<html>
<head>
<base href="https://bugzilla.netfilter.org/" />
</head>
<body><table border="1" cellspacing="0" cellpadding="8">
<tr>
<th>Bug ID</th>
<td><a class="bz_bug_link
bz_status_NEW "
title="NEW - Getting a segmentation fault for some reason"
href="https://bugzilla.netfilter.org/show_bug.cgi?id=1148">1148</a>
</td>
</tr>
<tr>
<th>Summary</th>
<td>Getting a segmentation fault for some reason
</td>
</tr>
<tr>
<th>Product</th>
<td>nftables
</td>
</tr>
<tr>
<th>Version</th>
<td>unspecified
</td>
</tr>
<tr>
<th>Hardware</th>
<td>x86_64
</td>
</tr>
<tr>
<th>OS</th>
<td>RedHat Linux
</td>
</tr>
<tr>
<th>Status</th>
<td>NEW
</td>
</tr>
<tr>
<th>Severity</th>
<td>normal
</td>
</tr>
<tr>
<th>Priority</th>
<td>P5
</td>
</tr>
<tr>
<th>Component</th>
<td>nft
</td>
</tr>
<tr>
<th>Assignee</th>
<td>pablo@netfilter.org
</td>
</tr>
<tr>
<th>Reporter</th>
<td>chokkoretto@gmail.com
</td>
</tr></table>
<p>
<div>
<pre>Hi! I've never done this before, but I've checked with my instructor and other
students and we can't seem to figure this one out.
Running this
nft add rule ip filter input ip protocol ospf accept
nft add rule ip filter input ip protocol 89 accept
gives this output
Segmentation fault (core dumped)
using gdb...
(gdb) run add rule ip filter input ip protocol 89 accept
Starting program: /usr/sbin/nft add rule ip filter input ip protocol 89 accept
Program received signal SIGSEGV, Segmentation fault.
0x0000000000411cb9 in payload_expr_pctx_update ()
(gdb) bt
#0 0x0000000000411cb9 in payload_expr_pctx_update ()
#1 0x000000000040f5d6 in expr_evaluate ()
#2 0x000000000040dd8c in stmt_evaluate ()
#3 0x0000000000410eec in rule_evaluate ()
#4 0x000000000042d332 in nft_parse ()
#5 0x0000000000406b4d in nft_run ()
#6 0x000000000040676d in main ()
Assistance appreciated! Thanks!</pre>
</div>
</p>
<hr>
<span>You are receiving this mail because:</span>
<ul>
<li>You are watching all bug changes.</li>
</ul>
</body>
</html>