Getting an error with kernel 4.1.28 ( USE="experimental symlink" )
The firewall ( 2 different packages tried ) locks up the machine during
boot.
The old kernel ( 4.1.27 ) worked with no errors.
I copied the /usr/src/linux/.config file over from kernel 4.1.27.
Used "make menuconfig" to check if changes were needed.
Recompiled 3 different times, minor changes, same result.
reinstalled iptables, nftables, and ran "perl-cleaner reallyall".
Always locks up after rules compiled / starting to initialize iptables.
The firewalls tried :
arno-iptables-firewall, shorewall
Part of the kernel 4.1.28 change-log :
Florian Westphal (20):
ipv6: re-enable fragment header matching in ipv6_find_hdr
netfilter: x_tables: validate e->target_offset early
netfilter: x_tables: make sure e->next_offset covers remaining
blob size
netfilter: x_tables: fix unconditional helper
netfilter: x_tables: don't move to non-existent next rule
netfilter: x_tables: validate targets of jumps
netfilter: x_tables: add and use xt_check_entry_offsets
netfilter: x_tables: kill check_entry helper
netfilter: x_tables: assert minimum target size
netfilter: x_tables: add compat version of xt_check_entry_offsets
netfilter: x_tables: check standard target size too
netfilter: x_tables: check for bogus target offset
netfilter: x_tables: validate all offsets and sizes in a rule
netfilter: x_tables: don't reject valid target size on some
architectures
netfilter: arp_tables: simplify translate_compat_table args
netfilter: ip_tables: simplify translate_compat_table args
netfilter: ip6_tables: simplify translate_compat_table args
netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
netfilter: x_tables: do compat validation via translate_table
netfilter: x_tables: introduce and use xt_copy_counters_from_user
I suspect this may have something to do with it.
Is anyone else seeing / experiencing this problem?