bugzilla-daemon at bugzilla.netfilter.org
2011-Jul-13 01:43 UTC
[Bug 728] New: ip_tables: limit match: invalid size 40!=48
http://bugzilla.netfilter.org/show_bug.cgi?id=728 Summary: ip_tables: limit match: invalid size 40!=48 Product: netfilter/iptables Version: linux-2.6.x Platform: mips64 OS/Version: Debian GNU/Linux Status: NEW Severity: critical Priority: P2 Component: ip_tables (kernel) AssignedTo: netfilter-buglog at lists.netfilter.org ReportedBy: wensy1009 at sina.com Estimated Hours: 0.0 I cross compiled iptables for mips(64bit) architecture and tried running iptables in pizzabox.my linux kernel is 2.6.32,first use iptables 1.4.4,after that i try iptables 1.4.11, problem still be there.when i set first entry which has limit match,the value off=8(xt_compat_match_offset(match)) in function xt_compat_match_from_user. After that ,i input another rule,it tells me "iptables: Invalid argument". dmesg tell me "ip_tables: limit match: invalid size 40!=48 " i open the DEBUG_IP_FIREWALL_USER in ip_tables.c,and add some print information. can you tell me how to fix this bug? =================print information: $./iptables -A INPUT -p icmp -m limit --limit 6/m --limit-burst 7 -j ACCEPT ===print infromation: t->private->number = 7 fun_into_compat_do_ipt_set_ctl compat_do_replace_copy_from_user copy from user:name filter,valid_hooks 14,number entries8,size 1480,hood_entry[5]:00100011520,underflow[5]:0848100011520,num_counters:7,counters:268608936,.. tmp.size:1480 fun_translate_compat_table translate_compat_table: size 1480 check_compat_entry_size_and_hooks a8000000019e8000 check_compat_entry_size_and_hooks a8000000019e80e8 check_compat_entry_size_and_hooks a8000000019e81b0 check_compat_entry_size_and_hooks a8000000019e8278 check_compat_entry_size_and_hooks a8000000019e8350 check_compat_entry_size_and_hooks a8000000019e83e8 check_compat_entry_size_and_hooks a8000000019e8480 check_compat_entry_size_and_hooks a8000000019e8518 Finished chain 1 Finished chain 2 Finished chain 3 xt_table_newinfo:size1488,number8,initial_entries0,hookentry[5]:00100811600,underflow[5]:0856100811600.. newinfo->size:1488,i:8,ret:0 ret:0,tmp.valid_hooks:14,tmp.size:1480,tmp.num_entries:8compat_do_replace: Translated table do_replace: oldnum=7, initnum=4, newnum=8 $./iptables -N syn_flood =========than print Ivalid arguments t->private->number = 8 fun_into_compat_do_ipt_set_ctl compat_do_replace_copy_from_user copy from user:name filter,valid_hooks 14,number entries10,size 1816,hood_entry[5]:00100811600,underflow[5]:0856100811600,num_counters:8,counters:268608600,.. tmp.size:1816 fun_translate_compat_table translate_compat_table: size 1816 check_compat_entry_size_and_hooks a8000000019e8800 check_compat_entry_size_and_hooks a8000000019e88e8 check_compat_entry_size_and_hooks a8000000019e89b0 check_compat_entry_size_and_hooks a8000000019e8a78 check_compat_entry_size_and_hooks a8000000019e8b58 check_compat_entry_size_and_hooks a8000000019e8bf0 check_compat_entry_size_and_hooks a8000000019e8c88 check_compat_entry_size_and_hooks a8000000019e8d20 check_compat_entry_size_and_hooks a8000000019e8dd0 check_compat_entry_size_and_hooks a8000000019e8e68 Finished chain 1 Finished chain 2 Finished chain 3 ip_tables: limit match: invalid size 40 != 48 ip_tables: check failed for `par.match->name'. xt_table_newinfo:size1824,number10,initial_entries0,hookentry[5]:00101611680,underflow[5]:0864101611680.. newinfo->size:1824,i:3,ret:-22 ret:-22,tmp.valid_hooks:14,tmp.size:1816,tmp.num_entries:10 compat_do_replace compat_do_ipt_set_ctl_end,ret:-22 -- Configure bugmail: http://bugzilla.netfilter.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug. You are watching all bug changes.
bugzilla-daemon at bugzilla.netfilter.org
2011-Jul-21 09:53 UTC
[Bug 728] ip_tables: limit match: invalid size 40!=48
http://bugzilla.netfilter.org/show_bug.cgi?id=728 Jan Engelhardt <jengelh at medozas.de> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |jengelh at medozas.de --- Comment #1 from Jan Engelhardt <jengelh at medozas.de> 2011-07-21 11:53:09 --- Are you combining a 64-bit userspace with a 32-bit kernel or something? -- Configure bugmail: http://bugzilla.netfilter.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug. You are watching all bug changes.
bugzilla-daemon at bugzilla.netfilter.org
2011-Jul-21 11:03 UTC
[Bug 728] ip_tables: limit match: invalid size 40!=48
http://bugzilla.netfilter.org/show_bug.cgi?id=728 --- Comment #2 from huwenxin <wensy1009 at sina.com> 2011-07-21 13:03:51 --- (In reply to comment #1)> Are you combining a 64-bit userspace with a 32-bit kernel or something? > i used 32-bit userspace with a 64-bit kernel mips architecture.-- Configure bugmail: http://bugzilla.netfilter.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug. You are watching all bug changes.
bugzilla-daemon at bugzilla.netfilter.org
2011-Jul-21 13:42 UTC
[Bug 728] ip_tables: limit match: invalid size 40!=48
http://bugzilla.netfilter.org/show_bug.cgi?id=728 --- Comment #3 from Jan Engelhardt <jengelh at medozas.de> 2011-07-21 15:42:55 --- Outputting 48 at all is highly surprising. Please compile and run cctypeinfo from the hxtools distribution: http://dev.medozas.de/gitweb.cgi?p=hxtools;a=blob;f=sdevel/cctypeinfo.c;hb=HEAD -- Configure bugmail: http://bugzilla.netfilter.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug. You are watching all bug changes.
bugzilla-daemon at bugzilla.netfilter.org
2011-Sep-03 13:45 UTC
[Bug 728] ip_tables: limit match: invalid size 40!=48
http://bugzilla.netfilter.org/show_bug.cgi?id=728 Jan Engelhardt <jengelh at medozas.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution| |WORKSFORME -- Configure bugmail: http://bugzilla.netfilter.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug. You are watching all bug changes.
Reasonably Related Threads
- iptables 1.2.5 and shorewall 1.2.8?
- kernel: ip_tables: MARK target: only valid in mangle table, not filter
- [Bug 531] New: ip_tables.h: IPT_TABLE_MAXNAMELEN bogously #defined to XT_FUNCTION_MAXNAMELEN
- [Bug 531] ip_tables.h: IPT_TABLE_MAXNAMELEN bogously #defined to XT_FUNCTION_MAXNAMELEN
- [Bug 84] Unaligned access in ip_tables.c:ip_packet_match