Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
L
linux
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
linux
Commits
98bd0c07
Commit
98bd0c07
authored
Feb 05, 2006
by
Linus Torvalds
Browse files
Options
Browse Files
Download
Plain Diff
Merge master.kernel.org:/pub/scm/linux/kernel/git/davem/net-2.6
parents
5e375bc7
7918d212
Changes
21
Show whitespace changes
Inline
Side-by-side
Showing
21 changed files
with
124 additions
and
61 deletions
+124
-61
include/linux/netfilter_ipv4/ipt_connbytes.h
include/linux/netfilter_ipv4/ipt_connbytes.h
+2
-2
include/linux/netfilter_ipv4/ipt_policy.h
include/linux/netfilter_ipv4/ipt_policy.h
+14
-8
include/linux/netfilter_ipv6/ip6t_policy.h
include/linux/netfilter_ipv6/ip6t_policy.h
+14
-8
include/net/netfilter/nf_conntrack_l3proto.h
include/net/netfilter/nf_conntrack_l3proto.h
+9
-6
net/bridge/netfilter/ebt_ulog.c
net/bridge/netfilter/ebt_ulog.c
+6
-4
net/bridge/netfilter/ebtables.c
net/bridge/netfilter/ebtables.c
+7
-0
net/ipv4/icmp.c
net/ipv4/icmp.c
+1
-1
net/ipv4/netfilter/arp_tables.c
net/ipv4/netfilter/arp_tables.c
+7
-0
net/ipv4/netfilter/ip_conntrack_netlink.c
net/ipv4/netfilter/ip_conntrack_netlink.c
+2
-1
net/ipv4/netfilter/ip_conntrack_tftp.c
net/ipv4/netfilter/ip_conntrack_tftp.c
+1
-0
net/ipv4/netfilter/ip_nat_standalone.c
net/ipv4/netfilter/ip_nat_standalone.c
+2
-2
net/ipv4/netfilter/ip_tables.c
net/ipv4/netfilter/ip_tables.c
+7
-0
net/ipv4/netfilter/ipt_ULOG.c
net/ipv4/netfilter/ipt_ULOG.c
+17
-9
net/ipv4/netfilter/ipt_policy.c
net/ipv4/netfilter/ipt_policy.c
+7
-4
net/ipv6/netfilter/ip6_tables.c
net/ipv6/netfilter/ip6_tables.c
+7
-0
net/ipv6/netfilter/ip6t_policy.c
net/ipv6/netfilter/ip6t_policy.c
+4
-3
net/netfilter/nf_conntrack_core.c
net/netfilter/nf_conntrack_core.c
+1
-1
net/netfilter/nf_conntrack_ftp.c
net/netfilter/nf_conntrack_ftp.c
+0
-2
net/netfilter/nf_conntrack_netlink.c
net/netfilter/nf_conntrack_netlink.c
+2
-1
net/netfilter/nfnetlink_log.c
net/netfilter/nfnetlink_log.c
+12
-8
net/netfilter/nfnetlink_queue.c
net/netfilter/nfnetlink_queue.c
+2
-1
No files found.
include/linux/netfilter_ipv4/ipt_connbytes.h
View file @
98bd0c07
#ifndef _IPT_CONNBYTES_H
#define _IPT_CONNBYTES_H
#include <
net
/netfilter/xt_connbytes.h>
#include <
linux
/netfilter/xt_connbytes.h>
#define ipt_connbytes_what xt_connbytes_what
#define IPT_CONNBYTES_PKTS XT_CONNBYTES_P
ACKE
TS
#define IPT_CONNBYTES_PKTS XT_CONNBYTES_P
K
TS
#define IPT_CONNBYTES_BYTES XT_CONNBYTES_BYTES
#define IPT_CONNBYTES_AVGPKT XT_CONNBYTES_AVGPKT
...
...
include/linux/netfilter_ipv4/ipt_policy.h
View file @
98bd0c07
...
...
@@ -27,12 +27,18 @@ struct ipt_policy_spec
reqid:
1
;
};
union
ipt_policy_addr
{
struct
in_addr
a4
;
struct
in6_addr
a6
;
};
struct
ipt_policy_elem
{
u
_int32_t
saddr
;
u
_int32_t
smask
;
u
_int32_t
daddr
;
u
_int32_t
dmask
;
u
nion
ipt_policy_addr
saddr
;
u
nion
ipt_policy_addr
smask
;
u
nion
ipt_policy_addr
daddr
;
u
nion
ipt_policy_addr
dmask
;
u_int32_t
spi
;
u_int32_t
reqid
;
u_int8_t
proto
;
...
...
include/linux/netfilter_ipv6/ip6t_policy.h
View file @
98bd0c07
...
...
@@ -27,12 +27,18 @@ struct ip6t_policy_spec
reqid:
1
;
};
union
ip6t_policy_addr
{
struct
in_addr
a4
;
struct
in6_addr
a6
;
};
struct
ip6t_policy_elem
{
struct
in6
_addr
saddr
;
struct
in6
_addr
smask
;
struct
in6
_addr
daddr
;
struct
in6
_addr
dmask
;
union
ip6t_policy
_addr
saddr
;
union
ip6t_policy
_addr
smask
;
union
ip6t_policy
_addr
daddr
;
union
ip6t_policy
_addr
dmask
;
u_int32_t
spi
;
u_int32_t
reqid
;
u_int8_t
proto
;
...
...
include/net/netfilter/nf_conntrack_l3proto.h
View file @
98bd0c07
...
...
@@ -88,12 +88,6 @@ extern struct nf_conntrack_l3proto *nf_ct_l3protos[AF_MAX];
extern
int
nf_conntrack_l3proto_register
(
struct
nf_conntrack_l3proto
*
proto
);
extern
void
nf_conntrack_l3proto_unregister
(
struct
nf_conntrack_l3proto
*
proto
);
static
inline
struct
nf_conntrack_l3proto
*
__nf_ct_l3proto_find
(
u_int16_t
l3proto
)
{
return
nf_ct_l3protos
[
l3proto
];
}
extern
struct
nf_conntrack_l3proto
*
nf_ct_l3proto_find_get
(
u_int16_t
l3proto
);
...
...
@@ -103,4 +97,13 @@ extern void nf_ct_l3proto_put(struct nf_conntrack_l3proto *p);
extern
struct
nf_conntrack_l3proto
nf_conntrack_l3proto_ipv4
;
extern
struct
nf_conntrack_l3proto
nf_conntrack_l3proto_ipv6
;
extern
struct
nf_conntrack_l3proto
nf_conntrack_generic_l3proto
;
static
inline
struct
nf_conntrack_l3proto
*
__nf_ct_l3proto_find
(
u_int16_t
l3proto
)
{
if
(
unlikely
(
l3proto
>=
AF_MAX
))
return
&
nf_conntrack_generic_l3proto
;
return
nf_ct_l3protos
[
l3proto
];
}
#endif
/*_NF_CONNTRACK_L3PROTO_H*/
net/bridge/netfilter/ebt_ulog.c
View file @
98bd0c07
...
...
@@ -46,7 +46,7 @@
#define PRINTR(format, args...) do { if (net_ratelimit()) \
printk(format , ## args); } while (0)
static
unsigned
int
nlbufsiz
=
4096
;
static
unsigned
int
nlbufsiz
=
NLMSG_GOODSIZE
;
module_param
(
nlbufsiz
,
uint
,
0600
);
MODULE_PARM_DESC
(
nlbufsiz
,
"netlink buffer size (number of bytes) "
"(defaults to 4096)"
);
...
...
@@ -98,12 +98,14 @@ static void ulog_timer(unsigned long data)
static
struct
sk_buff
*
ulog_alloc_skb
(
unsigned
int
size
)
{
struct
sk_buff
*
skb
;
unsigned
int
n
;
skb
=
alloc_skb
(
nlbufsiz
,
GFP_ATOMIC
);
n
=
max
(
size
,
nlbufsiz
);
skb
=
alloc_skb
(
n
,
GFP_ATOMIC
);
if
(
!
skb
)
{
PRINTR
(
KERN_ERR
"ebt_ulog: can't alloc whole buffer "
"of size %ub!
\n
"
,
n
lbufsiz
);
if
(
size
<
nlbufsiz
)
{
"of size %ub!
\n
"
,
n
);
if
(
n
>
size
)
{
/* try to allocate only as much as we need for
* current packet */
skb
=
alloc_skb
(
size
,
GFP_ATOMIC
);
...
...
net/bridge/netfilter/ebtables.c
View file @
98bd0c07
...
...
@@ -934,6 +934,13 @@ static int do_replace(void __user *user, unsigned int len)
BUGPRINT
(
"Entries_size never zero
\n
"
);
return
-
EINVAL
;
}
/* overflow check */
if
(
tmp
.
nentries
>=
((
INT_MAX
-
sizeof
(
struct
ebt_table_info
))
/
NR_CPUS
-
SMP_CACHE_BYTES
)
/
sizeof
(
struct
ebt_counter
))
return
-
ENOMEM
;
if
(
tmp
.
num_counters
>=
INT_MAX
/
sizeof
(
struct
ebt_counter
))
return
-
ENOMEM
;
countersize
=
COUNTER_OFFSET
(
tmp
.
nentries
)
*
(
highest_possible_processor_id
()
+
1
);
newinfo
=
(
struct
ebt_table_info
*
)
...
...
net/ipv4/icmp.c
View file @
98bd0c07
...
...
@@ -524,7 +524,7 @@ void icmp_send(struct sk_buff *skb_in, int type, int code, u32 info)
iph
->
tos
;
if
(
ip_options_echo
(
&
icmp_param
.
replyopts
,
skb_in
))
goto
ende
;
goto
out_unlock
;
/*
...
...
net/ipv4/netfilter/arp_tables.c
View file @
98bd0c07
...
...
@@ -807,6 +807,13 @@ static int do_replace(void __user *user, unsigned int len)
if
(
len
!=
sizeof
(
tmp
)
+
tmp
.
size
)
return
-
ENOPROTOOPT
;
/* overflow check */
if
(
tmp
.
size
>=
(
INT_MAX
-
sizeof
(
struct
xt_table_info
))
/
NR_CPUS
-
SMP_CACHE_BYTES
)
return
-
ENOMEM
;
if
(
tmp
.
num_counters
>=
INT_MAX
/
sizeof
(
struct
xt_counters
))
return
-
ENOMEM
;
newinfo
=
xt_alloc_table_info
(
tmp
.
size
);
if
(
!
newinfo
)
return
-
ENOMEM
;
...
...
net/ipv4/netfilter/ip_conntrack_netlink.c
View file @
98bd0c07
...
...
@@ -1216,7 +1216,7 @@ static int ctnetlink_expect_event(struct notifier_block *this,
b
=
skb
->
tail
;
type
|=
NFNL_SUBSYS_CTNETLINK
<<
8
;
type
|=
NFNL_SUBSYS_CTNETLINK
_EXP
<<
8
;
nlh
=
NLMSG_PUT
(
skb
,
0
,
0
,
type
,
sizeof
(
struct
nfgenmsg
));
nfmsg
=
NLMSG_DATA
(
nlh
);
...
...
@@ -1567,6 +1567,7 @@ static struct nfnetlink_subsystem ctnl_exp_subsys = {
};
MODULE_ALIAS_NFNL_SUBSYS
(
NFNL_SUBSYS_CTNETLINK
);
MODULE_ALIAS_NFNL_SUBSYS
(
NFNL_SUBSYS_CTNETLINK_EXP
);
static
int
__init
ctnetlink_init
(
void
)
{
...
...
net/ipv4/netfilter/ip_conntrack_tftp.c
View file @
98bd0c07
...
...
@@ -71,6 +71,7 @@ static int tftp_help(struct sk_buff **pskb,
exp
->
tuple
=
ct
->
tuplehash
[
IP_CT_DIR_REPLY
].
tuple
;
exp
->
mask
.
src
.
ip
=
0xffffffff
;
exp
->
mask
.
src
.
u
.
udp
.
port
=
0
;
exp
->
mask
.
dst
.
ip
=
0xffffffff
;
exp
->
mask
.
dst
.
u
.
udp
.
port
=
0xffff
;
exp
->
mask
.
dst
.
protonum
=
0xff
;
...
...
net/ipv4/netfilter/ip_nat_standalone.c
View file @
98bd0c07
...
...
@@ -209,8 +209,8 @@ ip_nat_in(unsigned int hooknum,
&&
(
ct
=
ip_conntrack_get
(
*
pskb
,
&
ctinfo
))
!=
NULL
)
{
enum
ip_conntrack_dir
dir
=
CTINFO2DIR
(
ctinfo
);
if
(
ct
->
tuplehash
[
dir
].
tuple
.
src
.
ip
!=
ct
->
tuplehash
[
!
dir
].
tuple
.
dst
.
ip
)
{
if
(
ct
->
tuplehash
[
dir
].
tuple
.
dst
.
ip
!=
ct
->
tuplehash
[
!
dir
].
tuple
.
src
.
ip
)
{
dst_release
((
*
pskb
)
->
dst
);
(
*
pskb
)
->
dst
=
NULL
;
}
...
...
net/ipv4/netfilter/ip_tables.c
View file @
98bd0c07
...
...
@@ -921,6 +921,13 @@ do_replace(void __user *user, unsigned int len)
if
(
len
!=
sizeof
(
tmp
)
+
tmp
.
size
)
return
-
ENOPROTOOPT
;
/* overflow check */
if
(
tmp
.
size
>=
(
INT_MAX
-
sizeof
(
struct
xt_table_info
))
/
NR_CPUS
-
SMP_CACHE_BYTES
)
return
-
ENOMEM
;
if
(
tmp
.
num_counters
>=
INT_MAX
/
sizeof
(
struct
xt_counters
))
return
-
ENOMEM
;
newinfo
=
xt_alloc_table_info
(
tmp
.
size
);
if
(
!
newinfo
)
return
-
ENOMEM
;
...
...
net/ipv4/netfilter/ipt_ULOG.c
View file @
98bd0c07
...
...
@@ -35,6 +35,10 @@
* each nlgroup you are using, so the total kernel memory usage increases
* by that factor.
*
* Actually you should use nlbufsiz a bit smaller than PAGE_SIZE, since
* nlbufsiz is used with alloc_skb, which adds another
* sizeof(struct skb_shared_info). Use NLMSG_GOODSIZE instead.
*
* flushtimeout:
* Specify, after how many hundredths of a second the queue should be
* flushed even if it is not full yet.
...
...
@@ -76,7 +80,7 @@ MODULE_ALIAS_NET_PF_PROTO(PF_NETLINK, NETLINK_NFLOG);
#define PRINTR(format, args...) do { if (net_ratelimit()) printk(format , ## args); } while (0)
static
unsigned
int
nlbufsiz
=
4096
;
static
unsigned
int
nlbufsiz
=
NLMSG_GOODSIZE
;
module_param
(
nlbufsiz
,
uint
,
0400
);
MODULE_PARM_DESC
(
nlbufsiz
,
"netlink buffer size"
);
...
...
@@ -143,22 +147,26 @@ static void ulog_timer(unsigned long data)
static
struct
sk_buff
*
ulog_alloc_skb
(
unsigned
int
size
)
{
struct
sk_buff
*
skb
;
unsigned
int
n
;
/* alloc skb which should be big enough for a whole
* multipart message. WARNING: has to be <= 131000
* due to slab allocator restrictions */
skb
=
alloc_skb
(
nlbufsiz
,
GFP_ATOMIC
);
n
=
max
(
size
,
nlbufsiz
);
skb
=
alloc_skb
(
n
,
GFP_ATOMIC
);
if
(
!
skb
)
{
PRINTR
(
"ipt_ULOG: can't alloc whole buffer %ub!
\n
"
,
nlbufsiz
);
PRINTR
(
"ipt_ULOG: can't alloc whole buffer %ub!
\n
"
,
n
);
if
(
n
>
size
)
{
/* try to allocate only as much as we need for
* current packet */
skb
=
alloc_skb
(
size
,
GFP_ATOMIC
);
if
(
!
skb
)
PRINTR
(
"ipt_ULOG: can't even allocate %ub
\n
"
,
size
);
PRINTR
(
"ipt_ULOG: can't even allocate %ub
\n
"
,
size
);
}
}
return
skb
;
...
...
net/ipv4/netfilter/ipt_policy.c
View file @
98bd0c07
...
...
@@ -26,10 +26,13 @@ MODULE_LICENSE("GPL");
static
inline
int
match_xfrm_state
(
struct
xfrm_state
*
x
,
const
struct
ipt_policy_elem
*
e
)
{
#define MATCH_ADDR(x,y,z) (!e->match.x || \
((e->x.a4.s_addr == (e->y.a4.s_addr & (z))) \
^ e->invert.x))
#define MATCH(x,y) (!e->match.x || ((e->x == (y)) ^ e->invert.x))
return
MATCH
(
saddr
,
x
->
props
.
saddr
.
a4
&
e
->
smask
)
&&
MATCH
(
daddr
,
x
->
id
.
daddr
.
a4
&
e
->
dmask
)
&&
return
MATCH
_ADDR
(
saddr
,
smask
,
x
->
props
.
saddr
.
a4
)
&&
MATCH
_ADDR
(
daddr
,
dmask
,
x
->
id
.
daddr
.
a4
)
&&
MATCH
(
proto
,
x
->
id
.
proto
)
&&
MATCH
(
mode
,
x
->
props
.
mode
)
&&
MATCH
(
spi
,
x
->
id
.
spi
)
&&
...
...
@@ -89,7 +92,7 @@ match_policy_out(const struct sk_buff *skb, const struct ipt_policy_info *info)
return
0
;
}
return
strict
?
1
:
0
;
return
strict
?
i
==
info
->
len
:
0
;
}
static
int
match
(
const
struct
sk_buff
*
skb
,
...
...
net/ipv6/netfilter/ip6_tables.c
View file @
98bd0c07
...
...
@@ -978,6 +978,13 @@ do_replace(void __user *user, unsigned int len)
if
(
copy_from_user
(
&
tmp
,
user
,
sizeof
(
tmp
))
!=
0
)
return
-
EFAULT
;
/* overflow check */
if
(
tmp
.
size
>=
(
INT_MAX
-
sizeof
(
struct
xt_table_info
))
/
NR_CPUS
-
SMP_CACHE_BYTES
)
return
-
ENOMEM
;
if
(
tmp
.
num_counters
>=
INT_MAX
/
sizeof
(
struct
xt_counters
))
return
-
ENOMEM
;
newinfo
=
xt_alloc_table_info
(
tmp
.
size
);
if
(
!
newinfo
)
return
-
ENOMEM
;
...
...
net/ipv6/netfilter/ip6t_policy.c
View file @
98bd0c07
...
...
@@ -27,7 +27,8 @@ static inline int
match_xfrm_state
(
struct
xfrm_state
*
x
,
const
struct
ip6t_policy_elem
*
e
)
{
#define MATCH_ADDR(x,y,z) (!e->match.x || \
((ip6_masked_addrcmp((z), &e->x, &e->y)) == 0) ^ e->invert.x)
((!ip6_masked_addrcmp(&e->x.a6, &e->y.a6, z)) \
^ e->invert.x))
#define MATCH(x,y) (!e->match.x || ((e->x == (y)) ^ e->invert.x))
return
MATCH_ADDR
(
saddr
,
smask
,
(
struct
in6_addr
*
)
&
x
->
props
.
saddr
.
a6
)
&&
...
...
@@ -91,7 +92,7 @@ match_policy_out(const struct sk_buff *skb, const struct ip6t_policy_info *info)
return
0
;
}
return
strict
?
1
:
0
;
return
strict
?
i
==
info
->
len
:
0
;
}
static
int
match
(
const
struct
sk_buff
*
skb
,
...
...
net/netfilter/nf_conntrack_core.c
View file @
98bd0c07
...
...
@@ -188,7 +188,7 @@ extern struct nf_conntrack_protocol nf_conntrack_generic_protocol;
struct
nf_conntrack_protocol
*
__nf_ct_proto_find
(
u_int16_t
l3proto
,
u_int8_t
protocol
)
{
if
(
unlikely
(
nf_ct_protos
[
l3proto
]
==
NULL
))
if
(
unlikely
(
l3proto
>=
AF_MAX
||
nf_ct_protos
[
l3proto
]
==
NULL
))
return
&
nf_conntrack_generic_protocol
;
return
nf_ct_protos
[
l3proto
][
protocol
];
...
...
net/netfilter/nf_conntrack_ftp.c
View file @
98bd0c07
...
...
@@ -657,8 +657,6 @@ static int __init init(void)
/* FIXME should be configurable whether IPv4 and IPv6 FTP connections
are tracked or not - YK */
for
(
i
=
0
;
i
<
ports_c
;
i
++
)
{
memset
(
&
ftp
[
i
],
0
,
sizeof
(
struct
nf_conntrack_helper
));
ftp
[
i
][
0
].
tuple
.
src
.
l3num
=
PF_INET
;
ftp
[
i
][
1
].
tuple
.
src
.
l3num
=
PF_INET6
;
for
(
j
=
0
;
j
<
2
;
j
++
)
{
...
...
net/netfilter/nf_conntrack_netlink.c
View file @
98bd0c07
...
...
@@ -1232,7 +1232,7 @@ static int ctnetlink_expect_event(struct notifier_block *this,
b
=
skb
->
tail
;
type
|=
NFNL_SUBSYS_CTNETLINK
<<
8
;
type
|=
NFNL_SUBSYS_CTNETLINK
_EXP
<<
8
;
nlh
=
NLMSG_PUT
(
skb
,
0
,
0
,
type
,
sizeof
(
struct
nfgenmsg
));
nfmsg
=
NLMSG_DATA
(
nlh
);
...
...
@@ -1589,6 +1589,7 @@ static struct nfnetlink_subsystem ctnl_exp_subsys = {
};
MODULE_ALIAS_NFNL_SUBSYS
(
NFNL_SUBSYS_CTNETLINK
);
MODULE_ALIAS_NFNL_SUBSYS
(
NFNL_SUBSYS_CTNETLINK_EXP
);
static
int
__init
ctnetlink_init
(
void
)
{
...
...
net/netfilter/nfnetlink_log.c
View file @
98bd0c07
...
...
@@ -37,7 +37,7 @@
#include "../bridge/br_private.h"
#endif
#define NFULNL_NLBUFSIZ_DEFAULT
4096
#define NFULNL_NLBUFSIZ_DEFAULT
NLMSG_GOODSIZE
#define NFULNL_TIMEOUT_DEFAULT 100
/* every second */
#define NFULNL_QTHRESH_DEFAULT 100
/* 100 packets */
...
...
@@ -314,24 +314,28 @@ static struct sk_buff *nfulnl_alloc_skb(unsigned int inst_size,
unsigned
int
pkt_size
)
{
struct
sk_buff
*
skb
;
unsigned
int
n
;
UDEBUG
(
"entered (%u, %u)
\n
"
,
inst_size
,
pkt_size
);
/* alloc skb which should be big enough for a whole multipart
* message. WARNING: has to be <= 128k due to slab restrictions */
skb
=
alloc_skb
(
inst_size
,
GFP_ATOMIC
);
n
=
max
(
inst_size
,
pkt_size
);
skb
=
alloc_skb
(
n
,
GFP_ATOMIC
);
if
(
!
skb
)
{
PRINTR
(
"nfnetlink_log: can't alloc whole buffer (%u bytes)
\n
"
,
inst_size
);
if
(
n
>
pkt_size
)
{
/* try to allocate only as much as we need for current
* packet */
skb
=
alloc_skb
(
pkt_size
,
GFP_ATOMIC
);
if
(
!
skb
)
PRINTR
(
"nfnetlink_log: can't even alloc %u bytes
\n
"
,
pkt_size
);
PRINTR
(
"nfnetlink_log: can't even alloc %u "
"bytes
\n
"
,
pkt_size
);
}
}
return
skb
;
...
...
net/netfilter/nfnetlink_queue.c
View file @
98bd0c07
...
...
@@ -825,7 +825,8 @@ nfqnl_recv_verdict(struct sock *ctnl, struct sk_buff *skb,
}
if
(
nfqa
[
NFQA_MARK
-
1
])
skb
->
nfmark
=
ntohl
(
*
(
u_int32_t
*
)
NFA_DATA
(
nfqa
[
NFQA_MARK
-
1
]));
entry
->
skb
->
nfmark
=
ntohl
(
*
(
u_int32_t
*
)
NFA_DATA
(
nfqa
[
NFQA_MARK
-
1
]));
issue_verdict
(
entry
,
verdict
);
instance_put
(
queue
);
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment