On Tue, Mar 21, 2017 at 07:36:27PM +0000, Robert White wrote: > On 03/21/17 16:53, Andreas Schultz wrote: > > delete element ip filter client_to_any { 10.180.86.22 : goto CIn_1 } > > delete chain ip filter CIn_1 > > I've verified that the problem is repeatable and that the two commands work > separately. The problem also exists for jump verdicts. > > I'd suspect that there's a strict ordering that makes "the chain work happen > first". For most cases this would make sense. Since the sets and the chains > are owned by different parts of the kernel (the two set types are in kernel > modules, so must be distinct from the chain handling) there are probably > limits on the degree of atomic modification. (e.g. I think the sets and maps > internal consistency logic _must_ be separate.) > > The two commands work separately, so once the set element is gone the chain > is just noise. So I'd rate it as annoying but probably non-trivial to fix. > > I'd open a bug at the bug tracker site (https://bugzilla.netfilter.org/) and > meanwhile do the chain drop separately after the set/map command. > > As a cheesy workaround for scripting, you can use a here document (etc.) > redirected into "nft -i" to do fast sequential changes. > > So > > nft -i <<'EOT' > delete element ip filter client_to_any { 10.180.86.22 : goto CIn_1 } > delete chain ip filter CIn_1 > EOT Right. But this is not atomic as Andreas indicates. There is a bug in the 2-phase commit protocol, the chain->use counter is not being decremented in the mapping. Let me have a look. Thanks for reporting! -- To unsubscribe from this list: send the line "unsubscribe netfilter" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html