Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
L
linux
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
linux
Commits
78582416
Commit
78582416
authored
Aug 30, 2011
by
David S. Miller
Browse files
Options
Browse Files
Download
Plain Diff
Merge branch 'master' of
git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6
parents
ec0506db
768b1031
Changes
8
Hide whitespace changes
Inline
Side-by-side
Showing
8 changed files
with
23 additions
and
26 deletions
+23
-26
MAINTAINERS
MAINTAINERS
+2
-1
net/bridge/netfilter/Kconfig
net/bridge/netfilter/Kconfig
+1
-1
net/ipv4/netfilter/ip_queue.c
net/ipv4/netfilter/ip_queue.c
+5
-7
net/ipv6/netfilter/ip6_queue.c
net/ipv6/netfilter/ip6_queue.c
+5
-7
net/netfilter/nf_conntrack_pptp.c
net/netfilter/nf_conntrack_pptp.c
+1
-0
net/netfilter/nf_conntrack_proto_tcp.c
net/netfilter/nf_conntrack_proto_tcp.c
+3
-3
net/netfilter/nfnetlink_queue.c
net/netfilter/nfnetlink_queue.c
+2
-2
net/netfilter/xt_rateest.c
net/netfilter/xt_rateest.c
+4
-5
No files found.
MAINTAINERS
View file @
78582416
...
...
@@ -4404,7 +4404,8 @@ L: netfilter@vger.kernel.org
L: coreteam@netfilter.org
W: http://www.netfilter.org/
W: http://www.iptables.org/
T: git git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6.git
T: git git://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf-2.6.git
T: git git://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf-next-2.6.git
S: Supported
F: include/linux/netfilter*
F: include/linux/netfilter/
...
...
net/bridge/netfilter/Kconfig
View file @
78582416
...
...
@@ -4,7 +4,7 @@
menuconfig BRIDGE_NF_EBTABLES
tristate "Ethernet Bridge tables (ebtables) support"
depends on BRIDGE &&
BRIDGE_
NETFILTER
depends on BRIDGE && NETFILTER
select NETFILTER_XTABLES
help
ebtables is a general, extensible frame/packet identification
...
...
net/ipv4/netfilter/ip_queue.c
View file @
78582416
...
...
@@ -218,6 +218,7 @@ ipq_build_packet_message(struct nf_queue_entry *entry, int *errp)
return
skb
;
nlmsg_failure:
kfree_skb
(
skb
);
*
errp
=
-
EINVAL
;
printk
(
KERN_ERR
"ip_queue: error creating packet message
\n
"
);
return
NULL
;
...
...
@@ -313,7 +314,7 @@ ipq_set_verdict(struct ipq_verdict_msg *vmsg, unsigned int len)
{
struct
nf_queue_entry
*
entry
;
if
(
vmsg
->
value
>
NF_MAX_VERDICT
)
if
(
vmsg
->
value
>
NF_MAX_VERDICT
||
vmsg
->
value
==
NF_STOLEN
)
return
-
EINVAL
;
entry
=
ipq_find_dequeue_entry
(
vmsg
->
id
);
...
...
@@ -358,12 +359,9 @@ ipq_receive_peer(struct ipq_peer_msg *pmsg,
break
;
case
IPQM_VERDICT
:
if
(
pmsg
->
msg
.
verdict
.
value
>
NF_MAX_VERDICT
)
status
=
-
EINVAL
;
else
status
=
ipq_set_verdict
(
&
pmsg
->
msg
.
verdict
,
len
-
sizeof
(
*
pmsg
));
break
;
status
=
ipq_set_verdict
(
&
pmsg
->
msg
.
verdict
,
len
-
sizeof
(
*
pmsg
));
break
;
default:
status
=
-
EINVAL
;
}
...
...
net/ipv6/netfilter/ip6_queue.c
View file @
78582416
...
...
@@ -218,6 +218,7 @@ ipq_build_packet_message(struct nf_queue_entry *entry, int *errp)
return
skb
;
nlmsg_failure:
kfree_skb
(
skb
);
*
errp
=
-
EINVAL
;
printk
(
KERN_ERR
"ip6_queue: error creating packet message
\n
"
);
return
NULL
;
...
...
@@ -313,7 +314,7 @@ ipq_set_verdict(struct ipq_verdict_msg *vmsg, unsigned int len)
{
struct
nf_queue_entry
*
entry
;
if
(
vmsg
->
value
>
NF_MAX_VERDICT
)
if
(
vmsg
->
value
>
NF_MAX_VERDICT
||
vmsg
->
value
==
NF_STOLEN
)
return
-
EINVAL
;
entry
=
ipq_find_dequeue_entry
(
vmsg
->
id
);
...
...
@@ -358,12 +359,9 @@ ipq_receive_peer(struct ipq_peer_msg *pmsg,
break
;
case
IPQM_VERDICT
:
if
(
pmsg
->
msg
.
verdict
.
value
>
NF_MAX_VERDICT
)
status
=
-
EINVAL
;
else
status
=
ipq_set_verdict
(
&
pmsg
->
msg
.
verdict
,
len
-
sizeof
(
*
pmsg
));
break
;
status
=
ipq_set_verdict
(
&
pmsg
->
msg
.
verdict
,
len
-
sizeof
(
*
pmsg
));
break
;
default:
status
=
-
EINVAL
;
}
...
...
net/netfilter/nf_conntrack_pptp.c
View file @
78582416
...
...
@@ -364,6 +364,7 @@ pptp_inbound_pkt(struct sk_buff *skb,
break
;
case
PPTP_WAN_ERROR_NOTIFY
:
case
PPTP_SET_LINK_INFO
:
case
PPTP_ECHO_REQUEST
:
case
PPTP_ECHO_REPLY
:
/* I don't have to explain these ;) */
...
...
net/netfilter/nf_conntrack_proto_tcp.c
View file @
78582416
...
...
@@ -409,7 +409,7 @@ static void tcp_options(const struct sk_buff *skb,
if
(
opsize
<
2
)
/* "silly options" */
return
;
if
(
opsize
>
length
)
break
;
/* don't parse partial options */
return
;
/* don't parse partial options */
if
(
opcode
==
TCPOPT_SACK_PERM
&&
opsize
==
TCPOLEN_SACK_PERM
)
...
...
@@ -447,7 +447,7 @@ static void tcp_sack(const struct sk_buff *skb, unsigned int dataoff,
BUG_ON
(
ptr
==
NULL
);
/* Fast path for timestamp-only option */
if
(
length
==
TCPOLEN_TSTAMP_ALIGNED
*
4
if
(
length
==
TCPOLEN_TSTAMP_ALIGNED
&&
*
(
__be32
*
)
ptr
==
htonl
((
TCPOPT_NOP
<<
24
)
|
(
TCPOPT_NOP
<<
16
)
|
(
TCPOPT_TIMESTAMP
<<
8
)
...
...
@@ -469,7 +469,7 @@ static void tcp_sack(const struct sk_buff *skb, unsigned int dataoff,
if
(
opsize
<
2
)
/* "silly options" */
return
;
if
(
opsize
>
length
)
break
;
/* don't parse partial options */
return
;
/* don't parse partial options */
if
(
opcode
==
TCPOPT_SACK
&&
opsize
>=
(
TCPOLEN_SACK_BASE
...
...
net/netfilter/nfnetlink_queue.c
View file @
78582416
...
...
@@ -646,8 +646,8 @@ verdicthdr_get(const struct nlattr * const nfqa[])
return
NULL
;
vhdr
=
nla_data
(
nfqa
[
NFQA_VERDICT_HDR
]);
verdict
=
ntohl
(
vhdr
->
verdict
);
if
(
(
verdict
&
NF_VERDICT_MASK
)
>
NF_MAX_VERDICT
)
verdict
=
ntohl
(
vhdr
->
verdict
)
&
NF_VERDICT_MASK
;
if
(
verdict
>
NF_MAX_VERDICT
||
verdict
==
NF_STOLEN
)
return
NULL
;
return
vhdr
;
}
...
...
net/netfilter/xt_rateest.c
View file @
78582416
...
...
@@ -78,7 +78,7 @@ static int xt_rateest_mt_checkentry(const struct xt_mtchk_param *par)
{
struct
xt_rateest_match_info
*
info
=
par
->
matchinfo
;
struct
xt_rateest
*
est1
,
*
est2
;
int
ret
=
false
;
int
ret
=
-
EINVAL
;
if
(
hweight32
(
info
->
flags
&
(
XT_RATEEST_MATCH_ABS
|
XT_RATEEST_MATCH_REL
))
!=
1
)
...
...
@@ -101,13 +101,12 @@ static int xt_rateest_mt_checkentry(const struct xt_mtchk_param *par)
if
(
!
est1
)
goto
err1
;
est2
=
NULL
;
if
(
info
->
flags
&
XT_RATEEST_MATCH_REL
)
{
est2
=
xt_rateest_lookup
(
info
->
name2
);
if
(
!
est2
)
goto
err2
;
}
else
est2
=
NULL
;
}
info
->
est1
=
est1
;
info
->
est2
=
est2
;
...
...
@@ -116,7 +115,7 @@ static int xt_rateest_mt_checkentry(const struct xt_mtchk_param *par)
err2:
xt_rateest_put
(
est1
);
err1:
return
-
EINVAL
;
return
ret
;
}
static
void
xt_rateest_mt_destroy
(
const
struct
xt_mtdtor_param
*
par
)
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment