Re: Fwd: ipset 6.24 and iptables 1.4.14, errno 22 (EINVAL)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, 16 Dec 2014, Oskar Berggren wrote:

> It's Debian 7, but with kernel from backports. uname:
> 3.16.0-0.bpo.4-amd64   3.16.7-ckt2-1~bpo70+1
> 
> The iptables 1.4.14 is from Debian, but we've rebuild it to increase
> the maximum set name length to 256. But we also build ipset kernel and
> userspace tools with this change. These patches have worked with ipset
> 6.11, iptables 1.4.13 on Debian 6, but perhaps they might be the
> problem if the versions themselves should be compatible.

Then the IPSET_MAXNAMELEN macro was not updated in both the ipset and 
iptables source tree - I suspect in the latter, see 
include/linux/netfilter/ipset/ipset.h

Best regards,
Jozsef
-
E-mail  : kadlec@xxxxxxxxxxxxxxxxx, kadlecsik.jozsef@xxxxxxxxxxxxx
PGP key : http://www.kfki.hu/~kadlec/pgp_public_key.txt
Address : Wigner Research Centre for Physics, Hungarian Academy of Sciences
          H-1525 Budapest 114, POB. 49, Hungary
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux