<html>
<head>
<base href="https://bugzilla.netfilter.org/" />
</head>
<body>
<p>
<div>
<b><a class="bz_bug_link
bz_status_ASSIGNED "
title="ASSIGNED - iptables fails to parse interface wildcard "-i +" correctly"
href="https://bugzilla.netfilter.org/show_bug.cgi?id=1702#c6">Comment # 6</a>
on <a class="bz_bug_link
bz_status_ASSIGNED "
title="ASSIGNED - iptables fails to parse interface wildcard "-i +" correctly"
href="https://bugzilla.netfilter.org/show_bug.cgi?id=1702">bug 1702</a>
from <span class="vcard"><a class="email" href="mailto:thomas.strangert@emblasoft.com" title="thomas.strangert@emblasoft.com">thomas.strangert@emblasoft.com</a>
</span></b>
<pre># valgrind --leak-check=full iptables-save
==3054371== Memcheck, a memory error detector
==3054371== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al.
==3054371== Using Valgrind-3.18.1 and LibVEX; rerun with -h for copyright info
==3054371== Command: iptables-save
==3054371==
==3054371== Syscall param socketcall.sendto(msg) points to uninitialised
byte(s)
==3054371== at 0x49DABBA: sendto (sendto.c:27)
==3054371== by 0x11666D: ??? (in /usr/sbin/xtables-nft-multi)
==3054371== by 0x123D61: ??? (in /usr/sbin/xtables-nft-multi)
==3054371== by 0x11C3D7: ??? (in /usr/sbin/xtables-nft-multi)
==3054371== by 0x1270B7: ??? (in /usr/sbin/xtables-nft-multi)
==3054371== by 0x11C7DE: ??? (in /usr/sbin/xtables-nft-multi)
==3054371== by 0x48DCD8F: (below main) (libc_start_call_main.h:58)
==3054371== Address 0x1ffeffc3af is on thread 1's stack
==3054371==
==3054371== Syscall param socketcall.sendto(msg) points to uninitialised
byte(s)
==3054371== at 0x49DABBA: sendto (sendto.c:27)
==3054371== by 0x11666D: ??? (in /usr/sbin/xtables-nft-multi)
==3054371== by 0x123D61: ??? (in /usr/sbin/xtables-nft-multi)
==3054371== by 0x11C423: ??? (in /usr/sbin/xtables-nft-multi)
==3054371== by 0x1270B7: ??? (in /usr/sbin/xtables-nft-multi)
==3054371== by 0x11C7DE: ??? (in /usr/sbin/xtables-nft-multi)
==3054371== by 0x48DCD8F: (below main) (libc_start_call_main.h:58)
==3054371== Address 0x1ffeffc3af is on thread 1's stack
==3054371==
# Generated by iptables-save v1.8.7 on Tue Sep 5 15:18:09 2023
*mangle
... ...
:mangle_WAN_DDoS - [0:0]
-A PREROUTING -i wan -j mangle_WAN_DDoS
==3054371== Syscall param socketcall.sendto(msg) points to uninitialised
byte(s)
==3054371== at 0x49DABBA: sendto (sendto.c:27)
==3054371== by 0x1139E0: ??? (in /usr/sbin/xtables-nft-multi)
==3054371== by 0x48A62C6: xtables_find_match (in
/usr/lib/x86_64-linux-gnu/libxtables.so.12.4.0)
==3054371== by 0x48A601A: ??? (in
/usr/lib/x86_64-linux-gnu/libxtables.so.12.4.0)
==3054371== by 0x48A63C6: xtables_find_match (in
/usr/lib/x86_64-linux-gnu/libxtables.so.12.4.0)
==3054371== by 0x114944: ??? (in /usr/sbin/xtables-nft-multi)
==3054371== by 0x11C02B: ??? (in /usr/sbin/xtables-nft-multi)
==3054371== by 0x11C124: ??? (in /usr/sbin/xtables-nft-multi)
==3054371== by 0x11C423: ??? (in /usr/sbin/xtables-nft-multi)
==3054371== by 0x11C527: ??? (in /usr/sbin/xtables-nft-multi)
==3054371== by 0x11C95B: ??? (in /usr/sbin/xtables-nft-multi)
==3054371== by 0x48DCD8F: (below main) (libc_start_call_main.h:58)
==3054371== Address 0x1ffeffbe02 is on thread 1's stack
==3054371==
... ...
:Cid82520X12088.0 - [0:0]
==3054371== Syscall param socketcall.sendto(msg) points to uninitialised
byte(s)
==3054371== at 0x49DABBA: sendto (sendto.c:27)
==3054371== by 0x1139E0: ??? (in /usr/sbin/xtables-nft-multi)
==3054371== by 0x48A5C95: xtables_find_target (in
/usr/lib/x86_64-linux-gnu/libxtables.so.12.4.0)
==3054371== by 0x48A5FF1: ??? (in
/usr/lib/x86_64-linux-gnu/libxtables.so.12.4.0)
==3054371== by 0x48A5D20: xtables_find_target (in
/usr/lib/x86_64-linux-gnu/libxtables.so.12.4.0)
==3054371== by 0x114A1D: ??? (in /usr/sbin/xtables-nft-multi)
==3054371== by 0x11C02B: ??? (in /usr/sbin/xtables-nft-multi)
==3054371== by 0x11C124: ??? (in /usr/sbin/xtables-nft-multi)
==3054371== by 0x11C3D7: ??? (in /usr/sbin/xtables-nft-multi)
==3054371== by 0x11C527: ??? (in /usr/sbin/xtables-nft-multi)
==3054371== by 0x11C95B: ??? (in /usr/sbin/xtables-nft-multi)
==3054371== by 0x48DCD8F: (below main) (libc_start_call_main.h:58)
==3054371== Address 0x1ffeffbdfd is on thread 1's stack
==3054371==
... ...
# Completed on Tue Sep 5 15:18:09 2023
==3054371==
==3054371== HEAP SUMMARY:
==3054371== in use at exit: 0 bytes in 0 blocks
==3054371== total heap usage: 10,741 allocs, 10,741 frees, 1,328,016 bytes
allocated
==3054371==
==3054371== All heap blocks were freed -- no leaks are possible
==3054371==
==3054371== Use --track-origins=yes to see where uninitialised values come from
==3054371== For lists of detected and suppressed errors, rerun with: -s
==3054371== ERROR SUMMARY: 60 errors from 4 contexts (suppressed: 0 from 0)</pre>
</div>
</p>
<hr>
<span>You are receiving this mail because:</span>
<ul>
<li>You are watching all bug changes.</li>
</ul>
</body>
</html>