Commit 5f3b7aae authored by Pablo Neira Ayuso's avatar Pablo Neira Ayuso

netfilter: nft_osf: restrict osf to ipv4, ipv6 and inet families

As it was originally intended, restrict extension to supported families.

Fixes: b96af92d ("netfilter: nf_tables: implement Passive OS fingerprint module in nft_osf")
Signed-off-by: default avatarPablo Neira Ayuso <pablo@netfilter.org>
parent 43eb8949
...@@ -115,9 +115,21 @@ static int nft_osf_validate(const struct nft_ctx *ctx, ...@@ -115,9 +115,21 @@ static int nft_osf_validate(const struct nft_ctx *ctx,
const struct nft_expr *expr, const struct nft_expr *expr,
const struct nft_data **data) const struct nft_data **data)
{ {
return nft_chain_validate_hooks(ctx->chain, (1 << NF_INET_LOCAL_IN) | unsigned int hooks;
(1 << NF_INET_PRE_ROUTING) |
(1 << NF_INET_FORWARD)); switch (ctx->family) {
case NFPROTO_IPV4:
case NFPROTO_IPV6:
case NFPROTO_INET:
hooks = (1 << NF_INET_LOCAL_IN) |
(1 << NF_INET_PRE_ROUTING) |
(1 << NF_INET_FORWARD);
break;
default:
return -EOPNOTSUPP;
}
return nft_chain_validate_hooks(ctx->chain, hooks);
} }
static bool nft_osf_reduce(struct nft_regs_track *track, static bool nft_osf_reduce(struct nft_regs_track *track,
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment