From patchwork Wed Dec 12 18:47:37 2012 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Patrick McHardy X-Patchwork-Id: 205619 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by ozlabs.org (Postfix) with ESMTP id 27ECE2C0092 for ; Thu, 13 Dec 2012 05:47:54 +1100 (EST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754392Ab2LLSrv (ORCPT ); Wed, 12 Dec 2012 13:47:51 -0500 Received: from stinky.trash.net ([213.144.137.162]:63176 "EHLO stinky.trash.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753949Ab2LLSru (ORCPT ); Wed, 12 Dec 2012 13:47:50 -0500 Received: from macbook.localnet (localhost [127.0.0.1]) by stinky.trash.net (Postfix) with ESMTP id B24BA9D2E7; Wed, 12 Dec 2012 19:47:49 +0100 (MET) From: kaber@trash.net To: pablo@netfilter.org Cc: netfilter-devel@vger.kernel.org, Patrick McHardy Subject: =?UTF-8?q?=5BPATCH=2007/11=5D=20netfilter=3A=20nf=5Ftables=3A=20fix=20invalid=20event=20type=20in=20nf=5Ftables=5Fgetrule=28=29?= Date: Wed, 12 Dec 2012 19:47:37 +0100 Message-Id: <1355338061-5517-8-git-send-email-kaber@trash.net> X-Mailer: git-send-email 1.7.11.7 In-Reply-To: <1355338061-5517-1-git-send-email-kaber@trash.net> References: <1355338061-5517-1-git-send-email-kaber@trash.net> MIME-Version: 1.0 Sender: netfilter-devel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netfilter-devel@vger.kernel.org From: Patrick McHardy The event type should be NFT_MSG_NEWRULE, not NFT_MSG_NEWCHAIN. Signed-off-by: Patrick McHardy --- net/netfilter/nf_tables_api.c | 2 +- 1 Datei geändert, 1 Zeile hinzugefügt(+), 1 Zeile entfernt(-) diff --git a/net/netfilter/nf_tables_api.c b/net/netfilter/nf_tables_api.c index bc4eb76..afda73f 100644 --- a/net/netfilter/nf_tables_api.c +++ b/net/netfilter/nf_tables_api.c @@ -1292,7 +1292,7 @@ static int nf_tables_getrule(struct sock *nlsk, struct sk_buff *skb, return -ENOMEM; err = nf_tables_fill_rule_info(skb2, NETLINK_CB(skb).portid, - nlh->nlmsg_seq, NFT_MSG_NEWCHAIN, + nlh->nlmsg_seq, NFT_MSG_NEWRULE, family, table, chain, rule); if (err < 0) goto err;