···866866extern int xfrm_init_state(struct xfrm_state *x);867867extern int xfrm4_rcv(struct sk_buff *skb);868868extern int xfrm4_output(struct sk_buff *skb);869869-extern int xfrm4_output_finish(struct sk_buff *skb);870869extern int xfrm4_tunnel_register(struct xfrm_tunnel *handler);871870extern int xfrm4_tunnel_deregister(struct xfrm_tunnel *handler);872871extern int xfrm6_rcv_spi(struct sk_buff **pskb, u32 spi);
···126126 tristate '"CONNMARK" target support'127127 depends on NETFILTER_XTABLES128128 depends on IP_NF_MANGLE || IP6_NF_MANGLE129129- depends on (IP_NF_CONNTRACK && IP_NF_CONNTRACK_MARK) || (NF_CONNTRACK_MARK && NF_CONNTRACK_IPV4)129129+ depends on (IP_NF_CONNTRACK && IP_NF_CONNTRACK_MARK) || (NF_CONNTRACK_MARK && NF_CONNTRACK)130130 help131131 This option adds a `CONNMARK' target, which allows one to manipulate132132 the connection mark value. Similar to the MARK target, but···187187config NETFILTER_XT_MATCH_CONNBYTES188188 tristate '"connbytes" per-connection counter match support'189189 depends on NETFILTER_XTABLES190190- depends on (IP_NF_CONNTRACK && IP_NF_CT_ACCT) || NF_CT_ACCT190190+ depends on (IP_NF_CONNTRACK && IP_NF_CT_ACCT) || (NF_CT_ACCT && NF_CONNTRACK)191191 help192192 This option adds a `connbytes' match, which allows you to match the193193 number of bytes and/or packets for each direction within a connection.···198198config NETFILTER_XT_MATCH_CONNMARK199199 tristate '"connmark" connection mark match support'200200 depends on NETFILTER_XTABLES201201- depends on (IP_NF_CONNTRACK && IP_NF_CONNTRACK_MARK) || NF_CONNTRACK_MARK201201+ depends on (IP_NF_CONNTRACK && IP_NF_CONNTRACK_MARK) || (NF_CONNTRACK_MARK && NF_CONNTRACK)202202 help203203 This option adds a `connmark' match, which allows you to match the204204 connection mark value previously set for the session by `CONNMARK'.
+5
net/netfilter/nf_conntrack_core.c
···15561556{15571557 int i;1558155815591559+ ip_ct_attach = NULL;15601560+15591561 /* This makes sure all current packets have passed through15601562 netfilter framework. Roll on, two-stage module15611563 delete... */···17161714 for (i = 0; i < PF_MAX; i++)17171715 nf_ct_l3protos[i] = &nf_conntrack_generic_l3proto;17181716 write_unlock_bh(&nf_conntrack_lock);17171717+17181718+ /* For use by REJECT target */17191719+ ip_ct_attach = __nf_conntrack_attach;1719172017201721 /* Set up fake conntrack:17211722 - to never be deleted, not in any hashes */