[PATCH] nft: arp: add parse_target to nft_family_ops_arp

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



This patch adds parse_target for arp family, fixing segfaults
for xtables-arp -L after rules like:

- xtables-arp -A OUTPUT -o eth0 -j CLASSIFY --set-class 0:7
- xtables-arp -A OUTPUT -o eth1 --h-length 6 -j mangle --mangle-mac-s 01:00:5e:00:01:01

Signed-off-by: Giuseppe Longo <giuseppelng@xxxxxxxxx>
---
 iptables/nft-arp.c |    1 +
 1 files changed, 1 insertions(+), 0 deletions(-)

diff --git a/iptables/nft-arp.c b/iptables/nft-arp.c
index 570962d..08f8814 100644
--- a/iptables/nft-arp.c
+++ b/iptables/nft-arp.c
@@ -643,4 +643,5 @@ struct nft_family_ops nft_family_ops_arp = {
 	.print_firewall		= nft_arp_print_firewall,
 	.post_parse		= NULL,
 	.rule_find		= nft_arp_rule_find,
+	.parse_target		= nft_arp_parse_target,
 };
-- 
1.7.8.6

--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Netfitler Users]     [LARTC]     [Bugtraq]     [Yosemite Forum]

  Powered by Linux