Dear Netfilter developers, We're working on releasing a GPL version of our modular proxy software again, this time complete with our custom iptables target and matcher modules that implement much of our policy evaluation in iptables. (Think something like being able to define sets of rules that are evaluated using a best-match algorithm instead of linear evaluation like iptables does.) The kernel space is obviously under GPL, and we'd be very glad to make it as easy to install as possible -- having to apply kernel patches and recompile your distro kernel is out of question for most of the potential users. Unfortunately upstream submission is not really an option, since the module itself is very much tied to the userspace and there's really no point in having it in the kernel unless you want to use Zorp. (I thought a lot about potential use cases without the userspace proxy, but really couldn't come up with anything meaningful.) There are two things remaining that prevent us doing simple out-of-tree kernel module builds: 1. We use nfnetlink for the userspace->kernelspace communication. This works beautifully, however, since NFNL_SUBSYS_COUNT is a compile-time constant there's no way of registering a subsystem with an ID not known at compile time. 2. Pretty much the same happens with conntrack extensions: we use a conntrack extension to store cached results of policy evaluation. Unfortunatly here we have an NF_CT_EXT_NUM sized static array storing the registered conntrack extensions. My question is whether or not removing those limitations and allowing runtime registration of both nfnetlink subsystems and conntrack extensions would be acceptable upstream? That way out-of-tree modules could possibly use those features without having to resort to patching and recompiling the kernel. TiA, -- KOVACS Krisztian -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html