lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <469DE243.20903@trash.net>
Date:	Wed, 18 Jul 2007 11:49:55 +0200
From:	Patrick McHardy <kaber@...sh.net>
To:	Abhijit Menon-Sen <ams@...oid.org>
CC:	netdev@...r.kernel.org, shemminger@...l.org
Subject: Re: tc filter add ... fw ... action drop

Abhijit Menon-Sen wrote:
> Hi.
> 
> Is it a bug that:
> 
>   # tc filter add dev eth0 parent 1: protocol ip prio 0 handle 0xfffffff
>     fw police rate 1 burst 1 mpu 0 mtu 1 action drop
>                                          ^^^^^^^^^^^
> creates a filter that looks like:
> 
>   # tc filter ls dev eth0
>   filter parent 1: protocol ip pref 49152 fw 
>   filter parent 1: protocol ip pref 49152 fw handle 0xfffffff police 0x1
>   rate 0bit burst 0b mtu 1b action reclassify
>                             ^^^^^^^^^^^^^^^^^
>   ref -543190236 bind 4
> 
> (which reclassifies and thus lets 0xfffffff-marked packets through).
> 
> I'm pretty sure this used to work under 2.4.x (though I no longer have a
> 2.4 box to test with), but it hasn't worked on any of the 2.6.x kernels
> I've tried (with both iproute2-ss060323 and 070710).


Good catch. It seems this is merely a parsing error, iproute doesn't
have an "action" parameter and aborts parsing, so it uses the default
value of "RECLASSIFY". It never had this parameter, so this patch
removes it from the help text and makes it return an error.


BTW, Stephen, whats the status of all the patches I sent you?

View attachment "x" of type "text/plain" (1061 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ