[prev in list] [next in list] [prev in thread] [next in thread]
List: netfilter-devel
Subject: Re: double call to ip_conntrack_put() ?
From: Wang Jian <lark () linux ! net ! cn>
Date: 2005-04-18 10:25:29
Message-ID: 20050418182442.0375.LARK () linux ! net ! cn
[Download RAW message or body]
Hi Tobias DiPasquale,
On Mon, 18 Apr 2005 05:57:30 -0400, Tobias DiPasquale <codeslinger@gmail.com> wrote:
>
> This is intended. tuplehash_to_ctrack() generates a reference to the
> conntrack record. In death_by_timeout() the refcount is decremented,
> yielding 1 for the second call to ip_conntrack_put(). The dec_and_test
> in nf_conntrack_put() (called by ip_conntrack_put()) will result in a
> refcount of 0, sending the record to the destroy_conntrack() function
> (or more properly, whatever's registered in nfct->destroy(), which I'm
> pretty sure is always either NULL or destroy_conntrack()).
>
Thanks for your clear answer :)
--
lark
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic