From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.0 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_PASS,USER_AGENT_NEOMUTT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 094C6C10F11 for ; Mon, 22 Apr 2019 18:57:15 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id CA43521738 for ; Mon, 22 Apr 2019 18:57:14 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728692AbfDVS5N (ORCPT ); Mon, 22 Apr 2019 14:57:13 -0400 Received: from Chamillionaire.breakpoint.cc ([146.0.238.67]:52378 "EHLO Chamillionaire.breakpoint.cc" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727014AbfDVS5N (ORCPT ); Mon, 22 Apr 2019 14:57:13 -0400 Received: from fw by Chamillionaire.breakpoint.cc with local (Exim 4.89) (envelope-from ) id 1hIe7q-0002nh-BO; Mon, 22 Apr 2019 20:57:10 +0200 Date: Mon, 22 Apr 2019 20:57:10 +0200 From: Florian Westphal To: Andreas Hartmann Cc: Florian Westphal , Pablo Neira Ayuso , linux-kernel@vger.kernel.org Subject: Re: [PATCH 4.19 13/99] netfilter: nf_conncount: fix argument order to find_next_bit Message-ID: <20190422185710.3la4ayzxslafxwbn@breakpoint.cc> References: <20190121134913.924726465@linuxfoundation.org> <20190121134914.421023706@linuxfoundation.org> <20190422172732.sneybhuwrreb7g2u@breakpoint.cc> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: NeoMutt/20170113 (1.7.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Andreas Hartmann wrote: > > Could you at least tell us how you're using nf_conncount (nf/iptables > > rules)? > > # Generated by iptables-save v1.6.2 on Mon Apr 22 20:19:30 2019 > *filter > :INPUT DROP [0:0] > :FORWARD ACCEPT [0:0] > :OUTPUT DROP [4423:248703] > -A INPUT -s 127.0.0.1/32 -d 239.255.255.250/32 -i lo -p udp -j ACCEPT > -A INPUT -p tcp -m tcp --dport 113 -j REJECT --reject-with icmp-port-unreachable > -A INPUT -d 255.255.255.255/32 -p udp -j ACCEPT > -A INPUT -d 224.0.0.1/32 -j ACCEPT > -A INPUT -s 127.0.0.1/32 -d 127.0.0.2/32 -i lo -j ACCEPT > -A INPUT -s 127.0.0.1/32 -d 127.0.0.1/32 -i lo -j ACCEPT > -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT > -A INPUT -s 192.168.22.0/24 -j ACCEPT > -A INPUT -j LOG --log-prefix "In Input gesperrt: " > -A INPUT -s 169.254.2.1/32 -d 169.254.2.2/32 -i br1 -p tcp -m tcp --sport 80 -j ACCEPT > -A OUTPUT -s 192.168.22.6/32 -d 224.0.0.22/32 -o lo -p igmp -j ACCEPT > -A OUTPUT -d 192.168.6.173/32 -o br1 -p tcp -m tcp --dport 80 -j ACCEPT > -A OUTPUT -s 169.254.2.2/32 -d 239.255.255.250/32 -o br1 -p udp -j DROP > -A OUTPUT -s 192.168.22.6/32 -d 224.0.0.251/32 -o br1 -p udp -j ACCEPT > -A OUTPUT -s 127.0.0.1/32 -d 239.255.255.250/32 -o lo -p udp -j ACCEPT > -A OUTPUT -s 192.168.22.6/32 -d 255.255.255.255/32 -o br1 -p udp -m udp --dport 1900 -j ACCEPT > -A OUTPUT -s 127.0.0.1/32 -d 127.255.255.255/32 -o br1 -p udp -j ACCEPT > -A OUTPUT -s 192.168.22.6/32 -d 239.0.0.250/32 -o br1 -p igmp -j ACCEPT > -A OUTPUT -s 192.168.22.6/32 -d 239.255.255.250/32 -o br1 -p igmp -j ACCEPT > -A OUTPUT -s 192.168.22.6/32 -d 239.255.255.250/32 -o br1 -p udp -m udp --dport 1900 -j ACCEPT > -A OUTPUT -s 192.168.22.6/32 -d 239.1.1.1/32 -o br1 -p udp -j ACCEPT > -A OUTPUT -s 192.168.22.6/32 -d 239.1.1.1/32 -o br1 -p igmp -j ACCEPT > -A OUTPUT -s 192.168.22.6/32 -d 224.0.0.251/32 -o br1 -p igmp -j ACCEPT > -A OUTPUT -s 192.168.22.6/32 -p tcp -m tcp --dport 1935 -j ACCEPT > -A OUTPUT -s 192.168.22.0/24 -d 192.168.3.0/24 -j ACCEPT > -A OUTPUT -s 127.0.0.1/32 -d 127.0.0.2/32 -o lo -j ACCEPT > -A OUTPUT -s 127.0.0.1/32 -d 127.0.0.1/32 -o lo -j ACCEPT > -A OUTPUT -m state --state RELATED,ESTABLISHED -j ACCEPT > -A OUTPUT -s 192.168.22.0/24 -d 192.168.22.0/24 -j ACCEPT > -A OUTPUT -j LOG --log-prefix "In Output gesperrt: " > -A OUTPUT -s 169.254.2.2/32 -d 169.254.2.1/32 -o br1 -p tcp -m tcp --dport 80 -j ACCEPT > COMMIT I don't see connlimit match is in use. Could you post output of lsmod | grep nf_conncount and grep CONNCOUNT ~/your_kernel_conf Thanks.