Commit graph

  • 180dbc957a port_fwd: Don't NS_CALL get_bound_ports() David Gibson 2023-11-03 13:23:00 +1100
  • 5a0485425b port_fwd: Pre-open /proc/net/* files rather than on-demand David Gibson 2023-11-03 13:22:59 +1100
  • 4f0b9f91e4 util: Add open_in_ns() helper David Gibson 2023-11-03 13:22:58 +1100
  • 17d40d1cb5 port_fwd: Better parameterise procfs_scan_listen() David Gibson 2023-11-03 13:22:57 +1100
  • e90f2770ae port_fwd: Move automatic port forwarding code to port_fwd.[ch] David Gibson 2023-11-03 13:22:56 +1100
  • 26d86f1304 conf: Cleaner initialisation of default forwarding modes David Gibson 2023-11-03 13:22:55 +1100
  • 3fb3f0f7a5 selinux: Drop user_namespace class rules for Fedora 37 Stefano Brivio 2023-10-09 23:04:47 +0200
  • f851084c96 dhcp: put option 53 at the beginning 2023_10_04.f851084 Stas Sergeev 2023-10-03 13:01:22 +0500
  • a469fc393f tcp, tap: Don't increase tap-side sequence counter for dropped frames Stefano Brivio 2023-09-22 23:35:08 +0200
  • d3192f67c4 tcp: Force TCP_WINDOW_CLAMP before resetting STALLED flag Stefano Brivio 2023-09-22 23:21:20 +0200
  • feaeb4986c tcp: Fix comment to tcp_sock_consume() Stefano Brivio 2023-09-22 23:08:29 +0200
  • 117b474f85 cppcheck: Work around bug in cppcheck 2.12.0 David Gibson 2023-09-29 15:50:22 +1000
  • 8640d62af7 cppcheck: Use "exhaustive" level checking when available David Gibson 2023-09-29 15:50:21 +1000
  • c0efa4e97f conf: Remove overly cryptic selection of forward table David Gibson 2023-09-29 15:50:20 +1000
  • 6471c7d01b cppcheck: Make many pointers const David Gibson 2023-09-29 15:50:19 +1000
  • fc8f0f8c48 siphash: Use incremental rather than all-at-once siphash functions David Gibson 2023-09-28 11:21:02 +1000
  • 04b10a8d90 siphash, checksum: Move TBAA explanation to checksum.c David Gibson 2023-09-28 11:21:01 +1000
  • ceae8422c1 siphash: Make internal helpers public David Gibson 2023-09-28 11:21:00 +1000
  • cbc84df47f siphash: Use specific structure for internal state David Gibson 2023-09-28 11:20:59 +1000
  • fcec3f6f9d siphash: Use more hygienic state initialiser David Gibson 2023-09-28 11:20:58 +1000
  • 5cc843521d siphash: Fix bug in state initialisation David Gibson 2023-09-28 11:20:57 +1000
  • 831067f483 siphash: Clean up hash finalisation with posthash_final() function David Gibson 2023-09-28 11:20:56 +1000
  • 7a3153cbfb siphash: Add siphash_feed() helper David Gibson 2023-09-28 11:20:55 +1000
  • f7b2be2d21 siphash: Make sip round calculations an inline function rather than macro David Gibson 2023-09-28 11:20:54 +1000
  • ca6e94702c siphash: Make siphash functions consistently return 64-bit results David Gibson 2023-09-28 11:20:53 +1000
  • c1d2a070f2 util: Consolidate and improve workarounds for clang-tidy issue 58992 David Gibson 2023-09-21 14:49:39 +1000
  • 5b6c68c2e4 Avoid shadowing index(3) David Gibson 2023-09-21 14:49:38 +1000
  • 9178a9e346 tcp: Always send an ACK segment once the handshake is completed Stefano Brivio 2023-09-22 23:48:06 +0200
  • c09069211a dhcp: Actually note down the length of options received by the client Stefano Brivio 2023-09-21 18:42:45 +0200
  • 8b8537d301 dhcpv6: Properly separate domain names in search list Stefano Brivio 2023-09-20 16:39:11 +0200
  • 05627dc512 util: Fix licensing information display in --version 2023_09_08.05627dc Stefano Brivio 2023-09-08 17:34:27 +0200
  • 46f915ddee tcp: Correct handling of FIN,ACK followed by SYN David Gibson 2023-09-08 11:49:53 +1000
  • b3f2210b05 tcp: Consolidate paths where we initiate reset on tap interface David Gibson 2023-09-08 11:49:52 +1000
  • f984003fdf tcp: Correctly handle RST followed rapidly by SYN David Gibson 2023-09-08 11:49:51 +1000
  • 60d3915ea3 tcp: Return consumed packet count from tcp_data_from_tap() David Gibson 2023-09-08 11:49:50 +1000
  • 5fb376de6e tcp: Never hash match closed connections David Gibson 2023-09-08 11:49:49 +1000
  • 805dd109a4 tcp: Remove some redundant packet_get() operations David Gibson 2023-09-08 11:49:48 +1000
  • 7b56117dae udp, tap: Correctly advance through packets in udp_tap_handler() David Gibson 2023-09-08 11:49:47 +1000
  • 043a70b885 tcp, tap: Correctly advance through packets in tcp_tap_handler() David Gibson 2023-09-08 11:49:46 +1000
  • ee58f37db0 test: Add Podman system test with bats for pasta 2023_09_07.ee58f37 Stefano Brivio 2023-08-23 15:51:49 +0200
  • 1f24d3efb4 dhcp: support BOOTP clients Stas Sergeev 2023-08-29 14:14:06 +0500
  • d8c4f23ecd tap: fix uses of l3_len in tap4_handler() Stas Sergeev 2023-08-29 21:44:06 +0500
  • a405d0c026 fedora: Replace pasta hard links by separate builds Stefano Brivio 2023-09-07 01:57:00 +0200
  • 63a8302961 apparmor: Add pasta's own profile Stefano Brivio 2023-09-06 22:55:22 +0200
  • abf5ef6c22 apparmor: Allow pasta to remount /proc, access entries under its own copy Stefano Brivio 2023-09-06 21:46:14 +0200
  • e2ad420fa2 apparmor: Allow read-only access to uid_map Stefano Brivio 2023-09-06 21:09:47 +0200
  • b686afa23e apparmor: Explicitly pass options we use while remounting root filesystem Stefano Brivio 2023-09-06 20:54:52 +0200
  • 6d3e426d2f apparmor: Use abstractions/nameservice to deal with symlinked resolv.conf Stefano Brivio 2023-09-06 20:39:12 +0200
  • a7e4bfb857 pasta: Strip RTA_PREFSRC when copying routes to the namespace 2023_08_23.a7e4bfb David Gibson 2023-08-23 17:03:38 +1000
  • 5e4f7b92b0 netlink: Set IFA_ADDRESS, not just IFA_LOCAL, while adding IPv4 addresses Stefano Brivio 2023-08-23 09:34:44 +0200
  • 69303cafbe tcp: Remove broken pressure calculations for tcp_defer_handler() David Gibson 2023-08-22 15:30:00 +1000
  • eb8fbdbfd0 inany: Add missing double include guard to inany.h David Gibson 2023-08-22 15:29:59 +1000
  • b60fa33eea tcp: Move in_epoll flag out of common connection structure David Gibson 2023-08-22 15:29:58 +1000
  • 955dd3251c tcp, udp: Don't pre-fill IPv4 destination address in headers David Gibson 2023-08-22 15:29:57 +1000
  • 5bf200ae8a tcp, udp: Don't include destination address in partially precomputed csums David Gibson 2023-08-22 15:29:56 +1000
  • 8aa32009ed tcp: Consistent usage of ports in tcp_seq_init() David Gibson 2023-08-22 15:29:55 +1000
  • bccfbff193 tcp: More precise terms for addresses and ports David Gibson 2023-08-22 15:29:54 +1000
  • cee4a2da48 tap: Pass source address to protocol handler functions David Gibson 2023-08-22 15:29:53 +1000
  • 673bde1f21 tap: Don't clobber source address in tap6_handler() David Gibson 2023-08-22 15:29:52 +1000
  • 0af928eaa0 selinux: Fix domain transitions for typical commands pasta might run 2023_08_18.0af928e Stefano Brivio 2023-08-16 07:20:30 +0200
  • 30817fdd4e selinux: Allow pasta_t to read nsfs entries Stefano Brivio 2023-08-15 19:56:15 +0200
  • 977652155d selinux: Add rules for sysctl and /proc/net accesses Stefano Brivio 2023-08-15 19:50:48 +0200
  • 56b8633a6b selinux: Update policy to fix user/group settings Stefano Brivio 2023-08-15 19:37:46 +0200
  • 62059058cf selinux: Fix user namespace creation after breaking kernel change Stefano Brivio 2023-08-15 18:53:48 +0200
  • 0c42326204 selinux: Use explicit paths for binaries in file context Stefano Brivio 2023-08-15 18:34:45 +0200
  • 479a9e1b4d fedora: Install pasta as hard link to ensure SELinux file context match Stefano Brivio 2023-08-15 18:22:02 +0200
  • 5f1fcfffe4 tap: Fix format specifier in tap4_is_fragment() warning Stefano Brivio 2023-08-16 08:20:17 +0200
  • da0aeb9080 netlink: Don't propagate host address expiry to the container David Gibson 2023-08-15 13:51:29 +1000
  • b4f8ffd5c4 netlink: Correctly calculate attribute length for address messages David Gibson 2023-08-15 13:51:28 +1000
  • 4b9f4c2513 netlink: Remove redundant check on nlmsg_type David Gibson 2023-08-15 13:51:27 +1000
  • 5ed4e034b2 conf: Demote overlapping port ranges error to a warning David Gibson 2023-08-11 17:36:00 +1000
  • ae5f6c8e1b epoll: Use different epoll types for passt and pasta tap fds David Gibson 2023-08-11 15:12:29 +1000
  • eda4f1997e epoll: Split listening Unix domain socket into its own type David Gibson 2023-08-11 15:12:28 +1000
  • 485b5fb8f9 epoll: Split handling of listening TCP sockets into their own handler David Gibson 2023-08-11 15:12:27 +1000
  • e6f81e5578 epoll: Split handling of TCP timerfds into its own handler function David Gibson 2023-08-11 15:12:26 +1000
  • 8271a2ed57 epoll: Tiny cleanup to udp_sock_handler() David Gibson 2023-08-11 15:12:25 +1000
  • 05f606ab0b epoll: Split handling of ICMP and ICMPv6 sockets David Gibson 2023-08-11 15:12:24 +1000
  • d850caab66 epoll: Fold sock_handler into general switch on epoll event fd David Gibson 2023-08-11 15:12:23 +1000
  • 6a6735ece4 epoll: Always use epoll_ref for the epoll data variable David Gibson 2023-08-11 15:12:22 +1000
  • 3401644453 epoll: Generalize epoll_ref to cover things other than sockets David Gibson 2023-08-11 15:12:21 +1000
  • e26282b67d tap: Fold reset handling into tap_handler_passt() David Gibson 2023-08-11 15:12:20 +1000
  • 0d870c5da6 tap: Fold reset handling into tap_handler_pasta() David Gibson 2023-08-11 15:12:19 +1000
  • 548e05f76a tap: Clean up behaviour for errors on listening Unix socket David Gibson 2023-08-11 15:12:18 +1000
  • 28877b0fcd tap: Clean up tap reset path David Gibson 2023-08-11 15:12:17 +1000
  • b2bea0047d tap: fix seq->p.count limit Laurent Vivier 2023-08-09 11:23:42 +0200
  • 02b30e7871 netlink: Propagate errors for "dup" operations David Gibson 2023-08-03 17:19:56 +1000
  • 5103811e2d netlink: Propagate errors for "dump" operations David Gibson 2023-08-03 17:19:55 +1000
  • 4d6e9d0816 netlink: Always process all responses to a netlink request David Gibson 2023-08-03 17:19:54 +1000
  • 8de9805224 netlink: Propagate errors for "set" operations David Gibson 2023-08-03 17:19:53 +1000
  • a309318275 netlink: Add nl_foreach_oftype to filter response message types David Gibson 2023-08-03 17:19:52 +1000
  • 99ddd7ce83 netlink: Split nl_req() to allow processing multiple response datagrams David Gibson 2023-08-03 17:19:51 +1000
  • 8ec757d003 netlink: Clearer reasoning about the netlink response buffer size David Gibson 2023-08-03 17:19:50 +1000
  • 9d4ab98d53 netlink: Add nl_do() helper for simple operations with error checking David Gibson 2023-08-03 17:19:49 +1000
  • 282581ba84 netlink: Fill in netlink header fields from nl_req() David Gibson 2023-08-03 17:19:48 +1000
  • f62600b2df netlink: Treat send() or recv() errors as fatal David Gibson 2023-08-03 17:19:47 +1000
  • 0a568c847d netlink: Start sequence number from 1 instead of 0 David Gibson 2023-08-03 17:19:46 +1000
  • dee7594180 netlink: Make nl_*_dup() use a separate datagram for each request David Gibson 2023-08-03 17:19:45 +1000
  • 576df71e8b netlink: Explicitly pass netlink sockets to operations David Gibson 2023-08-03 17:19:44 +1000
  • cfe7509e5c netlink: Use struct in_addr for IPv4 addresses, not bare uint32_t David Gibson 2023-08-03 17:19:43 +1000
  • 257a6b0b7e netlink: Split nl_route() into separate operation functions David Gibson 2023-08-03 17:19:42 +1000