Getting an error with kernel 4.1.28 ( USE="experimental symlink" )
The firewall ( 2 different packages tried ) locks up the machine during boot.

The old kernel ( 4.1.27 ) worked with no errors.
I copied the /usr/src/linux/.config file over from kernel 4.1.27.
Used "make menuconfig" to check if changes were needed.
Recompiled 3 different times, minor changes, same result.

reinstalled iptables, nftables, and ran "perl-cleaner reallyall".

Always locks up after rules compiled / starting to initialize iptables.

The firewalls tried :
arno-iptables-firewall, shorewall

Part of the kernel 4.1.28 change-log :

Florian Westphal (20):
      ipv6: re-enable fragment header matching in ipv6_find_hdr
      netfilter: x_tables: validate e->target_offset early
netfilter: x_tables: make sure e->next_offset covers remaining blob size
      netfilter: x_tables: fix unconditional helper
      netfilter: x_tables: don't move to non-existent next rule
      netfilter: x_tables: validate targets of jumps
      netfilter: x_tables: add and use xt_check_entry_offsets
      netfilter: x_tables: kill check_entry helper
      netfilter: x_tables: assert minimum target size
      netfilter: x_tables: add compat version of xt_check_entry_offsets
      netfilter: x_tables: check standard target size too
      netfilter: x_tables: check for bogus target offset
      netfilter: x_tables: validate all offsets and sizes in a rule
netfilter: x_tables: don't reject valid target size on some architectures
      netfilter: arp_tables: simplify translate_compat_table args
      netfilter: ip_tables: simplify translate_compat_table args
      netfilter: ip6_tables: simplify translate_compat_table args
      netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
      netfilter: x_tables: do compat validation via translate_table
      netfilter: x_tables: introduce and use xt_copy_counters_from_user
I suspect this may have something to do with it.

Is anyone else seeing / experiencing this problem?


Reply via email to