aboutsummaryrefslogtreecommitdiffstats
path: root/net/netfilter/nf_conntrack_ecache.c
diff options
context:
space:
mode:
authorFlorian Westphal <fw@strlen.de>2017-04-16 22:08:53 +0200
committerPablo Neira Ayuso <pablo@netfilter.org>2017-04-19 17:55:17 +0200
commitc6dd940b1f747bee62865e348d360f602057196e (patch)
tree1798d94ac1667544a3c00cd04641cdfec8e385de /net/netfilter/nf_conntrack_ecache.c
parentnetfilter: conntrack: use u8 for extension sizes again (diff)
downloadlinux-dev-c6dd940b1f747bee62865e348d360f602057196e.tar.xz
linux-dev-c6dd940b1f747bee62865e348d360f602057196e.zip
netfilter: allow early drop of assured conntracks
If insertion of a new conntrack fails because the table is full, the kernel searches the next buckets of the hash slot where the new connection was supposed to be inserted at for an entry that hasn't seen traffic in reply direction (non-assured), if it finds one, that entry is is dropped and the new connection entry is allocated. Allow the conntrack gc worker to also remove *assured* conntracks if resources are low. Do this by querying the l4 tracker, e.g. tcp connections are now dropped if they are no longer established (e.g. in finwait). This could be refined further, e.g. by adding 'soft' established timeout (i.e., a timeout that is only used once we get close to resource exhaustion). Cc: Jozsef Kadlecsik <kadlec@blackhole.kfki.hu> Signed-off-by: Florian Westphal <fw@strlen.de> Acked-by: Jozsef Kadlecsik <kadlec@blackhole.kfki.hu> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Diffstat (limited to 'net/netfilter/nf_conntrack_ecache.c')
0 files changed, 0 insertions, 0 deletions