Displaying 4 results from an estimated 4 matches for "ip_conntrack_lock".
2002 Aug 23
0
Re: ip_conntrack_lock not readlocked (fwd)
...http://www.shorewall.net
ICQ: #60745924 \ teastep@shorewall.net
---------- Forwarded message ----------
Date: Tue, 2 Jul 2002 18:02:05 +0200
From: Harald Welte <laforge@sunbeam.franken.de>
To: Albrecht Melan <melan@isd.uni-stuttgart.de>
Cc: netfilter-devel@lists.samba.org
Subject: Re: ip_conntrack_lock not readlocked
On Tue, Jul 02, 2002 at 04:11:37PM +0200, Albrecht Melan wrote:
> Hi,
>
> I''m using a kernel of version 2.4.18 where module-support is disabled
> together with iptables-1.2.6a ( all compiled by myself).
> I applied patches to netfilter using POM.
which p...
2006 Jul 25
0
[Bug 495] New: Netfilter Connection Tracking Race Condition in Kernel 2.4.x
.../net/ipv4/netfilter/ip_conntrack_core.c.orig 2005-04-03
18:42:20.000000000 -0700
+++ linux-2.4.32/net/ipv4/netfilter/ip_conntrack_core.c 2006-07-24
13:23:25.000000000 -0700
@@ -777,6 +777,14 @@
/* look for tuple match */
h = ip_conntrack_find_get(&tuple, NULL);
if (!h) {
+ READ_LOCK(&ip_conntrack_lock);
+ h = LIST_FIND(&unconfirmed, conntrack_tuple_cmp,
+ struct ip_conntrack_tuple_hash *, &tuple, NULL);
+ if (h)
+ atomic_inc(&h->ctrack->ct_general.use);
+ READ_UNLOCK(&ip_conntrack_lock);
+ }
+ if (!h) {
h = init_conntrack(&tuple, proto, skb);
if (!h)...
2003 Aug 02
0
[SECURITY] Netfilter Security Advisory: Conntrack list_del() DoS
...ip_conntrack_core=
=2Ec
--- linux-2.4.20-base/net/ipv4/netfilter/ip_conntrack_core.c Tue Feb 18 17:=
08:21 2003
+++ linux-2.4.20-del/net/ipv4/netfilter/ip_conntrack_core.c Fri Feb 21 17:0=
1:39 2003
@@ -292,9 +292,6 @@
{
DEBUGP("clean_from_lists(%p)\n", ct);
MUST_BE_WRITE_LOCKED(&ip_conntrack_lock);
- /* Remove from both hash lists: must not NULL out next ptrs,
- otherwise we'll look unconfirmed. Fortunately, LIST_DELETE
- doesn't do this. --RR */
LIST_DELETE(&ip_conntrack_hash
[hash_conntrack(&ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple)],...
2002 Jan 20
0
[ANNOUNCE] Bug in kernel == 2.4.10 causing netfilter problem
...;next =3D entry->prev =3D 0;
> }
> =20
> /**
This change breaks an assumption made by the netfilter connection tracking
code in linux/net/ipv4/netfilter/ip_conntrack_core.c:
> static void
> clean_from_lists(struct ip_conntrack *ct)
> {
> MUST_BE_WRITE_LOCKED(&ip_conntrack_lock);
> /* Remove from both hash lists: must not NULL out next ptrs,
> otherwise we'll look unconfirmed. Fortunately, LIST_DELETE
> doesn't do this. --RR */
> LIST_DELETE(&ip_conntrack_hash
> [hash_conntrack(&ct-&...