[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20110930125956.GD13047@Chamillionaire.breakpoint.cc>
Date: Fri, 30 Sep 2011 14:59:56 +0200
From: Florian Westphal <fw@...len.de>
To: Denys Fedoryshchenko <denys@...p.net.lb>
Cc: netdev@...r.kernel.org, netfilter-devel@...r.kernel.org
Subject: Re: conntrack events over netlink flood
Denys Fedoryshchenko <denys@...p.net.lb> wrote:
[ cc: netfilter-devel ]
> After enabling events and running conntrack -E i notice flood in output
> of server that have PPPoE and PPTP connections. Here is the output:
>
> OfficeNAT ~ # conntrack -E
> [UPDATE] gre 47 17999 src=192.168.0.140 dst=192.168.0.1
> srckey=0x0 dstkey=0x3 src=192.168.0.1 dst=192.168.0.140 srckey=0x3
> dstkey=0x0 [ASSURED]
> [UPDATE] gre 47 17999 src=192.168.0.140 dst=192.168.0.1
> srckey=0x0 dstkey=0x3 src=192.168.0.1 dst=192.168.0.140 srckey=0x3
> dstkey=0x0 [ASSURED]
[..]
> Is it considered as a bug? I think it should not send on each packet
> conntrack event.
Bug. Update events should only be generated when something in the
conntrack has changed (e.g. the connmark).
Could you please try this patch (untested)?
Subject: [PATCH] netfilter: conntrack_gre: only create ct assured event once
diff --git a/net/netfilter/nf_conntrack_proto_gre.c b/net/netfilter/nf_conntrack_proto_gre.c
--- a/net/netfilter/nf_conntrack_proto_gre.c
+++ b/net/netfilter/nf_conntrack_proto_gre.c
@@ -241,8 +241,8 @@ static int gre_packet(struct nf_conn *ct,
nf_ct_refresh_acct(ct, ctinfo, skb,
ct->proto.gre.stream_timeout);
/* Also, more likely to be important, and not a probe. */
- set_bit(IPS_ASSURED_BIT, &ct->status);
- nf_conntrack_event_cache(IPCT_ASSURED, ct);
+ if (!test_and_set_bit(IPS_ASSURED_BIT, &ct->status))
+ nf_conntrack_event_cache(IPCT_ASSURED, ct);
} else
nf_ct_refresh_acct(ct, ctinfo, skb,
ct->proto.gre.timeout);
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists