search for: nft_run

Displaying 11 results from an estimated 11 matches for "nft_run".

Did you mean: _net_run
2014 May 28
0
[Bug 948] New: tcp doff option crashes nft
...we use doff parameter: * We add the following rule, and It shows these error. $ sudo nft add rule ip test input tcp doff 33 ==14515== Invalid read of size 4 ==14515== at 0x40D9E0: payload_expr_alloc (payload.c:111) ==14515== by 0x41CB63: nft_parse (parser.y:1967) ==14515== by 0x405BCF: nft_run (main.c:223) ==14515== by 0x405854: main (main.c:334) ==14515== Address 0x4 is not stack'd, malloc'd or (recently) free'd ==14515== ==14515== ==14515== Process terminating with default action of signal 11 (SIGSEGV) ==14515== Access not within mapped region at address 0x4 ==14515=...
2013 Nov 29
1
[Bug 878] New: segfault running example/sets_and_maps
...ory error detector Copyright (C) 2002-2012, and GNU GPL'd, by Julian Seward et al. Using Valgrind-3.8.1 and LibVEX; rerun with -h for copyright info Command: ./sets_and_maps Invalid write of size 8 at 0x4062B1: symbol_bind (list.h:49) by 0x418B62: nft_parse (parser.y:489) by 0x4054DD: nft_run (main.c:205) by 0x405189: main (main.c:321) Address 0x0 is not stack'd, malloc'd or (recently) free'd Process terminating with default action of signal 11 (SIGSEGV) Access not within mapped region at address 0x0 at 0x4062B1: symbol_bind (list.h:49) by 0x418B62: nft_parse (p...
2014 May 28
0
[Bug 947] New: meta protocol doesn't work with sets
...by 0x40CE26: list_member_evaluate (evaluate.c:597) ==14445== by 0x40B318: expr_evaluate (evaluate.c:677) ==14445== by 0x40B7AE: expr_evaluate (evaluate.c:878) ==14445== by 0x40CFB7: rule_evaluate (evaluate.c:1283) ==14445== by 0x419DD5: nft_parse (parser.y:580) ==14445== by 0x405BCF: nft_run (main.c:223) ==14445== by 0x405854: main (main.c:334) -- Configure bugmail: https://bugzilla.netfilter.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching all bug changes.
2017 Apr 25
2
[Bug 1148] New: Getting a segmentation fault for some reason
...00000411cb9 in payload_expr_pctx_update () (gdb) bt #0 0x0000000000411cb9 in payload_expr_pctx_update () #1 0x000000000040f5d6 in expr_evaluate () #2 0x000000000040dd8c in stmt_evaluate () #3 0x0000000000410eec in rule_evaluate () #4 0x000000000042d332 in nft_parse () #5 0x0000000000406b4d in nft_run () #6 0x000000000040676d in main () Assistance appreciated! Thanks! -- You are receiving this mail because: You are watching all bug changes. -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20...
2013 Jul 20
1
[Bug 834] New: nft crash when invalid meta proto is used
...040b1c5 in cmd_evaluate_add (cmd=0x639860, ctx=0x7fffffffd8c0) at src/evaluate.c:1292 #9 cmd_evaluate (cmd=0x639860, ctx=0x7fffffffd8c0) at src/evaluate.c:1335 #10 evaluate (ctx=ctx at entry=0x7fffffffd8c0, commands=commands at entry=0x7fffffffdff0) at src/evaluate.c:1352 #11 0x0000000000404eed in nft_run (scanner=scanner at entry=0x6392a0, state=state at entry=0x7fffffffda20, msgs=msgs at entry=0x7fffffffda10) at src/main.c:162 #12 0x0000000000404ba3 in main (argc=12, argv=<optimized out>) at src/main.c:288 The issue is linked with icmpv6 being used. WHen runn with debug=all option: <cmd...
2013 Nov 28
3
[Bug 877] New: nftables - Set - define core dumps
...(head=0x7ffff97efda0, new=0xfbc440) at include/list.h:76 #2 symbol_bind (scope=<optimized out>, identifier=0xfbc3c0 "ip_set", expr=0xfc0770) at src/rule.c:176 #3 0x000000000041904b in nft_parse (scanner=0xfbc280, state=0x7ffff97ef800) at src/parser.y:489 #4 0x00000000004055f3 in nft_run (scanner=<optimized out>, state=0x7ffff97ef800, msgs=0x7ffff97efde0) at src/main.c:205 #5 0x00000000004052b8 in main (argc=<optimized out>, argv=<optimized out>) at src/main.c:321 I m on the latest git pull on all ... The kernel is nf-next (3.12.0) -- Configure bugmail: https:...
2014 Jul 17
1
[Bug 967] New: segfault when adding large sets
...fffe3a0, cmd=cmd at entry=0x6518a0, excl=excl at entry=false) at src/rule.c:625 #7 0x0000000000407eea in do_command (ctx=ctx at entry=0x7fffffffe3a0, cmd=cmd at entry=0x6518a0) at src/rule.c:914 #8 0x0000000000406426 in nft_netlink (msgs=0x7fffffffe430, state=0x7fffffffe440) at src/main.c:183 #9 nft_run (scanner=scanner at entry=0x645390, state=state at entry=0x7fffffffe440, msgs=msgs at entry=0x7fffffffe430) at src/main.c:227 #10 0x0000000000405fca in main (argc=3, argv=<optimized out>) at src/main.c:340 # Loading a larger ruleset containing two ~1700-element sets: Program received signa...
2016 Jul 10
2
[Bug 1079] New: nft-0.6: segfault on add rule ip filter INPUT ip protocol igmp counter accept
...041622b in cmd_evaluate_add (ctx=0x7fffffffe708, cmd=0x676b50) at evaluate.c:2614 #7 0x0000000000416a0b in cmd_evaluate (ctx=0x7fffffffe708, cmd=0x676b50) at evaluate.c:2857 #8 0x000000000043a3d6 in nft_parse (scanner=0x6764c0, state=0x7fffffffe120) at parser_bison.y:672 #9 0x0000000000405d15 in nft_run (scanner=0x6764c0, state=0x7fffffffe120, msgs=0x7fffffffe110) at main.c:231 #10 0x000000000040622a in main (argc=11, argv=0x7fffffffe928) at main.c:361 steps to reproduce: 1. nft create table ip filter INPUT 2. nft create chain ip filter INPUT \{ type filGenter hook input priority 0\; policy drop...
2018 Feb 18
5
[Bug 1228] New: [REGRESSION] nft cannot load big set anymore
...ntry=false) at rule.c:1054 #7 0x00005600a1c967a7 in do_command (ctx=ctx at entry=0x7fff364093e0, cmd=cmd at entry=0x5600a2fdcab0) at rule.c:1805 #8 0x00005600a1c810e5 in nft_netlink (nf_sock=0x5600a2fdbb50, msgs=0x7fff36409490, state=0x7fff364094a0, nft=0x5600a2fdba20) at libnftables.c:47 #9 nft_run (nft=nft at entry=0x5600a2fdba20, nf_sock=0x5600a2fdbb50, scanner=scanner at entry=0x5600a2fdbb90, state=state at entry=0x7fff364094a0, msgs=msgs at entry=0x7fff36409490) at libnftables.c:95 #10 0x00005600a1c817dc in nft_run_cmd_from_filename (nft=0x5600a2fdba20, filename=0x7fff3640be70 "...
2016 Oct 20
2
[Bug 1092] New: nft v0.6 segfault in must_print_eq_op at expression.c:520 during 'nft monitor trace' in netdev filter
...x0, data = 0x47a8a0c910, seqnum = 4, batch_supported = true} err = <optimized out> tmp = <optimized out> err_list = {next = 0x3cc19177c60, prev = 0x3cc19177c60} batch_seqnum = 3 batch_supported = true ret = 0 cmd = 0x47a8a0c4d0 #12 nft_run (scanner=<optimized out>, state=0x3cc19177d20, msgs=0x3cc19177d10) at main.c:236 ---Type <return> to continue, or q <return> to quit--- cmd = <optimized out> next = <optimized out> ret = <optimized out> #13 0x00000047a69f5fa6 in main (argc...
2014 Apr 13
1
[Bug 915] New: segfault in error case : expr_evaluate_payload not checking payload->payload.desc being null
...e in cmd_evaluate_add (ctx=0x7fffffffe438, cmd=0x64c8d0) at src/evaluate.c:1380 #8 0x000000000041066e in cmd_evaluate (ctx=0x7fffffffe438, cmd=0x64c8d0) at src/evaluate.c:1424 #9 0x0000000000420dfe in nft_parse (scanner=0x64c490, state=0x7fffffffde50) at src/parser.y:573 #10 0x00000000004055cb in nft_run (scanner=0x64c490, state=0x7fffffffde50, msgs=0x7fffffffde40) at src/main.c:221 #11 0x0000000000405a47 in main (argc=8, argv=0x7fffffffe658) at src/main.c:332 (gdb) p payload $1 = (struct expr *) 0x64c5a0 (gdb) p *payload $2 = {list = {next = 0x64c5a0, prev = 0x64c5a0}, location = {indesc = 0x7ffff...