Displaying 20 results from an estimated 24 matches for "nfmark".
2004 Nov 05
3
[PATCH] Use nfmark as a key for u32 classifier
Hello!
I am glad to announce a patch for u32 to allow matches on nfmark.
The patch is non intrusive (few lines).
Why I did this? Because fw classifier cannot be used together with u32.
For example, now, you cannot match a mark of 0x90 and a destination
port of 80. I know you can do it with iptables to do the marking, but if
you use Jamal actions to apply mark to po...
2005 Jun 01
3
filter ingress policy based on nfmark
Hi all.
Since I move on to 2.6 kernel , filter ingress policy based on nfmark won´t
work.
Sorry for my english.
Simple example:
iptables -t mangle -I PREROUTING -j MARK --set-mark 1
${QDISC_ADD} handle ffff: ingress
${FILTER_ADD} parent ffff: protocol ip prio 100 handle 1 fw \
police rate 128Kbit burst 10k drop flowid 2:11
# tc -s -d qdisc ls dev eth0
qdisc ingress fff...
2004 Nov 09
4
[PATCH] [TRY2] Use nfmark as a key in u32 classifier
Hello!
This is the try number two.
What was changed:
- Added selectable choice in Kconfig file (thanks Jamal!)
- Don''t abuse tc_u32_sel to not break backward compatibility (thanks
Patrick!).
Stephen, do you have any comments on iproute2 part? I know it''s not
perfect but this is the best way, I think. "u32 match mark vvvv mmmm" it''s
intuitive but breaks a
2004 Dec 24
4
Ingress and Classifier & netfilter
Hi all,
Whenever I start up TC and implement traffic policing using ingress, I
get logs that goes something like this:
Classifier actions preferred over ingress.
What does that mean??
This are the relevent lines :
tc qdisc add dev $DEV handle ffff: ingress
tc filter add dev $DEV parent ffff: protocol ip prio 50 u32 match ip src
0.0.0.0/0 police rate ${DOWNLINK}kbit burst 10k drop flowid :1
2004 Feb 26
1
ESFQ Modification
...u32 h, h2;
u32 hs;
+ u32 nfm;
switch (skb->protocol) {
case __constant_htons(ETH_P_IP):
@@ -124,6 +125,7 @@
struct iphdr *iph = skb->nh.iph;
h = iph->daddr;
hs = iph->saddr;
+ nfm = skb -> nfmark;
h2 = hs^iph->protocol;
if (!(iph->frag_off&htons(IP_MF|IP_OFFSET)) &&
(iph->protocol == IPPROTO_TCP ||
@@ -137,6 +139,7 @@
struct ipv6hdr *iph = skb->nh.ipv6h;
h = iph->daddr.s6_addr32[3]...
2005 Dec 20
0
Question about tc class in skb
...->tc_verd (okay, that was reaching). If I ping with
different QoS bits which I''m assigning to different htb flows, I see
(these are my debugging messages in the driver):
~$ ping -Q 0x10 172.29.50.230
kernel: outpkt: priority:06 tclassid:0x0 tc_classid:0x0 tc_index:0x0
tc_verd:0x2000 nfmark:00
~$ ping -Q 0x08 172.29.50.230
kernel: outpkt: priority:02 tclassid:0x0 tc_classid:0x0 tc_index:0x0
tc_verd:0x2000 nfmark:00
Nada. ''pri'' does change, but it seems to get set by the QoS value
directly (?), no change if I map them to different flows anyhow.
Now if I use iptab...
2005 Dec 21
0
CONNTRACK problem
...4: CONNMARK target: No operation specified
Try `iptables -h'' or ''iptables --help'' for more information.
root@prensa:~# strings /usr/lib/iptables/libipt_CONNMARK.so | grep restore
restore-mark
CONNMARK restore
--restore-mark
--restore-mark [--mask mask] Restore saved nfmark value
CONNMARK target: Can''t specify --restore-mark twice
root@prensa:~# iptables -j CONNMARK -h
bla bla bla
CONNMARK target v1.3.4 options:
--set-mark value[/mask] Set conntrack mark value
--save-mark [--mask mask] Save the packet nfmark in the connection
--restore-mark...
2005 Oct 15
5
esfq ? or wrr ?
Hi
If I have a HTB class with 128kbit, and I want to
put "N" users in that class ( in order to share
bandwidth fairly ) ,
which is better for me ? esfq (hash dst) or wrr ?
I would attach esfq or wrr to HTB parent class.
Also I''ve readed on Jim script that over WRR put
a RED qdisc, but I don''t understand it.
bests
andres
2007 Apr 24
1
IPMark won''t compile on a vanilla 2.6.20 kernel
...2.6.20 kernel
I obtain this error during the compilation under debian sarge 3.1
CC [M] net/ipv4/netfilter/ipt_TTL.o
CC [M] net/ipv4/netfilter/ipt_IPMARK.o
net/ipv4/netfilter/ipt_IPMARK.c: In function `target'':
net/ipv4/netfilter/ipt_IPMARK.c:37: error: structure has no member named
`nfmark''
net/ipv4/netfilter/ipt_IPMARK.c:38: error: structure has no member named
`nfmark''
net/ipv4/netfilter/ipt_IPMARK.c: At top level:
net/ipv4/netfilter/ipt_IPMARK.c:77: warning: initialization from
incompatible pointer type
net/ipv4/netfilter/ipt_IPMARK.c:81: warning: initialization...
2005 Jan 05
19
[PATCH] mark in u32
Hello, Stephen, List!
Attached is the patch for iproute2 to add the possibility to use fwmark in
u32 filters.
The kernel part was included in 2.6.10.
Please apply!
Thank you!
For more info:
- Kernel patch (not needed for 2.6.10):
http://kernel.umbrella.ro/net/mark_in_u32/net-match-nfmark-in-u32.patch
- Examples:
http://kernel.umbrella.ro/net/mark_in_u32/examples.txt
---
Catalin(ux aka Dino) BOIE
catab at deuroconsult.ro
http://kernel.umbrella.ro/
2003 Mar 04
1
[Bug 33] Connection tracking code doesn't track the interface of the connection
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=33
laforge@netfilter.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|ASSIGNED |RESOLVED
Resolution| |INVALID
------- Additional Comments From
2009 Aug 09
2
[Bug 601] New: log messages with flags "ACK PSH FIN"
http://bugzilla.netfilter.org/show_bug.cgi?id=601
Summary: log messages with flags "ACK PSH FIN"
Product: netfilter/iptables
Version: unspecified
Platform: All
OS/Version: Debian GNU/Linux
Status: NEW
Severity: minor
Priority: P3
Component: ip_conntrack
AssignedTo: laforge at
2006 Apr 08
4
source routing does not work with extra ip addresses
I set up this config:
+------+
-+ ISP1 +--+
+------+ | +-------+
+--+ linux |
+------+ | +-------+
-+ ISP2 +--+
+------+
No problem. Standard setup with two ISP''s. Both routed subnets. Default
gateway is ISP1. No magic here.
Now I put a server behind the Linux box. I want the server to be
reachable on an /extra/ IP in the routed subnet of ISP2.
+------+
-+ ISP1
2002 Aug 26
0
[ANNOUNCE] Release of iptables-1.2.7a
...piler warning in userspace support for ipv6 REJECT target
[ Fabrice Marie ]
- check for invalid portranges in tcp+udp helper (e.g. 2000:100)
[ Thomas Poehnitz ]
- fix save save/restore functions of ip6tables tcp/udp extension
[ Harald Welte / Andras Kis-Szabo ]
- check for invalid (out of range) nfmark values in MARK target
[ Alexey ??? ]
- fix save function of MASQUERADE userspace support
[ A. van Schie ]
- compile fixes for userspace suppot of experimental POOL target
[ ? ]
- fix save function of userspace support for ah and esp match
[ ? ]
- fix static build (NO_SHARED_LIBS)
[ Roberto Nib...
2002 Mar 14
0
[ANNOUNCE] Release of iptables-1.2.6
...ntrack match, enables matching on more conntrack informatin
than state
[ Marc Boucher ]
- New DSCP match and target (DSCP header field obsoletes TOS)
[ Harald Welte ]
- New owner match extension: Match on process name
[ Marc Boucher ]
- Add support for bitwise AND / OR manipulation on nfmark
[ Fabrice Marie ]
- New experimental patch for disabling TCP connection tracking pickup
[ Harald Welte ]
- Add support for SACK in all NAT helpers
[ Harald Welte ]
- Make eggdrop botnet connection tracking support work with eggdrop
v1.6.x=20
[ Magnus Sandin ]
- Add support to REJEC...
2002 Mar 17
0
[ANNOUNCE] Release of iptables-1.2.6a
...ntrack match, enables matching on more conntrack informatin
than state
[ Marc Boucher ]
- New DSCP match and target (DSCP header field obsoletes TOS)
[ Harald Welte ]
- New owner match extension: Match on process name
[ Marc Boucher ]
- Add support for bitwise AND / OR manipulation on nfmark
[ Fabrice Marie ]
- New experimental patch for disabling TCP connection tracking pickup
[ Harald Welte ]
- Add support for SACK in all NAT helpers
[ Harald Welte ]
- Make eggdrop botnet connection tracking support work with eggdrop
v1.6.x=20
[ Magnus Sandin ]
- Add support to REJEC...
2004 Jan 08
14
Strange behavior deleting filters
Hi list, I''m playing with tc and found a strange behavior when I try to
delete filters. For example, this simple scenario:
tc qdisc add dev eth1 root handle 1: htb default 100
tc class add dev eth1 parent 1: classid 1:1 htb rate 128Kbit
tc class add dev eth1 parent 1: classid 1:2 htb rate 258Kbit
tc class add dev eth1 parent 1: classid 1:100 htb rate 32Kbit
tc filter add dev eth1 parent
2005 Mar 25
3
These tc commands used to work... what''s broken them?
...<M> Firewall based classifier
<M> U32 classifier
[ ] U32 classifier performance counters
[ ] classify input device (slows things u32/fw)
[ ] Use nfmark as a key in U32 classifier
<M> Special RSVP classifier
<M> Special RSVP classifier for IPv6
[ ] Packet ACTION
[*] Traffic policing (needed f...
2007 Apr 18
5
[Bridge] RFC: [PATCH] bridge vlan integration
...+};
+
struct __fdb_entry
{
__u8 mac_addr[6];
Index: wireless-dev/include/linux/skbuff.h
===================================================================
--- wireless-dev.orig/include/linux/skbuff.h
+++ wireless-dev/include/linux/skbuff.h
@@ -296,6 +296,9 @@ struct sk_buff {
#endif
__u32 nfmark;
#endif /* CONFIG_NETFILTER */
+#ifdef CONFIG_BRIDGE_VLAN
+ unsigned int vlan;
+#endif
#ifdef CONFIG_NET_SCHED
__u16 tc_index; /* traffic control index */
#ifdef CONFIG_NET_CLS_ACT
Index: wireless-dev/net/bridge/br_forward.c
=================================================================...
2004 Mar 29
6
bridging shaper
Hello,
I have a transparent bridge/firewall setup using linux-2.6.3. My iptables
commands for the firewall seem to work fine, but my tc traffic shaper
rules dont. The tc rules seem to apply ok, but have no effect.
Here are my tc rules. Basically im just trying to limit each IP in my
internal /24 to 512k of bandwidth in and out.
DEV=eth0
tc qdisc del dev $DEV root
tc qdisc add dev $DEV