mirror of https://gitee.com/openkylin/linux.git
Merge branch 'master' of git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6
This commit is contained in:
commit
7858241655
|
@ -4404,7 +4404,8 @@ L: netfilter@vger.kernel.org
|
|||
L: coreteam@netfilter.org
|
||||
W: http://www.netfilter.org/
|
||||
W: http://www.iptables.org/
|
||||
T: git git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6.git
|
||||
T: git git://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf-2.6.git
|
||||
T: git git://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf-next-2.6.git
|
||||
S: Supported
|
||||
F: include/linux/netfilter*
|
||||
F: include/linux/netfilter/
|
||||
|
|
|
@ -4,7 +4,7 @@
|
|||
|
||||
menuconfig BRIDGE_NF_EBTABLES
|
||||
tristate "Ethernet Bridge tables (ebtables) support"
|
||||
depends on BRIDGE && BRIDGE_NETFILTER
|
||||
depends on BRIDGE && NETFILTER
|
||||
select NETFILTER_XTABLES
|
||||
help
|
||||
ebtables is a general, extensible frame/packet identification
|
||||
|
|
|
@ -218,6 +218,7 @@ ipq_build_packet_message(struct nf_queue_entry *entry, int *errp)
|
|||
return skb;
|
||||
|
||||
nlmsg_failure:
|
||||
kfree_skb(skb);
|
||||
*errp = -EINVAL;
|
||||
printk(KERN_ERR "ip_queue: error creating packet message\n");
|
||||
return NULL;
|
||||
|
@ -313,7 +314,7 @@ ipq_set_verdict(struct ipq_verdict_msg *vmsg, unsigned int len)
|
|||
{
|
||||
struct nf_queue_entry *entry;
|
||||
|
||||
if (vmsg->value > NF_MAX_VERDICT)
|
||||
if (vmsg->value > NF_MAX_VERDICT || vmsg->value == NF_STOLEN)
|
||||
return -EINVAL;
|
||||
|
||||
entry = ipq_find_dequeue_entry(vmsg->id);
|
||||
|
@ -358,12 +359,9 @@ ipq_receive_peer(struct ipq_peer_msg *pmsg,
|
|||
break;
|
||||
|
||||
case IPQM_VERDICT:
|
||||
if (pmsg->msg.verdict.value > NF_MAX_VERDICT)
|
||||
status = -EINVAL;
|
||||
else
|
||||
status = ipq_set_verdict(&pmsg->msg.verdict,
|
||||
len - sizeof(*pmsg));
|
||||
break;
|
||||
status = ipq_set_verdict(&pmsg->msg.verdict,
|
||||
len - sizeof(*pmsg));
|
||||
break;
|
||||
default:
|
||||
status = -EINVAL;
|
||||
}
|
||||
|
|
|
@ -218,6 +218,7 @@ ipq_build_packet_message(struct nf_queue_entry *entry, int *errp)
|
|||
return skb;
|
||||
|
||||
nlmsg_failure:
|
||||
kfree_skb(skb);
|
||||
*errp = -EINVAL;
|
||||
printk(KERN_ERR "ip6_queue: error creating packet message\n");
|
||||
return NULL;
|
||||
|
@ -313,7 +314,7 @@ ipq_set_verdict(struct ipq_verdict_msg *vmsg, unsigned int len)
|
|||
{
|
||||
struct nf_queue_entry *entry;
|
||||
|
||||
if (vmsg->value > NF_MAX_VERDICT)
|
||||
if (vmsg->value > NF_MAX_VERDICT || vmsg->value == NF_STOLEN)
|
||||
return -EINVAL;
|
||||
|
||||
entry = ipq_find_dequeue_entry(vmsg->id);
|
||||
|
@ -358,12 +359,9 @@ ipq_receive_peer(struct ipq_peer_msg *pmsg,
|
|||
break;
|
||||
|
||||
case IPQM_VERDICT:
|
||||
if (pmsg->msg.verdict.value > NF_MAX_VERDICT)
|
||||
status = -EINVAL;
|
||||
else
|
||||
status = ipq_set_verdict(&pmsg->msg.verdict,
|
||||
len - sizeof(*pmsg));
|
||||
break;
|
||||
status = ipq_set_verdict(&pmsg->msg.verdict,
|
||||
len - sizeof(*pmsg));
|
||||
break;
|
||||
default:
|
||||
status = -EINVAL;
|
||||
}
|
||||
|
|
|
@ -364,6 +364,7 @@ pptp_inbound_pkt(struct sk_buff *skb,
|
|||
break;
|
||||
|
||||
case PPTP_WAN_ERROR_NOTIFY:
|
||||
case PPTP_SET_LINK_INFO:
|
||||
case PPTP_ECHO_REQUEST:
|
||||
case PPTP_ECHO_REPLY:
|
||||
/* I don't have to explain these ;) */
|
||||
|
|
|
@ -409,7 +409,7 @@ static void tcp_options(const struct sk_buff *skb,
|
|||
if (opsize < 2) /* "silly options" */
|
||||
return;
|
||||
if (opsize > length)
|
||||
break; /* don't parse partial options */
|
||||
return; /* don't parse partial options */
|
||||
|
||||
if (opcode == TCPOPT_SACK_PERM
|
||||
&& opsize == TCPOLEN_SACK_PERM)
|
||||
|
@ -447,7 +447,7 @@ static void tcp_sack(const struct sk_buff *skb, unsigned int dataoff,
|
|||
BUG_ON(ptr == NULL);
|
||||
|
||||
/* Fast path for timestamp-only option */
|
||||
if (length == TCPOLEN_TSTAMP_ALIGNED*4
|
||||
if (length == TCPOLEN_TSTAMP_ALIGNED
|
||||
&& *(__be32 *)ptr == htonl((TCPOPT_NOP << 24)
|
||||
| (TCPOPT_NOP << 16)
|
||||
| (TCPOPT_TIMESTAMP << 8)
|
||||
|
@ -469,7 +469,7 @@ static void tcp_sack(const struct sk_buff *skb, unsigned int dataoff,
|
|||
if (opsize < 2) /* "silly options" */
|
||||
return;
|
||||
if (opsize > length)
|
||||
break; /* don't parse partial options */
|
||||
return; /* don't parse partial options */
|
||||
|
||||
if (opcode == TCPOPT_SACK
|
||||
&& opsize >= (TCPOLEN_SACK_BASE
|
||||
|
|
|
@ -646,8 +646,8 @@ verdicthdr_get(const struct nlattr * const nfqa[])
|
|||
return NULL;
|
||||
|
||||
vhdr = nla_data(nfqa[NFQA_VERDICT_HDR]);
|
||||
verdict = ntohl(vhdr->verdict);
|
||||
if ((verdict & NF_VERDICT_MASK) > NF_MAX_VERDICT)
|
||||
verdict = ntohl(vhdr->verdict) & NF_VERDICT_MASK;
|
||||
if (verdict > NF_MAX_VERDICT || verdict == NF_STOLEN)
|
||||
return NULL;
|
||||
return vhdr;
|
||||
}
|
||||
|
|
|
@ -78,7 +78,7 @@ static int xt_rateest_mt_checkentry(const struct xt_mtchk_param *par)
|
|||
{
|
||||
struct xt_rateest_match_info *info = par->matchinfo;
|
||||
struct xt_rateest *est1, *est2;
|
||||
int ret = false;
|
||||
int ret = -EINVAL;
|
||||
|
||||
if (hweight32(info->flags & (XT_RATEEST_MATCH_ABS |
|
||||
XT_RATEEST_MATCH_REL)) != 1)
|
||||
|
@ -101,13 +101,12 @@ static int xt_rateest_mt_checkentry(const struct xt_mtchk_param *par)
|
|||
if (!est1)
|
||||
goto err1;
|
||||
|
||||
est2 = NULL;
|
||||
if (info->flags & XT_RATEEST_MATCH_REL) {
|
||||
est2 = xt_rateest_lookup(info->name2);
|
||||
if (!est2)
|
||||
goto err2;
|
||||
} else
|
||||
est2 = NULL;
|
||||
|
||||
}
|
||||
|
||||
info->est1 = est1;
|
||||
info->est2 = est2;
|
||||
|
@ -116,7 +115,7 @@ static int xt_rateest_mt_checkentry(const struct xt_mtchk_param *par)
|
|||
err2:
|
||||
xt_rateest_put(est1);
|
||||
err1:
|
||||
return -EINVAL;
|
||||
return ret;
|
||||
}
|
||||
|
||||
static void xt_rateest_mt_destroy(const struct xt_mtdtor_param *par)
|
||||
|
|
Loading…
Reference in New Issue