On Tue, 11 Oct 2016, Liping Zhang wrote:
> Yes, thanks for clarifying this. There's a bug in kernel, can you try
> this patch:
>
> diff --git a/net/netfilter/xt_NFLOG.c b/net/netfilter/xt_NFLOG.c
> index 018eed7..8c069b4 100644
> --- a/net/netfilter/xt_NFLOG.c
> +++ b/net/netfilter/xt_NFLOG.c
> @@
On Mon, 10 Oct 2016, Liping Zhang wrote:
> 2016-10-10 15:02 GMT+08:00 Chris Caputo :
> > Program received signal SIGSEGV, Segmentation fault.
> > 0x765fd18a in _interp_iphdr (pi=0x617f50, len=0) at
> > ulogd_raw2packet_BASE.c:720
> >
> > 715
On Tue, 4 Oct 2016, Justin Piszcz wrote:
> kernel 4.8 with ulogd-2.0.5- IPs are no longer logged:
>
> Oct 4 17:51:30 atom INPUT_BLOCK IN=eth1 OUT=
> MAC=00:1b:21:9c:3b:fa:3e:94:d5:d2:49:1e:08:00 LEN=0 TOS=00 PREC=0x00
> TTL=0 ID=0 PROTO=0 MARK=0
> Oct 4 17:51:31 atom INPUT_BLOCK IN=eth1 OUT=
> M
flood.
Signed-off-by: Chris Caputo <[EMAIL PROTECTED]>
---
ping_common.c |8
1 file changed, 4 insertions(+), 4 deletions(-)
===
diff -ur iputils-s20071127/ping_common.c iputils/ping_common.c
--- iputils-s20
Unless a destination is specified by IP address, a ping flood results in a
gethostbyaddr() for every echo reply. Thus a DNS flood can accompany a
ping flood.
This patch makes it so a gethostbyaddr() is not performed with each echo
reply during a ping flood.
Signed-off-by: Chris Caputo
Environment is 2.6.16.9 with e1000 NICs.
Paul and I (as part of the Quagga project) are working on a user mode
method for doing BGP MD5 checksums using ip_queue. All is working except
when TSO is enabled I am seeing some problems.
It appears that when TSO is enabled, ip_queue can be used to ma