bugzilla-daemon at netfilter.org
2013-Nov-29 18:46 UTC
[Bug 878] New: segfault running example/sets_and_maps
https://bugzilla.netfilter.org/show_bug.cgi?id=878
Summary: segfault running example/sets_and_maps
Product: nftables
Version: unspecified
Platform: x86_64
OS/Version: All
Status: NEW
Severity: major
Priority: P5
Component: nft
AssignedTo: pablo at netfilter.org
ReportedBy: bjornar.ness at gmail.com
Estimated Hours: 0.0
running current git of libmnl/libnftables/nftables and 3.13-rc1
valgrind output:
Memcheck, a memory error detector
Copyright (C) 2002-2012, and GNU GPL'd, by Julian Seward et al.
Using Valgrind-3.8.1 and LibVEX; rerun with -h for copyright info
Command: ./sets_and_maps
Invalid write of size 8
at 0x4062B1: symbol_bind (list.h:49)
by 0x418B62: nft_parse (parser.y:489)
by 0x4054DD: nft_run (main.c:205)
by 0x405189: main (main.c:321)
Address 0x0 is not stack'd, malloc'd or (recently) free'd
Process terminating with default action of signal 11 (SIGSEGV)
Access not within mapped region at address 0x0
at 0x4062B1: symbol_bind (list.h:49)
by 0x418B62: nft_parse (parser.y:489)
by 0x4054DD: nft_run (main.c:205)
by 0x405189: main (main.c:321)
If you believe this happened as a result of a stack
overflow in your program's main thread (unlikely but
possible), you can try to increase the size of the
main thread stack using the --main-stacksize= flag.
The main thread stack size used in this run was 8388608.
HEAP SUMMARY:
in use at exit: 153,142 bytes in 17 blocks
total heap usage: 20 allocs, 3 frees, 154,283 bytes allocated
LEAK SUMMARY:
definitely lost: 0 bytes in 0 blocks
indirectly lost: 0 bytes in 0 blocks
possibly lost: 0 bytes in 0 blocks
still reachable: 153,142 bytes in 17 blocks
suppressed: 0 bytes in 0 blocks
Rerun with --leak-check=full to see details of leaked memory
For counts of detected and suppressed errors, rerun with: -v
ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 2 from 2)
Segmentation fault (core dumped)
--
Configure bugmail: https://bugzilla.netfilter.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.
bugzilla-daemon at netfilter.org
2013-Nov-29 20:05 UTC
[Bug 878] segfault running example/sets_and_maps
https://bugzilla.netfilter.org/show_bug.cgi?id=878
Phil Oester <netfilter at linuxace.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
CC| |netfilter at linuxace.com
Resolution| |DUPLICATE
--- Comment #1 from Phil Oester <netfilter at linuxace.com> 2013-11-29
21:04:55 CET ---
Same issue as bug 877. Closing.
*** This bug has been marked as a duplicate of bug 877 ***
--
Configure bugmail: https://bugzilla.netfilter.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.
Maybe Matching Threads
- [Bug 877] New: nftables - Set - define core dumps
- [Bug 948] New: tcp doff option crashes nft
- [Bug 947] New: meta protocol doesn't work with sets
- [Bug 1148] New: Getting a segmentation fault for some reason
- [Bug 1079] New: nft-0.6: segfault on add rule ip filter INPUT ip protocol igmp counter accept