Yes it's reproducible with two config and two list: # nft -f /dev/stdin <<EOF table ip nat { chain post { type nat hook postrouting priority 0; ip saddr 192.168.0.0/24 oif eth0 snat 192.168.1.2 } } EOF # nft -n list table nat # nft -f /dev/stdin <<EOF table ip nat { chain post { type nat hook postrouting priority 0; ip saddr 192.168.0.0/24 oif eth0 snat 192.168.1.2 } } EOF # nft -n list table nat 2014-08-05 12:01 GMT+02:00 Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>: > On Tue, Aug 05, 2014 at 10:01:56AM +0200, Matteo Croce wrote: >> with vanilla linux 3.16.0 and ntf 0.3: >> >> # nft list table nat >> Killed >> nf_tables: (c) 2007-2009 Patrick McHardy <kaber@xxxxxxxxx> >> BUG: unable to handle kernel NULL pointer dereference at 00000008 >> IP: [<d0b4beef>] nf_tables_fill_chain_info+0x27f/0x350 [nf_tables] > > Is this reproducible? If so, please indicate the sequence of commands. > Thanks. -- Matteo Croce OpenWrt Developer -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html