diff options
author | Jan Engelhardt <jengelh@gmx.de> | 2007-07-08 01:16:00 -0400 |
---|---|---|
committer | David S. Miller <davem@sunset.davemloft.net> | 2007-07-11 01:16:58 -0400 |
commit | ccb79bdce71f2c04cfa9bfcbaf4d37e2f963d684 (patch) | |
tree | 5f41d7d1daade309b96492301a6f973caba3a2a4 | |
parent | 1d93a9cbad608f6398ba6c5b588c504ccd35a2ca (diff) |
[NETFILTER]: x_tables: switch xt_match->checkentry to bool
Switch the return type of match functions to boolean
Signed-off-by: Jan Engelhardt <jengelh@gmx.de>
Signed-off-by: Patrick McHardy <kaber@trash.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
33 files changed, 148 insertions, 148 deletions
diff --git a/include/linux/netfilter/x_tables.h b/include/linux/netfilter/x_tables.h index 304fce356a43..5130dd60a2fc 100644 --- a/include/linux/netfilter/x_tables.h +++ b/include/linux/netfilter/x_tables.h | |||
@@ -152,11 +152,11 @@ struct xt_match | |||
152 | 152 | ||
153 | /* Called when user tries to insert an entry of this type. */ | 153 | /* Called when user tries to insert an entry of this type. */ |
154 | /* Should return true or false. */ | 154 | /* Should return true or false. */ |
155 | int (*checkentry)(const char *tablename, | 155 | bool (*checkentry)(const char *tablename, |
156 | const void *ip, | 156 | const void *ip, |
157 | const struct xt_match *match, | 157 | const struct xt_match *match, |
158 | void *matchinfo, | 158 | void *matchinfo, |
159 | unsigned int hook_mask); | 159 | unsigned int hook_mask); |
160 | 160 | ||
161 | /* Called when entry of this type deleted. */ | 161 | /* Called when entry of this type deleted. */ |
162 | void (*destroy)(const struct xt_match *match, void *matchinfo); | 162 | void (*destroy)(const struct xt_match *match, void *matchinfo); |
diff --git a/net/ipv4/netfilter/ip_tables.c b/net/ipv4/netfilter/ip_tables.c index b9c792dd4890..7962306df585 100644 --- a/net/ipv4/netfilter/ip_tables.c +++ b/net/ipv4/netfilter/ip_tables.c | |||
@@ -152,20 +152,20 @@ ip_packet_match(const struct iphdr *ip, | |||
152 | return 1; | 152 | return 1; |
153 | } | 153 | } |
154 | 154 | ||
155 | static inline int | 155 | static inline bool |
156 | ip_checkentry(const struct ipt_ip *ip) | 156 | ip_checkentry(const struct ipt_ip *ip) |
157 | { | 157 | { |
158 | if (ip->flags & ~IPT_F_MASK) { | 158 | if (ip->flags & ~IPT_F_MASK) { |
159 | duprintf("Unknown flag bits set: %08X\n", | 159 | duprintf("Unknown flag bits set: %08X\n", |
160 | ip->flags & ~IPT_F_MASK); | 160 | ip->flags & ~IPT_F_MASK); |
161 | return 0; | 161 | return false; |
162 | } | 162 | } |
163 | if (ip->invflags & ~IPT_INV_MASK) { | 163 | if (ip->invflags & ~IPT_INV_MASK) { |
164 | duprintf("Unknown invflag bits set: %08X\n", | 164 | duprintf("Unknown invflag bits set: %08X\n", |
165 | ip->invflags & ~IPT_INV_MASK); | 165 | ip->invflags & ~IPT_INV_MASK); |
166 | return 0; | 166 | return false; |
167 | } | 167 | } |
168 | return 1; | 168 | return true; |
169 | } | 169 | } |
170 | 170 | ||
171 | static unsigned int | 171 | static unsigned int |
@@ -2149,7 +2149,7 @@ icmp_match(const struct sk_buff *skb, | |||
2149 | } | 2149 | } |
2150 | 2150 | ||
2151 | /* Called when user tries to insert an entry of this type. */ | 2151 | /* Called when user tries to insert an entry of this type. */ |
2152 | static int | 2152 | static bool |
2153 | icmp_checkentry(const char *tablename, | 2153 | icmp_checkentry(const char *tablename, |
2154 | const void *info, | 2154 | const void *info, |
2155 | const struct xt_match *match, | 2155 | const struct xt_match *match, |
diff --git a/net/ipv4/netfilter/ipt_ah.c b/net/ipv4/netfilter/ipt_ah.c index 3da39ee92d8b..6b5b7c9f7392 100644 --- a/net/ipv4/netfilter/ipt_ah.c +++ b/net/ipv4/netfilter/ipt_ah.c | |||
@@ -70,7 +70,7 @@ match(const struct sk_buff *skb, | |||
70 | } | 70 | } |
71 | 71 | ||
72 | /* Called when user tries to insert an entry of this type. */ | 72 | /* Called when user tries to insert an entry of this type. */ |
73 | static int | 73 | static bool |
74 | checkentry(const char *tablename, | 74 | checkentry(const char *tablename, |
75 | const void *ip_void, | 75 | const void *ip_void, |
76 | const struct xt_match *match, | 76 | const struct xt_match *match, |
@@ -82,9 +82,9 @@ checkentry(const char *tablename, | |||
82 | /* Must specify no unknown invflags */ | 82 | /* Must specify no unknown invflags */ |
83 | if (ahinfo->invflags & ~IPT_AH_INV_MASK) { | 83 | if (ahinfo->invflags & ~IPT_AH_INV_MASK) { |
84 | duprintf("ipt_ah: unknown flags %X\n", ahinfo->invflags); | 84 | duprintf("ipt_ah: unknown flags %X\n", ahinfo->invflags); |
85 | return 0; | 85 | return false; |
86 | } | 86 | } |
87 | return 1; | 87 | return true; |
88 | } | 88 | } |
89 | 89 | ||
90 | static struct xt_match ah_match = { | 90 | static struct xt_match ah_match = { |
diff --git a/net/ipv4/netfilter/ipt_ecn.c b/net/ipv4/netfilter/ipt_ecn.c index ba3a17e0f848..ba4f5497add3 100644 --- a/net/ipv4/netfilter/ipt_ecn.c +++ b/net/ipv4/netfilter/ipt_ecn.c | |||
@@ -87,27 +87,27 @@ static bool match(const struct sk_buff *skb, | |||
87 | return true; | 87 | return true; |
88 | } | 88 | } |
89 | 89 | ||
90 | static int checkentry(const char *tablename, const void *ip_void, | 90 | static bool checkentry(const char *tablename, const void *ip_void, |
91 | const struct xt_match *match, | 91 | const struct xt_match *match, |
92 | void *matchinfo, unsigned int hook_mask) | 92 | void *matchinfo, unsigned int hook_mask) |
93 | { | 93 | { |
94 | const struct ipt_ecn_info *info = matchinfo; | 94 | const struct ipt_ecn_info *info = matchinfo; |
95 | const struct ipt_ip *ip = ip_void; | 95 | const struct ipt_ip *ip = ip_void; |
96 | 96 | ||
97 | if (info->operation & IPT_ECN_OP_MATCH_MASK) | 97 | if (info->operation & IPT_ECN_OP_MATCH_MASK) |
98 | return 0; | 98 | return false; |
99 | 99 | ||
100 | if (info->invert & IPT_ECN_OP_MATCH_MASK) | 100 | if (info->invert & IPT_ECN_OP_MATCH_MASK) |
101 | return 0; | 101 | return false; |
102 | 102 | ||
103 | if (info->operation & (IPT_ECN_OP_MATCH_ECE|IPT_ECN_OP_MATCH_CWR) | 103 | if (info->operation & (IPT_ECN_OP_MATCH_ECE|IPT_ECN_OP_MATCH_CWR) |
104 | && ip->proto != IPPROTO_TCP) { | 104 | && ip->proto != IPPROTO_TCP) { |
105 | printk(KERN_WARNING "ipt_ecn: can't match TCP bits in rule for" | 105 | printk(KERN_WARNING "ipt_ecn: can't match TCP bits in rule for" |
106 | " non-tcp packets\n"); | 106 | " non-tcp packets\n"); |
107 | return 0; | 107 | return false; |
108 | } | 108 | } |
109 | 109 | ||
110 | return 1; | 110 | return true; |
111 | } | 111 | } |
112 | 112 | ||
113 | static struct xt_match ecn_match = { | 113 | static struct xt_match ecn_match = { |
diff --git a/net/ipv4/netfilter/ipt_owner.c b/net/ipv4/netfilter/ipt_owner.c index 8f441cef5504..deea4b8cc055 100644 --- a/net/ipv4/netfilter/ipt_owner.c +++ b/net/ipv4/netfilter/ipt_owner.c | |||
@@ -51,7 +51,7 @@ match(const struct sk_buff *skb, | |||
51 | return true; | 51 | return true; |
52 | } | 52 | } |
53 | 53 | ||
54 | static int | 54 | static bool |
55 | checkentry(const char *tablename, | 55 | checkentry(const char *tablename, |
56 | const void *ip, | 56 | const void *ip, |
57 | const struct xt_match *match, | 57 | const struct xt_match *match, |
@@ -63,9 +63,9 @@ checkentry(const char *tablename, | |||
63 | if (info->match & (IPT_OWNER_PID|IPT_OWNER_SID|IPT_OWNER_COMM)) { | 63 | if (info->match & (IPT_OWNER_PID|IPT_OWNER_SID|IPT_OWNER_COMM)) { |
64 | printk("ipt_owner: pid, sid and command matching " | 64 | printk("ipt_owner: pid, sid and command matching " |
65 | "not supported anymore\n"); | 65 | "not supported anymore\n"); |
66 | return 0; | 66 | return false; |
67 | } | 67 | } |
68 | return 1; | 68 | return true; |
69 | } | 69 | } |
70 | 70 | ||
71 | static struct xt_match owner_match = { | 71 | static struct xt_match owner_match = { |
diff --git a/net/ipv4/netfilter/ipt_recent.c b/net/ipv4/netfilter/ipt_recent.c index 2e513ed9b6e9..d632e0e6ef16 100644 --- a/net/ipv4/netfilter/ipt_recent.c +++ b/net/ipv4/netfilter/ipt_recent.c | |||
@@ -235,7 +235,7 @@ out: | |||
235 | return ret; | 235 | return ret; |
236 | } | 236 | } |
237 | 237 | ||
238 | static int | 238 | static bool |
239 | ipt_recent_checkentry(const char *tablename, const void *ip, | 239 | ipt_recent_checkentry(const char *tablename, const void *ip, |
240 | const struct xt_match *match, void *matchinfo, | 240 | const struct xt_match *match, void *matchinfo, |
241 | unsigned int hook_mask) | 241 | unsigned int hook_mask) |
@@ -243,24 +243,24 @@ ipt_recent_checkentry(const char *tablename, const void *ip, | |||
243 | const struct ipt_recent_info *info = matchinfo; | 243 | const struct ipt_recent_info *info = matchinfo; |
244 | struct recent_table *t; | 244 | struct recent_table *t; |
245 | unsigned i; | 245 | unsigned i; |
246 | int ret = 0; | 246 | bool ret = false; |
247 | 247 | ||
248 | if (hweight8(info->check_set & | 248 | if (hweight8(info->check_set & |
249 | (IPT_RECENT_SET | IPT_RECENT_REMOVE | | 249 | (IPT_RECENT_SET | IPT_RECENT_REMOVE | |
250 | IPT_RECENT_CHECK | IPT_RECENT_UPDATE)) != 1) | 250 | IPT_RECENT_CHECK | IPT_RECENT_UPDATE)) != 1) |
251 | return 0; | 251 | return false; |
252 | if ((info->check_set & (IPT_RECENT_SET | IPT_RECENT_REMOVE)) && | 252 | if ((info->check_set & (IPT_RECENT_SET | IPT_RECENT_REMOVE)) && |
253 | (info->seconds || info->hit_count)) | 253 | (info->seconds || info->hit_count)) |
254 | return 0; | 254 | return false; |
255 | if (info->name[0] == '\0' || | 255 | if (info->name[0] == '\0' || |
256 | strnlen(info->name, IPT_RECENT_NAME_LEN) == IPT_RECENT_NAME_LEN) | 256 | strnlen(info->name, IPT_RECENT_NAME_LEN) == IPT_RECENT_NAME_LEN) |
257 | return 0; | 257 | return false; |
258 | 258 | ||
259 | mutex_lock(&recent_mutex); | 259 | mutex_lock(&recent_mutex); |
260 | t = recent_table_lookup(info->name); | 260 | t = recent_table_lookup(info->name); |
261 | if (t != NULL) { | 261 | if (t != NULL) { |
262 | t->refcnt++; | 262 | t->refcnt++; |
263 | ret = 1; | 263 | ret = true; |
264 | goto out; | 264 | goto out; |
265 | } | 265 | } |
266 | 266 | ||
@@ -287,7 +287,7 @@ ipt_recent_checkentry(const char *tablename, const void *ip, | |||
287 | spin_lock_bh(&recent_lock); | 287 | spin_lock_bh(&recent_lock); |
288 | list_add_tail(&t->list, &tables); | 288 | list_add_tail(&t->list, &tables); |
289 | spin_unlock_bh(&recent_lock); | 289 | spin_unlock_bh(&recent_lock); |
290 | ret = 1; | 290 | ret = true; |
291 | out: | 291 | out: |
292 | mutex_unlock(&recent_mutex); | 292 | mutex_unlock(&recent_mutex); |
293 | return ret; | 293 | return ret; |
diff --git a/net/ipv6/netfilter/ip6_tables.c b/net/ipv6/netfilter/ip6_tables.c index 31f42e82184a..7fe4d29708cb 100644 --- a/net/ipv6/netfilter/ip6_tables.c +++ b/net/ipv6/netfilter/ip6_tables.c | |||
@@ -188,20 +188,20 @@ ip6_packet_match(const struct sk_buff *skb, | |||
188 | } | 188 | } |
189 | 189 | ||
190 | /* should be ip6 safe */ | 190 | /* should be ip6 safe */ |
191 | static inline int | 191 | static inline bool |
192 | ip6_checkentry(const struct ip6t_ip6 *ipv6) | 192 | ip6_checkentry(const struct ip6t_ip6 *ipv6) |
193 | { | 193 | { |
194 | if (ipv6->flags & ~IP6T_F_MASK) { | 194 | if (ipv6->flags & ~IP6T_F_MASK) { |
195 | duprintf("Unknown flag bits set: %08X\n", | 195 | duprintf("Unknown flag bits set: %08X\n", |
196 | ipv6->flags & ~IP6T_F_MASK); | 196 | ipv6->flags & ~IP6T_F_MASK); |
197 | return 0; | 197 | return false; |
198 | } | 198 | } |
199 | if (ipv6->invflags & ~IP6T_INV_MASK) { | 199 | if (ipv6->invflags & ~IP6T_INV_MASK) { |
200 | duprintf("Unknown invflag bits set: %08X\n", | 200 | duprintf("Unknown invflag bits set: %08X\n", |
201 | ipv6->invflags & ~IP6T_INV_MASK); | 201 | ipv6->invflags & ~IP6T_INV_MASK); |
202 | return 0; | 202 | return false; |
203 | } | 203 | } |
204 | return 1; | 204 | return true; |
205 | } | 205 | } |
206 | 206 | ||
207 | static unsigned int | 207 | static unsigned int |
@@ -1282,10 +1282,10 @@ void ip6t_unregister_table(struct xt_table *table) | |||
1282 | } | 1282 | } |
1283 | 1283 | ||
1284 | /* Returns 1 if the type and code is matched by the range, 0 otherwise */ | 1284 | /* Returns 1 if the type and code is matched by the range, 0 otherwise */ |
1285 | static inline int | 1285 | static inline bool |
1286 | icmp6_type_code_match(u_int8_t test_type, u_int8_t min_code, u_int8_t max_code, | 1286 | icmp6_type_code_match(u_int8_t test_type, u_int8_t min_code, u_int8_t max_code, |
1287 | u_int8_t type, u_int8_t code, | 1287 | u_int8_t type, u_int8_t code, |
1288 | int invert) | 1288 | bool invert) |
1289 | { | 1289 | { |
1290 | return (type == test_type && code >= min_code && code <= max_code) | 1290 | return (type == test_type && code >= min_code && code <= max_code) |
1291 | ^ invert; | 1291 | ^ invert; |
@@ -1325,7 +1325,7 @@ icmp6_match(const struct sk_buff *skb, | |||
1325 | } | 1325 | } |
1326 | 1326 | ||
1327 | /* Called when user tries to insert an entry of this type. */ | 1327 | /* Called when user tries to insert an entry of this type. */ |
1328 | static int | 1328 | static bool |
1329 | icmp6_checkentry(const char *tablename, | 1329 | icmp6_checkentry(const char *tablename, |
1330 | const void *entry, | 1330 | const void *entry, |
1331 | const struct xt_match *match, | 1331 | const struct xt_match *match, |
diff --git a/net/ipv6/netfilter/ip6t_ah.c b/net/ipv6/netfilter/ip6t_ah.c index 607c2eb1296f..8fc00bdfc38b 100644 --- a/net/ipv6/netfilter/ip6t_ah.c +++ b/net/ipv6/netfilter/ip6t_ah.c | |||
@@ -103,7 +103,7 @@ match(const struct sk_buff *skb, | |||
103 | } | 103 | } |
104 | 104 | ||
105 | /* Called when user tries to insert an entry of this type. */ | 105 | /* Called when user tries to insert an entry of this type. */ |
106 | static int | 106 | static bool |
107 | checkentry(const char *tablename, | 107 | checkentry(const char *tablename, |
108 | const void *entry, | 108 | const void *entry, |
109 | const struct xt_match *match, | 109 | const struct xt_match *match, |
@@ -114,9 +114,9 @@ checkentry(const char *tablename, | |||
114 | 114 | ||
115 | if (ahinfo->invflags & ~IP6T_AH_INV_MASK) { | 115 | if (ahinfo->invflags & ~IP6T_AH_INV_MASK) { |
116 | DEBUGP("ip6t_ah: unknown flags %X\n", ahinfo->invflags); | 116 | DEBUGP("ip6t_ah: unknown flags %X\n", ahinfo->invflags); |
117 | return 0; | 117 | return false; |
118 | } | 118 | } |
119 | return 1; | 119 | return true; |
120 | } | 120 | } |
121 | 121 | ||
122 | static struct xt_match ah_match = { | 122 | static struct xt_match ah_match = { |
diff --git a/net/ipv6/netfilter/ip6t_frag.c b/net/ipv6/netfilter/ip6t_frag.c index 0ed5fbcf1f18..f0aed898e8b7 100644 --- a/net/ipv6/netfilter/ip6t_frag.c +++ b/net/ipv6/netfilter/ip6t_frag.c | |||
@@ -120,7 +120,7 @@ match(const struct sk_buff *skb, | |||
120 | } | 120 | } |
121 | 121 | ||
122 | /* Called when user tries to insert an entry of this type. */ | 122 | /* Called when user tries to insert an entry of this type. */ |
123 | static int | 123 | static bool |
124 | checkentry(const char *tablename, | 124 | checkentry(const char *tablename, |
125 | const void *ip, | 125 | const void *ip, |
126 | const struct xt_match *match, | 126 | const struct xt_match *match, |
@@ -131,9 +131,9 @@ checkentry(const char *tablename, | |||
131 | 131 | ||
132 | if (fraginfo->invflags & ~IP6T_FRAG_INV_MASK) { | 132 | if (fraginfo->invflags & ~IP6T_FRAG_INV_MASK) { |
133 | DEBUGP("ip6t_frag: unknown flags %X\n", fraginfo->invflags); | 133 | DEBUGP("ip6t_frag: unknown flags %X\n", fraginfo->invflags); |
134 | return 0; | 134 | return false; |
135 | } | 135 | } |
136 | return 1; | 136 | return true; |
137 | } | 137 | } |
138 | 138 | ||
139 | static struct xt_match frag_match = { | 139 | static struct xt_match frag_match = { |
diff --git a/net/ipv6/netfilter/ip6t_hbh.c b/net/ipv6/netfilter/ip6t_hbh.c index 4b05393faa68..6fdd79785f32 100644 --- a/net/ipv6/netfilter/ip6t_hbh.c +++ b/net/ipv6/netfilter/ip6t_hbh.c | |||
@@ -174,7 +174,7 @@ match(const struct sk_buff *skb, | |||
174 | } | 174 | } |
175 | 175 | ||
176 | /* Called when user tries to insert an entry of this type. */ | 176 | /* Called when user tries to insert an entry of this type. */ |
177 | static int | 177 | static bool |
178 | checkentry(const char *tablename, | 178 | checkentry(const char *tablename, |
179 | const void *entry, | 179 | const void *entry, |
180 | const struct xt_match *match, | 180 | const struct xt_match *match, |
@@ -185,9 +185,9 @@ checkentry(const char *tablename, | |||
185 | 185 | ||
186 | if (optsinfo->invflags & ~IP6T_OPTS_INV_MASK) { | 186 | if (optsinfo->invflags & ~IP6T_OPTS_INV_MASK) { |
187 | DEBUGP("ip6t_opts: unknown flags %X\n", optsinfo->invflags); | 187 | DEBUGP("ip6t_opts: unknown flags %X\n", optsinfo->invflags); |
188 | return 0; | 188 | return false; |
189 | } | 189 | } |
190 | return 1; | 190 | return true; |
191 | } | 191 | } |
192 | 192 | ||
193 | static struct xt_match opts_match[] = { | 193 | static struct xt_match opts_match[] = { |
diff --git a/net/ipv6/netfilter/ip6t_ipv6header.c b/net/ipv6/netfilter/ip6t_ipv6header.c index 3222e8959426..5ba6ef0f1b1b 100644 --- a/net/ipv6/netfilter/ip6t_ipv6header.c +++ b/net/ipv6/netfilter/ip6t_ipv6header.c | |||
@@ -124,7 +124,7 @@ ipv6header_match(const struct sk_buff *skb, | |||
124 | } | 124 | } |
125 | } | 125 | } |
126 | 126 | ||
127 | static int | 127 | static bool |
128 | ipv6header_checkentry(const char *tablename, | 128 | ipv6header_checkentry(const char *tablename, |
129 | const void *ip, | 129 | const void *ip, |
130 | const struct xt_match *match, | 130 | const struct xt_match *match, |
@@ -136,9 +136,9 @@ ipv6header_checkentry(const char *tablename, | |||
136 | /* invflags is 0 or 0xff in hard mode */ | 136 | /* invflags is 0 or 0xff in hard mode */ |
137 | if ((!info->modeflag) && info->invflags != 0x00 && | 137 | if ((!info->modeflag) && info->invflags != 0x00 && |
138 | info->invflags != 0xFF) | 138 | info->invflags != 0xFF) |
139 | return 0; | 139 | return false; |
140 | 140 | ||
141 | return 1; | 141 | return true; |
142 | } | 142 | } |
143 | 143 | ||
144 | static struct xt_match ip6t_ipv6header_match = { | 144 | static struct xt_match ip6t_ipv6header_match = { |
diff --git a/net/ipv6/netfilter/ip6t_mh.c b/net/ipv6/netfilter/ip6t_mh.c index ddffe03a8b37..a3008b41d24b 100644 --- a/net/ipv6/netfilter/ip6t_mh.c +++ b/net/ipv6/netfilter/ip6t_mh.c | |||
@@ -75,7 +75,7 @@ match(const struct sk_buff *skb, | |||
75 | } | 75 | } |
76 | 76 | ||
77 | /* Called when user tries to insert an entry of this type. */ | 77 | /* Called when user tries to insert an entry of this type. */ |
78 | static int | 78 | static bool |
79 | mh_checkentry(const char *tablename, | 79 | mh_checkentry(const char *tablename, |
80 | const void *entry, | 80 | const void *entry, |
81 | const struct xt_match *match, | 81 | const struct xt_match *match, |
diff --git a/net/ipv6/netfilter/ip6t_owner.c b/net/ipv6/netfilter/ip6t_owner.c index cadd0a64fed7..8cb6c94b4a20 100644 --- a/net/ipv6/netfilter/ip6t_owner.c +++ b/net/ipv6/netfilter/ip6t_owner.c | |||
@@ -53,7 +53,7 @@ match(const struct sk_buff *skb, | |||
53 | return true; | 53 | return true; |
54 | } | 54 | } |
55 | 55 | ||
56 | static int | 56 | static bool |
57 | checkentry(const char *tablename, | 57 | checkentry(const char *tablename, |
58 | const void *ip, | 58 | const void *ip, |
59 | const struct xt_match *match, | 59 | const struct xt_match *match, |
@@ -65,9 +65,9 @@ checkentry(const char *tablename, | |||
65 | if (info->match & (IP6T_OWNER_PID | IP6T_OWNER_SID)) { | 65 | if (info->match & (IP6T_OWNER_PID | IP6T_OWNER_SID)) { |
66 | printk("ipt_owner: pid and sid matching " | 66 | printk("ipt_owner: pid and sid matching " |
67 | "not supported anymore\n"); | 67 | "not supported anymore\n"); |
68 | return 0; | 68 | return false; |
69 | } | 69 | } |
70 | return 1; | 70 | return true; |
71 | } | 71 | } |
72 | 72 | ||
73 | static struct xt_match owner_match = { | 73 | static struct xt_match owner_match = { |
diff --git a/net/ipv6/netfilter/ip6t_rt.c b/net/ipv6/netfilter/ip6t_rt.c index 7966f4a5e9b7..e991ed4a692e 100644 --- a/net/ipv6/netfilter/ip6t_rt.c +++ b/net/ipv6/netfilter/ip6t_rt.c | |||
@@ -198,7 +198,7 @@ match(const struct sk_buff *skb, | |||
198 | } | 198 | } |
199 | 199 | ||
200 | /* Called when user tries to insert an entry of this type. */ | 200 | /* Called when user tries to insert an entry of this type. */ |
201 | static int | 201 | static bool |
202 | checkentry(const char *tablename, | 202 | checkentry(const char *tablename, |
203 | const void *entry, | 203 | const void *entry, |
204 | const struct xt_match *match, | 204 | const struct xt_match *match, |
@@ -209,17 +209,17 @@ checkentry(const char *tablename, | |||
209 | 209 | ||
210 | if (rtinfo->invflags & ~IP6T_RT_INV_MASK) { | 210 | if (rtinfo->invflags & ~IP6T_RT_INV_MASK) { |
211 | DEBUGP("ip6t_rt: unknown flags %X\n", rtinfo->invflags); | 211 | DEBUGP("ip6t_rt: unknown flags %X\n", rtinfo->invflags); |
212 | return 0; | 212 | return false; |
213 | } | 213 | } |
214 | if ((rtinfo->flags & (IP6T_RT_RES | IP6T_RT_FST_MASK)) && | 214 | if ((rtinfo->flags & (IP6T_RT_RES | IP6T_RT_FST_MASK)) && |
215 | (!(rtinfo->flags & IP6T_RT_TYP) || | 215 | (!(rtinfo->flags & IP6T_RT_TYP) || |
216 | (rtinfo->rt_type != 0) || | 216 | (rtinfo->rt_type != 0) || |
217 | (rtinfo->invflags & IP6T_RT_INV_TYP))) { | 217 | (rtinfo->invflags & IP6T_RT_INV_TYP))) { |
218 | DEBUGP("`--rt-type 0' required before `--rt-0-*'"); | 218 | DEBUGP("`--rt-type 0' required before `--rt-0-*'"); |
219 | return 0; | 219 | return false; |
220 | } | 220 | } |
221 | 221 | ||
222 | return 1; | 222 | return true; |
223 | } | 223 | } |
224 | 224 | ||
225 | static struct xt_match rt_match = { | 225 | static struct xt_match rt_match = { |
diff --git a/net/netfilter/xt_connbytes.c b/net/netfilter/xt_connbytes.c index aada7b797549..12541784109a 100644 --- a/net/netfilter/xt_connbytes.c +++ b/net/netfilter/xt_connbytes.c | |||
@@ -95,31 +95,31 @@ match(const struct sk_buff *skb, | |||
95 | return (what >= sinfo->count.from); | 95 | return (what >= sinfo->count.from); |
96 | } | 96 | } |
97 | 97 | ||
98 | static int check(const char *tablename, | 98 | static bool check(const char *tablename, |
99 | const void *ip, | 99 | const void *ip, |
100 | const struct xt_match *match, | 100 | const struct xt_match *match, |
101 | void *matchinfo, | 101 | void *matchinfo, |
102 | unsigned int hook_mask) | 102 | unsigned int hook_mask) |
103 | { | 103 | { |
104 | const struct xt_connbytes_info *sinfo = matchinfo; | 104 | const struct xt_connbytes_info *sinfo = matchinfo; |
105 | 105 | ||
106 | if (sinfo->what != XT_CONNBYTES_PKTS && | 106 | if (sinfo->what != XT_CONNBYTES_PKTS && |
107 | sinfo->what != XT_CONNBYTES_BYTES && | 107 | sinfo->what != XT_CONNBYTES_BYTES && |
108 | sinfo->what != XT_CONNBYTES_AVGPKT) | 108 | sinfo->what != XT_CONNBYTES_AVGPKT) |
109 | return 0; | 109 | return false; |
110 | 110 | ||
111 | if (sinfo->direction != XT_CONNBYTES_DIR_ORIGINAL && | 111 | if (sinfo->direction != XT_CONNBYTES_DIR_ORIGINAL && |
112 | sinfo->direction != XT_CONNBYTES_DIR_REPLY && | 112 | sinfo->direction != XT_CONNBYTES_DIR_REPLY && |
113 | sinfo->direction != XT_CONNBYTES_DIR_BOTH) | 113 | sinfo->direction != XT_CONNBYTES_DIR_BOTH) |
114 | return 0; | 114 | return false; |
115 | 115 | ||
116 | if (nf_ct_l3proto_try_module_get(match->family) < 0) { | 116 | if (nf_ct_l3proto_try_module_get(match->family) < 0) { |
117 | printk(KERN_WARNING "can't load conntrack support for " | 117 | printk(KERN_WARNING "can't load conntrack support for " |
118 | "proto=%d\n", match->family); | 118 | "proto=%d\n", match->family); |
119 | return 0; | 119 | return false; |
120 | } | 120 | } |
121 | 121 | ||
122 | return 1; | 122 | return true; |
123 | } | 123 | } |
124 | 124 | ||
125 | static void | 125 | static void |
diff --git a/net/netfilter/xt_connmark.c b/net/netfilter/xt_connmark.c index 3321b80aff4f..94d5251b3d88 100644 --- a/net/netfilter/xt_connmark.c +++ b/net/netfilter/xt_connmark.c | |||
@@ -51,7 +51,7 @@ match(const struct sk_buff *skb, | |||
51 | return (((ct->mark) & info->mask) == info->mark) ^ info->invert; | 51 | return (((ct->mark) & info->mask) == info->mark) ^ info->invert; |
52 | } | 52 | } |
53 | 53 | ||
54 | static int | 54 | static bool |
55 | checkentry(const char *tablename, | 55 | checkentry(const char *tablename, |
56 | const void *ip, | 56 | const void *ip, |
57 | const struct xt_match *match, | 57 | const struct xt_match *match, |
@@ -62,14 +62,14 @@ checkentry(const char *tablename, | |||
62 | 62 | ||
63 | if (cm->mark > 0xffffffff || cm->mask > 0xffffffff) { | 63 | if (cm->mark > 0xffffffff || cm->mask > 0xffffffff) { |
64 | printk(KERN_WARNING "connmark: only support 32bit mark\n"); | 64 | printk(KERN_WARNING "connmark: only support 32bit mark\n"); |
65 | return 0; | 65 | return false; |
66 | } | 66 | } |
67 | if (nf_ct_l3proto_try_module_get(match->family) < 0) { | 67 | if (nf_ct_l3proto_try_module_get(match->family) < 0) { |
68 | printk(KERN_WARNING "can't load conntrack support for " | 68 | printk(KERN_WARNING "can't load conntrack support for " |
69 | "proto=%d\n", match->family); | 69 | "proto=%d\n", match->family); |
70 | return 0; | 70 | return false; |
71 | } | 71 | } |
72 | return 1; | 72 | return true; |
73 | } | 73 | } |
74 | 74 | ||
75 | static void | 75 | static void |
diff --git a/net/netfilter/xt_conntrack.c b/net/netfilter/xt_conntrack.c index 26901f95bf4b..87364f58a4b9 100644 --- a/net/netfilter/xt_conntrack.c +++ b/net/netfilter/xt_conntrack.c | |||
@@ -114,7 +114,7 @@ match(const struct sk_buff *skb, | |||
114 | return true; | 114 | return true; |
115 | } | 115 | } |
116 | 116 | ||
117 | static int | 117 | static bool |
118 | checkentry(const char *tablename, | 118 | checkentry(const char *tablename, |
119 | const void *ip, | 119 | const void *ip, |
120 | const struct xt_match *match, | 120 | const struct xt_match *match, |
@@ -124,9 +124,9 @@ checkentry(const char *tablename, | |||
124 | if (nf_ct_l3proto_try_module_get(match->family) < 0) { | 124 | if (nf_ct_l3proto_try_module_get(match->family) < 0) { |
125 | printk(KERN_WARNING "can't load conntrack support for " | 125 | printk(KERN_WARNING "can't load conntrack support for " |
126 | "proto=%d\n", match->family); | 126 | "proto=%d\n", match->family); |
127 | return 0; | 127 | return false; |
128 | } | 128 | } |
129 | return 1; | 129 | return true; |
130 | } | 130 | } |
131 | 131 | ||
132 | static void destroy(const struct xt_match *match, void *matchinfo) | 132 | static void destroy(const struct xt_match *match, void *matchinfo) |
diff --git a/net/netfilter/xt_dccp.c b/net/netfilter/xt_dccp.c index b0eba4e2c53f..24895902cfe0 100644 --- a/net/netfilter/xt_dccp.c +++ b/net/netfilter/xt_dccp.c | |||
@@ -126,7 +126,7 @@ match(const struct sk_buff *skb, | |||
126 | XT_DCCP_OPTION, info->flags, info->invflags); | 126 | XT_DCCP_OPTION, info->flags, info->invflags); |
127 | } | 127 | } |
128 | 128 | ||
129 | static int | 129 | static bool |
130 | checkentry(const char *tablename, | 130 | checkentry(const char *tablename, |
131 | const void *inf, | 131 | const void *inf, |
132 | const struct xt_match *match, | 132 | const struct xt_match *match, |
diff --git a/net/netfilter/xt_dscp.c b/net/netfilter/xt_dscp.c index c9c6518907a2..35cabca28eff 100644 --- a/net/netfilter/xt_dscp.c +++ b/net/netfilter/xt_dscp.c | |||
@@ -52,20 +52,20 @@ static bool match6(const struct sk_buff *skb, | |||
52 | return (dscp == info->dscp) ^ !!info->invert; | 52 | return (dscp == info->dscp) ^ !!info->invert; |
53 | } | 53 | } |
54 | 54 | ||
55 | static int checkentry(const char *tablename, | 55 | static bool checkentry(const char *tablename, |
56 | const void *info, | 56 | const void *info, |
57 | const struct xt_match *match, | 57 | const struct xt_match *match, |
58 | void *matchinfo, | 58 | void *matchinfo, |
59 | unsigned int hook_mask) | 59 | unsigned int hook_mask) |
60 | { | 60 | { |
61 | const u_int8_t dscp = ((struct xt_dscp_info *)matchinfo)->dscp; | 61 | const u_int8_t dscp = ((struct xt_dscp_info *)matchinfo)->dscp; |
62 | 62 | ||
63 | if (dscp > XT_DSCP_MAX) { | 63 | if (dscp > XT_DSCP_MAX) { |
64 | printk(KERN_ERR "xt_dscp: dscp %x out of range\n", dscp); | 64 | printk(KERN_ERR "xt_dscp: dscp %x out of range\n", dscp); |
65 | return 0; | 65 | return false; |
66 | } | 66 | } |
67 | 67 | ||
68 | return 1; | 68 | return true; |
69 | } | 69 | } |
70 | 70 | ||
71 | static struct xt_match xt_dscp_match[] = { | 71 | static struct xt_match xt_dscp_match[] = { |
diff --git a/net/netfilter/xt_esp.c b/net/netfilter/xt_esp.c index 1a945cb7c359..1a6ae8a047c7 100644 --- a/net/netfilter/xt_esp.c +++ b/net/netfilter/xt_esp.c | |||
@@ -74,7 +74,7 @@ match(const struct sk_buff *skb, | |||
74 | } | 74 | } |
75 | 75 | ||
76 | /* Called when user tries to insert an entry of this type. */ | 76 | /* Called when user tries to insert an entry of this type. */ |
77 | static int | 77 | static bool |
78 | checkentry(const char *tablename, | 78 | checkentry(const char *tablename, |
79 | const void *ip_void, | 79 | const void *ip_void, |
80 | const struct xt_match *match, | 80 | const struct xt_match *match, |
@@ -85,10 +85,10 @@ checkentry(const char *tablename, | |||
85 | 85 | ||
86 | if (espinfo->invflags & ~XT_ESP_INV_MASK) { | 86 | if (espinfo->invflags & ~XT_ESP_INV_MASK) { |
87 | duprintf("xt_esp: unknown flags %X\n", espinfo->invflags); | 87 | duprintf("xt_esp: unknown flags %X\n", espinfo->invflags); |
88 | return 0; | 88 | return false; |
89 | } | 89 | } |
90 | 90 | ||
91 | return 1; | 91 | return true; |
92 | } | 92 | } |
93 | 93 | ||
94 | static struct xt_match xt_esp_match[] = { | 94 | static struct xt_match xt_esp_match[] = { |
diff --git a/net/netfilter/xt_hashlimit.c b/net/netfilter/xt_hashlimit.c index 21597b755cea..a1b5996447dd 100644 --- a/net/netfilter/xt_hashlimit.c +++ b/net/netfilter/xt_hashlimit.c | |||
@@ -492,7 +492,7 @@ hotdrop: | |||
492 | return false; | 492 | return false; |
493 | } | 493 | } |
494 | 494 | ||
495 | static int | 495 | static bool |
496 | hashlimit_checkentry(const char *tablename, | 496 | hashlimit_checkentry(const char *tablename, |
497 | const void *inf, | 497 | const void *inf, |
498 | const struct xt_match *match, | 498 | const struct xt_match *match, |
@@ -506,20 +506,20 @@ hashlimit_checkentry(const char *tablename, | |||
506 | user2credits(r->cfg.avg * r->cfg.burst) < user2credits(r->cfg.avg)) { | 506 | user2credits(r->cfg.avg * r->cfg.burst) < user2credits(r->cfg.avg)) { |
507 | printk(KERN_ERR "xt_hashlimit: overflow, try lower: %u/%u\n", | 507 | printk(KERN_ERR "xt_hashlimit: overflow, try lower: %u/%u\n", |
508 | r->cfg.avg, r->cfg.burst); | 508 | r->cfg.avg, r->cfg.burst); |
509 | return 0; | 509 | return false; |
510 | } | 510 | } |
511 | if (r->cfg.mode == 0 || | 511 | if (r->cfg.mode == 0 || |
512 | r->cfg.mode > (XT_HASHLIMIT_HASH_DPT | | 512 | r->cfg.mode > (XT_HASHLIMIT_HASH_DPT | |
513 | XT_HASHLIMIT_HASH_DIP | | 513 | XT_HASHLIMIT_HASH_DIP | |
514 | XT_HASHLIMIT_HASH_SIP | | 514 | XT_HASHLIMIT_HASH_SIP | |
515 | XT_HASHLIMIT_HASH_SPT)) | 515 | XT_HASHLIMIT_HASH_SPT)) |
516 | return 0; | 516 | return false; |
517 | if (!r->cfg.gc_interval) | 517 | if (!r->cfg.gc_interval) |
518 | return 0; | 518 | return false; |
519 | if (!r->cfg.expire) | 519 | if (!r->cfg.expire) |
520 | return 0; | 520 | return false; |
521 | if (r->name[sizeof(r->name) - 1] != '\0') | 521 | if (r->name[sizeof(r->name) - 1] != '\0') |
522 | return 0; | 522 | return false; |
523 | 523 | ||
524 | /* This is the best we've got: We cannot release and re-grab lock, | 524 | /* This is the best we've got: We cannot release and re-grab lock, |
525 | * since checkentry() is called before x_tables.c grabs xt_mutex. | 525 | * since checkentry() is called before x_tables.c grabs xt_mutex. |
@@ -531,13 +531,13 @@ hashlimit_checkentry(const char *tablename, | |||
531 | r->hinfo = htable_find_get(r->name, match->family); | 531 | r->hinfo = htable_find_get(r->name, match->family); |
532 | if (!r->hinfo && htable_create(r, match->family) != 0) { | 532 | if (!r->hinfo && htable_create(r, match->family) != 0) { |
533 | mutex_unlock(&hlimit_mutex); | 533 | mutex_unlock(&hlimit_mutex); |
534 | return 0; | 534 | return false; |
535 | } | 535 | } |
536 | mutex_unlock(&hlimit_mutex); | 536 | mutex_unlock(&hlimit_mutex); |
537 | 537 | ||
538 | /* Ugly hack: For SMP, we only want to use one set */ | 538 | /* Ugly hack: For SMP, we only want to use one set */ |
539 | r->u.master = r; | 539 | r->u.master = r; |
540 | return 1; | 540 | return true; |
541 | } | 541 | } |
542 | 542 | ||
543 | static void | 543 | static void |
diff --git a/net/netfilter/xt_helper.c b/net/netfilter/xt_helper.c index 10c629b34abf..a2688b807a99 100644 --- a/net/netfilter/xt_helper.c +++ b/net/netfilter/xt_helper.c | |||
@@ -76,21 +76,21 @@ out_unlock: | |||
76 | return ret; | 76 | return ret; |
77 | } | 77 | } |
78 | 78 | ||
79 | static int check(const char *tablename, | 79 | static bool check(const char *tablename, |
80 | const void *inf, | 80 | const void *inf, |
81 | const struct xt_match *match, | 81 | const struct xt_match *match, |
82 | void *matchinfo, | 82 | void *matchinfo, |
83 | unsigned int hook_mask) | 83 | unsigned int hook_mask) |
84 | { | 84 | { |
85 | struct xt_helper_info *info = matchinfo; | 85 | struct xt_helper_info *info = matchinfo; |
86 | 86 | ||
87 | if (nf_ct_l3proto_try_module_get(match->family) < 0) { | 87 | if (nf_ct_l3proto_try_module_get(match->family) < 0) { |
88 | printk(KERN_WARNING "can't load conntrack support for " | 88 | printk(KERN_WARNING "can't load conntrack support for " |
89 | "proto=%d\n", match->family); | 89 | "proto=%d\n", match->family); |
90 | return 0; | 90 | return false; |
91 | } | 91 | } |
92 | info->name[29] = '\0'; | 92 | info->name[29] = '\0'; |
93 | return 1; | 93 | return true; |
94 | } | 94 | } |
95 | 95 | ||
96 | static void | 96 | static void |
diff --git a/net/netfilter/xt_limit.c b/net/netfilter/xt_limit.c index 0cfe241a0493..2717aa65246a 100644 --- a/net/netfilter/xt_limit.c +++ b/net/netfilter/xt_limit.c | |||
@@ -98,7 +98,7 @@ user2credits(u_int32_t user) | |||
98 | return (user * HZ * CREDITS_PER_JIFFY) / XT_LIMIT_SCALE; | 98 | return (user * HZ * CREDITS_PER_JIFFY) / XT_LIMIT_SCALE; |
99 | } | 99 | } |
100 | 100 | ||
101 | static int | 101 | static bool |
102 | ipt_limit_checkentry(const char *tablename, | 102 | ipt_limit_checkentry(const char *tablename, |
103 | const void *inf, | 103 | const void *inf, |
104 | const struct xt_match *match, | 104 | const struct xt_match *match, |
@@ -112,7 +112,7 @@ ipt_limit_checkentry(const char *tablename, | |||
112 | || user2credits(r->avg * r->burst) < user2credits(r->avg)) { | 112 | || user2credits(r->avg * r->burst) < user2credits(r->avg)) { |
113 | printk("Overflow in xt_limit, try lower: %u/%u\n", | 113 | printk("Overflow in xt_limit, try lower: %u/%u\n", |
114 | r->avg, r->burst); | 114 | r->avg, r->burst); |
115 | return 0; | 115 | return false; |
116 | } | 116 | } |
117 | 117 | ||
118 | /* For SMP, we only want to use one set of counters. */ | 118 | /* For SMP, we only want to use one set of counters. */ |
@@ -125,7 +125,7 @@ ipt_limit_checkentry(const char *tablename, | |||
125 | r->credit_cap = user2credits(r->avg * r->burst); /* Credits full. */ | 125 | r->credit_cap = user2credits(r->avg * r->burst); /* Credits full. */ |
126 | r->cost = user2credits(r->avg); | 126 | r->cost = user2credits(r->avg); |
127 | } | 127 | } |
128 | return 1; | 128 | return true; |
129 | } | 129 | } |
130 | 130 | ||
131 | #ifdef CONFIG_COMPAT | 131 | #ifdef CONFIG_COMPAT |
diff --git a/net/netfilter/xt_mark.c b/net/netfilter/xt_mark.c index 10c6799cd56a..83ed806764b4 100644 --- a/net/netfilter/xt_mark.c +++ b/net/netfilter/xt_mark.c | |||
@@ -34,7 +34,7 @@ match(const struct sk_buff *skb, | |||
34 | return ((skb->mark & info->mask) == info->mark) ^ info->invert; | 34 | return ((skb->mark & info->mask) == info->mark) ^ info->invert; |
35 | } | 35 | } |
36 | 36 | ||
37 | static int | 37 | static bool |
38 | checkentry(const char *tablename, | 38 | checkentry(const char *tablename, |
39 | const void *entry, | 39 | const void *entry, |
40 | const struct xt_match *match, | 40 | const struct xt_match *match, |
@@ -45,9 +45,9 @@ checkentry(const char *tablename, | |||
45 | 45 | ||
46 | if (minfo->mark > 0xffffffff || minfo->mask > 0xffffffff) { | 46 | if (minfo->mark > 0xffffffff || minfo->mask > 0xffffffff) { |
47 | printk(KERN_WARNING "mark: only supports 32bit mark\n"); | 47 | printk(KERN_WARNING "mark: only supports 32bit mark\n"); |
48 | return 0; | 48 | return false; |
49 | } | 49 | } |
50 | return 1; | 50 | return true; |
51 | } | 51 | } |
52 | 52 | ||
53 | #ifdef CONFIG_COMPAT | 53 | #ifdef CONFIG_COMPAT |
diff --git a/net/netfilter/xt_multiport.c b/net/netfilter/xt_multiport.c index 55feb3d737d4..3d69d6208965 100644 --- a/net/netfilter/xt_multiport.c +++ b/net/netfilter/xt_multiport.c | |||
@@ -154,7 +154,7 @@ match_v1(const struct sk_buff *skb, | |||
154 | return ports_match_v1(multiinfo, ntohs(pptr[0]), ntohs(pptr[1])); | 154 | return ports_match_v1(multiinfo, ntohs(pptr[0]), ntohs(pptr[1])); |
155 | } | 155 | } |
156 | 156 | ||
157 | static inline int | 157 | static inline bool |
158 | check(u_int16_t proto, | 158 | check(u_int16_t proto, |
159 | u_int8_t ip_invflags, | 159 | u_int8_t ip_invflags, |
160 | u_int8_t match_flags, | 160 | u_int8_t match_flags, |
@@ -172,7 +172,7 @@ check(u_int16_t proto, | |||
172 | } | 172 | } |
173 | 173 | ||
174 | /* Called when user tries to insert an entry of this type. */ | 174 | /* Called when user tries to insert an entry of this type. */ |
175 | static int | 175 | static bool |
176 | checkentry(const char *tablename, | 176 | checkentry(const char *tablename, |
177 | const void *info, | 177 | const void *info, |
178 | const struct xt_match *match, | 178 | const struct xt_match *match, |
@@ -186,7 +186,7 @@ checkentry(const char *tablename, | |||
186 | multiinfo->count); | 186 | multiinfo->count); |
187 | } | 187 | } |
188 | 188 | ||
189 | static int | 189 | static bool |
190 | checkentry_v1(const char *tablename, | 190 | checkentry_v1(const char *tablename, |
191 | const void *info, | 191 | const void *info, |
192 | const struct xt_match *match, | 192 | const struct xt_match *match, |
@@ -200,7 +200,7 @@ checkentry_v1(const char *tablename, | |||
200 | multiinfo->count); | 200 | multiinfo->count); |
201 | } | 201 | } |
202 | 202 | ||
203 | static int | 203 | static bool |
204 | checkentry6(const char *tablename, | 204 | checkentry6(const char *tablename, |
205 | const void *info, | 205 | const void *info, |
206 | const struct xt_match *match, | 206 | const struct xt_match *match, |
@@ -214,7 +214,7 @@ checkentry6(const char *tablename, | |||
214 | multiinfo->count); | 214 | multiinfo->count); |
215 | } | 215 | } |
216 | 216 | ||
217 | static int | 217 | static bool |
218 | checkentry6_v1(const char *tablename, | 218 | checkentry6_v1(const char *tablename, |
219 | const void *info, | 219 | const void *info, |
220 | const struct xt_match *match, | 220 | const struct xt_match *match, |
diff --git a/net/netfilter/xt_physdev.c b/net/netfilter/xt_physdev.c index 70de6708e884..34f0d3e44ea7 100644 --- a/net/netfilter/xt_physdev.c +++ b/net/netfilter/xt_physdev.c | |||
@@ -99,7 +99,7 @@ match_outdev: | |||
99 | return ret ^ !(info->invert & XT_PHYSDEV_OP_OUT); | 99 | return ret ^ !(info->invert & XT_PHYSDEV_OP_OUT); |
100 | } | 100 | } |
101 | 101 | ||
102 | static int | 102 | static bool |
103 | checkentry(const char *tablename, | 103 | checkentry(const char *tablename, |
104 | const void *ip, | 104 | const void *ip, |
105 | const struct xt_match *match, | 105 | const struct xt_match *match, |
@@ -110,7 +110,7 @@ checkentry(const char *tablename, | |||
110 | 110 | ||
111 | if (!(info->bitmask & XT_PHYSDEV_OP_MASK) || | 111 | if (!(info->bitmask & XT_PHYSDEV_OP_MASK) || |
112 | info->bitmask & ~XT_PHYSDEV_OP_MASK) | 112 | info->bitmask & ~XT_PHYSDEV_OP_MASK) |
113 | return 0; | 113 | return false; |
114 | if (info->bitmask & XT_PHYSDEV_OP_OUT && | 114 | if (info->bitmask & XT_PHYSDEV_OP_OUT && |
115 | (!(info->bitmask & XT_PHYSDEV_OP_BRIDGED) || | 115 | (!(info->bitmask & XT_PHYSDEV_OP_BRIDGED) || |
116 | info->invert & XT_PHYSDEV_OP_BRIDGED) && | 116 | info->invert & XT_PHYSDEV_OP_BRIDGED) && |
@@ -120,9 +120,9 @@ checkentry(const char *tablename, | |||
120 | "OUTPUT, FORWARD and POSTROUTING chains for non-bridged " | 120 | "OUTPUT, FORWARD and POSTROUTING chains for non-bridged " |
121 | "traffic is not supported anymore.\n"); | 121 | "traffic is not supported anymore.\n"); |
122 | if (hook_mask & (1 << NF_IP_LOCAL_OUT)) | 122 | if (hook_mask & (1 << NF_IP_LOCAL_OUT)) |
123 | return 0; | 123 | return false; |
124 | } | 124 | } |
125 | return 1; | 125 | return true; |
126 | } | 126 | } |
127 | 127 | ||
128 | static struct xt_match xt_physdev_match[] = { | 128 | static struct xt_match xt_physdev_match[] = { |
diff --git a/net/netfilter/xt_policy.c b/net/netfilter/xt_policy.c index 0aa487b1f3b8..1534de55cdb6 100644 --- a/net/netfilter/xt_policy.c +++ b/net/netfilter/xt_policy.c | |||
@@ -133,35 +133,35 @@ static bool match(const struct sk_buff *skb, | |||
133 | return ret; | 133 | return ret; |
134 | } | 134 | } |
135 | 135 | ||
136 | static int checkentry(const char *tablename, const void *ip_void, | 136 | static bool checkentry(const char *tablename, const void *ip_void, |
137 | const struct xt_match *match, | 137 | const struct xt_match *match, |
138 | void *matchinfo, unsigned int hook_mask) | 138 | void *matchinfo, unsigned int hook_mask) |
139 | { | 139 | { |
140 | struct xt_policy_info *info = matchinfo; | 140 | struct xt_policy_info *info = matchinfo; |
141 | 141 | ||
142 | if (!(info->flags & (XT_POLICY_MATCH_IN|XT_POLICY_MATCH_OUT))) { | 142 | if (!(info->flags & (XT_POLICY_MATCH_IN|XT_POLICY_MATCH_OUT))) { |
143 | printk(KERN_ERR "xt_policy: neither incoming nor " | 143 | printk(KERN_ERR "xt_policy: neither incoming nor " |
144 | "outgoing policy selected\n"); | 144 | "outgoing policy selected\n"); |
145 | return 0; | 145 | return false; |
146 | } | 146 | } |
147 | /* hook values are equal for IPv4 and IPv6 */ | 147 | /* hook values are equal for IPv4 and IPv6 */ |
148 | if (hook_mask & (1 << NF_IP_PRE_ROUTING | 1 << NF_IP_LOCAL_IN) | 148 | if (hook_mask & (1 << NF_IP_PRE_ROUTING | 1 << NF_IP_LOCAL_IN) |
149 | && info->flags & XT_POLICY_MATCH_OUT) { | 149 | && info->flags & XT_POLICY_MATCH_OUT) { |
150 | printk(KERN_ERR "xt_policy: output policy not valid in " | 150 | printk(KERN_ERR "xt_policy: output policy not valid in " |
151 | "PRE_ROUTING and INPUT\n"); | 151 | "PRE_ROUTING and INPUT\n"); |
152 | return 0; | 152 | return false; |
153 | } | 153 | } |
154 | if (hook_mask & (1 << NF_IP_POST_ROUTING | 1 << NF_IP_LOCAL_OUT) | 154 | if (hook_mask & (1 << NF_IP_POST_ROUTING | 1 << NF_IP_LOCAL_OUT) |
155 | && info->flags & XT_POLICY_MATCH_IN) { | 155 | && info->flags & XT_POLICY_MATCH_IN) { |
156 | printk(KERN_ERR "xt_policy: input policy not valid in " | 156 | printk(KERN_ERR "xt_policy: input policy not valid in " |
157 | "POST_ROUTING and OUTPUT\n"); | 157 | "POST_ROUTING and OUTPUT\n"); |
158 | return 0; | 158 | return false; |
159 | } | 159 | } |
160 | if (info->len > XT_POLICY_MAX_ELEM) { | 160 | if (info->len > XT_POLICY_MAX_ELEM) { |
161 | printk(KERN_ERR "xt_policy: too many policy elements\n"); | 161 | printk(KERN_ERR "xt_policy: too many policy elements\n"); |
162 | return 0; | 162 | return false; |
163 | } | 163 | } |
164 | return 1; | 164 | return true; |
165 | } | 165 | } |
166 | 166 | ||
167 | static struct xt_match xt_policy_match[] = { | 167 | static struct xt_match xt_policy_match[] = { |
diff --git a/net/netfilter/xt_quota.c b/net/netfilter/xt_quota.c index 6091347e38b3..e13d62a8caba 100644 --- a/net/netfilter/xt_quota.c +++ b/net/netfilter/xt_quota.c | |||
@@ -38,7 +38,7 @@ match(const struct sk_buff *skb, | |||
38 | return ret; | 38 | return ret; |
39 | } | 39 | } |
40 | 40 | ||
41 | static int | 41 | static bool |
42 | checkentry(const char *tablename, const void *entry, | 42 | checkentry(const char *tablename, const void *entry, |
43 | const struct xt_match *match, void *matchinfo, | 43 | const struct xt_match *match, void *matchinfo, |
44 | unsigned int hook_mask) | 44 | unsigned int hook_mask) |
@@ -46,10 +46,10 @@ checkentry(const char *tablename, const void *entry, | |||
46 | struct xt_quota_info *q = (struct xt_quota_info *)matchinfo; | 46 | struct xt_quota_info *q = (struct xt_quota_info *)matchinfo; |
47 | 47 | ||
48 | if (q->flags & ~XT_QUOTA_MASK) | 48 | if (q->flags & ~XT_QUOTA_MASK) |
49 | return 0; | 49 | return false; |
50 | /* For SMP, we only want to use one set of counters. */ | 50 | /* For SMP, we only want to use one set of counters. */ |
51 | q->master = q; | 51 | q->master = q; |
52 | return 1; | 52 | return true; |
53 | } | 53 | } |
54 | 54 | ||
55 | static struct xt_match xt_quota_match[] = { | 55 | static struct xt_match xt_quota_match[] = { |
diff --git a/net/netfilter/xt_sctp.c b/net/netfilter/xt_sctp.c index a118a4c71563..22df338b3934 100644 --- a/net/netfilter/xt_sctp.c +++ b/net/netfilter/xt_sctp.c | |||
@@ -158,7 +158,7 @@ match(const struct sk_buff *skb, | |||
158 | XT_SCTP_CHUNK_TYPES, info->flags, info->invflags); | 158 | XT_SCTP_CHUNK_TYPES, info->flags, info->invflags); |
159 | } | 159 | } |
160 | 160 | ||
161 | static int | 161 | static bool |
162 | checkentry(const char *tablename, | 162 | checkentry(const char *tablename, |
163 | const void *inf, | 163 | const void *inf, |
164 | const struct xt_match *match, | 164 | const struct xt_match *match, |
diff --git a/net/netfilter/xt_state.c b/net/netfilter/xt_state.c index f77f74ad5c97..5b9c59aa14d3 100644 --- a/net/netfilter/xt_state.c +++ b/net/netfilter/xt_state.c | |||
@@ -44,18 +44,18 @@ match(const struct sk_buff *skb, | |||
44 | return (sinfo->statemask & statebit); | 44 | return (sinfo->statemask & statebit); |
45 | } | 45 | } |
46 | 46 | ||
47 | static int check(const char *tablename, | 47 | static bool check(const char *tablename, |
48 | const void *inf, | 48 | const void *inf, |
49 | const struct xt_match *match, | 49 | const struct xt_match *match, |
50 | void *matchinfo, | 50 | void *matchinfo, |
51 | unsigned int hook_mask) | 51 | unsigned int hook_mask) |
52 | { | 52 | { |
53 | if (nf_ct_l3proto_try_module_get(match->family) < 0) { | 53 | if (nf_ct_l3proto_try_module_get(match->family) < 0) { |
54 | printk(KERN_WARNING "can't load conntrack support for " | 54 | printk(KERN_WARNING "can't load conntrack support for " |
55 | "proto=%d\n", match->family); | 55 | "proto=%d\n", match->family); |
56 | return 0; | 56 | return false; |
57 | } | 57 | } |
58 | return 1; | 58 | return true; |
59 | } | 59 | } |
60 | 60 | ||
61 | static void | 61 | static void |
diff --git a/net/netfilter/xt_statistic.c b/net/netfilter/xt_statistic.c index 989924f9024e..0af42892e9dc 100644 --- a/net/netfilter/xt_statistic.c +++ b/net/netfilter/xt_statistic.c | |||
@@ -52,7 +52,7 @@ match(const struct sk_buff *skb, | |||
52 | return ret; | 52 | return ret; |
53 | } | 53 | } |
54 | 54 | ||
55 | static int | 55 | static bool |
56 | checkentry(const char *tablename, const void *entry, | 56 | checkentry(const char *tablename, const void *entry, |
57 | const struct xt_match *match, void *matchinfo, | 57 | const struct xt_match *match, void *matchinfo, |
58 | unsigned int hook_mask) | 58 | unsigned int hook_mask) |
@@ -61,9 +61,9 @@ checkentry(const char *tablename, const void *entry, | |||
61 | 61 | ||
62 | if (info->mode > XT_STATISTIC_MODE_MAX || | 62 | if (info->mode > XT_STATISTIC_MODE_MAX || |
63 | info->flags & ~XT_STATISTIC_MASK) | 63 | info->flags & ~XT_STATISTIC_MASK) |
64 | return 0; | 64 | return false; |
65 | info->master = info; | 65 | info->master = info; |
66 | return 1; | 66 | return true; |
67 | } | 67 | } |
68 | 68 | ||
69 | static struct xt_match xt_statistic_match[] = { | 69 | static struct xt_match xt_statistic_match[] = { |
diff --git a/net/netfilter/xt_string.c b/net/netfilter/xt_string.c index 3aea43d37339..ab761b17f811 100644 --- a/net/netfilter/xt_string.c +++ b/net/netfilter/xt_string.c | |||
@@ -42,30 +42,30 @@ static bool match(const struct sk_buff *skb, | |||
42 | 42 | ||
43 | #define STRING_TEXT_PRIV(m) ((struct xt_string_info *) m) | 43 | #define STRING_TEXT_PRIV(m) ((struct xt_string_info *) m) |
44 | 44 | ||
45 | static int checkentry(const char *tablename, | 45 | static bool checkentry(const char *tablename, |
46 | const void *ip, | 46 | const void *ip, |
47 | const struct xt_match *match, | 47 | const struct xt_match *match, |
48 | void *matchinfo, | 48 | void *matchinfo, |
49 | unsigned int hook_mask) | 49 | unsigned int hook_mask) |
50 | { | 50 | { |
51 | struct xt_string_info *conf = matchinfo; | 51 | struct xt_string_info *conf = matchinfo; |
52 | struct ts_config *ts_conf; | 52 | struct ts_config *ts_conf; |
53 | 53 | ||
54 | /* Damn, can't handle this case properly with iptables... */ | 54 | /* Damn, can't handle this case properly with iptables... */ |
55 | if (conf->from_offset > conf->to_offset) | 55 | if (conf->from_offset > conf->to_offset) |
56 | return 0; | 56 | return false; |
57 | if (conf->algo[XT_STRING_MAX_ALGO_NAME_SIZE - 1] != '\0') | 57 | if (conf->algo[XT_STRING_MAX_ALGO_NAME_SIZE - 1] != '\0') |
58 | return 0; | 58 | return false; |
59 | if (conf->patlen > XT_STRING_MAX_PATTERN_SIZE) | 59 | if (conf->patlen > XT_STRING_MAX_PATTERN_SIZE) |
60 | return 0; | 60 | return false; |
61 | ts_conf = textsearch_prepare(conf->algo, conf->pattern, conf->patlen, | 61 | ts_conf = textsearch_prepare(conf->algo, conf->pattern, conf->patlen, |
62 | GFP_KERNEL, TS_AUTOLOAD); | 62 | GFP_KERNEL, TS_AUTOLOAD); |
63 | if (IS_ERR(ts_conf)) | 63 | if (IS_ERR(ts_conf)) |
64 | return 0; | 64 | return false; |
65 | 65 | ||
66 | conf->config = ts_conf; | 66 | conf->config = ts_conf; |
67 | 67 | ||
68 | return 1; | 68 | return true; |
69 | } | 69 | } |
70 | 70 | ||
71 | static void destroy(const struct xt_match *match, void *matchinfo) | 71 | static void destroy(const struct xt_match *match, void *matchinfo) |
diff --git a/net/netfilter/xt_tcpudp.c b/net/netfilter/xt_tcpudp.c index 9ecc4a5bd529..0dd3022cc79a 100644 --- a/net/netfilter/xt_tcpudp.c +++ b/net/netfilter/xt_tcpudp.c | |||
@@ -133,7 +133,7 @@ tcp_match(const struct sk_buff *skb, | |||
133 | } | 133 | } |
134 | 134 | ||
135 | /* Called when user tries to insert an entry of this type. */ | 135 | /* Called when user tries to insert an entry of this type. */ |
136 | static int | 136 | static bool |
137 | tcp_checkentry(const char *tablename, | 137 | tcp_checkentry(const char *tablename, |
138 | const void *info, | 138 | const void *info, |
139 | const struct xt_match *match, | 139 | const struct xt_match *match, |
@@ -181,7 +181,7 @@ udp_match(const struct sk_buff *skb, | |||
181 | } | 181 | } |
182 | 182 | ||
183 | /* Called when user tries to insert an entry of this type. */ | 183 | /* Called when user tries to insert an entry of this type. */ |
184 | static int | 184 | static bool |
185 | udp_checkentry(const char *tablename, | 185 | udp_checkentry(const char *tablename, |
186 | const void *info, | 186 | const void *info, |
187 | const struct xt_match *match, | 187 | const struct xt_match *match, |