This patch adds parse_target for arp family, fixing segfaults for xtables-arp -L after rules like: - xtables-arp -A OUTPUT -o eth0 -j CLASSIFY --set-class 0:7 - xtables-arp -A OUTPUT -o eth1 --h-length 6 -j mangle --mangle-mac-s 01:00:5e:00:01:01 Signed-off-by: Giuseppe Longo <giuseppelng@xxxxxxxxx> --- iptables/nft-arp.c | 1 + 1 files changed, 1 insertions(+), 0 deletions(-) diff --git a/iptables/nft-arp.c b/iptables/nft-arp.c index 570962d..08f8814 100644 --- a/iptables/nft-arp.c +++ b/iptables/nft-arp.c @@ -643,4 +643,5 @@ struct nft_family_ops nft_family_ops_arp = { .print_firewall = nft_arp_print_firewall, .post_parse = NULL, .rule_find = nft_arp_rule_find, + .parse_target = nft_arp_parse_target, }; -- 1.7.8.6 -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html