diff options
author | David S. Miller <davem@davemloft.net> | 2015-08-20 22:18:45 -0700 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2015-08-20 22:18:45 -0700 |
commit | a9e01ed986aa80d3092134428f453072752da223 (patch) | |
tree | 2e2f68d8cb3d731db69d3c296f18dae88c983be8 /tools | |
parent | 08617f47eaf8c70b4c236dee2014c6141aa282bf (diff) | |
parent | 81bf1c64e7fe08f956c74fe2b0f1fa6eb163bd91 (diff) | |
download | linux-a9e01ed986aa80d3092134428f453072752da223.tar.gz linux-a9e01ed986aa80d3092134428f453072752da223.tar.bz2 linux-a9e01ed986aa80d3092134428f453072752da223.zip |
Merge git://git.kernel.org/pub/scm/linux/kernel/git/pablo/nf-next
Pablo Neira Ayuso says:
====================
Netfilter updates for net-next
This is second pull request includes the conflict resolution patch that
resulted from the updates that we got for the conntrack template through
kmalloc. No changes with regards to the previously sent 15 patches.
The following patchset contains Netfilter updates for your net-next tree, they
are:
1) Rework the existing nf_tables counter expression to make it per-cpu.
2) Prepare and factor out common packet duplication code from the TEE target so
it can be reused from the new dup expression.
3) Add the new dup expression for the nf_tables IPv4 and IPv6 families.
4) Convert the nf_tables limit expression to use a token-based approach with
64-bits precision.
5) Enhance the nf_tables limit expression to support limiting at packet byte.
This comes after several preparation patches.
6) Add a burst parameter to indicate the amount of packets or bytes that can
exceed the limiting.
7) Add netns support to nfacct, from Andreas Schultz.
8) Pass the nf_conn_zone structure instead of the zone ID in nf_tables to allow
accessing more zone specific information, from Daniel Borkmann.
9) Allow to define zone per-direction to support netns containers with
overlapping network addressing, also from Daniel.
10) Extend the CT target to allow setting the zone based on the skb->mark as a
way to support simple mappings from iptables, also from Daniel.
11) Make the nf_tables payload expression aware of the fact that VLAN offload
may have removed a vlan header, from Florian Westphal.
====================
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'tools')
0 files changed, 0 insertions, 0 deletions