[Bug 1509] New: Long type concatenations in sets are not reflected by the output of list ruleset
bugzilla-daemon at netfilter.org
bugzilla-daemon at netfilter.org
Sat Mar 6 12:56:29 CET 2021
https://bugzilla.netfilter.org/show_bug.cgi?id=1509
Bug ID: 1509
Summary: Long type concatenations in sets are not reflected by
the output of list ruleset
Product: nftables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
Reporter: kfm at plushkava.net
Created attachment 625
--> https://bugzilla.netfilter.org/attachment.cgi?id=625&action=edit
nft-set-long-type-bug script (bash)
The attached script produces the following output for the system on which I am
testing.
1: ipv4_addr
2: ipv4_addr . ipv4_addr
3: ipv4_addr . ipv4_addr . ipv4_addr
4: ipv4_addr . ipv4_addr . ipv4_addr . ipv4_addr
5: ipv4_addr . ipv4_addr . ipv4_addr . ipv4_addr . ipv4_addr
6: bitmask . ipv4_addr . ipv4_addr . ipv4_addr . ipv4_addr . ipv4_addr
7: bitmask . ipv4_addr . ipv4_addr . ipv4_addr . ipv4_addr . ipv4_addr
For each iteration, nft accepts its input without complaint. However, the
output of "list ruleset" ceased to match the input after the 5th iteration.
After the 6th iteration, the output doesn't appear to change at all.
This particular test was conducted using nftables-0.9.8, libnftnl-1.1.9 and a
5.10.4 kernel.
--
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20210306/93c044cd/attachment.html>
More information about the netfilter-buglog
mailing list