Hi Anders, 2016-10-21 16:26 GMT+08:00 Anders K. Pedersen | Cohaesio <akp@xxxxxxxxxxxx>: [...] > I had a look at it. This construct is used for NFT_CT_SRC and > NFT_CT_DST, where the init function just returns the IPv6 length for > the inet family. But I'm not sure how this can work for userspace, and > at least for current nftables there are problems: > > # nft flush ruleset > # nft add table inet filter > # nft add chain inet filter input > # nft add rule inet filter input ether type ip flow table acct \{ ct original saddr timeout 600s counter \} > # nft list ruleset > Killed > # nft list flow tables > Killed I guess there's a bug in nft utility, same problem exists in ip/ip6 family. In init routine, nft_validate_register_store was used to ensure that we will not do overflow operation. > > The latter two commands are killed by the OOM killer after a few > seconds. Same thing happens for 'ether type ip6', while it works fine > with 'ip saddr' or 'rt ip nexthop' in stead of 'ct original saddr'. > > Regards, > Anders -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html