[Bug 984] New: nft v0.3 - Segmentation fault when read input file specifies the "num" queue's option
bugzilla-daemon at netfilter.org
bugzilla-daemon at netfilter.org
Mon Oct 27 21:52:02 CET 2014
https://bugzilla.netfilter.org/show_bug.cgi?id=984
Bug ID: 984
Summary: nft v0.3 - Segmentation fault when read input file
specifies the "num" queue's option
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Gentoo
Status: NEW
Severity: blocker
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
Reporter: lucazorzo at gmail.com
Created attachment 452
--> https://bugzilla.netfilter.org/attachment.cgi?id=452&action=edit
Strace with "queue num 0"
Hello,
as described in the summary if the file passed to nft contains a "queue num x"
rule, nft segfauls with si_signo=SIGSEGV and si_code=SEGV_MAPERR, as you can
see in the attached strace files. Deleting the "num x" option solves the
problem.
Testing input file:
table ip filter {
chain forward {
type filter hook forward priority 0;
queue num 0
}
}
Environment ("-r*" releases can be gentoo specific):
- kernel: hardened-sources-3.17.1-r1
- nftables: nftables-0.3-r2
- gcc: gcc-4.7.3-r1
I found a similar problem in the wrong bugzilla:
https://bugs.launchpad.net/zope3/+bug/1353458
--
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20141027/3ade71c8/attachment.html>
More information about the netfilter-buglog
mailing list