1. 13 Mar, 2007 4 commits
    • Patrick McHardy's avatar
      nfnetlink_log: fix reference leak · 752d2d17
      Patrick McHardy authored
      [NETFILTER]: nfnetlink_log: fix reference leak
      
      Stop reference leaking in nfulnl_log_packet(). If we start a timer we
      are already taking another reference.
      Signed-off-by: default avatarMichal Miroslaw <mirq-linux@rere.qmqm.pl>
      Signed-off-by: default avatarPatrick McHardy <kaber@trash.net>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@suse.de>
      
      752d2d17
    • Patrick McHardy's avatar
      tcp conntrack: accept SYN|URG as valid · 23dfe33b
      Patrick McHardy authored
      [NETFILTER]: tcp conntrack: accept SYN|URG as valid
      
      Some stacks apparently send packets with SYN|URG set. Linux accepts
      these packets, so TCP conntrack should to.
      
      Pointed out by Martijn Posthuma <posthuma@sangine.com>.
      Signed-off-by: default avatarPatrick McHardy <kaber@trash.net>
      23dfe33b
    • Patrick McHardy's avatar
      nf_conntrack/nf_nat: fix incorrect config ifdefs · 51248d46
      Patrick McHardy authored
      [NETFILTER]: nf_conntrack/nf_nat: fix incorrect config ifdefs
      
      The nf_conntrack_netlink config option is named CONFIG_NF_CT_NETLINK,
      but multiple files use CONFIG_IP_NF_CONNTRACK_NETLINK or
      CONFIG_NF_CONNTRACK_NETLINK for ifdefs.
      Signed-off-by: default avatarPatrick McHardy <kaber@trash.net>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@suse.de>
      51248d46
    • Patrick McHardy's avatar
      conntrack: fix {nf, ip}_ct_iterate_cleanup endless loops · 48c0c8eb
      Patrick McHardy authored
      [NETFILTER]: conntrack: fix {nf,ip}_ct_iterate_cleanup endless loops
      
      Fix {nf,ip}_ct_iterate_cleanup unconfirmed list handling:
      
      - unconfirmed entries can not be killed manually, they are removed on
        confirmation or final destruction of the conntrack entry, which means
        we might iterate forever without making forward progress.
      
        This can happen in combination with the conntrack event cache, which
        holds a reference to the conntrack entry, which is only released when
        the packet makes it all the way through the stack or a different
        packet is handled.
      
      - taking references to an unconfirmed entry and using it outside the
        locked section doesn't work, the list entries are not refcounted and
        another CPU might already be waiting to destroy the entry
      
      What the code really wants to do is make sure the references of the hash
      table to the selected conntrack entries are released, so they will be
      destroyed once all references from skbs and the event cache are dropped.
      
      Since unconfirmed entries haven't even entered the hash yet, simply mark
      them as dying and skip confirmation based on that.
      Signed-off-by: default avatarPatrick McHardy <kaber@trash.net>
      Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@suse.de>
      48c0c8eb
  2. 09 Mar, 2007 36 commits