bugzilla-daemon at netfilter.org
2013-Nov-29 18:46 UTC
[Bug 878] New: segfault running example/sets_and_maps
https://bugzilla.netfilter.org/show_bug.cgi?id=878 Summary: segfault running example/sets_and_maps Product: nftables Version: unspecified Platform: x86_64 OS/Version: All Status: NEW Severity: major Priority: P5 Component: nft AssignedTo: pablo at netfilter.org ReportedBy: bjornar.ness at gmail.com Estimated Hours: 0.0 running current git of libmnl/libnftables/nftables and 3.13-rc1 valgrind output: Memcheck, a memory error detector Copyright (C) 2002-2012, and GNU GPL'd, by Julian Seward et al. Using Valgrind-3.8.1 and LibVEX; rerun with -h for copyright info Command: ./sets_and_maps Invalid write of size 8 at 0x4062B1: symbol_bind (list.h:49) by 0x418B62: nft_parse (parser.y:489) by 0x4054DD: nft_run (main.c:205) by 0x405189: main (main.c:321) Address 0x0 is not stack'd, malloc'd or (recently) free'd Process terminating with default action of signal 11 (SIGSEGV) Access not within mapped region at address 0x0 at 0x4062B1: symbol_bind (list.h:49) by 0x418B62: nft_parse (parser.y:489) by 0x4054DD: nft_run (main.c:205) by 0x405189: main (main.c:321) If you believe this happened as a result of a stack overflow in your program's main thread (unlikely but possible), you can try to increase the size of the main thread stack using the --main-stacksize= flag. The main thread stack size used in this run was 8388608. HEAP SUMMARY: in use at exit: 153,142 bytes in 17 blocks total heap usage: 20 allocs, 3 frees, 154,283 bytes allocated LEAK SUMMARY: definitely lost: 0 bytes in 0 blocks indirectly lost: 0 bytes in 0 blocks possibly lost: 0 bytes in 0 blocks still reachable: 153,142 bytes in 17 blocks suppressed: 0 bytes in 0 blocks Rerun with --leak-check=full to see details of leaked memory For counts of detected and suppressed errors, rerun with: -v ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 2 from 2) Segmentation fault (core dumped) -- Configure bugmail: https://bugzilla.netfilter.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching all bug changes.
bugzilla-daemon at netfilter.org
2013-Nov-29 20:05 UTC
[Bug 878] segfault running example/sets_and_maps
https://bugzilla.netfilter.org/show_bug.cgi?id=878 Phil Oester <netfilter at linuxace.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED CC| |netfilter at linuxace.com Resolution| |DUPLICATE --- Comment #1 from Phil Oester <netfilter at linuxace.com> 2013-11-29 21:04:55 CET --- Same issue as bug 877. Closing. *** This bug has been marked as a duplicate of bug 877 *** -- Configure bugmail: https://bugzilla.netfilter.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching all bug changes.
Seemingly Similar Threads
- [Bug 877] New: nftables - Set - define core dumps
- [Bug 948] New: tcp doff option crashes nft
- [Bug 947] New: meta protocol doesn't work with sets
- [Bug 1148] New: Getting a segmentation fault for some reason
- [Bug 1079] New: nft-0.6: segfault on add rule ip filter INPUT ip protocol igmp counter accept