1. 19 2月, 2009 1 次提交
  2. 08 10月, 2008 4 次提交
  3. 07 10月, 2008 1 次提交
  4. 22 7月, 2008 1 次提交
    • K
      netfilter: accounting rework: ct_extend + 64bit counters (v4) · 58401572
      Krzysztof Piotr Oledzki 提交于
      Initially netfilter has had 64bit counters for conntrack-based accounting, but
      it was changed in 2.6.14 to save memory. Unfortunately in-kernel 64bit counters are
      still required, for example for "connbytes" extension. However, 64bit counters
      waste a lot of memory and it was not possible to enable/disable it runtime.
      
      This patch:
       - reimplements accounting with respect to the extension infrastructure,
       - makes one global version of seq_print_acct() instead of two seq_print_counters(),
       - makes it possible to enable it at boot time (for CONFIG_SYSCTL/CONFIG_SYSFS=n),
       - makes it possible to enable/disable it at runtime by sysctl or sysfs,
       - extends counters from 32bit to 64bit,
       - renames ip_conntrack_counter -> nf_conn_counter,
       - enables accounting code unconditionally (no longer depends on CONFIG_NF_CT_ACCT),
       - set initial accounting enable state based on CONFIG_NF_CT_ACCT
       - removes buggy IPCT_COUNTER_FILLING event handling.
      
      If accounting is enabled newly created connections get additional acct extend.
      Old connections are not changed as it is not possible to add a ct_extend area
      to confirmed conntrack. Accounting is performed for all connections with
      acct extend regardless of a current state of "net.netfilter.nf_conntrack_acct".
      Signed-off-by: NKrzysztof Piotr Oledzki <ole@ans.pl>
      Signed-off-by: NPatrick McHardy <kaber@trash.net>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      58401572
  5. 14 4月, 2008 1 次提交
  6. 29 1月, 2008 6 次提交
  7. 07 11月, 2007 1 次提交
  8. 11 10月, 2007 1 次提交
  9. 15 7月, 2007 2 次提交
  10. 11 7月, 2007 3 次提交
  11. 09 2月, 2007 2 次提交
  12. 03 12月, 2006 14 次提交
  13. 23 9月, 2006 2 次提交
  14. 18 6月, 2006 1 次提交
    • J
      [SECMARK]: Add CONNSECMARK xtables target · 100468e9
      James Morris 提交于
      Add a new xtables target, CONNSECMARK, which is used to specify rules
      for copying security marks from packets to connections, and for
      copyying security marks back from connections to packets.  This is
      similar to the CONNMARK target, but is more limited in scope in that
      it only allows copying of security marks to and from packets, as this
      is all it needs to do.
      
      A typical scenario would be to apply a security mark to a 'new' packet
      with SECMARK, then copy that to its conntrack via CONNMARK, and then
      restore the security mark from the connection to established and
      related packets on that connection.
      Signed-off-by: NJames Morris <jmorris@namei.org>
      Signed-off-by: NAndrew Morton <akpm@osdl.org>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      100468e9