From patchwork Tue Jul 14 16:55:58 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Florian Westphal X-Patchwork-Id: 1329003 X-Patchwork-Delegate: pablo@netfilter.org Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org (client-ip=23.128.96.18; helo=vger.kernel.org; envelope-from=netfilter-devel-owner@vger.kernel.org; receiver=) Authentication-Results: ozlabs.org; dmarc=none (p=none dis=none) header.from=strlen.de Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by ozlabs.org (Postfix) with ESMTP id 4B5mqt46zVz9s1x for ; Wed, 15 Jul 2020 02:56:10 +1000 (AEST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728364AbgGNQ4K (ORCPT ); Tue, 14 Jul 2020 12:56:10 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48676 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726600AbgGNQ4K (ORCPT ); Tue, 14 Jul 2020 12:56:10 -0400 Received: from Chamillionaire.breakpoint.cc (Chamillionaire.breakpoint.cc [IPv6:2a0a:51c0:0:12e:520::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F1974C061755 for ; Tue, 14 Jul 2020 09:56:09 -0700 (PDT) Received: from fw by Chamillionaire.breakpoint.cc with local (Exim 4.92) (envelope-from ) id 1jvODw-0001Lc-M7; Tue, 14 Jul 2020 18:56:08 +0200 From: Florian Westphal To: Cc: Florian Westphal Subject: [PATCH nft 2/2] tests: extend existing dormat test case to catch a kernel bug Date: Tue, 14 Jul 2020 18:55:58 +0200 Message-Id: <20200714165558.14733-2-fw@strlen.de> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200714165558.14733-1-fw@strlen.de> References: <20200714165558.14733-1-fw@strlen.de> MIME-Version: 1.0 Sender: netfilter-devel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netfilter-devel@vger.kernel.org This is a test case for the kernel bug fixed by: netfilter: nf_tables: fix nat hook table deletion Signed-off-by: Florian Westphal --- tests/shell/testcases/transactions/0002table_0 | 1 + tests/shell/testcases/transactions/dumps/0002table_0.nft | 4 ++++ 2 files changed, 5 insertions(+) diff --git a/tests/shell/testcases/transactions/0002table_0 b/tests/shell/testcases/transactions/0002table_0 index 246b10924d19..c5f31a6fb401 100755 --- a/tests/shell/testcases/transactions/0002table_0 +++ b/tests/shell/testcases/transactions/0002table_0 @@ -5,6 +5,7 @@ set -e RULESET="add table x delete table x add table x +add chain x y { type nat hook prerouting priority 0; policy accept; } add table x { flags dormant; }" $NFT -f - <<< "$RULESET" diff --git a/tests/shell/testcases/transactions/dumps/0002table_0.nft b/tests/shell/testcases/transactions/dumps/0002table_0.nft index 6eb70726385f..429cbc348781 100644 --- a/tests/shell/testcases/transactions/dumps/0002table_0.nft +++ b/tests/shell/testcases/transactions/dumps/0002table_0.nft @@ -1,3 +1,7 @@ table ip x { flags dormant + + chain y { + type nat hook prerouting priority filter; policy accept; + } }