1 From 4058ce3186a99fd5f03350fc11a7fc8d38b6a381 Mon Sep 17 00:00:00 2001
2 From: "Maxin B. John" <maxin.john@intel.com>
3 Date: Mon, 8 May 2017 10:53:18 +0300
4 Subject: [PATCH] firewall-nftables: fix build with libnftnl-1.0.7
6 We need these updates to accommodate the changes caused by the following
7 commit in libnftnl-1.0.7
9 commit 907a9f8e5a93f5bcd449643eb3916a656d634758
10 Author: Pablo Neira Ayuso <pablo@netfilter.org>
11 Date: Tue Dec 20 13:47:11 2016 +0100
13 src: get rid of aliases and compat
15 This machinery was introduced to avoid sudden compilation breakage of
16 old nftables releases. With the upcoming release of 0.7 (and 0.6 which
17 is now 6 months old) this is not required anymore.
19 Moreover, users gain nothing from older releases since they are
20 half-boiled and buggy.
22 So let's get rid of aliases now. Bump LIBVERSION and update map file.
24 Upstream-Status: Submitted
26 Signed-off-by: Maxin B. John <maxin.john@intel.com>
28 src/firewall-nftables.c | 14 +++++++-------
29 1 file changed, 7 insertions(+), 7 deletions(-)
31 diff --git a/src/firewall-nftables.c b/src/firewall-nftables.c
32 index 583d1c4..83b137b 100644
33 --- a/src/firewall-nftables.c
34 +++ b/src/firewall-nftables.c
35 @@ -387,9 +387,9 @@ static int add_cmp(struct nftnl_rule *rule, uint32_t sreg, uint32_t op,
39 - nftnl_expr_set_u32(expr, NFT_EXPR_CMP_SREG, sreg);
40 - nftnl_expr_set_u32(expr, NFT_EXPR_CMP_OP, op);
41 - nftnl_expr_set(expr, NFT_EXPR_CMP_DATA, data, data_len);
42 + nftnl_expr_set_u32(expr, NFTNL_EXPR_CMP_SREG, sreg);
43 + nftnl_expr_set_u32(expr, NFTNL_EXPR_CMP_OP, op);
44 + nftnl_expr_set(expr, NFTNL_EXPR_CMP_DATA, data, data_len);
46 nftnl_rule_add_expr(rule, expr);
48 @@ -575,8 +575,8 @@ static int build_rule_nat(const char *address, unsigned char prefixlen,
49 expr = nftnl_expr_alloc("meta");
52 - nftnl_expr_set_u32(expr, NFT_EXPR_META_KEY, NFT_META_OIFNAME);
53 - nftnl_expr_set_u32(expr, NFT_EXPR_META_DREG, NFT_REG_1);
54 + nftnl_expr_set_u32(expr, NFTNL_EXPR_META_KEY, NFT_META_OIFNAME);
55 + nftnl_expr_set_u32(expr, NFTNL_EXPR_META_DREG, NFT_REG_1);
56 nftnl_rule_add_expr(rule, expr);
57 err = add_cmp(rule, NFT_REG_1, NFT_CMP_EQ, interface,
58 strlen(interface) + 1);
59 @@ -677,8 +677,8 @@ static int build_rule_snat(int index, const char *address,
60 expr = nftnl_expr_alloc("meta");
63 - nftnl_expr_set_u32(expr, NFT_EXPR_META_KEY, NFT_META_OIF);
64 - nftnl_expr_set_u32(expr, NFT_EXPR_META_DREG, NFT_REG_1);
65 + nftnl_expr_set_u32(expr, NFTNL_EXPR_META_KEY, NFT_META_OIF);
66 + nftnl_expr_set_u32(expr, NFTNL_EXPR_META_DREG, NFT_REG_1);
67 nftnl_rule_add_expr(rule, expr);
68 err = add_cmp(rule, NFT_REG_1, NFT_CMP_EQ, &index, sizeof(index));