On Fri, Dec 12, 2014 at 11:16:29AM +0100, leroy christophe wrote: > Hi, > > table ip nat { > chain prerouting { > type nat hook prerouting priority 0; > tcp dport 222 redirect :22 > } > chain postrouting { > type nat hook postrouting priority 0; > } > } > > With the above rules, data[priv->sreg_proto_min].data[0] has value > 0x160000 instead of 0x16 on powerpc (Big Endian byte order) > > Due to this, mr.range[0].min.all gets assigned value 0 instead of 22. > > Below patch fixes it, but it is maybe not the proper way to fix it, > so I let it up to you. > > Christophe > > diff --git a/net/ipv4/netfilter/nft_redir_ipv4.c > b/net/ipv4/netfilter/nft_redir_ipv4.c > index 643c596..554bb32 100644 > --- a/net/ipv4/netfilter/nft_redir_ipv4.c > +++ b/net/ipv4/netfilter/nft_redir_ipv4.c > @@ -28,9 +28,9 @@ static void nft_redir_ipv4_eval(const struct > nft_expr *expr, > memset(&mr, 0, sizeof(mr)); > if (priv->sreg_proto_min) { > mr.range[0].min.all = (__force __be16) > - data[priv->sreg_proto_min].data[0]; > + *(__be16*)&data[priv->sreg_proto_min].data[0]; > mr.range[0].max.all = (__force __be16) > - data[priv->sreg_proto_max].data[0]; > + *(__be16*)&data[priv->sreg_proto_max].data[0]; > mr.range[0].flags |= NF_NAT_RANGE_PROTO_SPECIFIED; > } It seems userspace was generating the wrong bytecode, so your workaround was reversing the again the port values. Please, test the userspace fix I sent you and get back to us. Thanks for diagnosing! -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html