Displaying 9 results from an estimated 9 matches for "tuplehash".
2006 Apr 13
3
[Bug 466] u.tcp used where u.udp should be, in tftp nat helper
...VED
Resolution| |INVALID
------- Additional Comments From netfilter@linuxace.com 2006-04-13 06:19 MET -------
Unclear which version kernel you're looking at, but this is correct in 2.6.latest
exp->saved_proto.udp.port
= ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.src.u.udp.port;
--
Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2003 Aug 02
0
[SECURITY] Netfilter Security Advisory: Conntrack list_del() DoS
...=3D (1 << IPS_ASSURED_BIT),
+
+ /* Connection is confirmed: originating packet has left box */
+ IPS_CONFIRMED_BIT =3D 3,
+ IPS_CONFIRMED =3D (1 << IPS_CONFIRMED_BIT),
};
=20
#include <linux/netfilter_ipv4/ip_conntrack_tcp.h>
@@ -159,7 +164,7 @@
struct ip_conntrack_tuple_hash tuplehash[IP_CT_DIR_MAX];
=20
/* Have we seen traffic both ways yet? (bitset) */
- volatile unsigned long status;
+ unsigned long status;
=20
/* Timer function; drops refcnt when it goes off. */
struct timer_list timeout;
@@ -254,7 +259,7 @@
/* It's confirmed if it is, or has been in the hash tabl...
2002 Jan 20
0
[ANNOUNCE] Bug in kernel == 2.4.10 causing netfilter problem
...> /* Remove from both hash lists: must not NULL out next ptrs,
> otherwise we'll look unconfirmed. Fortunately, LIST_DELETE
> doesn't do this. --RR */
> LIST_DELETE(&ip_conntrack_hash
> [hash_conntrack(&ct->tuplehash[IP_CT_DIR_ORIGINAL].tu=
ple)],
> &ct->tuplehash[IP_CT_DIR_ORIGINAL]);
> LIST_DELETE(&ip_conntrack_hash
> [hash_conntrack(&ct->tuplehash[IP_CT_DIR_REPLY].tuple=
)],
> &ct->tuplehash[IP_CT_DIR_REP...
2006 Oct 23
1
[Bug 512] poptop (pptpd) will not work if ip_nat_pptp loaded
...;
/* He Yi Oct 22, 2006 */
if( inet_addr_type(iph->daddr) == RTN_LOCAL )
{
DEBUGP("DO NOT CHANGE PPTP CALL ID FOR LOCAL
SERVICE!\n");
new_callid = ct_pptp_info->pns_call_id;
} else {
/* NATed src port is the dst port of the reply
*/
new_callid = ct->tuplehash
[IP_CT_DIR_REPLY].tuple.dst.u.tcp.port;
}
/* save new call ID in ct info */
ct_pptp_info->pns_call_id = ntohs(new_callid);
break;
......
It says, if the connection's destination is the local service, then do not
mangle the peer's call-ID.
--
Confi...
2011 Apr 07
8
[Bug 714] New: Kernel panics in same_src()
...cpu_idle at ffffffff8100ae7d
gdb nf_nat.ko
(gdb) l* nf_nat_setup_info+1497
0xf49 is in nf_nat_setup_info (net/ipv4/netfilter/nf_nat_core.c:135).
130 const struct nf_conntrack_tuple *tuple)
131 {
132 const struct nf_conntrack_tuple *t;
133
134 t = &ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple;
135 return (t->dst.protonum == tuple->dst.protonum &&
136 t->src.u3.ip == tuple->src.u3.ip &&
137 t->src.u.all == tuple->src.u.all);
138 }
139
Steps to Reproduce:
I don't reall...
2003 Mar 30
10
[Bug 71] dnat breaks connection tracking?
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=71
------- Additional Comments From laforge@netfilter.org 2003-03-30 21:18 -------
First of all: You didn't even specify the particular kernel version you are
running, not even mentioning which versions of which patches you are using (if
any).
Secondly, I don't see anything strange in this setup. DNAT with FTP sessions
2009 Mar 18
4
[Bug 586] New: Problems changing the source address of a packet
http://bugzilla.netfilter.org/show_bug.cgi?id=586
Summary: Problems changing the source address of a packet
Product: libnetfilter_queue
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: blocker
Priority: P1
Component: libnetfilter_queue
AssignedTo: laforge at netfilter.org
2013 Jul 05
4
[Bug 831] New: oops in find_appropriate_src+219
...0010 SS: 0018
#22 [ffff881810db3f30] cpu_idle at ffffffff8100204a
crash>
>From the dump looked like ct was NULL during the call of
find_appropriate_src->same_src, which led to the panic.
same_src(const struct nf_conn *ct,const struct nf_conntrack_tuple *tuple) {
t = &ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple; <<<<ct was NULL }
0xffffffffa1491a44 <find_appropriate_src+212>: mov 0x20(%rbx),%rdx
0xffffffffa1491a48 <find_appropriate_src+216>: mov (%rbx),%rax
0xffffffffa1491a4b <find_appropriate_src+219>: cmp %r8b,0x3e(%rdx)
<<<...
2016 Oct 04
13
[Bug 1087] New: Window Tracking not disabled
https://bugzilla.netfilter.org/show_bug.cgi?id=1087
Bug ID: 1087
Summary: Window Tracking not disabled
Product: conntrack-tools
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: conntrack-daemon
Assignee: netfilter-buglog