Hi, I hope I'm posting this question to the correct list. if not please let me know where I should be posting. I'm writing a kernel module (against 2.6.32) to add functionality to conntrack to maintain extra state information for certain tcp connections. the way I'm doing this is by unregistering the l4proto handler for tcp on module load and registering my own handler struct which is the same except for the new(), destroy(), packet() and print_conntrack() functions. my functions call the original tcp handler functions and then perform some of their own logic - they change the ct->mark to hold an id used to reference a table of "my" connection info (that holds my state and other data). I also have xtables matcher and target modules that reference this conntrack info and do some logic accordingly. therefore I'd like to protect my data and the nf_conn data while in my handler functions. this raises a few questions: 1. I see that xtables modules (such as xt_CONNMARK and xt_state) do not take the ct->lock. what protects the ct entry in this case? 2. since I cant take the ct->lock in my functions (because they call the tcp functions who take the lock) its not clear to me how to protect my data. in general, is my approach the correct one? thanks in advance, Gidon Miller -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html