On Tue, Feb 18, 2014 at 02:10:07AM +0100, Pablo Neira Ayuso wrote: > On Tue, Feb 18, 2014 at 12:18:38AM +0100, Arturo Borrero Gonzalez wrote: > > +static int netlink_events_table_cb(const struct nlmsghdr *nlh, int type, > > + struct netlink_ev_handler *evh) > > +{ > > + struct nft_table *nlt; > > + uint32_t family; > > + char buf[4096]; > > + > > + nlt = nft_table_alloc(); > > + if (nlt == NULL) > > + memory_allocation_error(); > > + > > + if (nft_table_nlmsg_parse(nlh, nlt) < 0) { > > + netlink_io_error(evh->ctx, evh->loc, > > + "Could not parse table: %s", > > + strerror(errno)); > > I think you should exit on parsing errors. I'm not so sure for event reporting. We should abort reporting the current event, sure. But I don't see why we shouldn't continue listering for further events. -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html