[Bug 1228] [REGRESSION] nft cannot load big set anymore
bugzilla-daemon at netfilter.org
bugzilla-daemon at netfilter.org
Sun Feb 18 15:59:09 CET 2018
https://bugzilla.netfilter.org/show_bug.cgi?id=1228
Florian Westphal <fw at strlen.de> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |fw at strlen.de
--- Comment #1 from Florian Westphal <fw at strlen.de> ---
(In reply to Oleksandr Natalenko from comment #0)
[..]
> I think this has something to do with the changes related to checking for
> overlapping ranges introduced in v0.8.1.
>
> Here is how the set gets loaded:
>
> ===
> …
> table inet filter {
> set blackhole {
> type ipv4_addr
> flags interval
> include "/etc/nftables-blackhole.conf"
> }
> …
> ===
>
> I'm attaching the nftables-blackhole.conf file to this ticket too.
Thanks for the detailed info.
Caused by commit 9a4b513014cfdeaad6d247b72a7924b3a536cfe9 (refs/bisect/bad)
src: Don't merge adjacent/overlapping ranges
> Could you please fix this?
We will look at fixing this, in the mean time, you should be able to get
performance (and old behaviour) back by adding auto-merge keyword:
table inet filter {
set blackhole {
type ipv4_addr
auto-merge
flags interval
include "/etc/nftables-blackhole.conf"
}
This restores old behaviour and makes nft not check for overlapping
addresses.
--
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20180218/8ce80093/attachment.html>
More information about the netfilter-buglog
mailing list