Am 22. Dezember 2014 12:54:48 MEZ, schrieb Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>: >On Fri, Dec 12, 2014 at 11:16:29AM +0100, leroy christophe wrote: >> Hi, >> >> table ip nat { >> chain prerouting { >> type nat hook prerouting priority 0; >> tcp dport 222 redirect :22 >> } >> chain postrouting { >> type nat hook postrouting priority 0; >> } >> } >> >> With the above rules, data[priv->sreg_proto_min].data[0] has value >> 0x160000 instead of 0x16 on powerpc (Big Endian byte order) >> >> Due to this, mr.range[0].min.all gets assigned value 0 instead of 22. >> >> Below patch fixes it, but it is maybe not the proper way to fix it, >> so I let it up to you. >> >> Christophe >> >> diff --git a/net/ipv4/netfilter/nft_redir_ipv4.c >> b/net/ipv4/netfilter/nft_redir_ipv4.c >> index 643c596..554bb32 100644 >> --- a/net/ipv4/netfilter/nft_redir_ipv4.c >> +++ b/net/ipv4/netfilter/nft_redir_ipv4.c >> @@ -28,9 +28,9 @@ static void nft_redir_ipv4_eval(const struct >> nft_expr *expr, >> memset(&mr, 0, sizeof(mr)); >> if (priv->sreg_proto_min) { >> mr.range[0].min.all = (__force __be16) >> - data[priv->sreg_proto_min].data[0]; >> + *(__be16*)&data[priv->sreg_proto_min].data[0]; >> mr.range[0].max.all = (__force __be16) >> - data[priv->sreg_proto_max].data[0]; >> + *(__be16*)&data[priv->sreg_proto_max].data[0]; >> mr.range[0].flags |= NF_NAT_RANGE_PROTO_SPECIFIED; >> } > >It seems userspace was generating the wrong bytecode, so your >workaround was reversing the again the port values. > >Please, test the userspace fix I sent you and get back to us. I actually think this is exactly what needs to be done since it also matches what we're doing for runtime gathered data. > >Thanks for diagnosing! -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html