On Mon, Jan 12, 2009 at 9:35 AM, Bryan Duff <bduff@xxxxxxxxxxxxx> wrote: > Jan Engelhardt wrote: >> >> On Friday 2009-01-09 23:20, Bryan Duff wrote: >> >> >>> >>> ... gets out of sync in nth mode. The count seems to be off somehow. At >>> some >>> point the count is off - in my case I have 3 rules that are consecutive: >>> >>> //snip - iptables rules >>> iptables -t mangle -A PREROUTING -i ethX -s 10.10.10.0/24 -d >>> 10.10.11.0/24 -m >>> statistic --mode nth --every 3 --packet 0 -j MARK --set-mark 1 >>> iptables -t mangle -A PREROUTING -i ethX -s 10.10.10.0/24 -d >>> 10.10.11.0/24 -m >>> statistic --mode nth --every 3 --packet 1 -j MARK --set-mark 2 >>> iptables -t >>> mangle -A PREROUTING -i ethX -s 10.10.10.0/24 -d 10.10.11.0/24 -m >>> statistic >>> --mode nth --every 3 --packet 2 -j MARK --set-mark 3 >>> //end snip >>> >>> Now when I accept those mark values, the packet counts which should be >>> almost >>> equal are off by large numbers (hundreds of thousands): > > I have three rules. Each rule marks one packet for every three that match - > no packets matching that criteria should fall through. After they are > marked, I accept them. >>> >>> //snip - iptables -L >>> 978189 1210792980 ACCEPT all -- ethX * 10.10.10.0/24 >>> 10.10.11.0/24 MARK match 0x1 >>> 2182885 2704995300 ACCEPT all -- ethX * 10.10.10.0/24 >>> 10.10.11.0/24 MARK match 0x2 >>> 2289382 2862482240 ACCEPT all -- ethX * 10.10.10.0/24 >>> 10.10.11.0/24 MARK match 0x3 >>> 1417708 1807169776 MARK all -- ethX * 10.10.10.0/24 >>> 10.10.11.0/24 MARK set 0x1 >>> 1417708 1807169776 ACCEPT all -- ethX * 10.10.10.0/24 >>> 10.10.11.0/24 MARK match 0x1 > //end snip I'm a bit curious about this. I thought it was only possible to use the MARK target in mangle, but you seem to be listing the filter table. I notice that mark_tg_reg[] revision 2 doesn't limit the table to mangle like r0 and r1 do (anyone know if this a bug, or is r2 intended to be available everywhere?), but even so, when I try to replicate rule #4 on 2.6.28+1.4.3-rc1, I just get a dmesg error. > Those are the accept rules..., here are the match rules: > > 126489573 186243254796 MARK all -- eth0 * 10.10.10.0/24 > 10.10.11.0/24 statistic mode nth every 3 MARK set 0x11 > 126489608 186238009472 MARK all -- eth0 * 10.10.10.0/24 > 10.10.11.0/24 statistic mode nth every 3 packet 1 MARK set 0x12 > 126489614 186238262872 MARK all -- eth0 * 10.10.10.0/24 > 10.10.11.0/24 statistic mode nth every 3 packet 2 MARK set 0x13 > //the accept rules are right here... > > I mark the packets (in this case a packet goes through 3 statistic match > rules, and one should be marked). And then I accept the marks - otherwise > the are remarked at some point later (which I don't want). But the problem > is that the 3 match rules get out of sync. So instead of each rule matching > on a different packet (and incrementing on every packet) - at some point 2 > of the 3 rules are matching the same packet. > > How could that happen? I'm not accepting between the statistic match rules > (which would definitely cause the rules to get out of sync). Have you tried using iptables-restore? If you're using iptables to commit these rules individually (as your first message implies) and the system is under traffic already, it's easy for them to get out of sync because each nth rule tracks its own state individually and MARK is non-terminating. Any packets processed by the kernel between each rule addition will cause their packet counters (and potentially nth count) to be out of sync. There will be a consistent delta between the packet counters for the mangle PREROUTING rules, since they only mark the packet (or not) and continue processing the rest of the chain. However, if the nth count isn't in sync across all the rules, the mark can be overwritten further down the chain, and subsequently mess up the filter rules. An example using your rules (assuming subnet, etc already match): Rule #1 added Packet #1 processed Rule #1 (initial count = 2, every = 2) matches, set mark 0x11 Packet #2 processed Rule #1 (count = 0, every = 2) no match Rule #2 added Packet #3 processed Rule #1 (count = 1, every = 2) no match Rule #2 (initial count = 1, every = 2) no match Rule #3 added Packet #4 processed Rule #1 (count = 2, every = 2) matches, set mark 0x11 Rule #2 (count = 2, every = 2) matches, overwrite mark 0x12 Rule #3 (initial count = 0, every = 2) no match Packet #5 processed Rule #1 (count = 0, every = 2) no match Rule #2 (count = 0, every = 2) no match Rule #3 (count = 1, every = 2) no match -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html