lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <alpine.LNX.2.01.1212160002330.4901@nerf07.vanv.qr> Date: Sun, 16 Dec 2012 00:06:37 +0100 (CET) From: Jan Engelhardt <jengelh@...i.de> To: Jamal Hadi Salim <jhs@...atatu.com> cc: Yury Stankevich <urykhy@...il.com>, shemonc@...il.com, "netdev@...r.kernel.org" <netdev@...r.kernel.org>, pablo@...filter.org, netfilter-devel@...r.kernel.org Subject: Re: tc ipt action On Saturday 2012-12-15 22:19, Jamal Hadi Salim wrote: > > Example, the following should work for > tc filter add dev eth0 parent ffff: protocol ip u32 match u32 0 0 > action ipt -j CONNMARK \ > action mirred egress redirect dev ifb0 If I try that command (substituting ipt->xt and eth0->dummy0, ifb0->dummy1), all I get is the dreaded "Invalid argument". So the kernel rejected the command, which could indicate that userspace construction might have been ok. # tc filter add dev dummy0 parent ffff: protocol ip u32 match u32 0 0 \ action xt -j CONNMARK action mirred egress redirect dev dummy1 tablename: mangle hook: NF_IP_PRE_ROUTING target: CONNMARK and 0x0 index 0 RTNETLINK answers: Invalid argument We have an error talking to the kernel > Pablo, Hasan Chowdhury tells me this broke after iptable 1.4.10 > Hasan also sent me a small patch to fake "xt" instead of "ipt" - but i think > there's more than meets the eye here; some interface we are using to talk to > xtables on user space seems to have changed. What was the last combination that worked? -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists