Without this, target never gets its options parsed, so it's a bug. Signed-off-by: Tomasz Bursztyka <tomasz.bursztyka@xxxxxxxxxxxxxxx> --- iptables/xtables-arp.c | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/iptables/xtables-arp.c b/iptables/xtables-arp.c index 8072d90..147c371 100644 --- a/iptables/xtables-arp.c +++ b/iptables/xtables-arp.c @@ -1317,16 +1317,16 @@ int do_commandarp(struct nft_handle *h, int argc, char *argv[], char **table) exit_tryhelp(2); default: + if (target) { + xtables_option_tfcall(target); + xtables_option_tpcall(c, argv, + invert, target, &fw); + } break; } invert = FALSE; } - if (target) - xtables_option_tfcall(target); - - /* Fix me: must put inverse options checking here --MN */ - if (optind < argc) xtables_error(PARAMETER_PROBLEM, "unknown arguments found on commandline"); -- 1.8.3.2 -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html