Re: [PATCH net-next v4 0/2] tcp: add a new TW_PAWS drop reason

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello:

This series was applied to netdev/net-next.git (main)
by Jakub Kicinski <kuba@xxxxxxxxxx>:

On Wed,  9 Apr 2025 19:26:03 +0800 you wrote:
> Devices in the networking path, such as firewalls, NATs, or routers, which
> can perform SNAT or DNAT, use addresses from their own limited address
> pools to masquerade the source address during forwarding, causing PAWS
> verification to fail more easily under TW status.
> 
> Currently, packet loss statistics for PAWS can only be viewed through MIB,
> which is a global metric and cannot be precisely obtained through tracing
> to get the specific 4-tuple of the dropped packet. In the past, we had to
> use kprobe ret to retrieve relevant skb information from
> tcp_timewait_state_process().
> 
> [...]

Here is the summary with links:
  - [net-next,v4,1/2] tcp: add TCP_RFC7323_TW_PAWS drop reason
    https://git.kernel.org/netdev/net-next/c/04271411121a
  - [net-next,v4,2/2] tcp: add LINUX_MIB_PAWS_TW_REJECTED counter
    https://git.kernel.org/netdev/net-next/c/c449d5f3a3d7

You are awesome, thank you!
-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html






[Index of Archives]     [Kernel Newbies]     [Security]     [Netfilter]     [Bugtraq]     [Linux FS]     [Yosemite Forum]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Samba]     [Video 4 Linux]     [Device Mapper]     [Linux Resources]

  Powered by Linux