated>2018-01-10T14:32:05Z</updated>
<author>
<name>Pablo Neira Ayuso</name>
<email>pablo@netfilter.org</email>
</author>
<published>2017-12-19T13:07:52Z</published>
<link rel='alternate' type='text/html' href='https://git.kobert.dev/pm24.git/commit/?id=e7bb5c714020a2dce85b12766899f528883585ac'/>
<id>urn:sha1:e7bb5c714020a2dce85b12766899f528883585ac</id>
<content type='text'>
Replace it by a direct check for the netdev protocol family.

Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
</content>
</entry>
</feed>
