Hi,

I tested on the platform where this bug happened with the following packages:

ebtables:armhf 2.0.10.4+snapshot20181205-3, and
Linux espressobin 4.19.20-mvebu64 #5.75 SMP PREEMPT Fri Feb 8 09:54:18 CET 2019 
aarch64 GNU/Linux

And I can confirm that the behavior is expected.

Cheers,

Miao Wang

> 2019年12月15日 04:26,Alberto Molina Coballes <alb.mol...@gmail.com> 写道:
> 
> Hi Wang and Tomáš,
> 
> When I adopted ebtables in 2018 and I was initially focused on putting the 
> package in shape, but this bug has remained unattended for too many time.
> 
> Now, installing i386 ebtables userspace tool on an amd64 kernel I can't 
> reproduce this bug.
> 
> I've tested both ebtables-legacy (provided by ebtables package) and 
> ebtables-nft (provided by iptables package) on buster and sid, so I think 
> that this bug has been solved at any moment since you reported on ebtables 
> 2.0.10.4-3.
> 
> ebtables versions tested:
> 
> buster:
> ebtables:i386 2.0.10.4+snapshot20181205-3 i386
> iptables 1.8.2-4
> linux-image-4.19.0-6-amd64 4.19.67-2+deb10u2
> 
> sid:
> ebtables:i386 2.0.11-1
> iptables 1.8.4-1 
> linux-image-5.3.0-3-amd64 5.3.15-1
> 
> In all the combinations tested the behaviour was the expected not the 
> reported in your bug. Please, reply this message with any other information 
> needed if the bug remains in other scenario.
> 
> Regards,
> 
> Alberto

Reply via email to