search for: nft_parse

Displaying 7 results from an estimated 7 matches for "nft_parse".

2014 May 28
0
[Bug 948] New: tcp doff option crashes nft
...m Estimated Hours: 0.0 There is a problem when we use doff parameter: * We add the following rule, and It shows these error. $ sudo nft add rule ip test input tcp doff 33 ==14515== Invalid read of size 4 ==14515== at 0x40D9E0: payload_expr_alloc (payload.c:111) ==14515== by 0x41CB63: nft_parse (parser.y:1967) ==14515== by 0x405BCF: nft_run (main.c:223) ==14515== by 0x405854: main (main.c:334) ==14515== Address 0x4 is not stack'd, malloc'd or (recently) free'd ==14515== ==14515== ==14515== Process terminating with default action of signal 11 (SIGSEGV) ==14515== Acces...
2013 Nov 29
1
[Bug 878] New: segfault running example/sets_and_maps
...13-rc1 valgrind output: Memcheck, a memory error detector Copyright (C) 2002-2012, and GNU GPL'd, by Julian Seward et al. Using Valgrind-3.8.1 and LibVEX; rerun with -h for copyright info Command: ./sets_and_maps Invalid write of size 8 at 0x4062B1: symbol_bind (list.h:49) by 0x418B62: nft_parse (parser.y:489) by 0x4054DD: nft_run (main.c:205) by 0x405189: main (main.c:321) Address 0x0 is not stack'd, malloc'd or (recently) free'd Process terminating with default action of signal 11 (SIGSEGV) Access not within mapped region at address 0x0 at 0x4062B1: symbol_bind (...
2014 May 28
0
[Bug 947] New: meta protocol doesn't work with sets
...0B870: expr_evaluate (evaluate.c:220) ==14445== by 0x40CE26: list_member_evaluate (evaluate.c:597) ==14445== by 0x40B318: expr_evaluate (evaluate.c:677) ==14445== by 0x40B7AE: expr_evaluate (evaluate.c:878) ==14445== by 0x40CFB7: rule_evaluate (evaluate.c:1283) ==14445== by 0x419DD5: nft_parse (parser.y:580) ==14445== by 0x405BCF: nft_run (main.c:223) ==14445== by 0x405854: main (main.c:334) -- Configure bugmail: https://bugzilla.netfilter.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching all bug changes.
2017 Apr 25
2
[Bug 1148] New: Getting a segmentation fault for some reason
...al SIGSEGV, Segmentation fault. 0x0000000000411cb9 in payload_expr_pctx_update () (gdb) bt #0 0x0000000000411cb9 in payload_expr_pctx_update () #1 0x000000000040f5d6 in expr_evaluate () #2 0x000000000040dd8c in stmt_evaluate () #3 0x0000000000410eec in rule_evaluate () #4 0x000000000042d332 in nft_parse () #5 0x0000000000406b4d in nft_run () #6 0x000000000040676d in main () Assistance appreciated! Thanks! -- You are receiving this mail because: You are watching all bug changes. -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.netfilter.org/pipe...
2013 Nov 28
3
[Bug 877] New: nftables - Set - define core dumps
...ist_add (next=0x7ffff97efda0, prev=0xfbc440, new=0xfbc440) at include/list.h:49 #1 list_add_tail (head=0x7ffff97efda0, new=0xfbc440) at include/list.h:76 #2 symbol_bind (scope=<optimized out>, identifier=0xfbc3c0 "ip_set", expr=0xfc0770) at src/rule.c:176 #3 0x000000000041904b in nft_parse (scanner=0xfbc280, state=0x7ffff97ef800) at src/parser.y:489 #4 0x00000000004055f3 in nft_run (scanner=<optimized out>, state=0x7ffff97ef800, msgs=0x7ffff97efde0) at src/main.c:205 #5 0x00000000004052b8 in main (argc=<optimized out>, argv=<optimized out>) at src/main.c:321 I m...
2016 Jul 10
2
[Bug 1079] New: nft-0.6: segfault on add rule ip filter INPUT ip protocol igmp counter accept
...00000415b94 in rule_evaluate (ctx=0x7fffffffe708, rule=0x676a60) at evaluate.c:2470 #6 0x000000000041622b in cmd_evaluate_add (ctx=0x7fffffffe708, cmd=0x676b50) at evaluate.c:2614 #7 0x0000000000416a0b in cmd_evaluate (ctx=0x7fffffffe708, cmd=0x676b50) at evaluate.c:2857 #8 0x000000000043a3d6 in nft_parse (scanner=0x6764c0, state=0x7fffffffe120) at parser_bison.y:672 #9 0x0000000000405d15 in nft_run (scanner=0x6764c0, state=0x7fffffffe120, msgs=0x7fffffffe110) at main.c:231 #10 0x000000000040622a in main (argc=11, argv=0x7fffffffe928) at main.c:361 steps to reproduce: 1. nft create table ip filter...
2014 Apr 13
1
[Bug 915] New: segfault in error case : expr_evaluate_payload not checking payload->payload.desc being null
...in rule_evaluate (ctx=0x7fffffffe438, rule=0x64c840) at src/evaluate.c:1283 #7 0x000000000041049e in cmd_evaluate_add (ctx=0x7fffffffe438, cmd=0x64c8d0) at src/evaluate.c:1380 #8 0x000000000041066e in cmd_evaluate (ctx=0x7fffffffe438, cmd=0x64c8d0) at src/evaluate.c:1424 #9 0x0000000000420dfe in nft_parse (scanner=0x64c490, state=0x7fffffffde50) at src/parser.y:573 #10 0x00000000004055cb in nft_run (scanner=0x64c490, state=0x7fffffffde50, msgs=0x7fffffffde40) at src/main.c:221 #11 0x0000000000405a47 in main (argc=8, argv=0x7fffffffe658) at src/main.c:332 (gdb) p payload $1 = (struct expr *) 0x64c5a0...