1. 13 8月, 2013 2 次提交
  2. 11 8月, 2013 1 次提交
  3. 09 8月, 2013 1 次提交
  4. 07 8月, 2013 1 次提交
  5. 06 8月, 2013 1 次提交
  6. 05 8月, 2013 2 次提交
  7. 01 8月, 2013 7 次提交
  8. 31 7月, 2013 5 次提交
  9. 28 7月, 2013 1 次提交
  10. 15 7月, 2013 2 次提交
  11. 01 7月, 2013 1 次提交
    • F
      netfilter: nf_queue: add NFQA_SKB_CSUM_NOTVERIFIED info flag · 496e4ae7
      Florian Westphal 提交于
      The common case is that TCP/IP checksums have already been
      verified, e.g. by hardware (rx checksum offload), or conntrack.
      
      Userspace can use this flag to determine when the checksum
      has not been validated yet.
      
      If the flag is set, this doesn't necessarily mean that the packet has
      an invalid checksum, e.g. if NIC doesn't support rx checksum.
      
      Userspace that sucessfully enabled NFQA_CFG_F_GSO queue feature flag can
      infer that IP/TCP checksum has already been validated if either the
      SKB_INFO attribute is not present or the NFQA_SKB_CSUM_NOTVERIFIED
      flag is unset.
      Signed-off-by: NFlorian Westphal <fw@strlen.de>
      Signed-off-by: NPablo Neira Ayuso <pablo@netfilter.org>
      496e4ae7
  12. 26 6月, 2013 6 次提交
  13. 24 6月, 2013 2 次提交
  14. 21 6月, 2013 1 次提交
    • E
      netfilter: xt_socket: add XT_SOCKET_NOWILDCARD flag · 681f130f
      Eric Dumazet 提交于
      xt_socket module can be a nice replacement to conntrack module
      in some cases (SYN filtering for example)
      
      But it lacks the ability to match the 3rd packet of TCP
      handshake (ACK coming from the client).
      
      Add a XT_SOCKET_NOWILDCARD flag to disable the wildcard mechanism.
      
      The wildcard is the legacy socket match behavior, that ignores
      LISTEN sockets bound to INADDR_ANY (or ipv6 equivalent)
      
      iptables -I INPUT -p tcp --syn -j SYN_CHAIN
      iptables -I INPUT -m socket --nowildcard -j ACCEPT
      Signed-off-by: NEric Dumazet <edumazet@google.com>
      Cc: Patrick McHardy <kaber@trash.net>
      Cc: Jesper Dangaard Brouer <brouer@redhat.com>
      Signed-off-by: NPablo Neira Ayuso <pablo@netfilter.org>
      681f130f
  15. 20 6月, 2013 2 次提交
    • F
      netfilter: nf_conntrack: avoid large timeout for mid-stream pickup · 6547a221
      Florian Westphal 提交于
      When loose tracking is enabled (default), non-syn packets cause
      creation of new conntracks in established state with default timeout for
      established state (5 days).  This causes the table to fill up with UNREPLIED
      when the 'new ack' packet happened to be the last-ack of a previous,
      already timed-out connection.
      
      Consider:
      
      A 192.168.x.52792 > 10.184.y.80: F, 426:426(0) ack 9237 win 255
      B 10.184.y.80 > 192.168.x.52792: ., ack 427 win 123
      <61 second pause>
      C 10.184.y.80 > 192.168.x.52792: F, 9237:9237(0) ack 427 win 123
      D 192.168.x.52792 > 10.184.y.80: ., ack 9238 win 255
      
      B moves conntrack to CLOSE_WAIT and will kill it after 60 second timeout,
      C is ignored (FIN set), but last packet (D) causes new ct with 5-days timeout.
      
      Use UNACK timeout (5 minutes) instead to get rid of these entries sooner
      when in ESTABLISHED state without having seen traffic in both directions.
      Signed-off-by: NFlorian Westphal <fw@strlen.de>
      Acked-by: NJozsef Kadlecsik <kadlec@blackhole.kfki.hu>
      Signed-off-by: NPablo Neira Ayuso <pablo@netfilter.org>
      6547a221
    • D
      netfilter: check return code from nla_parse_tested · 130ffbc2
      Daniel Borkmann 提交于
      These are the only calls under net/ that do not check nla_parse_nested()
      for its error code, but simply continue execution. If parsing of netlink
      attributes fails, we should return with an error instead of continuing.
      In nearly all of these calls we have a policy attached, that is being
      type verified during nla_parse_nested(), which we would miss checking
      for otherwise.
      Signed-off-by: NDaniel Borkmann <dborkman@redhat.com>
      Signed-off-by: NPablo Neira Ayuso <pablo@netfilter.org>
      130ffbc2
  16. 19 6月, 2013 1 次提交
  17. 13 6月, 2013 1 次提交
  18. 12 6月, 2013 2 次提交
  19. 11 6月, 2013 1 次提交
    • E
      net_sched: add 64bit rate estimators · 45203a3b
      Eric Dumazet 提交于
      struct gnet_stats_rate_est contains u32 fields, so the bytes per second
      field can wrap at 34360Mbit.
      
      Add a new gnet_stats_rate_est64 structure to get 64bit bps/pps fields,
      and switch the kernel to use this structure natively.
      
      This structure is dumped to user space as a new attribute :
      
      TCA_STATS_RATE_EST64
      
      Old tc command will now display the capped bps (to 34360Mbit), instead
      of wrapped values, and updated tc command will display correct
      information.
      
      Old tc command output, after patch :
      
      eric:~# tc -s -d qd sh dev lo
      qdisc pfifo 8001: root refcnt 2 limit 1000p
       Sent 80868245400 bytes 1978837 pkt (dropped 0, overlimits 0 requeues 0)
       rate 34360Mbit 189696pps backlog 0b 0p requeues 0
      
      This patch carefully reorganizes "struct Qdisc" layout to get optimal
      performance on SMP.
      Signed-off-by: NEric Dumazet <edumazet@google.com>
      Cc: Ben Hutchings <bhutchings@solarflare.com>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      45203a3b