<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/include/net/netfilter, branch v2.6.30</title>
<subtitle>Mirror of https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/
</subtitle>
<id>https://git.shady.money/linux/atom?h=v2.6.30</id>
<link rel='self' href='https://git.shady.money/linux/atom?h=v2.6.30'/>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/'/>
<updated>2009-04-16T16:33:01Z</updated>
<entry>
<title>netfilter: nf_nat: add support for persistent mappings</title>
<updated>2009-04-16T16:33:01Z</updated>
<author>
<name>Patrick McHardy</name>
<email>kaber@trash.net</email>
</author>
<published>2009-04-16T16:33:01Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=98d500d66cb7940747b424b245fc6a51ecfbf005'/>
<id>urn:sha1:98d500d66cb7940747b424b245fc6a51ecfbf005</id>
<content type='text'>
The removal of the SAME target accidentally removed one feature that is
not available from the normal NAT targets so far, having multi-range
mappings that use the same mapping for each connection from a single
client. The current behaviour is to choose the address from the range
based on source and destination IP, which breaks when communicating
with sites having multiple addresses that require all connections to
originate from the same IP address.

Introduce a IP_NAT_RANGE_PERSISTENT option that controls whether the
destination address is taken into account for selecting addresses.

http://bugzilla.kernel.org/show_bug.cgi?id=12954

Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
</content>
</entry>
<entry>
<title>netfilter: ctnetlink: fix regression in expectation handling</title>
<updated>2009-04-06T15:47:20Z</updated>
<author>
<name>Pablo Neira Ayuso</name>
<email>pablo@netfilter.org</email>
</author>
<published>2009-04-06T15:47:20Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=83731671d9e6878c0a05d309c68fb71c16d3235a'/>
<id>urn:sha1:83731671d9e6878c0a05d309c68fb71c16d3235a</id>
<content type='text'>
This patch fixes a regression (introduced by myself in commit 19abb7b:
netfilter: ctnetlink: deliver events for conntracks changed from
userspace) that results in an expectation re-insertion since
__nf_ct_expect_check() may return 0 for expectation timer refreshing.

This patch also removes a unnecessary refcount bump that
pretended to avoid a possible race condition with event delivery
and expectation timers (as said, not needed since we hold a
reference to the object since until we finish the expectation
setup). This also merges nf_ct_expect_related_report() and
nf_ct_expect_related() which look basically the same.

Reported-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: Pablo Neira Ayuso &lt;pablo@netfilter.org&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
</content>
</entry>
<entry>
<title>Merge branch 'master' of git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-next-2.6</title>
<updated>2009-03-27T05:45:23Z</updated>
<author>
<name>David S. Miller</name>
<email>davem@davemloft.net</email>
</author>
<published>2009-03-27T05:45:23Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=01e6de64d9c8d0e75dca3bb4cf898db73abe00d4'/>
<id>urn:sha1:01e6de64d9c8d0e75dca3bb4cf898db73abe00d4</id>
<content type='text'>
</content>
</entry>
<entry>
<title>netfilter: nf_conntrack: add generic function to get len of generic policy</title>
<updated>2009-03-25T20:52:17Z</updated>
<author>
<name>Holger Eitzenberger</name>
<email>holger@eitzenberger.org</email>
</author>
<published>2009-03-25T20:52:17Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=5c0de29d06318ec8f6e3ba0d17d62529dbbdc1e8'/>
<id>urn:sha1:5c0de29d06318ec8f6e3ba0d17d62529dbbdc1e8</id>
<content type='text'>
Usefull for all protocols which do not add additional data, such
as GRE or UDPlite.

Signed-off-by: Holger Eitzenberger &lt;holger@eitzenberger.org&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
</content>
</entry>
<entry>
<title>netfilter: nf_conntrack: use SLAB_DESTROY_BY_RCU and get rid of call_rcu()</title>
<updated>2009-03-25T20:05:46Z</updated>
<author>
<name>Eric Dumazet</name>
<email>dada1@cosmosbay.com</email>
</author>
<published>2009-03-25T20:05:46Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=ea781f197d6a835cbb93a0bf88ee1696296ed8aa'/>
<id>urn:sha1:ea781f197d6a835cbb93a0bf88ee1696296ed8aa</id>
<content type='text'>
Use "hlist_nulls" infrastructure we added in 2.6.29 for RCUification of UDP &amp; TCP.

This permits an easy conversion from call_rcu() based hash lists to a
SLAB_DESTROY_BY_RCU one.

Avoiding call_rcu() delay at nf_conn freeing time has numerous gains.

First, it doesnt fill RCU queues (up to 10000 elements per cpu).
This reduces OOM possibility, if queued elements are not taken into account
This reduces latency problems when RCU queue size hits hilimit and triggers
emergency mode.

- It allows fast reuse of just freed elements, permitting better use of
CPU cache.

- We delete rcu_head from "struct nf_conn", shrinking size of this structure
by 8 or 16 bytes.

This patch only takes care of "struct nf_conn".
call_rcu() is still used for less critical conntrack parts, that may
be converted later if necessary.

Signed-off-by: Eric Dumazet &lt;dada1@cosmosbay.com&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
</content>
</entry>
<entry>
<title>netfilter: limit the length of the helper name</title>
<updated>2009-03-25T17:44:01Z</updated>
<author>
<name>Holger Eitzenberger</name>
<email>holger@eitzenberger.org</email>
</author>
<published>2009-03-25T17:44:01Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=af9d32ad6718b9a80fa89f557cc1fbb63a93ec15'/>
<id>urn:sha1:af9d32ad6718b9a80fa89f557cc1fbb63a93ec15</id>
<content type='text'>
This is necessary in order to have an upper bound for Netlink
message calculation, which is not a problem at all, as there
are no helpers with a longer name.

Signed-off-by: Holger Eitzenberger &lt;holger@eitzenberger.org&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
</content>
</entry>
<entry>
<title>netfilter: ctnetlink: add callbacks to the per-proto nlattrs</title>
<updated>2009-03-25T17:24:48Z</updated>
<author>
<name>Holger Eitzenberger</name>
<email>holger@eitzenberger.org</email>
</author>
<published>2009-03-25T17:24:48Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=d0dba7255b541f1651a88e75ebdb20dd45509c2f'/>
<id>urn:sha1:d0dba7255b541f1651a88e75ebdb20dd45509c2f</id>
<content type='text'>
There is added a single callback for the l3 proto helper.  The two
callbacks for the l4 protos are necessary because of the general
structure of a ctnetlink event, which is in short:

 CTA_TUPLE_ORIG
   &lt;l3/l4-proto-attributes&gt;
 CTA_TUPLE_REPLY
   &lt;l3/l4-proto-attributes&gt;
 CTA_ID
 ...
 CTA_PROTOINFO
   &lt;l4-proto-attributes&gt;
 CTA_TUPLE_MASTER
   &lt;l3/l4-proto-attributes&gt;

Therefore the formular is

 size := sizeof(generic-nlas) + 3 * sizeof(tuple_nlas) + sizeof(protoinfo_nlas)

Some of the NLAs are optional, e. g. CTA_TUPLE_MASTER, which is only
set if it's an expected connection.  But the number of optional NLAs is
small enough to prevent netlink_trim() from reallocating if calculated
properly.

Signed-off-by: Holger Eitzenberger &lt;holger@eitzenberger.org&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
</content>
</entry>
<entry>
<title>Merge branch 'master' of git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-next-2.6</title>
<updated>2009-03-24T20:24:36Z</updated>
<author>
<name>David S. Miller</name>
<email>davem@davemloft.net</email>
</author>
<published>2009-03-24T20:24:36Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=b5bb14386eabcb4229ade2bc0a2b237ca166d37d'/>
<id>urn:sha1:b5bb14386eabcb4229ade2bc0a2b237ca166d37d</id>
<content type='text'>
</content>
</entry>
<entry>
<title>netfilter: remove nf_ct_l4proto_find_get/nf_ct_l4proto_put</title>
<updated>2009-03-18T16:30:50Z</updated>
<author>
<name>Florian Westphal</name>
<email>fw@strlen.de</email>
</author>
<published>2009-03-18T16:30:50Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=711d60a9e7f88e394ccca10f5fc83f95f0cea5b1'/>
<id>urn:sha1:711d60a9e7f88e394ccca10f5fc83f95f0cea5b1</id>
<content type='text'>
users have been moved to __nf_ct_l4proto_find.

Signed-off-by: Florian Westphal &lt;fw@strlen.de&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
</content>
</entry>
<entry>
<title>netfilter: remove IPvX specific parts from nf_conntrack_l4proto.h</title>
<updated>2009-03-16T14:15:35Z</updated>
<author>
<name>Christoph Paasch</name>
<email>christoph.paasch@gmail.com</email>
</author>
<published>2009-03-16T14:15:35Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=9d2493f88f846b391a15a736efc7f4b97d6c4046'/>
<id>urn:sha1:9d2493f88f846b391a15a736efc7f4b97d6c4046</id>
<content type='text'>
Moving the structure definitions to the corresponding IPvX specific header files.

Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
</content>
</entry>
</feed>
