Since commit
61e85e3192dea ("iptables-nft: allow removal of empty
builtin chains"), the command may be applied to "builtin" chains as
well, so the output is basically valid.
Apart from that, since kernel commit
a1050dd07168 ("netfilter:
nf_tables: Reintroduce shortened deletion notifications") the base chain
deletion notification does not contain NFTNL_CHAIN_PRIO (actually:
NFTA_HOOK_PRIORITY) attribute anymore so this implicitly fixes for
changed kernel behaviour.
Signed-off-by: Phil Sutter <phil@nwl.cc>
EXP=" EVENT: arptables -t filter -D INPUT -j ACCEPT"
monitorcheck arptables -F INPUT
EXP=" EVENT: arptables -t filter -D INPUT -j ACCEPT"
monitorcheck arptables -F INPUT
-EXP=" EVENT: nft: DEL chain: ip filter FORWARD use 0 type filter hook forward prio 0 policy accept packets 0 bytes 0 flags 1"
+EXP=" EVENT: iptables -t filter -X FORWARD"
monitorcheck iptables -X FORWARD
monitorcheck iptables -X FORWARD
-EXP=" EVENT: nft: DEL chain: ip6 filter FORWARD use 0 type filter hook forward prio 0 policy accept packets 0 bytes 0 flags 1"
+EXP=" EVENT: ip6tables -t filter -X FORWARD"
monitorcheck ip6tables -X FORWARD
monitorcheck ip6tables -X FORWARD
-EXP=" EVENT: nft: DEL chain: bridge filter FORWARD use 0 type filter hook forward prio -200 policy accept packets 0 bytes 0 flags 1"
+EXP=" EVENT: ebtables -t filter -X FORWARD"
monitorcheck ebtables -X FORWARD
monitorcheck ebtables -X FORWARD
-EXP=" EVENT: nft: DEL chain: arp filter INPUT use 0 type filter hook input prio 0 policy accept packets 0 bytes 0 flags 1"
+EXP=" EVENT: arptables -t filter -X INPUT"
monitorcheck arptables -X INPUT
exit $rc
monitorcheck arptables -X INPUT
exit $rc
- if (nftnl_chain_is_set(c, NFTNL_CHAIN_PRIO) || !family_cmd(family)) {
+ if (!family_cmd(family) ||
+ (type == NFT_MSG_NEWCHAIN &&
+ nftnl_chain_is_set(c, NFTNL_CHAIN_PRIO))) {
nftnl_chain_snprintf(buf, sizeof(buf),
c, NFTNL_OUTPUT_DEFAULT, 0);
printf("nft: %s chain: %s\n",
nftnl_chain_snprintf(buf, sizeof(buf),
c, NFTNL_OUTPUT_DEFAULT, 0);
printf("nft: %s chain: %s\n",