diff options
| author | Jan Engelhardt <jengelh@medozas.de> | 2010-03-25 11:34:45 -0400 |
|---|---|---|
| committer | Jan Engelhardt <jengelh@medozas.de> | 2010-03-25 11:55:49 -0400 |
| commit | d6b00a5345ce4e86e8b00a88bb84a2c0c1f69ddc (patch) | |
| tree | 11d68bb08584fbbae02a7bf22599bdd67da4408e /net/bridge | |
| parent | bd414ee605ff3ac5fcd79f57269a897879ee4cde (diff) | |
netfilter: xtables: change targets to return error code
Part of the transition of done by this semantic patch:
// <smpl>
@ rule1 @
struct xt_target ops;
identifier check;
@@
ops.checkentry = check;
@@
identifier rule1.check;
@@
check(...) { <...
-return true;
+return 0;
...> }
@@
identifier rule1.check;
@@
check(...) { <...
-return false;
+return -EINVAL;
...> }
// </smpl>
Signed-off-by: Jan Engelhardt <jengelh@medozas.de>
Diffstat (limited to 'net/bridge')
| -rw-r--r-- | net/bridge/netfilter/ebt_arpreply.c | 6 | ||||
| -rw-r--r-- | net/bridge/netfilter/ebt_dnat.c | 8 | ||||
| -rw-r--r-- | net/bridge/netfilter/ebt_log.c | 6 | ||||
| -rw-r--r-- | net/bridge/netfilter/ebt_mark.c | 8 | ||||
| -rw-r--r-- | net/bridge/netfilter/ebt_nflog.c | 4 | ||||
| -rw-r--r-- | net/bridge/netfilter/ebt_redirect.c | 8 | ||||
| -rw-r--r-- | net/bridge/netfilter/ebt_snat.c | 8 | ||||
| -rw-r--r-- | net/bridge/netfilter/ebt_ulog.c | 4 |
8 files changed, 26 insertions, 26 deletions
diff --git a/net/bridge/netfilter/ebt_arpreply.c b/net/bridge/netfilter/ebt_arpreply.c index 2491564e9e0..4581adb2758 100644 --- a/net/bridge/netfilter/ebt_arpreply.c +++ b/net/bridge/netfilter/ebt_arpreply.c | |||
| @@ -63,11 +63,11 @@ static int ebt_arpreply_tg_check(const struct xt_tgchk_param *par) | |||
| 63 | const struct ebt_entry *e = par->entryinfo; | 63 | const struct ebt_entry *e = par->entryinfo; |
| 64 | 64 | ||
| 65 | if (BASE_CHAIN && info->target == EBT_RETURN) | 65 | if (BASE_CHAIN && info->target == EBT_RETURN) |
| 66 | return false; | 66 | return -EINVAL; |
| 67 | if (e->ethproto != htons(ETH_P_ARP) || | 67 | if (e->ethproto != htons(ETH_P_ARP) || |
| 68 | e->invflags & EBT_IPROTO) | 68 | e->invflags & EBT_IPROTO) |
| 69 | return false; | 69 | return -EINVAL; |
| 70 | return true; | 70 | return 0; |
| 71 | } | 71 | } |
| 72 | 72 | ||
| 73 | static struct xt_target ebt_arpreply_tg_reg __read_mostly = { | 73 | static struct xt_target ebt_arpreply_tg_reg __read_mostly = { |
diff --git a/net/bridge/netfilter/ebt_dnat.c b/net/bridge/netfilter/ebt_dnat.c index 5fddebea45c..59d5b7c8a55 100644 --- a/net/bridge/netfilter/ebt_dnat.c +++ b/net/bridge/netfilter/ebt_dnat.c | |||
| @@ -32,7 +32,7 @@ static int ebt_dnat_tg_check(const struct xt_tgchk_param *par) | |||
| 32 | unsigned int hook_mask; | 32 | unsigned int hook_mask; |
| 33 | 33 | ||
| 34 | if (BASE_CHAIN && info->target == EBT_RETURN) | 34 | if (BASE_CHAIN && info->target == EBT_RETURN) |
| 35 | return false; | 35 | return -EINVAL; |
| 36 | 36 | ||
| 37 | hook_mask = par->hook_mask & ~(1 << NF_BR_NUMHOOKS); | 37 | hook_mask = par->hook_mask & ~(1 << NF_BR_NUMHOOKS); |
| 38 | if ((strcmp(par->table, "nat") != 0 || | 38 | if ((strcmp(par->table, "nat") != 0 || |
| @@ -40,10 +40,10 @@ static int ebt_dnat_tg_check(const struct xt_tgchk_param *par) | |||
| 40 | (1 << NF_BR_LOCAL_OUT)))) && | 40 | (1 << NF_BR_LOCAL_OUT)))) && |
| 41 | (strcmp(par->table, "broute") != 0 || | 41 | (strcmp(par->table, "broute") != 0 || |
| 42 | hook_mask & ~(1 << NF_BR_BROUTING))) | 42 | hook_mask & ~(1 << NF_BR_BROUTING))) |
| 43 | return false; | 43 | return -EINVAL; |
| 44 | if (INVALID_TARGET) | 44 | if (INVALID_TARGET) |
| 45 | return false; | 45 | return -EINVAL; |
| 46 | return true; | 46 | return 0; |
| 47 | } | 47 | } |
| 48 | 48 | ||
| 49 | static struct xt_target ebt_dnat_tg_reg __read_mostly = { | 49 | static struct xt_target ebt_dnat_tg_reg __read_mostly = { |
diff --git a/net/bridge/netfilter/ebt_log.c b/net/bridge/netfilter/ebt_log.c index a0aeac6176e..c4602415653 100644 --- a/net/bridge/netfilter/ebt_log.c +++ b/net/bridge/netfilter/ebt_log.c | |||
| @@ -29,11 +29,11 @@ static int ebt_log_tg_check(const struct xt_tgchk_param *par) | |||
| 29 | struct ebt_log_info *info = par->targinfo; | 29 | struct ebt_log_info *info = par->targinfo; |
| 30 | 30 | ||
| 31 | if (info->bitmask & ~EBT_LOG_MASK) | 31 | if (info->bitmask & ~EBT_LOG_MASK) |
| 32 | return false; | 32 | return -EINVAL; |
| 33 | if (info->loglevel >= 8) | 33 | if (info->loglevel >= 8) |
| 34 | return false; | 34 | return -EINVAL; |
| 35 | info->prefix[EBT_LOG_PREFIX_SIZE - 1] = '\0'; | 35 | info->prefix[EBT_LOG_PREFIX_SIZE - 1] = '\0'; |
| 36 | return true; | 36 | return 0; |
| 37 | } | 37 | } |
| 38 | 38 | ||
| 39 | struct tcpudphdr | 39 | struct tcpudphdr |
diff --git a/net/bridge/netfilter/ebt_mark.c b/net/bridge/netfilter/ebt_mark.c index dd94dafa615..126e536ff8f 100644 --- a/net/bridge/netfilter/ebt_mark.c +++ b/net/bridge/netfilter/ebt_mark.c | |||
| @@ -43,14 +43,14 @@ static int ebt_mark_tg_check(const struct xt_tgchk_param *par) | |||
| 43 | 43 | ||
| 44 | tmp = info->target | ~EBT_VERDICT_BITS; | 44 | tmp = info->target | ~EBT_VERDICT_BITS; |
| 45 | if (BASE_CHAIN && tmp == EBT_RETURN) | 45 | if (BASE_CHAIN && tmp == EBT_RETURN) |
| 46 | return false; | 46 | return -EINVAL; |
| 47 | if (tmp < -NUM_STANDARD_TARGETS || tmp >= 0) | 47 | if (tmp < -NUM_STANDARD_TARGETS || tmp >= 0) |
| 48 | return false; | 48 | return -EINVAL; |
| 49 | tmp = info->target & ~EBT_VERDICT_BITS; | 49 | tmp = info->target & ~EBT_VERDICT_BITS; |
| 50 | if (tmp != MARK_SET_VALUE && tmp != MARK_OR_VALUE && | 50 | if (tmp != MARK_SET_VALUE && tmp != MARK_OR_VALUE && |
| 51 | tmp != MARK_AND_VALUE && tmp != MARK_XOR_VALUE) | 51 | tmp != MARK_AND_VALUE && tmp != MARK_XOR_VALUE) |
| 52 | return false; | 52 | return -EINVAL; |
| 53 | return true; | 53 | return 0; |
| 54 | } | 54 | } |
| 55 | #ifdef CONFIG_COMPAT | 55 | #ifdef CONFIG_COMPAT |
| 56 | struct compat_ebt_mark_t_info { | 56 | struct compat_ebt_mark_t_info { |
diff --git a/net/bridge/netfilter/ebt_nflog.c b/net/bridge/netfilter/ebt_nflog.c index 1f2b7bbdde7..22e2ad5f23e 100644 --- a/net/bridge/netfilter/ebt_nflog.c +++ b/net/bridge/netfilter/ebt_nflog.c | |||
| @@ -40,9 +40,9 @@ static int ebt_nflog_tg_check(const struct xt_tgchk_param *par) | |||
| 40 | struct ebt_nflog_info *info = par->targinfo; | 40 | struct ebt_nflog_info *info = par->targinfo; |
| 41 | 41 | ||
| 42 | if (info->flags & ~EBT_NFLOG_MASK) | 42 | if (info->flags & ~EBT_NFLOG_MASK) |
| 43 | return false; | 43 | return -EINVAL; |
| 44 | info->prefix[EBT_NFLOG_PREFIX_SIZE - 1] = '\0'; | 44 | info->prefix[EBT_NFLOG_PREFIX_SIZE - 1] = '\0'; |
| 45 | return true; | 45 | return 0; |
| 46 | } | 46 | } |
| 47 | 47 | ||
| 48 | static struct xt_target ebt_nflog_tg_reg __read_mostly = { | 48 | static struct xt_target ebt_nflog_tg_reg __read_mostly = { |
diff --git a/net/bridge/netfilter/ebt_redirect.c b/net/bridge/netfilter/ebt_redirect.c index 73c4d3ac6f2..a6044a6f238 100644 --- a/net/bridge/netfilter/ebt_redirect.c +++ b/net/bridge/netfilter/ebt_redirect.c | |||
| @@ -38,17 +38,17 @@ static int ebt_redirect_tg_check(const struct xt_tgchk_param *par) | |||
| 38 | unsigned int hook_mask; | 38 | unsigned int hook_mask; |
| 39 | 39 | ||
| 40 | if (BASE_CHAIN && info->target == EBT_RETURN) | 40 | if (BASE_CHAIN && info->target == EBT_RETURN) |
| 41 | return false; | 41 | return -EINVAL; |
| 42 | 42 | ||
| 43 | hook_mask = par->hook_mask & ~(1 << NF_BR_NUMHOOKS); | 43 | hook_mask = par->hook_mask & ~(1 << NF_BR_NUMHOOKS); |
| 44 | if ((strcmp(par->table, "nat") != 0 || | 44 | if ((strcmp(par->table, "nat") != 0 || |
| 45 | hook_mask & ~(1 << NF_BR_PRE_ROUTING)) && | 45 | hook_mask & ~(1 << NF_BR_PRE_ROUTING)) && |
| 46 | (strcmp(par->table, "broute") != 0 || | 46 | (strcmp(par->table, "broute") != 0 || |
| 47 | hook_mask & ~(1 << NF_BR_BROUTING))) | 47 | hook_mask & ~(1 << NF_BR_BROUTING))) |
| 48 | return false; | 48 | return -EINVAL; |
| 49 | if (INVALID_TARGET) | 49 | if (INVALID_TARGET) |
| 50 | return false; | 50 | return -EINVAL; |
| 51 | return true; | 51 | return 0; |
| 52 | } | 52 | } |
| 53 | 53 | ||
| 54 | static struct xt_target ebt_redirect_tg_reg __read_mostly = { | 54 | static struct xt_target ebt_redirect_tg_reg __read_mostly = { |
diff --git a/net/bridge/netfilter/ebt_snat.c b/net/bridge/netfilter/ebt_snat.c index 94bcecd90d7..79caca34ae2 100644 --- a/net/bridge/netfilter/ebt_snat.c +++ b/net/bridge/netfilter/ebt_snat.c | |||
| @@ -49,14 +49,14 @@ static int ebt_snat_tg_check(const struct xt_tgchk_param *par) | |||
| 49 | 49 | ||
| 50 | tmp = info->target | ~EBT_VERDICT_BITS; | 50 | tmp = info->target | ~EBT_VERDICT_BITS; |
| 51 | if (BASE_CHAIN && tmp == EBT_RETURN) | 51 | if (BASE_CHAIN && tmp == EBT_RETURN) |
| 52 | return false; | 52 | return -EINVAL; |
| 53 | 53 | ||
| 54 | if (tmp < -NUM_STANDARD_TARGETS || tmp >= 0) | 54 | if (tmp < -NUM_STANDARD_TARGETS || tmp >= 0) |
| 55 | return false; | 55 | return -EINVAL; |
| 56 | tmp = info->target | EBT_VERDICT_BITS; | 56 | tmp = info->target | EBT_VERDICT_BITS; |
| 57 | if ((tmp & ~NAT_ARP_BIT) != ~NAT_ARP_BIT) | 57 | if ((tmp & ~NAT_ARP_BIT) != ~NAT_ARP_BIT) |
| 58 | return false; | 58 | return -EINVAL; |
| 59 | return true; | 59 | return 0; |
| 60 | } | 60 | } |
| 61 | 61 | ||
| 62 | static struct xt_target ebt_snat_tg_reg __read_mostly = { | 62 | static struct xt_target ebt_snat_tg_reg __read_mostly = { |
diff --git a/net/bridge/netfilter/ebt_ulog.c b/net/bridge/netfilter/ebt_ulog.c index f554bc2515d..f77b42d8e87 100644 --- a/net/bridge/netfilter/ebt_ulog.c +++ b/net/bridge/netfilter/ebt_ulog.c | |||
| @@ -254,14 +254,14 @@ static int ebt_ulog_tg_check(const struct xt_tgchk_param *par) | |||
| 254 | struct ebt_ulog_info *uloginfo = par->targinfo; | 254 | struct ebt_ulog_info *uloginfo = par->targinfo; |
| 255 | 255 | ||
| 256 | if (uloginfo->nlgroup > 31) | 256 | if (uloginfo->nlgroup > 31) |
| 257 | return false; | 257 | return -EINVAL; |
| 258 | 258 | ||
| 259 | uloginfo->prefix[EBT_ULOG_PREFIX_LEN - 1] = '\0'; | 259 | uloginfo->prefix[EBT_ULOG_PREFIX_LEN - 1] = '\0'; |
| 260 | 260 | ||
| 261 | if (uloginfo->qthreshold > EBT_ULOG_MAX_QLEN) | 261 | if (uloginfo->qthreshold > EBT_ULOG_MAX_QLEN) |
| 262 | uloginfo->qthreshold = EBT_ULOG_MAX_QLEN; | 262 | uloginfo->qthreshold = EBT_ULOG_MAX_QLEN; |
| 263 | 263 | ||
| 264 | return true; | 264 | return 0; |
| 265 | } | 265 | } |
| 266 | 266 | ||
| 267 | static struct xt_target ebt_ulog_tg_reg __read_mostly = { | 267 | static struct xt_target ebt_ulog_tg_reg __read_mostly = { |
