lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20190118.141403.2038148706703776533.davem@davemloft.net> Date: Fri, 18 Jan 2019 14:14:03 -0800 (PST) From: David Miller <davem@...emloft.net> To: xiyou.wangcong@...il.com Cc: netdev@...r.kernel.org, martin.olsson+netdev@...torsecurity.com, jhs@...atatu.com, jiri@...nulli.us Subject: Re: [Patch net-next] net_sched: add hit counter for matchall From: Cong Wang <xiyou.wangcong@...il.com> Date: Thu, 17 Jan 2019 12:44:25 -0800 > Although matchall always matches packets, however, it still > relies on a protocol match first. So it is still useful to have > such a counter for matchall. Of course, unlike u32, every time > we hit a matchall filter, it is always a success, so we don't > have to distinguish them. > > Sample output: > > filter protocol 802.1Q pref 100 matchall chain 0 > filter protocol 802.1Q pref 100 matchall chain 0 handle 0x1 > not_in_hw (rule hit 10) > action order 1: vlan pop continue > index 1 ref 1 bind 1 installed 40 sec used 1 sec > Action statistics: > Sent 836 bytes 10 pkt (dropped 0, overlimits 0 requeues 0) > backlog 0b 0p requeues 0 > > Reported-by: Martin Olsson <martin.olsson+netdev@...torsecurity.com> > Cc: Jamal Hadi Salim <jhs@...atatu.com> > Cc: Jiri Pirko <jiri@...nulli.us> > Signed-off-by: Cong Wang <xiyou.wangcong@...il.com> Applied.
Powered by blists - more mailing lists