Hi Wang and Tomáš,

When I adopted ebtables in 2018 and I was initially focused on putting the 
package in shape, but this bug has remained unattended for too many time.

Now, installing i386 ebtables userspace tool on an amd64 kernel I can't 
reproduce this bug.

I've tested both ebtables-legacy (provided by ebtables package) and 
ebtables-nft (provided by iptables package) on buster and sid, so I think that 
this bug has been solved at any moment since you reported on ebtables 
2.0.10.4-3.

ebtables versions tested:

buster:
ebtables:i386 2.0.10.4+snapshot20181205-3 i386
iptables 1.8.2-4
linux-image-4.19.0-6-amd64 4.19.67-2+deb10u2

sid:
ebtables:i386 2.0.11-1
iptables 1.8.4-1 
linux-image-5.3.0-3-amd64 5.3.15-1

In all the combinations tested the behaviour was the expected not the reported 
in your bug. Please, reply this message with any other information needed if 
the bug remains in other scenario.

Regards,

Alberto

Reply via email to