On Thu, Mar 26, 2015 at 08:14:46PM +0100, Daniel Borkmann wrote: > Hi Pablo, > > here's a possible fix for xt_cgroups that was previously reported > by Daniel Mack. > > I respinned the set based on your previous feedback wrt tw sockets. > > The first patch refactors common helpers, which is later on being > used by the actual fix. Please see individual patches for details. > > I have rebased it against nf-next as in the previous version. The existing cgroup support for nf_tables is quite broken (see patch attached), that needs some care too. Would you also help us to get that in good shape? It will be half way done after your patches. This makes me think that you can place something generic to fetch the sk_classid: static bool nf_sock_classid(u32 *sk_classid); this would go in net/ipv4/netfilter/nf_sock_ipv4.c. And also the ipv6 version: static bool nf_sock6_classid(u32 *sk_classid); so we can use the same function to fetch the sk_classid that can be shared by xt and nft. Please, give it another spin, you can probably come up with a better interface. BTW, we also have two more families: inet and bridge. Inet should be easy, it's basically a special family for dual-stack setups, 'inet' chain see both ipv4 and ipv6 traffic, you have to use pkt->ops->pf to pass this to right ipv4/ipv6 function. See net/netfilter/nft_reject.c, net/ipv{4,6}/nft_reject_ipv{4,6}.c and net/netfilter/nft_reject_inet.c for reference. Thanks. -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html