Displaying 11 results from an estimated 11 matches for "nft_run".
Did you mean:
_net_run
2014 May 28
0
[Bug 948] New: tcp doff option crashes nft
...we use doff parameter:
* We add the following rule, and It shows these error.
$ sudo nft add rule ip test input tcp doff 33
==14515== Invalid read of size 4
==14515== at 0x40D9E0: payload_expr_alloc (payload.c:111)
==14515== by 0x41CB63: nft_parse (parser.y:1967)
==14515== by 0x405BCF: nft_run (main.c:223)
==14515== by 0x405854: main (main.c:334)
==14515== Address 0x4 is not stack'd, malloc'd or (recently) free'd
==14515==
==14515==
==14515== Process terminating with default action of signal 11 (SIGSEGV)
==14515== Access not within mapped region at address 0x4
==14515=...
2013 Nov 29
1
[Bug 878] New: segfault running example/sets_and_maps
...ory error detector
Copyright (C) 2002-2012, and GNU GPL'd, by Julian Seward et al.
Using Valgrind-3.8.1 and LibVEX; rerun with -h for copyright info
Command: ./sets_and_maps
Invalid write of size 8
at 0x4062B1: symbol_bind (list.h:49)
by 0x418B62: nft_parse (parser.y:489)
by 0x4054DD: nft_run (main.c:205)
by 0x405189: main (main.c:321)
Address 0x0 is not stack'd, malloc'd or (recently) free'd
Process terminating with default action of signal 11 (SIGSEGV)
Access not within mapped region at address 0x0
at 0x4062B1: symbol_bind (list.h:49)
by 0x418B62: nft_parse (p...
2014 May 28
0
[Bug 947] New: meta protocol doesn't work with sets
...by 0x40CE26: list_member_evaluate (evaluate.c:597)
==14445== by 0x40B318: expr_evaluate (evaluate.c:677)
==14445== by 0x40B7AE: expr_evaluate (evaluate.c:878)
==14445== by 0x40CFB7: rule_evaluate (evaluate.c:1283)
==14445== by 0x419DD5: nft_parse (parser.y:580)
==14445== by 0x405BCF: nft_run (main.c:223)
==14445== by 0x405854: main (main.c:334)
--
Configure bugmail: https://bugzilla.netfilter.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.
2017 Apr 25
2
[Bug 1148] New: Getting a segmentation fault for some reason
...00000411cb9 in payload_expr_pctx_update ()
(gdb) bt
#0 0x0000000000411cb9 in payload_expr_pctx_update ()
#1 0x000000000040f5d6 in expr_evaluate ()
#2 0x000000000040dd8c in stmt_evaluate ()
#3 0x0000000000410eec in rule_evaluate ()
#4 0x000000000042d332 in nft_parse ()
#5 0x0000000000406b4d in nft_run ()
#6 0x000000000040676d in main ()
Assistance appreciated! Thanks!
--
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20...
2013 Jul 20
1
[Bug 834] New: nft crash when invalid meta proto is used
...040b1c5 in cmd_evaluate_add (cmd=0x639860, ctx=0x7fffffffd8c0)
at src/evaluate.c:1292
#9 cmd_evaluate (cmd=0x639860, ctx=0x7fffffffd8c0) at src/evaluate.c:1335
#10 evaluate (ctx=ctx at entry=0x7fffffffd8c0,
commands=commands at entry=0x7fffffffdff0) at src/evaluate.c:1352
#11 0x0000000000404eed in nft_run (scanner=scanner at entry=0x6392a0,
state=state at entry=0x7fffffffda20, msgs=msgs at entry=0x7fffffffda10) at
src/main.c:162
#12 0x0000000000404ba3 in main (argc=12, argv=<optimized out>) at
src/main.c:288
The issue is linked with icmpv6 being used. WHen runn with debug=all option:
<cmd...
2013 Nov 28
3
[Bug 877] New: nftables - Set - define core dumps
...(head=0x7ffff97efda0, new=0xfbc440) at include/list.h:76
#2 symbol_bind (scope=<optimized out>, identifier=0xfbc3c0 "ip_set",
expr=0xfc0770) at src/rule.c:176
#3 0x000000000041904b in nft_parse (scanner=0xfbc280,
state=0x7ffff97ef800) at src/parser.y:489
#4 0x00000000004055f3 in nft_run (scanner=<optimized out>,
state=0x7ffff97ef800, msgs=0x7ffff97efde0) at src/main.c:205
#5 0x00000000004052b8 in main (argc=<optimized out>, argv=<optimized
out>) at src/main.c:321
I m on the latest git pull on all ... The kernel is nf-next (3.12.0)
--
Configure bugmail: https:...
2014 Jul 17
1
[Bug 967] New: segfault when adding large sets
...fffe3a0, cmd=cmd at entry=0x6518a0,
excl=excl at entry=false) at src/rule.c:625
#7 0x0000000000407eea in do_command (ctx=ctx at entry=0x7fffffffe3a0,
cmd=cmd at entry=0x6518a0) at src/rule.c:914
#8 0x0000000000406426 in nft_netlink (msgs=0x7fffffffe430,
state=0x7fffffffe440) at src/main.c:183
#9 nft_run (scanner=scanner at entry=0x645390, state=state at entry=0x7fffffffe440,
msgs=msgs at entry=0x7fffffffe430) at src/main.c:227
#10 0x0000000000405fca in main (argc=3, argv=<optimized out>) at src/main.c:340
# Loading a larger ruleset containing two ~1700-element sets:
Program received signa...
2016 Jul 10
2
[Bug 1079] New: nft-0.6: segfault on add rule ip filter INPUT ip protocol igmp counter accept
...041622b in cmd_evaluate_add (ctx=0x7fffffffe708, cmd=0x676b50)
at evaluate.c:2614
#7 0x0000000000416a0b in cmd_evaluate (ctx=0x7fffffffe708, cmd=0x676b50) at
evaluate.c:2857
#8 0x000000000043a3d6 in nft_parse (scanner=0x6764c0, state=0x7fffffffe120) at
parser_bison.y:672
#9 0x0000000000405d15 in nft_run (scanner=0x6764c0, state=0x7fffffffe120,
msgs=0x7fffffffe110) at main.c:231
#10 0x000000000040622a in main (argc=11, argv=0x7fffffffe928) at main.c:361
steps to reproduce:
1. nft create table ip filter INPUT
2. nft create chain ip filter INPUT \{ type filGenter hook input priority 0\;
policy drop...
2018 Feb 18
5
[Bug 1228] New: [REGRESSION] nft cannot load big set anymore
...ntry=false) at rule.c:1054
#7 0x00005600a1c967a7 in do_command (ctx=ctx at entry=0x7fff364093e0,
cmd=cmd at entry=0x5600a2fdcab0) at rule.c:1805
#8 0x00005600a1c810e5 in nft_netlink (nf_sock=0x5600a2fdbb50,
msgs=0x7fff36409490, state=0x7fff364094a0, nft=0x5600a2fdba20)
at libnftables.c:47
#9 nft_run (nft=nft at entry=0x5600a2fdba20, nf_sock=0x5600a2fdbb50,
scanner=scanner at entry=0x5600a2fdbb90,
state=state at entry=0x7fff364094a0, msgs=msgs at entry=0x7fff36409490) at
libnftables.c:95
#10 0x00005600a1c817dc in nft_run_cmd_from_filename (nft=0x5600a2fdba20,
filename=0x7fff3640be70 "...
2016 Oct 20
2
[Bug 1092] New: nft v0.6 segfault in must_print_eq_op at expression.c:520 during 'nft monitor trace' in netdev filter
...x0, data = 0x47a8a0c910, seqnum = 4, batch_supported =
true}
err = <optimized out>
tmp = <optimized out>
err_list = {next = 0x3cc19177c60, prev = 0x3cc19177c60}
batch_seqnum = 3
batch_supported = true
ret = 0
cmd = 0x47a8a0c4d0
#12 nft_run (scanner=<optimized out>, state=0x3cc19177d20, msgs=0x3cc19177d10)
at main.c:236
---Type <return> to continue, or q <return> to quit---
cmd = <optimized out>
next = <optimized out>
ret = <optimized out>
#13 0x00000047a69f5fa6 in main (argc...
2014 Apr 13
1
[Bug 915] New: segfault in error case : expr_evaluate_payload not checking payload->payload.desc being null
...e in cmd_evaluate_add (ctx=0x7fffffffe438, cmd=0x64c8d0)
at src/evaluate.c:1380
#8 0x000000000041066e in cmd_evaluate (ctx=0x7fffffffe438, cmd=0x64c8d0) at
src/evaluate.c:1424
#9 0x0000000000420dfe in nft_parse (scanner=0x64c490, state=0x7fffffffde50) at
src/parser.y:573
#10 0x00000000004055cb in nft_run (scanner=0x64c490, state=0x7fffffffde50,
msgs=0x7fffffffde40) at src/main.c:221
#11 0x0000000000405a47 in main (argc=8, argv=0x7fffffffe658) at src/main.c:332
(gdb) p payload
$1 = (struct expr *) 0x64c5a0
(gdb) p *payload
$2 = {list = {next = 0x64c5a0, prev = 0x64c5a0}, location = {indesc =
0x7ffff...