Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/809797/?format=api
{ "id": 809797, "url": "http://patchwork.ozlabs.org/api/patches/809797/?format=api", "web_url": "http://patchwork.ozlabs.org/project/netdev/patch/1504555874-4168-1-git-send-email-pablo@netfilter.org/", "project": { "id": 7, "url": "http://patchwork.ozlabs.org/api/projects/7/?format=api", "name": "Linux network development", "link_name": "netdev", "list_id": "netdev.vger.kernel.org", "list_email": "netdev@vger.kernel.org", "web_url": null, "scm_url": null, "webscm_url": null, "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<1504555874-4168-1-git-send-email-pablo@netfilter.org>", "list_archive_url": null, "date": "2017-09-04T20:11:02", "name": "[00/12] Netfilter updates for next-net (part 2)", "commit_ref": null, "pull_url": "git://git.kernel.org/pub/scm/linux/kernel/git/pablo/nf-next.git HEAD", "state": "accepted", "archived": true, "hash": null, "submitter": { "id": 1315, "url": "http://patchwork.ozlabs.org/api/people/1315/?format=api", "name": "Pablo Neira Ayuso", "email": "pablo@netfilter.org" }, "delegate": { "id": 34, "url": "http://patchwork.ozlabs.org/api/users/34/?format=api", "username": "davem", "first_name": "David", "last_name": "Miller", "email": "davem@davemloft.net" }, "mbox": "http://patchwork.ozlabs.org/project/netdev/patch/1504555874-4168-1-git-send-email-pablo@netfilter.org/mbox/", "series": [], "comments": "http://patchwork.ozlabs.org/api/patches/809797/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/809797/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<netdev-owner@vger.kernel.org>", "X-Original-To": "patchwork-incoming@ozlabs.org", "Delivered-To": "patchwork-incoming@ozlabs.org", "Authentication-Results": "ozlabs.org;\n\tspf=none (mailfrom) smtp.mailfrom=vger.kernel.org\n\t(client-ip=209.132.180.67; helo=vger.kernel.org;\n\tenvelope-from=netdev-owner@vger.kernel.org;\n\treceiver=<UNKNOWN>)", "Received": [ "from vger.kernel.org (vger.kernel.org [209.132.180.67])\n\tby ozlabs.org (Postfix) with ESMTP id 3xmLb44mPbz9t2R\n\tfor <patchwork-incoming@ozlabs.org>;\n\tTue, 5 Sep 2017 06:11:28 +1000 (AEST)", "(majordomo@vger.kernel.org) by vger.kernel.org via listexpand\n\tid S1754654AbdIDUL0 (ORCPT <rfc822;patchwork-incoming@ozlabs.org>);\n\tMon, 4 Sep 2017 16:11:26 -0400", "from mail.us.es ([193.147.175.20]:42118 \"EHLO mail.us.es\"\n\trhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP\n\tid S1754005AbdIDULX (ORCPT <rfc822;netdev@vger.kernel.org>);\n\tMon, 4 Sep 2017 16:11:23 -0400", "from antivirus1-rhel7.int (unknown [192.168.2.11])\n\tby mail.us.es (Postfix) with ESMTP id 105E3532F88\n\tfor <netdev@vger.kernel.org>; Mon, 4 Sep 2017 22:10:55 +0200 (CEST)", "from antivirus1-rhel7.int (localhost [127.0.0.1])\n\tby antivirus1-rhel7.int (Postfix) with ESMTP id 02B78B502E\n\tfor <netdev@vger.kernel.org>; Mon, 4 Sep 2017 22:10:55 +0200 (CEST)", "by antivirus1-rhel7.int (Postfix, from userid 99)\n\tid EC792B502A; Mon, 4 Sep 2017 22:10:54 +0200 (CEST)", "from antivirus1-rhel7.int (localhost [127.0.0.1])\n\tby antivirus1-rhel7.int (Postfix) with ESMTP id B91B9DA2AF;\n\tMon, 4 Sep 2017 22:10:52 +0200 (CEST)", "from 192.168.1.97 (192.168.1.97) by antivirus1-rhel7.int\n\t(F-Secure/fsigk_smtp/550/antivirus1-rhel7.int); \n\tMon, 04 Sep 2017 22:10:52 +0200 (CEST)", "from salvia.here (129.166.216.87.static.jazztel.es\n\t[87.216.166.129]) (Authenticated sender: pneira@us.es)\n\tby entrada.int (Postfix) with ESMTPA id 6883E4265A22;\n\tMon, 4 Sep 2017 22:10:52 +0200 (CEST)" ], "X-Spam-Checker-Version": "SpamAssassin 3.4.1 (2015-04-28) on\n\tantivirus1-rhel7.int", "X-Spam-Level": "", "X-Spam-Status": "No, score=-108.2 required=7.5 tests=ALL_TRUSTED,BAYES_50,\n\tSMTPAUTH_US2,USER_IN_WHITELIST autolearn=disabled version=3.4.1", "X-Virus-Status": "clean(F-Secure/fsigk_smtp/550/antivirus1-rhel7.int)", "X-SMTPAUTHUS": "auth mail.us.es", "From": "Pablo Neira Ayuso <pablo@netfilter.org>", "To": "netfilter-devel@vger.kernel.org", "Cc": "davem@davemloft.net, netdev@vger.kernel.org", "Subject": "[PATCH 00/12] Netfilter updates for next-net (part 2)", "Date": "Mon, 4 Sep 2017 22:11:02 +0200", "Message-Id": "<1504555874-4168-1-git-send-email-pablo@netfilter.org>", "X-Mailer": "git-send-email 2.1.4", "X-Virus-Scanned": "ClamAV using ClamSMTP", "Sender": "netdev-owner@vger.kernel.org", "Precedence": "bulk", "List-ID": "<netdev.vger.kernel.org>", "X-Mailing-List": "netdev@vger.kernel.org" }, "content": "Hi David,\n\nThe following patchset contains Netfilter updates for net-next. This\npatchset includes updates for nf_tables, removal of\nCONFIG_NETFILTER_DEBUG and a new mode for xt_hashlimit. More\nspecifically, they:\n\n1) Add new rate match mode for hashlimit, this introduces a new revision\n for this match. The idea is to stop matching packets until ratelimit\n criteria stands true. Patch from Vishwanath Pai.\n\n2) Add ->select_ops indirection to nf_tables named objects, so we can\n choose between different flavours of the same object type, patch from\n Pablo M. Bermudo.\n\n3) Shorter function names in nft_limit, basically:\n s/nft_limit_pkt_bytes/nft_limit_bytes, also from Pablo M. Bermudo.\n\n4) Add new stateful limit named object type, this allows us to create\n limit policies that you can identify via name, also from Pablo.\n\n5) Remove unused hooknum parameter in conntrack ->packet indirection.\n From Florian Westphal.\n\n6) Patches to remove CONFIG_NETFILTER_DEBUG and macros such as\n IP_NF_ASSERT and IP_NF_ASSERT. From Varsha Rao.\n\n7) Add nf_tables_updchain() helper function and use it from\n nf_tables_newchain() to make it more maintainable. Similarly,\n add nf_tables_addchain() and use it too.\n\n8) Add new netlink NLM_F_NONREC flag, this flag should only be used for\n deletion requests, specifically, to support non-recursive deletion.\n Based on what we discussed during NFWS'17 in Faro.\n\n9) Use NLM_F_NONREC from table and sets in nf_tables.\n\n10) Support for recursive chain deletion. Table and set deletion\n commands come with an implicit content flush on deletion, while\n chains do not. This patch addresses this inconsistency by adding\n the code to perform recursive chain deletions. This also comes with\n the bits to deal with the new NLM_F_NONREC netlink flag.\n\nYou can pull these changes from:\n\n git://git.kernel.org/pub/scm/linux/kernel/git/pablo/nf-next.git\n\nThanks a lot!\n\n----------------------------------------------------------------\n\nThe following changes since commit 3cf2e08f5ace79d57c8edba06deb59b25bd1dd33:\n\n Merge branch 'nfp-refactor-app-init-and-minor-flower-fixes' (2017-09-03 21:22:05 -0700)\n\nare available in the git repository at:\n\n git://git.kernel.org/pub/scm/linux/kernel/git/pablo/nf-next.git HEAD\n\nfor you to fetch changes up to 9dee1474121550b20542321f9e0579801c6b587c:\n\n netfilter: nf_tables: support for recursive chain deletion (2017-09-04 17:34:55 +0200)\n\n----------------------------------------------------------------\nFlorian Westphal (1):\n netfilter: remove unused hooknum arg from packet functions\n\nPablo M. Bermudo Garay (3):\n netfilter: nf_tables: add select_ops for stateful objects\n netfilter: nft_limit: replace pkt_bytes with bytes\n netfilter: nft_limit: add stateful object type\n\nPablo Neira Ayuso (5):\n netfilter: nf_tables: add nf_tables_updchain()\n netfilter: nf_tables: add nf_tables_addchain()\n netlink: add NLM_F_NONREC flag for deletion requests\n netfilter: nf_tables: use NLM_F_NONREC for deletion requests\n netfilter: nf_tables: support for recursive chain deletion\n\nVarsha Rao (2):\n net: Replace NF_CT_ASSERT() with WARN_ON().\n net: Remove CONFIG_NETFILTER_DEBUG and _ASSERT() macros.\n\nVishwanath Pai (1):\n netfilter: xt_hashlimit: add rate match mode\n\n arch/parisc/configs/c3000_defconfig | 1 -\n arch/sh/configs/se7751_defconfig | 1 -\n include/linux/netfilter/xt_hashlimit.h | 3 +-\n include/net/netfilter/nf_conntrack.h | 8 +-\n include/net/netfilter/nf_conntrack_l4proto.h | 1 -\n include/net/netfilter/nf_tables.h | 35 ++-\n include/uapi/linux/netfilter/nf_tables.h | 3 +-\n include/uapi/linux/netfilter/xt_hashlimit.h | 36 ++-\n include/uapi/linux/netlink.h | 3 +\n net/Kconfig | 7 -\n net/bridge/netfilter/ebtables.c | 20 +-\n net/ipv4/netfilter/ip_tables.c | 12 +-\n net/ipv4/netfilter/nf_conntrack_proto_icmp.c | 3 +-\n net/ipv4/netfilter/nf_nat_l3proto_ipv4.c | 6 +-\n net/ipv4/netfilter/nf_nat_masquerade_ipv4.c | 8 +-\n net/ipv6/netfilter/ip6_tables.c | 12 +-\n net/ipv6/netfilter/nf_conntrack_proto_icmpv6.c | 8 +-\n net/ipv6/netfilter/nf_nat_l3proto_ipv6.c | 6 +-\n net/ipv6/netfilter/nf_nat_masquerade_ipv6.c | 4 +-\n net/netfilter/nf_conntrack_core.c | 13 +-\n net/netfilter/nf_conntrack_expect.c | 4 +-\n net/netfilter/nf_conntrack_extend.c | 2 +-\n net/netfilter/nf_conntrack_proto_dccp.c | 2 +-\n net/netfilter/nf_conntrack_proto_generic.c | 1 -\n net/netfilter/nf_conntrack_proto_gre.c | 1 -\n net/netfilter/nf_conntrack_proto_sctp.c | 1 -\n net/netfilter/nf_conntrack_proto_tcp.c | 1 -\n net/netfilter/nf_conntrack_proto_udp.c | 1 -\n net/netfilter/nf_conntrack_standalone.c | 6 +-\n net/netfilter/nf_nat_core.c | 4 +-\n net/netfilter/nf_nat_redirect.c | 6 +-\n net/netfilter/nf_tables_api.c | 403 ++++++++++++++-----------\n net/netfilter/nft_counter.c | 20 +-\n net/netfilter/nft_ct.c | 18 +-\n net/netfilter/nft_limit.c | 148 ++++++++-\n net/netfilter/nft_objref.c | 7 +-\n net/netfilter/nft_quota.c | 20 +-\n net/netfilter/xt_NETMAP.c | 8 +-\n net/netfilter/xt_hashlimit.c | 277 +++++++++++++++--\n net/netfilter/xt_nat.c | 20 +-\n 40 files changed, 788 insertions(+), 352 deletions(-)", "diff": null, "prefixes": [ "00/12" ] }