Displaying 7 results from an estimated 7 matches for "nft_parse".
2014 May 28
0
[Bug 948] New: tcp doff option crashes nft
...m
Estimated Hours: 0.0
There is a problem when we use doff parameter:
* We add the following rule, and It shows these error.
$ sudo nft add rule ip test input tcp doff 33
==14515== Invalid read of size 4
==14515== at 0x40D9E0: payload_expr_alloc (payload.c:111)
==14515== by 0x41CB63: nft_parse (parser.y:1967)
==14515== by 0x405BCF: nft_run (main.c:223)
==14515== by 0x405854: main (main.c:334)
==14515== Address 0x4 is not stack'd, malloc'd or (recently) free'd
==14515==
==14515==
==14515== Process terminating with default action of signal 11 (SIGSEGV)
==14515== Acces...
2013 Nov 29
1
[Bug 878] New: segfault running example/sets_and_maps
...13-rc1
valgrind output:
Memcheck, a memory error detector
Copyright (C) 2002-2012, and GNU GPL'd, by Julian Seward et al.
Using Valgrind-3.8.1 and LibVEX; rerun with -h for copyright info
Command: ./sets_and_maps
Invalid write of size 8
at 0x4062B1: symbol_bind (list.h:49)
by 0x418B62: nft_parse (parser.y:489)
by 0x4054DD: nft_run (main.c:205)
by 0x405189: main (main.c:321)
Address 0x0 is not stack'd, malloc'd or (recently) free'd
Process terminating with default action of signal 11 (SIGSEGV)
Access not within mapped region at address 0x0
at 0x4062B1: symbol_bind (...
2014 May 28
0
[Bug 947] New: meta protocol doesn't work with sets
...0B870: expr_evaluate (evaluate.c:220)
==14445== by 0x40CE26: list_member_evaluate (evaluate.c:597)
==14445== by 0x40B318: expr_evaluate (evaluate.c:677)
==14445== by 0x40B7AE: expr_evaluate (evaluate.c:878)
==14445== by 0x40CFB7: rule_evaluate (evaluate.c:1283)
==14445== by 0x419DD5: nft_parse (parser.y:580)
==14445== by 0x405BCF: nft_run (main.c:223)
==14445== by 0x405854: main (main.c:334)
--
Configure bugmail: https://bugzilla.netfilter.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.
2017 Apr 25
2
[Bug 1148] New: Getting a segmentation fault for some reason
...al SIGSEGV, Segmentation fault.
0x0000000000411cb9 in payload_expr_pctx_update ()
(gdb) bt
#0 0x0000000000411cb9 in payload_expr_pctx_update ()
#1 0x000000000040f5d6 in expr_evaluate ()
#2 0x000000000040dd8c in stmt_evaluate ()
#3 0x0000000000410eec in rule_evaluate ()
#4 0x000000000042d332 in nft_parse ()
#5 0x0000000000406b4d in nft_run ()
#6 0x000000000040676d in main ()
Assistance appreciated! Thanks!
--
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.netfilter.org/pipe...
2013 Nov 28
3
[Bug 877] New: nftables - Set - define core dumps
...ist_add (next=0x7ffff97efda0, prev=0xfbc440, new=0xfbc440) at
include/list.h:49
#1 list_add_tail (head=0x7ffff97efda0, new=0xfbc440) at include/list.h:76
#2 symbol_bind (scope=<optimized out>, identifier=0xfbc3c0 "ip_set",
expr=0xfc0770) at src/rule.c:176
#3 0x000000000041904b in nft_parse (scanner=0xfbc280,
state=0x7ffff97ef800) at src/parser.y:489
#4 0x00000000004055f3 in nft_run (scanner=<optimized out>,
state=0x7ffff97ef800, msgs=0x7ffff97efde0) at src/main.c:205
#5 0x00000000004052b8 in main (argc=<optimized out>, argv=<optimized
out>) at src/main.c:321
I m...
2016 Jul 10
2
[Bug 1079] New: nft-0.6: segfault on add rule ip filter INPUT ip protocol igmp counter accept
...00000415b94 in rule_evaluate (ctx=0x7fffffffe708, rule=0x676a60) at
evaluate.c:2470
#6 0x000000000041622b in cmd_evaluate_add (ctx=0x7fffffffe708, cmd=0x676b50)
at evaluate.c:2614
#7 0x0000000000416a0b in cmd_evaluate (ctx=0x7fffffffe708, cmd=0x676b50) at
evaluate.c:2857
#8 0x000000000043a3d6 in nft_parse (scanner=0x6764c0, state=0x7fffffffe120) at
parser_bison.y:672
#9 0x0000000000405d15 in nft_run (scanner=0x6764c0, state=0x7fffffffe120,
msgs=0x7fffffffe110) at main.c:231
#10 0x000000000040622a in main (argc=11, argv=0x7fffffffe928) at main.c:361
steps to reproduce:
1. nft create table ip filter...
2014 Apr 13
1
[Bug 915] New: segfault in error case : expr_evaluate_payload not checking payload->payload.desc being null
...in rule_evaluate (ctx=0x7fffffffe438, rule=0x64c840) at
src/evaluate.c:1283
#7 0x000000000041049e in cmd_evaluate_add (ctx=0x7fffffffe438, cmd=0x64c8d0)
at src/evaluate.c:1380
#8 0x000000000041066e in cmd_evaluate (ctx=0x7fffffffe438, cmd=0x64c8d0) at
src/evaluate.c:1424
#9 0x0000000000420dfe in nft_parse (scanner=0x64c490, state=0x7fffffffde50) at
src/parser.y:573
#10 0x00000000004055cb in nft_run (scanner=0x64c490, state=0x7fffffffde50,
msgs=0x7fffffffde40) at src/main.c:221
#11 0x0000000000405a47 in main (argc=8, argv=0x7fffffffe658) at src/main.c:332
(gdb) p payload
$1 = (struct expr *) 0x64c5a0...