Displaying 3 results from an estimated 3 matches for "newinfo".
Did you mean:
netinfo
2007 Apr 18
2
[Bridge] Re: [RESEND][PATCH] ebtables: clean up vmalloc usage in net/bridge/netfilter/ebtables.c
...ilter/ebtables.c
index 66bd932..84b9af7 100644
--- a/net/bridge/netfilter/ebtables.c
+++ b/net/bridge/netfilter/ebtables.c
@@ -824,9 +824,9 @@ static int translate_table(struct ebt_re
if (udc_cnt) {
/* this will get free'd in do_replace()/ebt_register_table()
if an error occurs */
- newinfo->chainstack = (struct ebt_chainstack **)
- vmalloc((highest_possible_processor_id()+1)
- * sizeof(struct ebt_chainstack));
+ newinfo->chainstack =
+ vmalloc((highest_possible_processor_id()+1)
+ * sizeof(*(newinfo->chainstack)));
if (!newinfo->chainstack)
r...
2012 Mar 13
1
[Bug 777] New: Suspect bug in __do_replace()
...ter/ip_tables.c __do_replace()
function. xt_replace_table() may return NULL when allocation of memory was not
successful by xt_replace_table->xt_jumpstack_alloc() (in my case I suspect
there were no free memory when it's happened):
...
oldinfo = xt_replace_table(t, num_counters, newinfo, &ret);
if (!oldinfo)
goto put_module;
The full bactrace is
WARNING: at /kernel/mm/vmalloc.c:107 vmap_page_range_noflush+0x120/0x1b4()
<4>[18835.587677] [<c00409dc>] (unwind_backtrace+0x0/0x164) from [<c0082a34>]
(warn_slowpath_common+0x4c/0x64)
<4>[18835.5...
2011 Jul 13
4
[Bug 728] New: ip_tables: limit match: invalid size 40!=48
...try_size_and_hooks a8000000019e8278
check_compat_entry_size_and_hooks a8000000019e8350
check_compat_entry_size_and_hooks a8000000019e83e8
check_compat_entry_size_and_hooks a8000000019e8480
check_compat_entry_size_and_hooks a8000000019e8518
Finished chain 1
Finished chain 2
Finished chain 3
xt_table_newinfo:size1488,number8,initial_entries0,hookentry[5]:00100811600,underflow[5]:0856100811600..
newinfo->size:1488,i:8,ret:0
ret:0,tmp.valid_hooks:14,tmp.size:1480,tmp.num_entries:8compat_do_replace:
Translated table
do_replace: oldnum=7, initnum=4, newnum=8
$./iptables -N syn_flood
=========than pri...