Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 25 Jun 2019 06:35:11 -0700 (PDT)
From:      "Rodney W. Grimes" <freebsd@gndrsh.dnsmgr.net>
To:        "Andrey V. Elsukov" <ae@FreeBSD.org>
Cc:        rgrimes@FreeBSD.org, src-committers@FreeBSD.org, svn-src-all@FreeBSD.org,  svn-src-head@FreeBSD.org
Subject:   Re: svn commit: r349366 - head/sys/netpfil/ipfw
Message-ID:  <201906251335.x5PDZBUP049675@gndrsh.dnsmgr.net>
In-Reply-To: <040e7778-dd19-be48-a5b4-1d6f02ddfbc0@FreeBSD.org>

next in thread | previous in thread | raw e-mail | index | archive | help
-- Start of PGP signed section.
[ Charset UTF-8 unsupported, converting... ]
> On 25.06.2019 16:28, Rodney W. Grimes wrote:
> >> Author: ae
> >> Date: Tue Jun 25 11:40:37 2019
> >> New Revision: 349366
> >> URL: https://svnweb.freebsd.org/changeset/base/349366
> >>
> >> Log:
> >>   Follow the RFC 3128 and drop short TCP fragments with offset = 1.
> >>   
> >>   Reported by:	emaste
> >>   MFC after:	1 week
> > 
> > Can we get a counter or something so that the dropping of these
> > is not totally silent and invisible?
> 
> They are logged as all short packets with "Pullup failed" message when
> net.inet.ip.fw.verbose is enabled.

Thats over kill for what I was asking about.
Also are there not other casses that pullup failed is counted?

I was asking for a counter specifically on the rfc3128
packets which one use to be able to do with a ipfw rule,
but since the kernel started to deal with these I lost that
visibility.


-- 
Rod Grimes                                                 rgrimes@freebsd.org



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201906251335.x5PDZBUP049675>