search for: ip_ct_dir_original

Displaying 7 results from an estimated 7 matches for "ip_ct_dir_original".

2006 Apr 13
3
[Bug 466] u.tcp used where u.udp should be, in tftp nat helper
...Resolution| |INVALID ------- Additional Comments From netfilter@linuxace.com 2006-04-13 06:19 MET ------- Unclear which version kernel you're looking at, but this is correct in 2.6.latest exp->saved_proto.udp.port = ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.src.u.udp.port; -- Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
2003 Aug 02
0
[SECURITY] Netfilter Security Advisory: Conntrack list_del() DoS
...d long status; + unsigned long status; =20 /* Timer function; drops refcnt when it goes off. */ struct timer_list timeout; @@ -254,7 +259,7 @@ /* It's confirmed if it is, or has been in the hash table. */ static inline int is_confirmed(struct ip_conntrack *ct) { - return ct->tuplehash[IP_CT_DIR_ORIGINAL].list.next !=3D NULL; + return test_bit(IPS_CONFIRMED_BIT, &ct->status); } =20 extern unsigned int ip_conntrack_htable_size; diff -urN --exclude-from=3Ddiff.exclude linux-2.4.20-base/net/ipv4/netfilte= r/ip_conntrack_core.c linux-2.4.20-del/net/ipv4/netfilter/ip_conntrack_core= =2Ec --- li...
2002 Jan 20
0
[ANNOUNCE] Bug in kernel == 2.4.10 causing netfilter problem
.../* Remove from both hash lists: must not NULL out next ptrs, > otherwise we'll look unconfirmed. Fortunately, LIST_DELETE > doesn't do this. --RR */ > LIST_DELETE(&ip_conntrack_hash > [hash_conntrack(&ct->tuplehash[IP_CT_DIR_ORIGINAL].tu= ple)], > &ct->tuplehash[IP_CT_DIR_ORIGINAL]); > LIST_DELETE(&ip_conntrack_hash > [hash_conntrack(&ct->tuplehash[IP_CT_DIR_REPLY].tuple= )], > &ct->tuplehash[IP_CT_DIR_REPLY]); LIST_DELETE...
2016 Oct 04
13
[Bug 1087] New: Window Tracking not disabled
https://bugzilla.netfilter.org/show_bug.cgi?id=1087 Bug ID: 1087 Summary: Window Tracking not disabled Product: conntrack-tools Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: enhancement Priority: P5 Component: conntrack-daemon Assignee: netfilter-buglog
2013 Mar 20
2
netfilter+libvirt=(smth got broken?)
Hello, I'm having problem setting up filtering traffic for a virtual machine managed by libvirt. Strange thing is, such a setup has been working fine for me on an older version of distro (namely, opensuse 11.3 w/updates, kernel 2.6.34, libvirt 0.8.8) but refused to work on shiny new opensuse 12.4 (kernel 3.7.10, libvirt 1.0.2). The definition of filter in question is pretty simple:
2011 Apr 07
8
[Bug 714] New: Kernel panics in same_src()
...t ffffffff8100ae7d gdb nf_nat.ko (gdb) l* nf_nat_setup_info+1497 0xf49 is in nf_nat_setup_info (net/ipv4/netfilter/nf_nat_core.c:135). 130 const struct nf_conntrack_tuple *tuple) 131 { 132 const struct nf_conntrack_tuple *t; 133 134 t = &ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple; 135 return (t->dst.protonum == tuple->dst.protonum && 136 t->src.u3.ip == tuple->src.u3.ip && 137 t->src.u.all == tuple->src.u.all); 138 } 139 Steps to Reproduce: I don't really know. It happends...
2013 Jul 05
4
[Bug 831] New: oops in find_appropriate_src+219
...018 #22 [ffff881810db3f30] cpu_idle at ffffffff8100204a crash> >From the dump looked like ct was NULL during the call of find_appropriate_src->same_src, which led to the panic. same_src(const struct nf_conn *ct,const struct nf_conntrack_tuple *tuple) { t = &ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple; <<<<ct was NULL } 0xffffffffa1491a44 <find_appropriate_src+212>: mov 0x20(%rbx),%rdx 0xffffffffa1491a48 <find_appropriate_src+216>: mov (%rbx),%rax 0xffffffffa1491a4b <find_appropriate_src+219>: cmp %r8b,0x3e(%rdx) <<<panic because rdx w...