Hi, I tested on the platform where this bug happened with the following packages:
ebtables:armhf 2.0.10.4+snapshot20181205-3, and Linux espressobin 4.19.20-mvebu64 #5.75 SMP PREEMPT Fri Feb 8 09:54:18 CET 2019 aarch64 GNU/Linux And I can confirm that the behavior is expected. Cheers, Miao Wang > 2019年12月15日 04:26,Alberto Molina Coballes <alb.mol...@gmail.com> 写道: > > Hi Wang and Tomáš, > > When I adopted ebtables in 2018 and I was initially focused on putting the > package in shape, but this bug has remained unattended for too many time. > > Now, installing i386 ebtables userspace tool on an amd64 kernel I can't > reproduce this bug. > > I've tested both ebtables-legacy (provided by ebtables package) and > ebtables-nft (provided by iptables package) on buster and sid, so I think > that this bug has been solved at any moment since you reported on ebtables > 2.0.10.4-3. > > ebtables versions tested: > > buster: > ebtables:i386 2.0.10.4+snapshot20181205-3 i386 > iptables 1.8.2-4 > linux-image-4.19.0-6-amd64 4.19.67-2+deb10u2 > > sid: > ebtables:i386 2.0.11-1 > iptables 1.8.4-1 > linux-image-5.3.0-3-amd64 5.3.15-1 > > In all the combinations tested the behaviour was the expected not the > reported in your bug. Please, reply this message with any other information > needed if the bug remains in other scenario. > > Regards, > > Alberto