Re: xt_statistic.c - the statistic match

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Jan 12, 2009 at 9:35 AM, Bryan Duff <bduff@xxxxxxxxxxxxx> wrote:
> Jan Engelhardt wrote:
>>
>> On Friday 2009-01-09 23:20, Bryan Duff wrote:
>>
>>
>>>
>>> ... gets out of sync in nth mode.  The count seems to be off somehow.  At
>>> some
>>> point the count is off - in my case I have 3 rules that are consecutive:
>>>
>>> //snip - iptables rules
>>> iptables -t mangle -A PREROUTING -i ethX -s 10.10.10.0/24 -d
>>> 10.10.11.0/24 -m
>>> statistic --mode nth --every 3 --packet 0 -j MARK --set-mark 1
>>> iptables -t mangle -A PREROUTING -i ethX -s 10.10.10.0/24 -d
>>> 10.10.11.0/24 -m
>>> statistic --mode nth --every 3 --packet 1 -j MARK --set-mark 2
>>> iptables -t
>>> mangle -A PREROUTING -i ethX -s 10.10.10.0/24 -d 10.10.11.0/24 -m
>>> statistic
>>> --mode nth --every 3 --packet 2 -j MARK --set-mark 3
>>> //end snip
>>>
>>> Now when I accept those mark values, the packet counts which should be
>>> almost
>>> equal are off by large numbers (hundreds of thousands):
>
> I have three rules.  Each rule marks one packet for every three that match -
> no packets matching that criteria should fall through.  After they are
> marked, I accept them.
>>>
>>> //snip - iptables -L
>>> 978189 1210792980 ACCEPT     all  --  ethX   *       10.10.10.0/24
>>> 10.10.11.0/24    MARK match 0x1
>>> 2182885 2704995300 ACCEPT     all  --  ethX   *       10.10.10.0/24
>>> 10.10.11.0/24    MARK match 0x2
>>> 2289382 2862482240 ACCEPT     all  --  ethX   *       10.10.10.0/24
>>> 10.10.11.0/24    MARK match 0x3
>>> 1417708 1807169776 MARK       all  --  ethX   *       10.10.10.0/24
>>>  10.10.11.0/24    MARK set 0x1
>>> 1417708 1807169776 ACCEPT     all  --  ethX   *       10.10.10.0/24
>>>  10.10.11.0/24    MARK match 0x1
> //end snip

I'm a bit curious about this.  I thought it was only possible to use
the MARK target in mangle, but you seem to be listing the filter
table.  I notice that mark_tg_reg[] revision 2 doesn't limit the table
to mangle like r0 and r1 do (anyone know if this a bug, or is r2
intended to be available everywhere?), but even so, when I try to
replicate rule #4 on 2.6.28+1.4.3-rc1, I just get a dmesg error.

> Those are the accept rules..., here are the match rules:
>
> 126489573 186243254796 MARK       all  --  eth0   *       10.10.10.0/24
>    10.10.11.0/24    statistic mode nth every 3 MARK set 0x11
> 126489608 186238009472 MARK       all  --  eth0   *       10.10.10.0/24
>    10.10.11.0/24    statistic mode nth every 3 packet 1 MARK set 0x12
> 126489614 186238262872 MARK       all  --  eth0   *       10.10.10.0/24
>    10.10.11.0/24    statistic mode nth every 3 packet 2 MARK set 0x13
> //the accept rules are right here...
>
> I mark the packets (in this case a packet goes through 3 statistic match
> rules, and one should be marked).  And then I accept the marks - otherwise
> the are remarked at some point later (which I don't want).  But the problem
> is that the 3 match rules get out of sync.  So instead of each rule matching
> on a different packet (and incrementing on every packet) - at some point 2
> of the 3 rules are matching the same packet.
>
> How could that happen?  I'm not accepting between the statistic match rules
> (which would definitely cause the rules to get out of sync).

Have you tried using iptables-restore?

If you're using iptables to commit these rules individually (as your
first message implies) and the system is under traffic already, it's
easy for them to get out of sync because each nth rule tracks its own
state individually and MARK is non-terminating.  Any packets processed
by the kernel between each rule addition will cause their packet
counters (and potentially nth count) to be out of sync.  There will be
a consistent delta between the packet counters for the mangle
PREROUTING rules, since they only mark the packet (or not) and
continue processing the rest of the chain.  However, if the nth count
isn't in sync across all the rules, the mark can be overwritten
further down the chain, and subsequently mess up the filter rules.
An example using your rules (assuming subnet, etc already match):

Rule #1 added
	Packet #1 processed
		Rule #1 (initial count = 2, every = 2) matches, set mark 0x11
	Packet #2 processed
		Rule #1 (count = 0, every = 2) no match
Rule #2 added
	Packet #3 processed
		Rule #1 (count = 1, every = 2) no match
		Rule #2 (initial count = 1, every = 2) no match
Rule #3 added
	Packet #4 processed
		Rule #1 (count = 2, every = 2) matches, set mark 0x11
		Rule #2 (count = 2, every = 2) matches, overwrite mark 0x12
		Rule #3 (initial count = 0, every = 2) no match
	Packet #5 processed
		Rule #1 (count = 0, every = 2) no match
		Rule #2 (count = 0, every = 2) no match
		Rule #3 (count = 1, every = 2) no match
--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Netfitler Users]     [LARTC]     [Bugtraq]     [Yosemite Forum]

  Powered by Linux