sst-linux/include/net/netfilter
Xin Long 3fa58a6fbd netfilter: allow exp not to be removed in nf_ct_find_expectation
commit 4914109a8e1e494c6aa9852f9e84ec77a5fc643f upstream.

Currently nf_conntrack_in() calling nf_ct_find_expectation() will
remove the exp from the hash table. However, in some scenario, we
expect the exp not to be removed when the created ct will not be
confirmed, like in OVS and TC conntrack in the following patches.

This patch allows exp not to be removed by setting IPS_CONFIRMED
in the status of the tmpl.

Signed-off-by: Xin Long <lucien.xin@gmail.com>
Acked-by: Aaron Conole <aconole@redhat.com>
Acked-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2025-03-07 16:56:41 +01:00
..
ipv4
ipv6
br_netfilter.h
nf_conntrack_acct.h
nf_conntrack_act_ct.h
nf_conntrack_bpf.h
nf_conntrack_bridge.h
nf_conntrack_core.h
nf_conntrack_count.h
nf_conntrack_ecache.h
nf_conntrack_expect.h netfilter: allow exp not to be removed in nf_ct_find_expectation 2025-03-07 16:56:41 +01:00
nf_conntrack_extend.h
nf_conntrack_helper.h
nf_conntrack_l4proto.h
nf_conntrack_labels.h
nf_conntrack_seqadj.h
nf_conntrack_synproxy.h
nf_conntrack_timeout.h
nf_conntrack_timestamp.h
nf_conntrack_tuple.h
nf_conntrack_zones.h
nf_conntrack.h
nf_dup_netdev.h
nf_flow_table.h
nf_hooks_lwtunnel.h
nf_log.h
nf_nat_helper.h
nf_nat_masquerade.h
nf_nat_redirect.h
nf_nat.h
nf_queue.h
nf_reject.h
nf_socket.h
nf_synproxy.h
nf_tables_core.h
nf_tables_ipv4.h netfilter: nf_tables: restore IP sanity checks for netdev/egress 2024-09-04 13:25:01 +02:00
nf_tables_ipv6.h netfilter: nf_tables_ipv6: consider network offset in netdev/egress validation 2024-09-04 13:25:01 +02:00
nf_tables_offload.h
nf_tables.h netfilter: nft_set_hash: unaligned atomic read on struct nft_set_ext 2025-01-09 13:30:01 +01:00
nf_tproxy.h
nft_fib.h
nft_meta.h
nft_reject.h
xt_rateest.h