bugzilla-daemon at netfilter.org
2016-Feb-19 14:01 UTC
[Bug 1048] xt_bpf completely broken with kernel 4.3
https://bugzilla.netfilter.org/show_bug.cgi?id=1048 --- Comment #2 from blaffablaffa at gmail.com --- It turns out that the problem is indeed the different 0 offset that xt_bpf and tcpdump use. In particular, it appears that offset 0 in tcpdump is at the very beginning of the packet (ethernet header included) whereas xt_bpf uses the beginning of the IP header. I've spoken with the author of the module, and he is probably going to just point this out more clearly in the man pages. -- You are receiving this mail because: You are watching all bug changes. -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20160219/047b0f45/attachment.html>
Maybe Matching Threads
- [Bug 1048] xt_bpf completely broken with kernel 4.3
- [Bug 1048] xt_bpf completely broken with kernel 4.3
- [Bug 1048] xt_bpf completely broken with kernel 4.3
- [Bug 1129] New: iptables outgoing SNAT works for a while then stops working completely for a while
- [Bug 1308] New: iptables -i + is broken in v1.8.0