mirror of
https://gitlab.com/libvirt/libvirt.git
synced 2024-12-22 13:45:38 +00:00
2a95dbd03c
Long ago we adapted to Linux kernel changes which inverted the
behaviour of the conntrack --ctdir setting:
commit a6a04ea47a
Author: Stefan Berger <stefanb@us.ibm.com>
Date: Wed May 15 21:02:11 2013 -0400
nwfilter: check for inverted ctdir
Linux netfilter at some point (Linux 2.6.39) inverted the meaning of the
'--ctdir reply' and newer netfilter implementations now expect
'--ctdir original' instead and vice-versa.
We check for the kernel version and assume that all Linux kernels with version
2.6.39 have the newer inverted logic.
Any distro backporting the Linux kernel patch that inverts the --ctdir logic
(Linux commit 96120d86f) must also backport this patch for Linux and
adapt the kernel version being tested for.
Signed-off-by: Stefan Berger <stefanb@linux.vnet.ibm.com>
Given our supported platform targets, we no longer need to
consider a version of Linux before 2.6.39, so can drop
support for the old direction behaviour.
The test suite updates are triggered because that never
probed for the ctdir direction, and so the iptables syntax
generator unconditionally dropped the ctdir args.
Reviewed-by: Laine Stump <laine@redhat.com>
Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
129 lines
1.9 KiB
Plaintext
129 lines
1.9 KiB
Plaintext
iptables \
|
|
-w \
|
|
-A FJ-vnet0 \
|
|
-p udp \
|
|
-m mac \
|
|
--mac-source 01:02:03:04:05:06 \
|
|
--destination 10.1.2.3/32 \
|
|
-m dscp \
|
|
--dscp 2 \
|
|
-m conntrack \
|
|
--ctstate NEW,ESTABLISHED \
|
|
-m conntrack \
|
|
--ctdir Original \
|
|
-j RETURN
|
|
iptables \
|
|
-w \
|
|
-A FP-vnet0 \
|
|
-p udp \
|
|
--source 10.1.2.3/32 \
|
|
-m dscp \
|
|
--dscp 2 \
|
|
-m conntrack \
|
|
--ctstate ESTABLISHED \
|
|
-m conntrack \
|
|
--ctdir Reply \
|
|
-j ACCEPT
|
|
iptables \
|
|
-w \
|
|
-A HJ-vnet0 \
|
|
-p udp \
|
|
-m mac \
|
|
--mac-source 01:02:03:04:05:06 \
|
|
--destination 10.1.2.3/32 \
|
|
-m dscp \
|
|
--dscp 2 \
|
|
-m conntrack \
|
|
--ctstate NEW,ESTABLISHED \
|
|
-m conntrack \
|
|
--ctdir Original \
|
|
-j RETURN
|
|
iptables \
|
|
-w \
|
|
-A FJ-vnet0 \
|
|
-p udp \
|
|
--destination 10.1.2.3/32 \
|
|
-m dscp \
|
|
--dscp 33 \
|
|
--dport 20:21 \
|
|
--sport 100:1111 \
|
|
-m conntrack \
|
|
--ctstate ESTABLISHED \
|
|
-m conntrack \
|
|
--ctdir Reply \
|
|
-j RETURN
|
|
iptables \
|
|
-w \
|
|
-A FP-vnet0 \
|
|
-p udp \
|
|
-m mac \
|
|
--mac-source 01:02:03:04:05:06 \
|
|
--source 10.1.2.3/32 \
|
|
-m dscp \
|
|
--dscp 33 \
|
|
--sport 20:21 \
|
|
--dport 100:1111 \
|
|
-m conntrack \
|
|
--ctstate NEW,ESTABLISHED \
|
|
-m conntrack \
|
|
--ctdir Original \
|
|
-j ACCEPT
|
|
iptables \
|
|
-w \
|
|
-A HJ-vnet0 \
|
|
-p udp \
|
|
--destination 10.1.2.3/32 \
|
|
-m dscp \
|
|
--dscp 33 \
|
|
--dport 20:21 \
|
|
--sport 100:1111 \
|
|
-m conntrack \
|
|
--ctstate ESTABLISHED \
|
|
-m conntrack \
|
|
--ctdir Reply \
|
|
-j RETURN
|
|
iptables \
|
|
-w \
|
|
-A FJ-vnet0 \
|
|
-p udp \
|
|
--destination 10.1.2.3/32 \
|
|
-m dscp \
|
|
--dscp 63 \
|
|
--dport 255:256 \
|
|
--sport 65535:65535 \
|
|
-m conntrack \
|
|
--ctstate ESTABLISHED \
|
|
-m conntrack \
|
|
--ctdir Reply \
|
|
-j RETURN
|
|
iptables \
|
|
-w \
|
|
-A FP-vnet0 \
|
|
-p udp \
|
|
-m mac \
|
|
--mac-source 01:02:03:04:05:06 \
|
|
--source 10.1.2.3/32 \
|
|
-m dscp \
|
|
--dscp 63 \
|
|
--sport 255:256 \
|
|
--dport 65535:65535 \
|
|
-m conntrack \
|
|
--ctstate NEW,ESTABLISHED \
|
|
-m conntrack \
|
|
--ctdir Original \
|
|
-j ACCEPT
|
|
iptables \
|
|
-w \
|
|
-A HJ-vnet0 \
|
|
-p udp \
|
|
--destination 10.1.2.3/32 \
|
|
-m dscp \
|
|
--dscp 63 \
|
|
--dport 255:256 \
|
|
--sport 65535:65535 \
|
|
-m conntrack \
|
|
--ctstate ESTABLISHED \
|
|
-m conntrack \
|
|
--ctdir Reply \
|
|
-j RETURN
|