Re: Fwd: ipset 6.24 and iptables 1.4.14, errno 22 (EINVAL)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



2014-12-16 17:11 GMT+01:00 Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>:
> On Tue, 16 Dec 2014, Oskar Berggren wrote:
>
>> It's Debian 7, but with kernel from backports. uname:
>> 3.16.0-0.bpo.4-amd64   3.16.7-ckt2-1~bpo70+1
>>
>> The iptables 1.4.14 is from Debian, but we've rebuild it to increase
>> the maximum set name length to 256. But we also build ipset kernel and
>> userspace tools with this change. These patches have worked with ipset
>> 6.11, iptables 1.4.13 on Debian 6, but perhaps they might be the
>> problem if the versions themselves should be compatible.
>
> Then the IPSET_MAXNAMELEN macro was not updated in both the ipset and
> iptables source tree - I suspect in the latter, see
> include/linux/netfilter/ipset/ipset.h
>

We were patching IPSET_MAXNAMELEN in two places in ipset and one place
in iptables.

However
    ipset-6.11/kernel/include/linux/netfilter/ipset/ip_set.h
have become
    ipset-6.24/kernel/include/uapi/linux/netfilter/ipset/ip_set.h

And during the patch update, the change in this file was lost. It's
all working now!


/Oskar
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux