search for: mport

Displaying 20 results from an estimated 36 matches for "mport".

Did you mean: port
2004 Jun 11
1
R2q stuff
...# ICMP $iptables -t mangle -A PREROUTING -p icmp -j MARK --set-mark $fast_mark # TRAFICO OUT for i in $average_port do $iptables -t mangle -N FORW_FAST_OUT_DST_$i $iptables -t mangle -A FORWARD -i $interfaz_interna -o $interfaz_externa -p tcp -m mport --ports $i -j FORW_FAST_OUT_DST_$i $iptables -t mangle -A FORW_FAST_OUT_DST_$i -j MARK --set-mark $fast_mark done # dns fast $iptables -t mangle -A FORWARD -p udp -m mport --ports 53 -j MARK --set-mark $fast_mark for i in $p2p_port do $ipta...
2004 Aug 28
4
RE: Promisc routing
...ignore ethernet addess and use only ip for routing. > > I suppose this may require writting special kernel driver or it > is possible > in other way? Probably you need only a kernel patched with ebtables/br-nf and use iptables extensions ROUTE, TTL/ttl, TOS/tos, MARK/mark, multiport, mport, etc. All the best, -- Sumit _______________________________________________ LARTC mailing list / LARTC@mailman.ds9a.nl http://mailman.ds9a.nl/mailman/listinfo/lartc HOWTO: http://lartc.org/
2004 Aug 21
1
Firewalling certain IP ranges
Hi, I have a linux router which is connected to a local network and the internet (eth0 and eth1). My local network (eth0) consists of two IP ranges, which are assigned by a DHCP server on my router - 10.0.0.2-10.0.0.19 for trusted clients (MAC addresses are known) and 10.0.0.20-10.0.0.254 for untrusted clients (MAC addresses are not known). These two ranges share the same physical network,
2005 Apr 06
2
Multipath routing + traffic separation problem.
...y iptables-save v1.2.11 on Wed Apr 6 11:57:06 2005 *mangle :PREROUTING ACCEPT [3281:1066576] :INPUT ACCEPT [411:32992] :FORWARD ACCEPT [2870:1033584] :OUTPUT ACCEPT [339:63745] :POSTROUTING ACCEPT [3195:1096657] -A PREROUTING -p tcp -m tcp --dport 25 -j MARK --set-mark 0xa -A PREROUTING -p tcp -m mport --dports 80,443,21 -j MARK --set-mark 0x14 COMMIT # Completed on Wed Apr 6 11:57:06 2005 So with this configuration all the http,https and ftp traffic must be routed by the 'wan2' connection. I have done severals tests and it dont work, i have also had a realms mark to my routing rule...
2013 Nov 26
6
[PATCH v5] x86: properly handle MSI-X unmask operation from guests
...oid hvm_io_assist(ioreq_t *p) } if ( p->state == STATE_IOREQ_NONE ) + { + if ( !msix_post_handler(curr) ) + gdprintk(XENLOG_WARNING, "msix_post_handler error\n"); vcpu_end_shutdown_deferral(curr); + } } static int dpci_ioport_read(uint32_t mport, ioreq_t *p) diff --git a/xen/arch/x86/hvm/vmsi.c b/xen/arch/x86/hvm/vmsi.c index 4826b4a..7178de9 100644 --- a/xen/arch/x86/hvm/vmsi.c +++ b/xen/arch/x86/hvm/vmsi.c @@ -293,7 +293,10 @@ static int msixtbl_write(struct vcpu *v, unsigned long address, /* exit to device model if address/data ha...
2019 Jan 09
0
[PATCH v5 06/20] drm/dp_mst: Introduce new refcounting scheme for mstbs and ports
..._mst_port *drm_dp_mst_get_port_ref_locked(struct drm_dp_mst_branch *mstb, struct drm_dp_mst_port *to_find) +static struct drm_dp_mst_port * +drm_dp_mst_topology_get_port_validated_locked(struct drm_dp_mst_branch *mstb, + struct drm_dp_mst_port *to_find) { struct drm_dp_mst_port *port, *mport; list_for_each_entry(port, &mstb->ports, next) { - if (port == to_find) { - kref_get(&port->kref); + if (port == to_find) return port; - } + if (port->mstb) { - mport = drm_dp_mst_get_port_ref_locked(port->mstb, to_find); + mport = drm_dp_mst_topology_get_por...
2019 Jan 05
0
[PATCH v4 02/16] drm/dp_mst: Introduce new refcounting scheme for mstbs and ports
..._mst_port *drm_dp_mst_get_port_ref_locked(struct drm_dp_mst_branch *mstb, struct drm_dp_mst_port *to_find) +static struct drm_dp_mst_port * +drm_dp_mst_topology_get_port_validated_locked(struct drm_dp_mst_branch *mstb, + struct drm_dp_mst_port *to_find) { struct drm_dp_mst_port *port, *mport; list_for_each_entry(port, &mstb->ports, next) { - if (port == to_find) { - kref_get(&port->kref); + if (port == to_find) return port; - } + if (port->mstb) { - mport = drm_dp_mst_get_port_ref_locked(port->mstb, to_find); + mport = drm_dp_mst_topology_get_por...
2018 Dec 14
0
[WIP PATCH 03/15] drm/dp_mst: Introduce new refcounting scheme for mstbs and ports
..._mst_port *drm_dp_mst_get_port_ref_locked(struct drm_dp_mst_branch *mstb, struct drm_dp_mst_port *to_find) +static struct drm_dp_mst_port * +drm_dp_mst_topology_get_port_validated_locked(struct drm_dp_mst_branch *mstb, + struct drm_dp_mst_port *to_find) { struct drm_dp_mst_port *port, *mport; list_for_each_entry(port, &mstb->ports, next) { - if (port == to_find) { - kref_get(&port->kref); + if (port == to_find) return port; - } + if (port->mstb) { - mport = drm_dp_mst_get_port_ref_locked(port->mstb, to_find); + mport = drm_dp_mst_topology_get_por...
2018 Dec 14
2
[WIP PATCH 03/15] drm/dp_mst: Introduce new refcounting scheme for mstbs and ports
..._topology.c > :export: > > +Branch device and port refcounting > +---------------------------------- I generally try to put the long-form explanations before the function references. Since usually the references completely drown out everything else and make it harder to spot the important overview stuff. > + > +Overview > +~~~~~~~~ > + > +The refcounting schemes for :c:type:`struct drm_dp_mst_branch` and > +:c:type:`struct drm_dp_mst_port` are somewhat unusual. Both ports and branch > +devices have two different kinds of refcounts: topology refcounts, and m...
2002 Aug 22
6
Q: best solution to stop traffic to huge amount of unregistered hosts
...rottle down traffic to unregistered hosts already in the ingress lane without hitting the routing and netfilter engine with this traffic? Does tc scale well with this huge amount addresses/masks? How could this be handled with tc? Regards and thanks in advance for any hint Charly P.S. Speed is important, this linux router/firewall connects Gigabit Ethernet networks -- Karl Gaissmaier Computing Center,University of Ulm,Germany Email:karl.gaissmaier@rz.uni-ulm.de Network Administration Tel.: ++49 731 50-22499 _______________________________________________ LARTC mailing list /...
2018 Dec 19
1
[WIP PATCH 03/15] drm/dp_mst: Introduce new refcounting scheme for mstbs and ports
...device and port refcounting > > > +---------------------------------- > > > > I generally try to put the long-form explanations before the function > > references. Since usually the references completely drown out everything > > else and make it harder to spot the important overview stuff. > > > > > > > + > > > +Overview > > > +~~~~~~~~ > > > + > > > +The refcounting schemes for :c:type:`struct drm_dp_mst_branch` and > > > +:c:type:`struct drm_dp_mst_port` are somewhat unusual. Both ports and >...
2003 Nov 02
0
[ANNOUNCE] Release of iptables-1.2.9
...ip(6)tables-save [ Hime Aguiar e Oliveira Jr. ] - mac match: fix ip(6)tables-save if used inverted (!) [ David Zambonini, Martin Josefsson ] - ip6tables udp match: check for invalid port ranges [ Thomas Poehnitz ] - LOG target: fix iptables-save (save loglevel numerically) [ Thomas Woerner ] - mport match: fix iptables-save (save numerically) [ Thomas Woerner ] - libipq: fix ipq_id_t definition on 'real' 64bit/64bit architectures [ Ryan Veety ] - libip6tc: fix ipv6_prefix_length endianness bugs [ Mikko Markus Torni ] - MASQUERADE target: don't accept negative port numbers [ Yas...
2018 Dec 18
0
[WIP PATCH 03/15] drm/dp_mst: Introduce new refcounting scheme for mstbs and ports
...> > > +Branch device and port refcounting > > +---------------------------------- > > I generally try to put the long-form explanations before the function > references. Since usually the references completely drown out everything > else and make it harder to spot the important overview stuff. > > > > + > > +Overview > > +~~~~~~~~ > > + > > +The refcounting schemes for :c:type:`struct drm_dp_mst_branch` and > > +:c:type:`struct drm_dp_mst_port` are somewhat unusual. Both ports and > > branch > > +devices have two...
2003 Oct 07
0
[ANNOUNCE] Release of iptables-1.2.9rc1
...ip(6)tables-save [ Hime Aguiar e Oliveira Jr. ] - mac match: fix ip(6)tables-save if used inverted (!) [ David Zambonini, Martin Josefsson ] - ip6tables udp match: check for invalid port ranges [ Thomas Poehnitz ] - LOG target: fix iptables-save (save loglevel numerically) [ Thomas Woerner ] - mport match: fix iptables-save (save numerically) [ Thomas Woerner ] - libipq: fix ipq_id_t definition on 'real' 64bit/64bit architectures [ Ryan Veety ] - libip6tc: fix ipv6_prefix_length endianness bugs [ Mikko Markus Torni ] Changes from 1.2.8: - build plugins for connlimit, iprange, real...
2002 Aug 26
0
[ANNOUNCE] Release of iptables-1.2.7a
...of MASQUERADE userspace support [ A. van Schie ] - compile fixes for userspace suppot of experimental POOL target [ ? ] - fix save function of userspace support for ah and esp match [ ? ] - fix static build (NO_SHARED_LIBS) [ Roberto Nibali ] - fix save/restore function of userspace support for mport match [ Bob Hockney ] - update manpages to reflect recent changes [ Herve Eychenne, Harald Welte ] - remove all remnants of the 'check' option [ ? ] Changes from 1.2.6a: - patch-o-matic is now no longer part of iptables but rather distributed as a seperate package (ftp://ftp.netfilt...
2003 Feb 14
0
[Bug 50] New: Kernel panic with netfilter
...incl 0x10(%eax) fuzzy.patch ALREADY APPLIED (0 rejects out of 2 hunks). iplimit.patch NOT APPLIED ( 2 missing files) ipt_unclean-ubit.patch NOT APPLIED (1 rejects out of 1 hunks) ipv4options.patch NOT APPLIED ( 2 missing files) IPV4OPTSSTRIP.patch NOT APPLIED ( 1 missing files) mport.patch ALREADY APPLIED (0 rejects out of 2 hunks). NETLINK.patch NOT APPLIED ( 2 missing files) NETMAP.patch NOT APPLIED ( 1 missing files) nth.patch ALREADY APPLIED (0 rejects out of 2 hunks). pool.patch NOT APPLIED ( 5 missing files) psd.patch NOT APPLIED ( 2 missing files) quota.patch ALREADY APP...
2003 Mar 20
6
[Bug 68] Kernel panic
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=68 ------- Additional Comments From laforge@netfilter.org 2003-03-20 10:55 ------- This looks strange. The BUG in slab.c tells us that there is a GFP_ATOMIC missing. This means that we are allocating kernel memory from softirq context with only GFP_KERNEL. If I understand your backtrace correctly, what happens is: - you are
2019 Jan 05
19
[PATCH v4 00/16] MST refcounting/atomic helpers cleanup
This is the series I've been working on for a while now to get all of the atomic DRM drivers in the tree to use the atomic MST helpers, and to make the atomic MST helpers actually idempotent. Turns out it's a lot more difficult to do that without also fixing how port and branch device refcounting works so that it actually makes sense, since the current upstream implementation requires a
2018 Dec 14
22
[WIP PATCH 00/15] MST refcounting/atomic helpers cleanup
This is a WIP version of the series I've been working on for a while now to get all of the atomic DRM drivers in the tree to use the atomic MST helpers, and to make the atomic MST helpers actually idempotent. Turns out it's a lot more difficult to do that without also fixing how port and branch device refcounting works so that it actually makes sense, since the current upstream
2019 Jan 09
27
[PATCH v5 00/20] MST refcounting/atomic helpers cleanup
This is the series I've been working on for a while now to get all of the atomic DRM drivers in the tree to use the atomic MST helpers, and to make the atomic MST helpers actually idempotent. Turns out it's a lot more difficult to do that without also fixing how port and branch device refcounting works so that it actually makes sense, since the current upstream implementation requires a