• David S. Miller's avatar
    Merge git://git.kernel.org/pub/scm/linux/kernel/git/pablo/nf-next · 61b37d2f
    David S. Miller authored
    Pablo Neira Ayuso says:
    
    ====================
    Netfilter/IPVS updates for net-next
    
    The following patchset contains another batch with Netfilter/IPVS updates
    for net-next, they are:
    
    1) Add abstracted ICMP codes to the nf_tables reject expression. We
       introduce four reasons to reject using ICMP that overlap in IPv4
       and IPv6 from the semantic point of view. This should simplify the
       maintainance of dual stack rule-sets through the inet table.
    
    2) Move nf_send_reset() functions from header files to per-family
       nf_reject modules, suggested by Patrick McHardy.
    
    3) We have to use IS_ENABLED(CONFIG_BRIDGE_NETFILTER) everywhere in the
       code now that br_netfilter can be modularized. Convert remaining spots
       in the network stack code.
    
    4) Use rcu_barrier() in the nf_tables module removal path to ensure that
       we don't leave object that are still pending to be released via
       call_rcu (that may likely result in a crash).
    
    5) Remove incomplete arch 32/64 compat from nft_compat. The original (bad)
       idea was to probe the word size based on the xtables match/target info
       size, but this assumption is wrong when you have to dump the information
       back to userspace.
    
    6) Allow to filter from prerouting and postrouting in the nf_tables bridge.
       In order to emulate the ebtables NAT chains (which are actually simple
       filter chains with no special semantics), we have support filtering from
       this hooks too.
    
    7) Add explicit module dependency between xt_physdev and br_netfilter.
       This provides a way to detect if the user needs br_netfilter from
       the configuration path. This should reduce the breakage of the
       br_netfilter modularization.
    
    8) Cleanup coding style in ip_vs.h, from Simon Horman.
    
    9) Fix crash in the recently added nf_tables masq expression. We have
       to register/unregister the notifiers to clean up the conntrack table
       entries from the module init/exit path, not from the rule addition /
       deletion path. From Arturo Borrero.
    ====================
    Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
    61b37d2f
skbuff.c 104 KB