summaryrefslogtreecommitdiffstats
path: root/libiptc
Commit message (Collapse)AuthorAgeFilesLines
* fix deletion of targets where kernel size != userspace size (Pablo Neira)Pablo Neira2005-06-232-0/+2
|
* Restore chain order (Olaf Rempel <razzor@kopf-tisch.de>)Olaf Rempel2005-03-041-4/+7
|
* Kill NFC_* stuff in iptables (Pablo Neira <pablo@eurodev.net>)Pablo Neira2005-02-142-22/+0
| | | | Fixes build with conntrack event patch for 2.6
* Revert the recent addition of memset()'s to TC_COMMIT. One of them is bogus ↵Phil Oester2005-02-041-3/+0
| | | | | | and the other one needs more investigation to why valgrind is complaining. Noticed and reverted by Phil Oester.
* re-implement alphabetic sorting to not confuse users who upgrade to 1.3.0Harald Welte2005-02-011-7/+18
|
* - Sets the 'iptc_fn' global variable to the pointer to the current functions ↵Derrik Pates2005-02-011-13/+36
| | | | | | | | in all major TC_* functions. This is necessary because in certain cases, an error return from a function that doesn't set 'iptc_fn' will conflict with a function-specific error return from one that does, causing TC_STRERROR() to return the wrong error string. This ensures that the right one will be returned. - Implements a simple reference counter for the netlink socket global variable 'sockfd'; this is necessary for IPTables::IPv4, where multiple tables (filter, nat, mangle, untracked) may be opened at one time. The way libiptc does it in the official version causes previously-opened tables to break such that attempts to commit changes will fail. - Adds a couple of memset() invocations in TC_COMMIT, based on past analysis with valgrind. It claimed that allocated structure were not being fully initialized, and adding the memset()s corrected this warning. (Derrik Pates <demon@devrandom.net>)
* Extension revision number support (if kernel supports the getsockopts).Rusty Russell2005-01-031-2/+2
| | | | | Enhance MARK match with second revision. Committed in anticipation of the kernel patch being applied.
* Stupid typo that meant we didn't compare target data when doing ↵Rusty Russell2004-12-291-1/+1
| | | | delete-by-matching-rule (found by nfsim test).
* Implement some optimization for finding rules to replace in TC_REPLACE_ENTRY.Martin Josefsson2004-12-181-2/+9
| | | | Stolen from TC_DELETE_NUM_ENTRY.
* Make "is_same" test basics and entries only: targets are generic.Rusty Russell2004-12-163-70/+72
| | | | | | | Make target testing aware of different kinds of rules. Change reverse logic: target_different now target_same. Set type to MODULE in iptcc_map_target. Add testcase for this.
* Remove GET_TARGET() define: this was for compiling iptables for debugging ↵Rusty Russell2004-12-161-37/+25
| | | | | | | (ie. without -O) on old kernels where ipt_get_target() was defined "extern inline". These days it's "static inline", and only developers build without -O anyway. Fix up DUMP_ENTRIES a little, but remove calls: it only dumps the table as loaded, not the changed (cached) table, which is misleading. Fix TC_DELETE_ENTRY: we need to use iptcc_map_target() before comparing, otherwise "-j DROP" (as an example) doesn't work.
* Search backwards when inserting/deleting in/from the top half of the rules ↵Martin Josefsson2004-10-241-12/+24
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | in a chain. before: insert 50k rules without any previous rules real 0m1.314s user 0m1.184s sys 0m0.123s insert 50k with one already existing rule real 2m38.052s user 2m37.296s sys 0m0.353s insert 50k rules in the middle of 20k already existing rules real 2m43.831s user 2m43.005s sys 0m0.414s delete rule #70000 10k times with 100k rules real 1m37.990s user 1m37.247s sys 0m0.500s after: insert 50k without any previous rules real 0m1.315s user 0m1.184s sys 0m0.125s insert 50k with one already existing rule real 0m1.313s user 0m1.189s sys 0m0.119s insert 50k rules in the middle of 20k already existing rules real 0m8.550s user 0m8.327s sys 0m0.197s delete rule #70000 10k times with 100k rules real 0m35.566s user 0m35.062s sys 0m0.416s
* Replace O(n) with O(1) when TC_INSERT_ENTRY() inserts an entry at the end.Martin Josefsson2004-09-231-8/+23
| | | | | | | | | | | | | | Do the same with TC_DELETE_NUM_ENTRY() when deleting the last rule. My rule management script does both of these things in certain situations. Created a file with 50.000 rules which my script converted into iptables-restore format but inserting each rule with an index instead of appending like the iptables-save output does. That took a while without this optimization. Same thing when deleting the 45.000 last rules in that chain, the script outputs deletes by number starting from the bottom. Inserting or deleting (by number) in the middle of the chain is still O(n) where n is the rulenumber where the insert/delete is taking place.
* Spelling error.Martin Josefsson2004-09-231-2/+2
|
* Fix returnvalue of TC_BUILTIN()Martin Josefsson2004-09-231-2/+2
| | | | | All jumps to nonexisting chains were believed to be jumps to builtin chains, that's bad as it made it impossible to add rules with external targets.
* Make sure to zero all the memory we allocate for the new table.Martin Josefsson2004-09-221-2/+2
| | | | | Makes flushing of chains containing more than a few entries work without potentially oopsing the kernel.
* Make TC_DELETE_ENTRY() and TC_DELETE_NUM_ENTRY() actually do something practicalMartin Josefsson2004-09-221-1/+5
|
* Fix two more rulenumber off by 1 errorsMartin Josefsson2004-09-221-3/+3
|
* Insertion of rules with -I was broken.Martin Josefsson2004-09-221-5/+15
| | | | | | | It checked if a rule existed on the position we were inserting to. Thus inserting into an empty chain didn't work. And it didn't care about the fact that the first rule in the chain has index 1 the rulenumer we get starts at 0...
* Fix rule countingMartin Josefsson2004-09-221-1/+3
|
* Fix listing of module targets.Martin Josefsson2004-09-221-1/+4
| | | | | | Type was only set for standard targets. Harald: please review.
* fix segfault from memory allocation: handle->entries is actualy struct ↵Harald Welte2004-09-191-2/+3
| | | | ipt_get_entries plus the size
* add delete by matching-rule to libiptc2 (still untested)Harald Welte2004-08-301-67/+19
|
* complete libiptc rewrite. Time to load 10k rules goes down from 2.20 ↵Harald Welte2004-08-295-918/+1973
| | | | minutes to 1.255 seconds (!). Might still contain bugs, use with caution.
* Get rid of some warnings when compiling 64bit.Martin Josefsson2004-05-263-5/+5
|
* cosmetic fix (space between include directive and filename)Harald Welte2004-05-161-3/+3
|
* Compiler warnings due to missing include files (Stephane Ouellette)Stephane Ouellette2004-05-141-1/+4
|
* Fix even more possibly not zero-terminated strings after copy (Karsten Desler)Karsten Desler2004-01-311-1/+2
|
* oops, don't commit this to the stable treeHarald Welte2004-01-061-547/+641
|
* commit all current changesHarald Welte2004-01-061-642/+548
|
* sorry, this one didn't make it in 1.2.9rc1 :(Harald Welte2003-10-071-0/+13
|
* add support for the raw table to userspaceHarald Welte2003-10-071-0/+13
|
* fix rule deletion in modified libiptc (Martin Josefsson)Martin Josefsson2003-07-051-5/+9
|
* fix ipv6_prefix_length endianness bugs (Closes: #103)Harald Welte2003-06-241-1/+1
|
* Add my recent performance optimization work, might destabilize iptables.Harald Welte2003-06-241-13/+108
| | | | | Please report bugs to bugzilla, we need to fix this up before releasing the next iptables version.
* implement chain cache ussing relative offsets instead of absolute entryHarald Welte2003-06-231-50/+73
| | | | | | pointers. This is needed for my current libiptc optimization work, since it needs the chain cache to still be correct after it has been reallocated to a different address.
* Fix possible doubleclose of sockfd.Martin Josefsson2003-06-131-2/+7
| | | | This shouldn't break anything, things were already broken.
* fix memory leak(s) in libiptc. Reverts the previous (wrong) patch. (Martin ↵Martin Josefsson2003-05-023-16/+30
| | | | Josefsson)
* Fix libiptc memory hole during iptc_chain_next() (Tomas Lejdar)Tomáš Lejdar2003-04-301-2/+4
|
* make DO_IPV6 work again..Harald Welte2003-03-041-1/+1
|
* Fixed destination netmask comparison bug in is_same()Marc Boucher2002-06-121-1/+1
|
* globally replace NETFILTER_VERSION with IPTABLES_VERSION to have consistent ↵Harald Welte2002-05-291-2/+2
| | | | naming
* explicitly check for two possible sets of hooks in case of nat and mangleHarald Welte2002-02-132-24/+56
|
* fix compatibility with mangle2hooks and mangle5hooksHarald Welte2002-02-132-13/+17
|
* first attempt in trying to make debug code work with mangle2hooks and ↵Harald Welte2002-02-132-35/+52
| | | | mangle5hooks
* - don't need -DNDEBUG anymore. Instead, use -DIPTC_DEBUG to enableHarald Welte2002-02-133-14/+42
| | | | | | | | libiptc debugging. This is to make people at RedHat and Mandrake happy. - add debugging code for mangle5hooks table (will break debugging of iptables >= 1.2.6 on old kernels <= 2.4.18-pre6. *sigh*
* update debugging code to mangle5hooks changesHarald Welte2002-02-082-2/+8
|
* Added #include <unistd.h> to eliminate close() warning.Marc Boucher2002-01-192-0/+2
|
* libiptc socket leaking fixHarald Welte2002-01-071-1/+4
|
* move defaults to bottom, print reasonable message for CHECK functionsHarald Welte2001-07-301-8/+12
|