Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
L
linux
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
Kirill Smelkov
linux
Commits
8bee4bad
Commit
8bee4bad
authored
Mar 17, 2010
by
Jan Engelhardt
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
netfilter: xt extensions: use pr_<level>
Signed-off-by:
Jan Engelhardt
<
jengelh@medozas.de
>
parent
be91fd5e
Changes
21
Hide whitespace changes
Inline
Side-by-side
Showing
21 changed files
with
88 additions
and
107 deletions
+88
-107
net/netfilter/xt_CONNSECMARK.c
net/netfilter/xt_CONNSECMARK.c
+6
-7
net/netfilter/xt_DSCP.c
net/netfilter/xt_DSCP.c
+2
-2
net/netfilter/xt_HL.c
net/netfilter/xt_HL.c
+4
-6
net/netfilter/xt_LED.c
net/netfilter/xt_LED.c
+4
-6
net/netfilter/xt_SECMARK.c
net/netfilter/xt_SECMARK.c
+10
-10
net/netfilter/xt_TCPMSS.c
net/netfilter/xt_TCPMSS.c
+9
-9
net/netfilter/xt_cluster.c
net/netfilter/xt_cluster.c
+6
-5
net/netfilter/xt_connbytes.c
net/netfilter/xt_connbytes.c
+3
-2
net/netfilter/xt_connlimit.c
net/netfilter/xt_connlimit.c
+3
-2
net/netfilter/xt_connmark.c
net/netfilter/xt_connmark.c
+4
-4
net/netfilter/xt_conntrack.c
net/netfilter/xt_conntrack.c
+3
-3
net/netfilter/xt_dscp.c
net/netfilter/xt_dscp.c
+2
-2
net/netfilter/xt_hashlimit.c
net/netfilter/xt_hashlimit.c
+8
-10
net/netfilter/xt_helper.c
net/netfilter/xt_helper.c
+3
-3
net/netfilter/xt_hl.c
net/netfilter/xt_hl.c
+0
-12
net/netfilter/xt_limit.c
net/netfilter/xt_limit.c
+3
-3
net/netfilter/xt_osf.c
net/netfilter/xt_osf.c
+4
-4
net/netfilter/xt_physdev.c
net/netfilter/xt_physdev.c
+4
-4
net/netfilter/xt_policy.c
net/netfilter/xt_policy.c
+5
-8
net/netfilter/xt_recent.c
net/netfilter/xt_recent.c
+3
-3
net/netfilter/xt_state.c
net/netfilter/xt_state.c
+2
-2
No files found.
net/netfilter/xt_CONNSECMARK.c
View file @
8bee4bad
...
...
@@ -15,6 +15,7 @@
* published by the Free Software Foundation.
*
*/
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
#include <linux/module.h>
#include <linux/skbuff.h>
#include <linux/netfilter/x_tables.h>
...
...
@@ -22,8 +23,6 @@
#include <net/netfilter/nf_conntrack.h>
#include <net/netfilter/nf_conntrack_ecache.h>
#define PFX "CONNSECMARK: "
MODULE_LICENSE
(
"GPL"
);
MODULE_AUTHOR
(
"James Morris <jmorris@redhat.com>"
);
MODULE_DESCRIPTION
(
"Xtables: target for copying between connection and security mark"
);
...
...
@@ -91,8 +90,8 @@ static bool connsecmark_tg_check(const struct xt_tgchk_param *par)
if
(
strcmp
(
par
->
table
,
"mangle"
)
!=
0
&&
strcmp
(
par
->
table
,
"security"
)
!=
0
)
{
pr
intk
(
KERN_INFO
PFX
"target only valid in the
\'
mangle
\'
"
"or
\'
security
\'
tables, not
\'
%s
\'
.
\n
"
,
par
->
table
);
pr
_info
(
"target only valid in the
\'
mangle
\'
"
"or
\'
security
\'
tables, not
\'
%s
\'
.
\n
"
,
par
->
table
);
return
false
;
}
...
...
@@ -102,13 +101,13 @@ static bool connsecmark_tg_check(const struct xt_tgchk_param *par)
break
;
default:
pr
intk
(
KERN_INFO
PFX
"invalid mode: %hu
\n
"
,
info
->
mode
);
pr
_info
(
"invalid mode: %hu
\n
"
,
info
->
mode
);
return
false
;
}
if
(
nf_ct_l3proto_try_module_get
(
par
->
family
)
<
0
)
{
pr
intk
(
KERN_WARNING
"can't load conntrack support for "
"proto=%u
\n
"
,
par
->
family
);
pr
_info
(
"cannot load conntrack support for proto=%u
\n
"
,
par
->
family
);
return
false
;
}
return
true
;
...
...
net/netfilter/xt_DSCP.c
View file @
8bee4bad
...
...
@@ -9,7 +9,7 @@
*
* See RFC2474 for a description of the DSCP field within the IP Header.
*/
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
#include <linux/module.h>
#include <linux/skbuff.h>
#include <linux/ip.h>
...
...
@@ -65,7 +65,7 @@ static bool dscp_tg_check(const struct xt_tgchk_param *par)
const
struct
xt_DSCP_info
*
info
=
par
->
targinfo
;
if
(
info
->
dscp
>
XT_DSCP_MAX
)
{
pr
intk
(
KERN_WARNING
"DSCP:
dscp %x out of range
\n
"
,
info
->
dscp
);
pr
_info
(
"
dscp %x out of range
\n
"
,
info
->
dscp
);
return
false
;
}
return
true
;
...
...
net/netfilter/xt_HL.c
View file @
8bee4bad
...
...
@@ -9,7 +9,7 @@
* it under the terms of the GNU General Public License version 2 as
* published by the Free Software Foundation.
*/
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
#include <linux/module.h>
#include <linux/skbuff.h>
#include <linux/ip.h>
...
...
@@ -106,8 +106,7 @@ static bool ttl_tg_check(const struct xt_tgchk_param *par)
const
struct
ipt_TTL_info
*
info
=
par
->
targinfo
;
if
(
info
->
mode
>
IPT_TTL_MAXMODE
)
{
printk
(
KERN_WARNING
"ipt_TTL: invalid or unknown Mode %u
\n
"
,
info
->
mode
);
pr_info
(
"TTL: invalid or unknown mode %u
\n
"
,
info
->
mode
);
return
false
;
}
if
(
info
->
mode
!=
IPT_TTL_SET
&&
info
->
ttl
==
0
)
...
...
@@ -120,12 +119,11 @@ static bool hl_tg6_check(const struct xt_tgchk_param *par)
const
struct
ip6t_HL_info
*
info
=
par
->
targinfo
;
if
(
info
->
mode
>
IP6T_HL_MAXMODE
)
{
printk
(
KERN_WARNING
"ip6t_HL: invalid or unknown Mode %u
\n
"
,
info
->
mode
);
pr_info
(
"invalid or unknown mode %u
\n
"
,
info
->
mode
);
return
false
;
}
if
(
info
->
mode
!=
IP6T_HL_SET
&&
info
->
hop_limit
==
0
)
{
pr
intk
(
KERN_WARNING
"ip6t_HL: increment/decrement doesn'
t "
pr
_info
(
"increment/decrement does no
t "
"make sense with value 0
\n
"
);
return
false
;
}
...
...
net/netfilter/xt_LED.c
View file @
8bee4bad
...
...
@@ -18,7 +18,7 @@
* 02110-1301 USA.
*
*/
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
#include <linux/module.h>
#include <linux/skbuff.h>
#include <linux/netfilter/x_tables.h>
...
...
@@ -87,7 +87,7 @@ static bool led_tg_check(const struct xt_tgchk_param *par)
int
err
;
if
(
ledinfo
->
id
[
0
]
==
'\0'
)
{
pr
intk
(
KERN_ERR
KBUILD_MODNAME
":
No 'id' parameter given.
\n
"
);
pr
_info
(
"
No 'id' parameter given.
\n
"
);
return
false
;
}
...
...
@@ -99,11 +99,9 @@ static bool led_tg_check(const struct xt_tgchk_param *par)
err
=
led_trigger_register
(
&
ledinternal
->
netfilter_led_trigger
);
if
(
err
)
{
printk
(
KERN_CRIT
KBUILD_MODNAME
": led_trigger_register() failed
\n
"
);
pr_warning
(
"led_trigger_register() failed
\n
"
);
if
(
err
==
-
EEXIST
)
printk
(
KERN_ERR
KBUILD_MODNAME
": Trigger name is already in use.
\n
"
);
pr_warning
(
"Trigger name is already in use.
\n
"
);
goto
exit_alloc
;
}
...
...
net/netfilter/xt_SECMARK.c
View file @
8bee4bad
...
...
@@ -12,6 +12,7 @@
* published by the Free Software Foundation.
*
*/
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
#include <linux/module.h>
#include <linux/skbuff.h>
#include <linux/selinux.h>
...
...
@@ -59,20 +60,19 @@ static bool checkentry_selinux(struct xt_secmark_target_info *info)
err
=
selinux_string_to_sid
(
sel
->
selctx
,
&
sel
->
selsid
);
if
(
err
)
{
if
(
err
==
-
EINVAL
)
pr
intk
(
KERN_INFO
PFX
"invalid SELinux context
\'
%s
\'\n
"
,
sel
->
selctx
);
pr
_info
(
"invalid SELinux context
\'
%s
\'\n
"
,
sel
->
selctx
);
return
false
;
}
if
(
!
sel
->
selsid
)
{
printk
(
KERN_INFO
PFX
"unable to map SELinux context
\'
%s
\'\n
"
,
sel
->
selctx
);
pr_info
(
"unable to map SELinux context
\'
%s
\'\n
"
,
sel
->
selctx
);
return
false
;
}
err
=
selinux_secmark_relabel_packet_permission
(
sel
->
selsid
);
if
(
err
)
{
pr
intk
(
KERN_INFO
PFX
"unable to obtain relabeling permission
\n
"
);
pr
_info
(
"unable to obtain relabeling permission
\n
"
);
return
false
;
}
...
...
@@ -86,14 +86,14 @@ static bool secmark_tg_check(const struct xt_tgchk_param *par)
if
(
strcmp
(
par
->
table
,
"mangle"
)
!=
0
&&
strcmp
(
par
->
table
,
"security"
)
!=
0
)
{
pr
intk
(
KERN_INFO
PFX
"target only valid in the
\'
mangle
\'
"
"or
\'
security
\'
tables, not
\'
%s
\'
.
\n
"
,
par
->
table
);
pr
_info
(
"target only valid in the
\'
mangle
\'
"
"or
\'
security
\'
tables, not
\'
%s
\'
.
\n
"
,
par
->
table
);
return
false
;
}
if
(
mode
&&
mode
!=
info
->
mode
)
{
pr
intk
(
KERN_INFO
PFX
"mode already set to %hu cannot mix with "
"rules for mode %hu
\n
"
,
mode
,
info
->
mode
);
pr
_info
(
"mode already set to %hu cannot mix with "
"rules for mode %hu
\n
"
,
mode
,
info
->
mode
);
return
false
;
}
...
...
@@ -104,7 +104,7 @@ static bool secmark_tg_check(const struct xt_tgchk_param *par)
break
;
default:
pr
intk
(
KERN_INFO
PFX
"invalid mode: %hu
\n
"
,
info
->
mode
);
pr
_info
(
"invalid mode: %hu
\n
"
,
info
->
mode
);
return
false
;
}
...
...
net/netfilter/xt_TCPMSS.c
View file @
8bee4bad
...
...
@@ -7,7 +7,7 @@
* it under the terms of the GNU General Public License version 2 as
* published by the Free Software Foundation.
*/
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
#include <linux/module.h>
#include <linux/skbuff.h>
#include <linux/ip.h>
...
...
@@ -67,14 +67,14 @@ tcpmss_mangle_packet(struct sk_buff *skb,
if
(
info
->
mss
==
XT_TCPMSS_CLAMP_PMTU
)
{
if
(
dst_mtu
(
skb_dst
(
skb
))
<=
minlen
)
{
if
(
net_ratelimit
())
pr
intk
(
KERN_ERR
"xt_TCPMSS: "
pr
_err
(
"xt_TCPMSS: "
"unknown or invalid path-MTU (%u)
\n
"
,
dst_mtu
(
skb_dst
(
skb
)));
return
-
1
;
}
if
(
in_mtu
<=
minlen
)
{
if
(
net_ratelimit
())
pr
intk
(
KERN_ERR
"xt_TCPMSS: unknown or "
pr
_err
(
"xt_TCPMSS: unknown or "
"invalid path-MTU (%u)
\n
"
,
in_mtu
);
return
-
1
;
}
...
...
@@ -245,14 +245,14 @@ static bool tcpmss_tg4_check(const struct xt_tgchk_param *par)
(
par
->
hook_mask
&
~
((
1
<<
NF_INET_FORWARD
)
|
(
1
<<
NF_INET_LOCAL_OUT
)
|
(
1
<<
NF_INET_POST_ROUTING
)))
!=
0
)
{
pr
intk
(
"xt_TCPMSS:
path-MTU clamping only supported in "
"FORWARD, OUTPUT and POSTROUTING hooks
\n
"
);
pr
_info
(
"
path-MTU clamping only supported in "
"FORWARD, OUTPUT and POSTROUTING hooks
\n
"
);
return
false
;
}
xt_ematch_foreach
(
ematch
,
e
)
if
(
find_syn_match
(
ematch
))
return
true
;
pr
intk
(
"xt_TCPMSS:
Only works on TCP SYN packets
\n
"
);
pr
_info
(
"
Only works on TCP SYN packets
\n
"
);
return
false
;
}
...
...
@@ -267,14 +267,14 @@ static bool tcpmss_tg6_check(const struct xt_tgchk_param *par)
(
par
->
hook_mask
&
~
((
1
<<
NF_INET_FORWARD
)
|
(
1
<<
NF_INET_LOCAL_OUT
)
|
(
1
<<
NF_INET_POST_ROUTING
)))
!=
0
)
{
pr
intk
(
"xt_TCPMSS:
path-MTU clamping only supported in "
"FORWARD, OUTPUT and POSTROUTING hooks
\n
"
);
pr
_info
(
"
path-MTU clamping only supported in "
"FORWARD, OUTPUT and POSTROUTING hooks
\n
"
);
return
false
;
}
xt_ematch_foreach
(
ematch
,
e
)
if
(
find_syn_match
(
ematch
))
return
true
;
pr
intk
(
"xt_TCPMSS:
Only works on TCP SYN packets
\n
"
);
pr
_info
(
"
Only works on TCP SYN packets
\n
"
);
return
false
;
}
#endif
...
...
net/netfilter/xt_cluster.c
View file @
8bee4bad
...
...
@@ -5,6 +5,7 @@
* it under the terms of the GNU General Public License version 2 as
* published by the Free Software Foundation.
*/
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
#include <linux/module.h>
#include <linux/skbuff.h>
#include <linux/jhash.h>
...
...
@@ -136,14 +137,14 @@ static bool xt_cluster_mt_checkentry(const struct xt_mtchk_param *par)
struct
xt_cluster_match_info
*
info
=
par
->
matchinfo
;
if
(
info
->
total_nodes
>
XT_CLUSTER_NODES_MAX
)
{
pr
intk
(
KERN_ERR
"xt_cluster:
you have exceeded the maximum "
"number of cluster nodes (%u > %u)
\n
"
,
info
->
total_nodes
,
XT_CLUSTER_NODES_MAX
);
pr
_info
(
"
you have exceeded the maximum "
"number of cluster nodes (%u > %u)
\n
"
,
info
->
total_nodes
,
XT_CLUSTER_NODES_MAX
);
return
false
;
}
if
(
info
->
node_mask
>=
(
1ULL
<<
info
->
total_nodes
))
{
pr
intk
(
KERN_ERR
"xt_cluster:
this node mask cannot be "
"higher than the total number of nodes
\n
"
);
pr
_info
(
"
this node mask cannot be "
"higher than the total number of nodes
\n
"
);
return
false
;
}
return
true
;
...
...
net/netfilter/xt_connbytes.c
View file @
8bee4bad
/* Kernel module to match connection tracking byte counter.
* GPL (C) 2002 Martin Devera (devik@cdi.cz).
*/
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
#include <linux/module.h>
#include <linux/bitops.h>
#include <linux/skbuff.h>
...
...
@@ -107,8 +108,8 @@ static bool connbytes_mt_check(const struct xt_mtchk_param *par)
return
false
;
if
(
nf_ct_l3proto_try_module_get
(
par
->
family
)
<
0
)
{
pr
intk
(
KERN_WARNING
"can't load conntrack support for "
"proto=%u
\n
"
,
par
->
family
);
pr
_info
(
"cannot load conntrack support for proto=%u
\n
"
,
par
->
family
);
return
false
;
}
...
...
net/netfilter/xt_connlimit.c
View file @
8bee4bad
...
...
@@ -11,6 +11,7 @@
* Kernel module to match connection tracking information.
* GPL (C) 1999 Rusty Russell (rusty@rustcorp.com.au).
*/
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
#include <linux/in.h>
#include <linux/in6.h>
#include <linux/ip.h>
...
...
@@ -225,8 +226,8 @@ static bool connlimit_mt_check(const struct xt_mtchk_param *par)
connlimit_rnd_inited
=
true
;
}
if
(
nf_ct_l3proto_try_module_get
(
par
->
family
)
<
0
)
{
pr
intk
(
KERN_WARNING
"cannot load conntrack support for "
"address family %u
\n
"
,
par
->
family
);
pr
_info
(
"cannot load conntrack support for "
"address family %u
\n
"
,
par
->
family
);
return
false
;
}
...
...
net/netfilter/xt_connmark.c
View file @
8bee4bad
...
...
@@ -77,8 +77,8 @@ connmark_tg(struct sk_buff *skb, const struct xt_target_param *par)
static
bool
connmark_tg_check
(
const
struct
xt_tgchk_param
*
par
)
{
if
(
nf_ct_l3proto_try_module_get
(
par
->
family
)
<
0
)
{
pr
intk
(
KERN_WARNING
"cannot load conntrack support for "
"proto=%u
\n
"
,
par
->
family
);
pr
_info
(
"cannot load conntrack support for proto=%u
\n
"
,
par
->
family
);
return
false
;
}
return
true
;
...
...
@@ -106,8 +106,8 @@ connmark_mt(const struct sk_buff *skb, const struct xt_match_param *par)
static
bool
connmark_mt_check
(
const
struct
xt_mtchk_param
*
par
)
{
if
(
nf_ct_l3proto_try_module_get
(
par
->
family
)
<
0
)
{
pr
intk
(
KERN_WARNING
"cannot load conntrack support for "
"proto=%u
\n
"
,
par
->
family
);
pr
_info
(
"cannot load conntrack support for proto=%u
\n
"
,
par
->
family
);
return
false
;
}
return
true
;
...
...
net/netfilter/xt_conntrack.c
View file @
8bee4bad
...
...
@@ -9,7 +9,7 @@
* it under the terms of the GNU General Public License version 2 as
* published by the Free Software Foundation.
*/
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
#include <linux/module.h>
#include <linux/skbuff.h>
#include <net/ipv6.h>
...
...
@@ -209,8 +209,8 @@ conntrack_mt_v2(const struct sk_buff *skb, const struct xt_match_param *par)
static
bool
conntrack_mt_check
(
const
struct
xt_mtchk_param
*
par
)
{
if
(
nf_ct_l3proto_try_module_get
(
par
->
family
)
<
0
)
{
pr
intk
(
KERN_WARNING
"can't load conntrack support for "
"proto=%u
\n
"
,
par
->
family
);
pr
_info
(
"cannot load conntrack support for proto=%u
\n
"
,
par
->
family
);
return
false
;
}
return
true
;
...
...
net/netfilter/xt_dscp.c
View file @
8bee4bad
...
...
@@ -6,7 +6,7 @@
* it under the terms of the GNU General Public License version 2 as
* published by the Free Software Foundation.
*/
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
#include <linux/module.h>
#include <linux/skbuff.h>
#include <linux/ip.h>
...
...
@@ -47,7 +47,7 @@ static bool dscp_mt_check(const struct xt_mtchk_param *par)
const
struct
xt_dscp_info
*
info
=
par
->
matchinfo
;
if
(
info
->
dscp
>
XT_DSCP_MAX
)
{
pr
intk
(
KERN_ERR
"xt_dscp:
dscp %x out of range
\n
"
,
info
->
dscp
);
pr
_info
(
"
dscp %x out of range
\n
"
,
info
->
dscp
);
return
false
;
}
...
...
net/netfilter/xt_hashlimit.c
View file @
8bee4bad
...
...
@@ -7,6 +7,7 @@
*
* Development of this code was funded by Astaro AG, http://www.astaro.com/
*/
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
#include <linux/module.h>
#include <linux/spinlock.h>
#include <linux/random.h>
...
...
@@ -166,17 +167,14 @@ dsthash_alloc_init(struct xt_hashlimit_htable *ht,
if
(
ht
->
cfg
.
max
&&
ht
->
count
>=
ht
->
cfg
.
max
)
{
/* FIXME: do something. question is what.. */
if
(
net_ratelimit
())
printk
(
KERN_WARNING
"xt_hashlimit: max count of %u reached
\n
"
,
ht
->
cfg
.
max
);
pr_err
(
"max count of %u reached
\n
"
,
ht
->
cfg
.
max
);
return
NULL
;
}
ent
=
kmem_cache_alloc
(
hashlimit_cachep
,
GFP_ATOMIC
);
if
(
!
ent
)
{
if
(
net_ratelimit
())
printk
(
KERN_ERR
"xt_hashlimit: can't allocate dsthash_ent
\n
"
);
pr_err
(
"cannot allocate dsthash_ent
\n
"
);
return
NULL
;
}
memcpy
(
&
ent
->
dst
,
dst
,
sizeof
(
ent
->
dst
));
...
...
@@ -681,8 +679,8 @@ static bool hashlimit_mt_check_v0(const struct xt_mtchk_param *par)
/* Check for overflow. */
if
(
r
->
cfg
.
burst
==
0
||
user2credits
(
r
->
cfg
.
avg
*
r
->
cfg
.
burst
)
<
user2credits
(
r
->
cfg
.
avg
))
{
pr
intk
(
KERN_ERR
"xt_hashlimit:
overflow, try lower: %u/%u
\n
"
,
r
->
cfg
.
avg
,
r
->
cfg
.
burst
);
pr
_info
(
"
overflow, try lower: %u/%u
\n
"
,
r
->
cfg
.
avg
,
r
->
cfg
.
burst
);
return
false
;
}
if
(
r
->
cfg
.
mode
==
0
||
...
...
@@ -718,8 +716,8 @@ static bool hashlimit_mt_check(const struct xt_mtchk_param *par)
if
(
info
->
cfg
.
burst
==
0
||
user2credits
(
info
->
cfg
.
avg
*
info
->
cfg
.
burst
)
<
user2credits
(
info
->
cfg
.
avg
))
{
pr
intk
(
KERN_ERR
"xt_hashlimit:
overflow, try lower: %u/%u
\n
"
,
info
->
cfg
.
avg
,
info
->
cfg
.
burst
);
pr
_info
(
"
overflow, try lower: %u/%u
\n
"
,
info
->
cfg
.
avg
,
info
->
cfg
.
burst
);
return
false
;
}
if
(
info
->
cfg
.
gc_interval
==
0
||
info
->
cfg
.
expire
==
0
)
...
...
@@ -1018,7 +1016,7 @@ static int __init hashlimit_mt_init(void)
sizeof
(
struct
dsthash_ent
),
0
,
0
,
NULL
);
if
(
!
hashlimit_cachep
)
{
pr
intk
(
KERN_ERR
"xt_hashlimit:
unable to create slab cache
\n
"
);
pr
_warning
(
"
unable to create slab cache
\n
"
);
goto
err2
;
}
return
0
;
...
...
net/netfilter/xt_helper.c
View file @
8bee4bad
...
...
@@ -6,7 +6,7 @@
* it under the terms of the GNU General Public License version 2 as
* published by the Free Software Foundation.
*/
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
#include <linux/module.h>
#include <linux/skbuff.h>
#include <linux/netfilter.h>
...
...
@@ -59,8 +59,8 @@ static bool helper_mt_check(const struct xt_mtchk_param *par)
struct
xt_helper_info
*
info
=
par
->
matchinfo
;
if
(
nf_ct_l3proto_try_module_get
(
par
->
family
)
<
0
)
{
pr
intk
(
KERN_WARNING
"can't load conntrack support for "
"proto=%u
\n
"
,
par
->
family
);
pr
_info
(
"cannot load conntrack support for proto=%u
\n
"
,
par
->
family
);
return
false
;
}
info
->
name
[
29
]
=
'\0'
;
...
...
net/netfilter/xt_hl.c
View file @
8bee4bad
...
...
@@ -39,10 +39,6 @@ static bool ttl_mt(const struct sk_buff *skb, const struct xt_match_param *par)
return
ttl
<
info
->
ttl
;
case
IPT_TTL_GT
:
return
ttl
>
info
->
ttl
;
default:
printk
(
KERN_WARNING
"ipt_ttl: unknown mode %d
\n
"
,
info
->
mode
);
return
false
;
}
return
false
;
...
...
@@ -56,20 +52,12 @@ static bool hl_mt6(const struct sk_buff *skb, const struct xt_match_param *par)
switch
(
info
->
mode
)
{
case
IP6T_HL_EQ
:
return
ip6h
->
hop_limit
==
info
->
hop_limit
;
break
;
case
IP6T_HL_NE
:
return
ip6h
->
hop_limit
!=
info
->
hop_limit
;
break
;
case
IP6T_HL_LT
:
return
ip6h
->
hop_limit
<
info
->
hop_limit
;
break
;
case
IP6T_HL_GT
:
return
ip6h
->
hop_limit
>
info
->
hop_limit
;
break
;
default:
printk
(
KERN_WARNING
"ip6t_hl: unknown mode %d
\n
"
,
info
->
mode
);
return
false
;
}
return
false
;
...
...
net/netfilter/xt_limit.c
View file @
8bee4bad
...
...
@@ -5,7 +5,7 @@
* it under the terms of the GNU General Public License version 2 as
* published by the Free Software Foundation.
*/
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
#include <linux/module.h>
#include <linux/skbuff.h>
#include <linux/spinlock.h>
...
...
@@ -105,8 +105,8 @@ static bool limit_mt_check(const struct xt_mtchk_param *par)
/* Check for overflow. */
if
(
r
->
burst
==
0
||
user2credits
(
r
->
avg
*
r
->
burst
)
<
user2credits
(
r
->
avg
))
{
pr
intk
(
"Overflow in xt_limit
, try lower: %u/%u
\n
"
,
r
->
avg
,
r
->
burst
);
pr
_info
(
"Overflow
, try lower: %u/%u
\n
"
,
r
->
avg
,
r
->
burst
);
return
false
;
}
...
...
net/netfilter/xt_osf.c
View file @
8bee4bad
...
...
@@ -16,7 +16,7 @@
* along with this program; if not, write to the Free Software
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
*/
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
#include <linux/module.h>
#include <linux/kernel.h>
...
...
@@ -382,14 +382,14 @@ static int __init xt_osf_init(void)
err
=
nfnetlink_subsys_register
(
&
xt_osf_nfnetlink
);
if
(
err
<
0
)
{
pr
intk
(
KERN_ERR
"Failed (%d) to register OSF nsfnetlink helper.
\n
"
,
err
);
pr
_err
(
"Failed to register OSF nsfnetlink helper (%d)
\n
"
,
err
);
goto
err_out_exit
;
}
err
=
xt_register_match
(
&
xt_osf_match
);
if
(
err
)
{
pr
intk
(
KERN_ERR
"Failed (%d)
to register OS fingerprint "
"matching module.
\n
"
,
err
);
pr
_err
(
"Failed
to register OS fingerprint "
"matching module (%d)
\n
"
,
err
);
goto
err_out_remove
;
}
...
...
net/netfilter/xt_physdev.c
View file @
8bee4bad
...
...
@@ -7,7 +7,7 @@
* it under the terms of the GNU General Public License version 2 as
* published by the Free Software Foundation.
*/
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
#include <linux/module.h>
#include <linux/skbuff.h>
#include <linux/netfilter_bridge.h>
...
...
@@ -95,9 +95,9 @@ static bool physdev_mt_check(const struct xt_mtchk_param *par)
info
->
invert
&
XT_PHYSDEV_OP_BRIDGED
)
&&
par
->
hook_mask
&
((
1
<<
NF_INET_LOCAL_OUT
)
|
(
1
<<
NF_INET_FORWARD
)
|
(
1
<<
NF_INET_POST_ROUTING
)))
{
pr
intk
(
KERN_WARNING
"physdev match: using --physdev-out in the
"
"OUTPUT, FORWARD and POSTROUTING chains for non-bridged
"
"traffic is not
supported anymore.
\n
"
);
pr
_info
(
"using --physdev-out in the OUTPUT, FORWARD and
"
"POSTROUTING chains for non-bridged traffic is not
"
"
supported anymore.
\n
"
);
if
(
par
->
hook_mask
&
(
1
<<
NF_INET_LOCAL_OUT
))
return
false
;
}
...
...
net/netfilter/xt_policy.c
View file @
8bee4bad
...
...
@@ -6,7 +6,7 @@
* it under the terms of the GNU General Public License version 2 as
* published by the Free Software Foundation.
*/
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
#include <linux/kernel.h>
#include <linux/module.h>
#include <linux/skbuff.h>
...
...
@@ -133,24 +133,21 @@ static bool policy_mt_check(const struct xt_mtchk_param *par)
const
struct
xt_policy_info
*
info
=
par
->
matchinfo
;
if
(
!
(
info
->
flags
&
(
XT_POLICY_MATCH_IN
|
XT_POLICY_MATCH_OUT
)))
{
printk
(
KERN_ERR
"xt_policy: neither incoming nor "
"outgoing policy selected
\n
"
);
pr_info
(
"neither incoming nor outgoing policy selected
\n
"
);
return
false
;
}
if
(
par
->
hook_mask
&
((
1
<<
NF_INET_PRE_ROUTING
)
|
(
1
<<
NF_INET_LOCAL_IN
))
&&
info
->
flags
&
XT_POLICY_MATCH_OUT
)
{
printk
(
KERN_ERR
"xt_policy: output policy not valid in "
"PRE_ROUTING and INPUT
\n
"
);
pr_info
(
"output policy not valid in PREROUTING and INPUT
\n
"
);
return
false
;
}
if
(
par
->
hook_mask
&
((
1
<<
NF_INET_POST_ROUTING
)
|
(
1
<<
NF_INET_LOCAL_OUT
))
&&
info
->
flags
&
XT_POLICY_MATCH_IN
)
{
printk
(
KERN_ERR
"xt_policy: input policy not valid in "
"POST_ROUTING and OUTPUT
\n
"
);
pr_info
(
"input policy not valid in POSTROUTING and OUTPUT
\n
"
);
return
false
;
}
if
(
info
->
len
>
XT_POLICY_MAX_ELEM
)
{
pr
intk
(
KERN_ERR
"xt_policy:
too many policy elements
\n
"
);
pr
_info
(
"
too many policy elements
\n
"
);
return
false
;
}
return
true
;
...
...
net/netfilter/xt_recent.c
View file @
8bee4bad
...
...
@@ -12,6 +12,7 @@
* Author: Stephen Frost <sfrost@snowman.net>
* Copyright 2002-2003, Stephen Frost, 2.5.x port by laforge@netfilter.org
*/
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
#include <linux/init.h>
#include <linux/ip.h>
#include <linux/ipv6.h>
...
...
@@ -520,7 +521,7 @@ recent_mt_proc_write(struct file *file, const char __user *input,
add
=
true
;
break
;
default:
pr
intk
(
KERN_INFO
KBUILD_MODNAME
": Need +ip, -ip or /
\n
"
);
pr
_info
(
"Need
\"
+ip
\"
,
\"
-ip
\"
or
\"
/
\"
\n
"
);
return
-
EINVAL
;
}
...
...
@@ -535,8 +536,7 @@ recent_mt_proc_write(struct file *file, const char __user *input,
}
if
(
!
succ
)
{
printk
(
KERN_INFO
KBUILD_MODNAME
": illegal address written "
"to procfs
\n
"
);
pr_info
(
"illegal address written to procfs
\n
"
);
return
-
EINVAL
;
}
...
...
net/netfilter/xt_state.c
View file @
8bee4bad
...
...
@@ -40,8 +40,8 @@ state_mt(const struct sk_buff *skb, const struct xt_match_param *par)
static
bool
state_mt_check
(
const
struct
xt_mtchk_param
*
par
)
{
if
(
nf_ct_l3proto_try_module_get
(
par
->
family
)
<
0
)
{
pr
intk
(
KERN_WARNING
"can't load conntrack support for "
"proto=%u
\n
"
,
par
->
family
);
pr
_info
(
"cannot load conntrack support for proto=%u
\n
"
,
par
->
family
);
return
false
;
}
return
true
;
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment