Its already there but it did not work because it wasn't loaded.

Signed-off-by: Florian Westphal <f...@strlen.de>
---
 iptables/xtables-eb.c | 16 ++++++++++++++--
 1 file changed, 14 insertions(+), 2 deletions(-)

diff --git a/iptables/xtables-eb.c b/iptables/xtables-eb.c
index 33f7851e9e5a..596894fdc000 100644
--- a/iptables/xtables-eb.c
+++ b/iptables/xtables-eb.c
@@ -623,14 +623,14 @@ static void ebt_load_match(const char *name)
                xtables_error(OTHER_PROBLEM, "Can't alloc memory");
 }
 
-static void ebt_load_watcher(const char *name)
+static void __ebt_load_watcher(const char *name, const char *typename)
 {
        struct xtables_target *watcher;
        size_t size;
 
        watcher = xtables_find_target(name, XTF_TRY_LOAD);
        if (!watcher) {
-               fprintf(stderr, "Unable to load %s watcher\n", name);
+               fprintf(stderr, "Unable to load %s %s\n", name, typename);
                return;
        }
 
@@ -651,6 +651,16 @@ static void ebt_load_watcher(const char *name)
                xtables_error(OTHER_PROBLEM, "Can't alloc memory");
 }
 
+static void ebt_load_watcher(const char *name)
+{
+       return __ebt_load_watcher(name, "watcher");
+}
+
+static void ebt_load_target(const char *name)
+{
+       return __ebt_load_watcher(name, "target");
+}
+
 static void ebt_load_match_extensions(void)
 {
        opts = ebt_original_options;
@@ -661,6 +671,8 @@ static void ebt_load_match_extensions(void)
 
        ebt_load_watcher("log");
        ebt_load_watcher("nflog");
+
+       ebt_load_target("mark");
 }
 
 static void ebt_add_match(struct xtables_match *m,
-- 
2.16.1

--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to