[Bug 1048] xt_bpf completely broken with kernel 4.3

bugzilla-daemon at netfilter.org bugzilla-daemon at netfilter.org
Fri Feb 19 15:01:24 CET 2016


https://bugzilla.netfilter.org/show_bug.cgi?id=1048

--- Comment #2 from blaffablaffa at gmail.com ---
It turns out that the problem is indeed the different 0 offset that xt_bpf and
tcpdump use. In particular, it appears that offset 0 in tcpdump is at the very
beginning of the packet (ethernet header included) whereas xt_bpf uses the
beginning of the IP header. I've spoken with the author of the module, and he
is probably going to just point this out more clearly in the man pages.

-- 
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20160219/047b0f45/attachment.html>


More information about the netfilter-buglog mailing list