David Ahern <dsahern@xxxxxxxxx> wrote: > On 12/27/18 12:38 AM, wenxu@xxxxxxxxx wrote: > > nft add table firewall > > nft add chain firewall zones { type filter hook prerouting priority - 300 \; } > > nft add rule firewall zones counter ct zone set iif map { "eth1" : 1, "eth2" : 2 } > > nft add chain firewall rule-1000-ingress > > nft add rule firewall rule-1000-ingress ct zone 1 tcp dport 22 ct state new counter accept > > nft add rule firewall rule-1000-ingress counter drop > > nft add chain firewall rule-1000-egress > > nft add rule firewall rule-1000-egress tcp dport 22 ct state new counter drop > > nft add rule firewall rule-1000-egress counter accept > > > > nft add chain firewall rules-all { type filter hook prerouting priority - 150 \; } > > nft add rule firewall rules-all ip daddr vmap { "2.2.2.11" : jump rule-1000-ingress } > > nft add rule firewall rules-all ct zone vmap { 1 : jump rule-1000-egress } > > Bug report to the netfilter crowd: After this set of commands, 'nft list > tables' goes into a loop over recvmsg. This is debian stretch with > nftables from backports - version 0.9.0-1~bpo9+1 Thanks for reporting, I will have a look.