summaryrefslogtreecommitdiff
path: root/net/netfilter/nft_limit.c
diff options
context:
space:
mode:
authorFlorian Westphal <fw@strlen.de>2023-06-06 22:59:30 +0200
committerPablo Neira Ayuso <pablo@netfilter.org>2023-06-26 08:05:57 +0200
commit4589725502871e77d06464f731f92fd9173e2be6 (patch)
tree42c398c71f40803b81430cb7d490f1e1a88b1771 /net/netfilter/nft_limit.c
parent96b2ef9b16cb302d0b47c5670d30a05963e0e1e3 (diff)
netfilter: snat: evict closing tcp entries on reply tuple collision
When all tried source tuples are in use, the connection request (skb) and the new conntrack will be dropped in nf_confirm() due to the non-recoverable clash. Make it so that the last 32 attempts are allowed to evict a colliding entry if this connection is already closing and the new sequence number has advanced past the old one. Such "all tuples taken" secenario can happen with tcp-rpc workloads where same dst:dport gets queried repeatedly. Signed-off-by: Florian Westphal <fw@strlen.de> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Diffstat (limited to 'net/netfilter/nft_limit.c')
0 files changed, 0 insertions, 0 deletions