summaryrefslogtreecommitdiffstats
path: root/net/netfilter/nf_conntrack_core.c
diff options
context:
space:
mode:
authorJarno Rajahalme2016-03-10 19:54:20 +0100
committerPablo Neira Ayuso2016-03-14 23:47:28 +0100
commit289f225349cb2a97448fd14599ab34b741f706f3 (patch)
tree7b1f0a85832935af7e98cdac7227632be2a67729 /net/netfilter/nf_conntrack_core.c
parentopenvswitch: Update the CT state key only after nf_conntrack_in(). (diff)
downloadkernel-qcow2-linux-289f225349cb2a97448fd14599ab34b741f706f3.tar.gz
kernel-qcow2-linux-289f225349cb2a97448fd14599ab34b741f706f3.tar.xz
kernel-qcow2-linux-289f225349cb2a97448fd14599ab34b741f706f3.zip
openvswitch: Find existing conntrack entry after upcall.
Add a new function ovs_ct_find_existing() to find an existing conntrack entry for which this packet was already applied to. This is only to be called when there is evidence that the packet was already tracked and committed, but we lost the ct reference due to an userspace upcall. ovs_ct_find_existing() is called from skb_nfct_cached(), which can now hide the fact that the ct reference may have been lost due to an upcall. This allows ovs_ct_commit() to be simplified. This patch is needed by later "openvswitch: Interface with NAT" patch, as we need to be able to pass the packet through NAT using the original ct reference also after the reference is lost after an upcall. Signed-off-by: Jarno Rajahalme <jarno@ovn.org> Acked-by: Joe Stringer <joe@ovn.org> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Diffstat (limited to 'net/netfilter/nf_conntrack_core.c')
0 files changed, 0 insertions, 0 deletions