Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
L
linux
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
Kirill Smelkov
linux
Commits
6457b195
Commit
6457b195
authored
Apr 13, 2003
by
Chris Wright
Committed by
David S. Miller
Apr 13, 2003
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
[PATCH] remove __sk_filter.
parent
74e323ba
Changes
1
Show whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
8 additions
and
17 deletions
+8
-17
include/net/sock.h
include/net/sock.h
+8
-17
No files found.
include/net/sock.h
View file @
6457b195
...
@@ -453,7 +453,7 @@ extern void sock_def_destruct(struct sock *);
...
@@ -453,7 +453,7 @@ extern void sock_def_destruct(struct sock *);
extern
void
sock_init_data
(
struct
socket
*
sock
,
struct
sock
*
sk
);
extern
void
sock_init_data
(
struct
socket
*
sock
,
struct
sock
*
sk
);
/**
/**
*
__
sk_filter - run a packet through a socket filter
* sk_filter - run a packet through a socket filter
* @sk: sock associated with &sk_buff
* @sk: sock associated with &sk_buff
* @skb: buffer to filter
* @skb: buffer to filter
* @needlock: set to 1 if the sock is not locked by caller.
* @needlock: set to 1 if the sock is not locked by caller.
...
@@ -464,13 +464,15 @@ extern void sock_init_data(struct socket *sock, struct sock *sk);
...
@@ -464,13 +464,15 @@ extern void sock_init_data(struct socket *sock, struct sock *sk);
* wrapper to sk_run_filter. It returns 0 if the packet should
* wrapper to sk_run_filter. It returns 0 if the packet should
* be accepted or -EPERM if the packet should be tossed.
* be accepted or -EPERM if the packet should be tossed.
*
*
* This function should not be called directly, use sk_filter instead
* to ensure that the LSM security check is also performed.
*/
*/
static
inline
int
__
sk_filter
(
struct
sock
*
sk
,
struct
sk_buff
*
skb
,
int
needlock
)
static
inline
int
sk_filter
(
struct
sock
*
sk
,
struct
sk_buff
*
skb
,
int
needlock
)
{
{
int
err
=
0
;
int
err
;
err
=
security_sock_rcv_skb
(
sk
,
skb
);
if
(
err
)
return
err
;
if
(
sk
->
filter
)
{
if
(
sk
->
filter
)
{
struct
sk_filter
*
filter
;
struct
sk_filter
*
filter
;
...
@@ -518,17 +520,6 @@ static inline void sk_filter_charge(struct sock *sk, struct sk_filter *fp)
...
@@ -518,17 +520,6 @@ static inline void sk_filter_charge(struct sock *sk, struct sk_filter *fp)
atomic_add
(
sk_filter_len
(
fp
),
&
sk
->
omem_alloc
);
atomic_add
(
sk_filter_len
(
fp
),
&
sk
->
omem_alloc
);
}
}
static
inline
int
sk_filter
(
struct
sock
*
sk
,
struct
sk_buff
*
skb
,
int
needlock
)
{
int
err
;
err
=
security_sock_rcv_skb
(
sk
,
skb
);
if
(
err
)
return
err
;
return
__sk_filter
(
sk
,
skb
,
needlock
);
}
/*
/*
* Socket reference counting postulates.
* Socket reference counting postulates.
*
*
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment