Rule that fails to be added while holding a bound set triggers user-after-free from the abort path. Signed-off-by: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx> --- tests/shell/testcases/transactions/0050rule_1 | 17 +++++++++++++++++ 1 file changed, 17 insertions(+) create mode 100755 tests/shell/testcases/transactions/0050rule_1 diff --git a/tests/shell/testcases/transactions/0050rule_1 b/tests/shell/testcases/transactions/0050rule_1 new file mode 100755 index 000000000000..7c487e2e4710 --- /dev/null +++ b/tests/shell/testcases/transactions/0050rule_1 @@ -0,0 +1,17 @@ +#!/bin/bash + +RULESET="table inet filter { + flowtable ft { + hook ingress priority 0; devices = { x, y, z }; + } + +chain forward { + type filter hook forward priority 0; policy drop; + + ip protocol { tcp, udp } counter flow add @ft + ip6 nexthdr { tcp, udp } counter flow add @ft + counter + } +}" + +$NFT -f - <<< "$RULESET" >/dev/null -- 2.11.0