[nf-next:fw 18/18] net/netfilter/nf_conntrack_standalone.c:647:2: error: call to '__compiletime_assert_647' declared with attribute error: BUILD_BUG_ON failed: NFCT_INFOMASK >= ARCH_KMALLOC_MINALIGN

2017-01-18 Thread kbuild test robot
tree: https://git.kernel.org/pub/scm/linux/kernel/git/pablo/nf-next.git fw head: f0ec36fc1d09458eb0ee7efb3aff532b7caf4257 commit: f0ec36fc1d09458eb0ee7efb3aff532b7caf4257 [18/18] netfilter: merge ctinfo into nfct pointer storage area config: openrisc-allyesconfig (attached as .config) compiler

Re: [PATCH nf v2] netfilter: conntrack: refine gc worker heuristics, redux

2017-01-18 Thread Denys Fedoryshchenko
On 2017-01-18 03:01, Florian Westphal wrote: This further refines the changes made to conntrack gc_worker in commit e0df8cae6c16 ("netfilter: conntrack: refine gc worker heuristics"). The main idea of that change was to reduce the scan interval when evictions take place. However, on the rep

Re: AUDIT_NETFILTER_PKT message format

2017-01-18 Thread Paul Moore
On Wed, Jan 18, 2017 at 10:15 AM, Richard Guy Briggs wrote: > On 2017-01-18 07:32, Paul Moore wrote: >> On Wed, Jan 18, 2017 at 12:39 AM, Richard Guy Briggs wrote: >> > On 2017-01-17 21:34, Richard Guy Briggs wrote: >> >> On 2017-01-17 15:17, Paul Moore wrote: >> >> > On Tue, Jan 17, 2017 at 11:1

[PATCH nft] src: Honor obligatory stateless printing of flow tables

2017-01-18 Thread Elise Lennion
Signed-off-by: Elise Lennion --- include/nftables.h | 2 +- src/main.c | 4 ++-- src/statement.c| 4 3 files changed, 7 insertions(+), 3 deletions(-) diff --git a/include/nftables.h b/include/nftables.h index 760bbff..6f54155 100644 --- a/include/nftables.h +++ b/include/nftable

Re: [PATCH nf-next v2 1/1] netfilter: nf_tables: Refine the codes to eliminate useless condition checks in nf_tables_api.c

2017-01-18 Thread Pablo Neira Ayuso
On Mon, Jan 16, 2017 at 10:02:57PM +0800, f...@ikuai8.com wrote: > From: Gao Feng > > The return value of nf_tables_table_lookup is valid pointer or one > pointer error. There are two cases totally. > case1: IS_ERR(table) is true, it would return the error or reset the > table as NULL, it is unne

Re: [PATCH nf-next 1/1] netfilter: nf_tables: Eliminate duplicated codes in nf_tables_table_enable

2017-01-18 Thread Pablo Neira Ayuso
On Tue, Jan 10, 2017 at 12:42:39PM +0800, f...@ikuai8.com wrote: > From: Gao Feng > > When something failed in nf_tables_table_enable, it would unregister > the chains. But the rollback codes are same as nf_tables_table_disable > almostly, except there is one counter check. > Now create one wrapp

Re: [PATCH] netfilter: ipt_CLUSTERIP: fix build error without procfs

2017-01-18 Thread Pablo Neira Ayuso
On Fri, Jan 13, 2017 at 04:41:03PM +0100, Arnd Bergmann wrote: > We can't access c->pde if CONFIG_PROC_FS is disabled: > > net/ipv4/netfilter/ipt_CLUSTERIP.c: In function 'clusterip_config_find_get': > net/ipv4/netfilter/ipt_CLUSTERIP.c:147:9: error: 'struct clusterip_config' > has no member name

Re: [PATCH nf-next 2/2] netfilter: nft_meta: deal with PACKET_LOOPBACK in netdev family

2017-01-18 Thread Pablo Neira Ayuso
On Sat, Jan 07, 2017 at 09:33:55PM +0800, Liping Zhang wrote: > From: Liping Zhang > > After adding the following nft rule, then ping 224.0.0.1: > # nft add rule netdev t c pkttype host counter > > The warning complain message will be printed out again and again: > WARNING: CPU: 0 PID: 10182

Re: [PATCH nf-next 1/2] netfilter: pkttype: unnecessary to check ipv6 multicast address

2017-01-18 Thread Pablo Neira Ayuso
On Sat, Jan 07, 2017 at 09:33:54PM +0800, Liping Zhang wrote: > From: Liping Zhang > > Since there's no broadcast address in IPV6, so in ipv6 family, the > PACKET_LOOPBACK must be multicast packets, there's no need to check > it again. Applied, thanks Liping. -- To unsubscribe from this list: se

Re: [PATCH nf-next v2 4/4] netfilter: merge ctinfo into nfct pointer storage area

2017-01-18 Thread Pablo Neira Ayuso
Hi Florian, Sorry for taking a while to look into this. On Thu, Jan 05, 2017 at 12:26:49PM +0100, Florian Westphal wrote: > Merge conntrack related status bits into skb->_nfct. > After this change conntrack operations (lookup, creation, matching from > ruleset) only accesses one instead of two sk

Re: [RFC/PATCH 2/3] netfilter: ctnetlink: Fix regression in CTA_STATUS processing

2017-01-18 Thread Doug Anderson
Hi, On Mon, Jan 16, 2017 at 9:14 PM, Kevin Cernekee wrote: > The libnetfilter_conntrack userland library always sets IPS_CONFIRMED > when building a CTA_STATUS attribute. If this toggles the bit from > 0->1, Linux 4.4+ will reject it and this will cause any NFQA_EXP > attribute in the packet to

Re: [RFC/PATCH 3/3] netfilter: ctnetlink: Fix regression in CTA_HELP processing

2017-01-18 Thread Doug Anderson
Hi, On Mon, Jan 16, 2017 at 9:14 PM, Kevin Cernekee wrote: > If a user program specifies CTA_HELP but the argument matches the > current conntrack helper name, ignore it instead of generating an error. The "subject" of this patch says that it fixes a regression, but that regression isn't explain

Re: [RFC/PATCH 1/3] netfilter: ctnetlink: Fix regression in CTA_TIMEOUT processing

2017-01-18 Thread Doug Anderson
Hi, On Mon, Jan 16, 2017 at 9:14 PM, Kevin Cernekee wrote: > Commit b7bd1809e078 ("netfilter: nfnetlink_queue: get rid of > nfnetlink_queue_ct.c") introduced a new check on the return value > from the NFQA_CT parser (currently ctnetlink_glue_parse_ct()). > Prior to Linux 4.4, nfqnl_ct_parse() wou

Re: [PATCH nft 2/2] tests: py: Use stateless option on tests

2017-01-18 Thread Pablo Neira Ayuso
On Wed, Jan 18, 2017 at 07:02:53PM +0100, Pablo Neira Ayuso wrote: > On Tue, Jan 17, 2017 at 01:44:54PM -0200, Elise Lennion wrote: > > To don't trigger false errors because of unrelated traffic on the > > tested machine. > > > > Tests, which have rules with counter and 'ok' result, are updated to

Re: [PATCH nft 2/2] tests: py: Use stateless option on tests

2017-01-18 Thread Pablo Neira Ayuso
On Tue, Jan 17, 2017 at 01:44:54PM -0200, Elise Lennion wrote: > To don't trigger false errors because of unrelated traffic on the > tested machine. > > Tests, which have rules with counter and 'ok' result, are updated to > avoid new Warnings. Also applied, thanks. > diff --git a/tests/py/ip/flo

Re: [PATCH nft 1/2] doc: Include stateless option

2017-01-18 Thread Pablo Neira Ayuso
Applied, thanks. -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html

[PATCH nf-next 5/7] netfilter: nf_tables: rename struct nft_set_estimate class field

2017-01-18 Thread Pablo Neira Ayuso
Use lookup as field name instead, to prepare the introduction of the memory class in a follow up patch. Signed-off-by: Pablo Neira Ayuso --- include/net/netfilter/nf_tables.h | 4 ++-- net/netfilter/nf_tables_api.c | 12 ++-- net/netfilter/nft_set_hash.c | 2 +- net/netfilter/

[PATCH nf-next 7/7] netfilter: nf_tables: add bitmap set type

2017-01-18 Thread Pablo Neira Ayuso
This patch adds a new bitmap set type. This bitmap uses two bits to represent one element. These two bits determine the element state in the current and the future generation that fits into the nf_tables commit protocol. When dumping elements back to userspace, the two bits are expanded into a stru

[PATCH nf-next 0/7] nf_tables set enhancements

2017-01-18 Thread Pablo Neira Ayuso
Hi, The following patches contains enhancements for the set infrastructure: 1) Introduce memory scalability notation for sets, this is useful in case that userspace provides no explicit number of elements for this set and to break ties if the set selection routine finds two backends prov

[PATCH nf-next 2/7] netfilter: nf_tables: use struct nft_set_iter in set element flush

2017-01-18 Thread Pablo Neira Ayuso
Instead of struct nft_set_dump_args, remove unnecessary wrapper structure. Signed-off-by: Pablo Neira Ayuso --- net/netfilter/nf_tables_api.c | 12 +--- 1 file changed, 5 insertions(+), 7 deletions(-) diff --git a/net/netfilter/nf_tables_api.c b/net/netfilter/nf_tables_api.c index 6598a

[PATCH nf-next 3/7] netfilter: nf_tables: rename deactivate_one() to flush()

2017-01-18 Thread Pablo Neira Ayuso
Although semantics are similar to deactivate() with no implicit element lookup, this is only called from the set flush path, so better rename this to flush. Signed-off-by: Pablo Neira Ayuso --- include/net/netfilter/nf_tables.h | 8 net/netfilter/nf_tables_api.c | 2 +- net/netfilte

[PATCH nf-next 4/7] netfilter: nf_tables: add flush field to struct nft_set_iter

2017-01-18 Thread Pablo Neira Ayuso
This provides context to walk callback iterator, thus, we know if the walk happens from the set flush path. This is required by the new bitmap set type coming in a follow up patch which has no real struct nft_set_ext, so it has to allocate it based on the two bit compact element representation. Si

[PATCH nf-next 6/7] netfilter: nf_tables: add space notation to sets

2017-01-18 Thread Pablo Neira Ayuso
The space notation allows us to classify the set backend implementation based on the amount of required memory. This provides an order of the set representation scalability in terms of memory. The size field is still left in place so use this if the userspace provides no explicit number of elements

[PATCH nf-next 1/7] netfilter: nf_tables: pass netns to set->ops->remove()

2017-01-18 Thread Pablo Neira Ayuso
This is required by the new bitmap set type that comes in a follow up patch. Signed-off-by: Pablo Neira Ayuso --- include/net/netfilter/nf_tables.h | 3 ++- net/netfilter/nf_tables_api.c | 4 ++-- net/netfilter/nft_set_hash.c | 3 ++- net/netfilter/nft_set_rbtree.c| 3 ++- 4 files c

[PATCH nf] netfilter: nf_tables: fix set->nelem leak

2017-01-18 Thread Pablo Neira Ayuso
If no NLM_F_EXCL is specified and the element already exists, no error is reported to userspace. However, no new element is added so decrement set->nelem to restore it the early increment that nf_tables_newsetelem() performs. Fixes: c016c7e45ddf ("netfilter: nf_tables: honor NLM_F_EXCL flag in set

Re: [PATCH nf-next] netfilter: ctnetlink: make more information available in DESTROY events

2017-01-18 Thread Florian Westphal
Pablo Neira Ayuso wrote: > IIRC, the destroy message is rather small. Moreover, think of > thousands of messages in that queue, that makes a difference. And I > cannot think of anything useful people can do with window scale and > flags at that stage, right? I could not think of a reason why any

Re: [PATCH nf-next] netfilter: ctnetlink: make more information available in DESTROY events

2017-01-18 Thread Pablo Neira Ayuso
On Wed, Jan 18, 2017 at 04:07:45PM +0100, Florian Westphal wrote: > Pablo Neira Ayuso wrote: > > On Wed, Jan 18, 2017 at 03:54:32PM +0100, Florian Westphal wrote: > > > destroy events currently don't contain the tcp state info and no > > > secmark and conntrack labels. > > > > > > Quoting Victor:

Re: [PATCH nf-next] netfilter: ctnetlink: make more information available in DESTROY events

2017-01-18 Thread Florian Westphal
Pablo Neira Ayuso wrote: > On Wed, Jan 18, 2017 at 03:54:32PM +0100, Florian Westphal wrote: > > destroy events currently don't contain the tcp state info and no > > secmark and conntrack labels. > > > > Quoting Victor: > > "I was hoping to get the last TCP state in a conntrack destroy event, >

Re: AUDIT_NETFILTER_PKT message format

2017-01-18 Thread Richard Guy Briggs
On 2017-01-18 07:32, Paul Moore wrote: > On Wed, Jan 18, 2017 at 12:39 AM, Richard Guy Briggs wrote: > > On 2017-01-17 21:34, Richard Guy Briggs wrote: > >> On 2017-01-17 15:17, Paul Moore wrote: > >> > On Tue, Jan 17, 2017 at 11:12 AM, Richard Guy Briggs > >> > wrote: > >> > > On 2017-01-17 08:

Re: [PATCH nf-next] netfilter: ctnetlink: make more information available in DESTROY events

2017-01-18 Thread Pablo Neira Ayuso
On Wed, Jan 18, 2017 at 03:54:32PM +0100, Florian Westphal wrote: > destroy events currently don't contain the tcp state info and no > secmark and conntrack labels. > > Quoting Victor: > "I was hoping to get the last TCP state in a conntrack destroy event, > however it seems to be unavailable."

Re: AUDIT_NETFILTER_PKT message format

2017-01-18 Thread Steve Grubb
On Wednesday, January 18, 2017 7:32:40 AM EST Paul Moore wrote: > On Wed, Jan 18, 2017 at 12:39 AM, Richard Guy Briggs wrote: > > On 2017-01-17 21:34, Richard Guy Briggs wrote: > >> On 2017-01-17 15:17, Paul Moore wrote: > >> > On Tue, Jan 17, 2017 at 11:12 AM, Richard Guy Briggs wrote: > >> > >

[PATCH nf-next] netfilter: ctnetlink: make more information available in DESTROY events

2017-01-18 Thread Florian Westphal
destroy events currently don't contain the tcp state info and no secmark and conntrack labels. Quoting Victor: "I was hoping to get the last TCP state in a conntrack destroy event, however it seems to be unavailable." Quoting Jarno: "I have a use case where we want to log terminating connecti

Re: [PATCH nf v2] netfilter: conntrack: refine gc worker heuristics, redux

2017-01-18 Thread Nicolas Dichtel
Le 18/01/2017 à 02:01, Florian Westphal a écrit : > This further refines the changes made to conntrack gc_worker in > commit e0df8cae6c16 ("netfilter: conntrack: refine gc worker heuristics"). > > The main idea of that change was to reduce the scan interval when evictions > take place. > > Howeve

Re: [PATCH] iptables-save: Exit with error if unable to open proc file

2017-01-18 Thread thomas
On Wed, 18 Jan 2017 15:07:17 +0100, Florian Westphal said: > Still a linewrap here, rest was fine so I fixed this up and applied > the patch, thanks! Curious. My outgoing history claims it's a single line. I'll have to look into this. > I did not notce on 1st review but a 'Signed-off-by' line wo

Re: [PATCH] iptables-save: Exit with error if unable to open proc file

2017-01-18 Thread Florian Westphal
tho...@habets.se wrote: > diff --git a/iptables/ip6tables-save.c b/iptables/ip6tables-save.c > index f35e921..053413a 100644 > --- a/iptables/ip6tables-save.c > +++ b/iptables/ip6tables-save.c > @@ -35,10 +35,16 @@ static int for_each_table(int (*func)(const char > *tablename)) Still a linewrap h

Re: [PATCH] iptables-save: Exit with error if unable to open proc file

2017-01-18 Thread thomas
On Wed, 18 Jan 2017 14:32:30 +0100, Florian Westphal said: > static const char filename[] = Done. > iptables uses kernel coding style, so > > if (errno == ENOENT) > return ret; Gotcha. Making the code unambiguously worse, then. (cough, goto fail, cough) Done. > Looks like y

Re: [PATCH] iptables-save: Exit with error if unable to open proc file

2017-01-18 Thread Florian Westphal
Thomas Habets wrote: > I sent this before without being subscribed, but it doesn't seem to > have reached the archives so now retrying while subscribed. Weird, its an open list (no subscribe required). > If you're not root, then iptables-save silently fails (both to stderr > and exit code). This

[PATCH] iptables-save: Exit with error if unable to open proc file

2017-01-18 Thread Thomas Habets
I sent this before without being subscribed, but it doesn't seem to have reached the archives so now retrying while subscribed. If you're not root, then iptables-save silently fails (both to stderr and exit code). This patch fixes that. -- Author: Thomas Habets Date: Tue Jan 17 14:22:25 2017

Re: AUDIT_NETFILTER_PKT message format

2017-01-18 Thread Paul Moore
On Wed, Jan 18, 2017 at 12:39 AM, Richard Guy Briggs wrote: > On 2017-01-17 21:34, Richard Guy Briggs wrote: >> On 2017-01-17 15:17, Paul Moore wrote: >> > On Tue, Jan 17, 2017 at 11:12 AM, Richard Guy Briggs >> > wrote: >> > > On 2017-01-17 08:55, Steve Grubb wrote: >> > >> On Tuesday, January