diff options
Diffstat (limited to 'net')
| -rw-r--r-- | net/ipv4/netfilter/arp_tables.c | 10 | ||||
| -rw-r--r-- | net/ipv4/netfilter/ip_tables.c | 12 | ||||
| -rw-r--r-- | net/ipv6/netfilter/ip6_tables.c | 12 |
3 files changed, 17 insertions, 17 deletions
diff --git a/net/ipv4/netfilter/arp_tables.c b/net/ipv4/netfilter/arp_tables.c index e8f4f9a57f12..e427a9e3c489 100644 --- a/net/ipv4/netfilter/arp_tables.c +++ b/net/ipv4/netfilter/arp_tables.c | |||
| @@ -895,7 +895,7 @@ static int compat_table_info(const struct xt_table_info *info, | |||
| 895 | static int get_info(struct net *net, void __user *user, | 895 | static int get_info(struct net *net, void __user *user, |
| 896 | const int *len, int compat) | 896 | const int *len, int compat) |
| 897 | { | 897 | { |
| 898 | char name[ARPT_TABLE_MAXNAMELEN]; | 898 | char name[XT_TABLE_MAXNAMELEN]; |
| 899 | struct xt_table *t; | 899 | struct xt_table *t; |
| 900 | int ret; | 900 | int ret; |
| 901 | 901 | ||
| @@ -908,7 +908,7 @@ static int get_info(struct net *net, void __user *user, | |||
| 908 | if (copy_from_user(name, user, sizeof(name)) != 0) | 908 | if (copy_from_user(name, user, sizeof(name)) != 0) |
| 909 | return -EFAULT; | 909 | return -EFAULT; |
| 910 | 910 | ||
| 911 | name[ARPT_TABLE_MAXNAMELEN-1] = '\0'; | 911 | name[XT_TABLE_MAXNAMELEN-1] = '\0'; |
| 912 | #ifdef CONFIG_COMPAT | 912 | #ifdef CONFIG_COMPAT |
| 913 | if (compat) | 913 | if (compat) |
| 914 | xt_compat_lock(NFPROTO_ARP); | 914 | xt_compat_lock(NFPROTO_ARP); |
| @@ -1474,7 +1474,7 @@ out_unlock: | |||
| 1474 | } | 1474 | } |
| 1475 | 1475 | ||
| 1476 | struct compat_arpt_replace { | 1476 | struct compat_arpt_replace { |
| 1477 | char name[ARPT_TABLE_MAXNAMELEN]; | 1477 | char name[XT_TABLE_MAXNAMELEN]; |
| 1478 | u32 valid_hooks; | 1478 | u32 valid_hooks; |
| 1479 | u32 num_entries; | 1479 | u32 num_entries; |
| 1480 | u32 size; | 1480 | u32 size; |
| @@ -1628,7 +1628,7 @@ static int compat_copy_entries_to_user(unsigned int total_size, | |||
| 1628 | } | 1628 | } |
| 1629 | 1629 | ||
| 1630 | struct compat_arpt_get_entries { | 1630 | struct compat_arpt_get_entries { |
| 1631 | char name[ARPT_TABLE_MAXNAMELEN]; | 1631 | char name[XT_TABLE_MAXNAMELEN]; |
| 1632 | compat_uint_t size; | 1632 | compat_uint_t size; |
| 1633 | struct compat_arpt_entry entrytable[0]; | 1633 | struct compat_arpt_entry entrytable[0]; |
| 1634 | }; | 1634 | }; |
| @@ -1840,7 +1840,7 @@ static struct xt_target arpt_builtin_tg[] __read_mostly = { | |||
| 1840 | { | 1840 | { |
| 1841 | .name = ARPT_ERROR_TARGET, | 1841 | .name = ARPT_ERROR_TARGET, |
| 1842 | .target = arpt_error, | 1842 | .target = arpt_error, |
| 1843 | .targetsize = ARPT_FUNCTION_MAXNAMELEN, | 1843 | .targetsize = XT_FUNCTION_MAXNAMELEN, |
| 1844 | .family = NFPROTO_ARP, | 1844 | .family = NFPROTO_ARP, |
| 1845 | }, | 1845 | }, |
| 1846 | }; | 1846 | }; |
diff --git a/net/ipv4/netfilter/ip_tables.c b/net/ipv4/netfilter/ip_tables.c index d163f2e3b2e9..2efd41bef452 100644 --- a/net/ipv4/netfilter/ip_tables.c +++ b/net/ipv4/netfilter/ip_tables.c | |||
| @@ -1092,7 +1092,7 @@ static int compat_table_info(const struct xt_table_info *info, | |||
| 1092 | static int get_info(struct net *net, void __user *user, | 1092 | static int get_info(struct net *net, void __user *user, |
| 1093 | const int *len, int compat) | 1093 | const int *len, int compat) |
| 1094 | { | 1094 | { |
| 1095 | char name[IPT_TABLE_MAXNAMELEN]; | 1095 | char name[XT_TABLE_MAXNAMELEN]; |
| 1096 | struct xt_table *t; | 1096 | struct xt_table *t; |
| 1097 | int ret; | 1097 | int ret; |
| 1098 | 1098 | ||
| @@ -1105,7 +1105,7 @@ static int get_info(struct net *net, void __user *user, | |||
| 1105 | if (copy_from_user(name, user, sizeof(name)) != 0) | 1105 | if (copy_from_user(name, user, sizeof(name)) != 0) |
| 1106 | return -EFAULT; | 1106 | return -EFAULT; |
| 1107 | 1107 | ||
| 1108 | name[IPT_TABLE_MAXNAMELEN-1] = '\0'; | 1108 | name[XT_TABLE_MAXNAMELEN-1] = '\0'; |
| 1109 | #ifdef CONFIG_COMPAT | 1109 | #ifdef CONFIG_COMPAT |
| 1110 | if (compat) | 1110 | if (compat) |
| 1111 | xt_compat_lock(AF_INET); | 1111 | xt_compat_lock(AF_INET); |
| @@ -1400,7 +1400,7 @@ do_add_counters(struct net *net, const void __user *user, | |||
| 1400 | 1400 | ||
| 1401 | #ifdef CONFIG_COMPAT | 1401 | #ifdef CONFIG_COMPAT |
| 1402 | struct compat_ipt_replace { | 1402 | struct compat_ipt_replace { |
| 1403 | char name[IPT_TABLE_MAXNAMELEN]; | 1403 | char name[XT_TABLE_MAXNAMELEN]; |
| 1404 | u32 valid_hooks; | 1404 | u32 valid_hooks; |
| 1405 | u32 num_entries; | 1405 | u32 num_entries; |
| 1406 | u32 size; | 1406 | u32 size; |
| @@ -1884,7 +1884,7 @@ compat_do_ipt_set_ctl(struct sock *sk, int cmd, void __user *user, | |||
| 1884 | } | 1884 | } |
| 1885 | 1885 | ||
| 1886 | struct compat_ipt_get_entries { | 1886 | struct compat_ipt_get_entries { |
| 1887 | char name[IPT_TABLE_MAXNAMELEN]; | 1887 | char name[XT_TABLE_MAXNAMELEN]; |
| 1888 | compat_uint_t size; | 1888 | compat_uint_t size; |
| 1889 | struct compat_ipt_entry entrytable[0]; | 1889 | struct compat_ipt_entry entrytable[0]; |
| 1890 | }; | 1890 | }; |
| @@ -2039,7 +2039,7 @@ do_ipt_get_ctl(struct sock *sk, int cmd, void __user *user, int *len) | |||
| 2039 | 2039 | ||
| 2040 | case IPT_SO_GET_REVISION_MATCH: | 2040 | case IPT_SO_GET_REVISION_MATCH: |
| 2041 | case IPT_SO_GET_REVISION_TARGET: { | 2041 | case IPT_SO_GET_REVISION_TARGET: { |
| 2042 | struct ipt_get_revision rev; | 2042 | struct xt_get_revision rev; |
| 2043 | int target; | 2043 | int target; |
| 2044 | 2044 | ||
| 2045 | if (*len != sizeof(rev)) { | 2045 | if (*len != sizeof(rev)) { |
| @@ -2188,7 +2188,7 @@ static struct xt_target ipt_builtin_tg[] __read_mostly = { | |||
| 2188 | { | 2188 | { |
| 2189 | .name = IPT_ERROR_TARGET, | 2189 | .name = IPT_ERROR_TARGET, |
| 2190 | .target = ipt_error, | 2190 | .target = ipt_error, |
| 2191 | .targetsize = IPT_FUNCTION_MAXNAMELEN, | 2191 | .targetsize = XT_FUNCTION_MAXNAMELEN, |
| 2192 | .family = NFPROTO_IPV4, | 2192 | .family = NFPROTO_IPV4, |
| 2193 | }, | 2193 | }, |
| 2194 | }; | 2194 | }; |
diff --git a/net/ipv6/netfilter/ip6_tables.c b/net/ipv6/netfilter/ip6_tables.c index 8e754be92c24..4b973e13952d 100644 --- a/net/ipv6/netfilter/ip6_tables.c +++ b/net/ipv6/netfilter/ip6_tables.c | |||
| @@ -1105,7 +1105,7 @@ static int compat_table_info(const struct xt_table_info *info, | |||
| 1105 | static int get_info(struct net *net, void __user *user, | 1105 | static int get_info(struct net *net, void __user *user, |
| 1106 | const int *len, int compat) | 1106 | const int *len, int compat) |
| 1107 | { | 1107 | { |
| 1108 | char name[IP6T_TABLE_MAXNAMELEN]; | 1108 | char name[XT_TABLE_MAXNAMELEN]; |
| 1109 | struct xt_table *t; | 1109 | struct xt_table *t; |
| 1110 | int ret; | 1110 | int ret; |
| 1111 | 1111 | ||
| @@ -1118,7 +1118,7 @@ static int get_info(struct net *net, void __user *user, | |||
| 1118 | if (copy_from_user(name, user, sizeof(name)) != 0) | 1118 | if (copy_from_user(name, user, sizeof(name)) != 0) |
| 1119 | return -EFAULT; | 1119 | return -EFAULT; |
| 1120 | 1120 | ||
| 1121 | name[IP6T_TABLE_MAXNAMELEN-1] = '\0'; | 1121 | name[XT_TABLE_MAXNAMELEN-1] = '\0'; |
| 1122 | #ifdef CONFIG_COMPAT | 1122 | #ifdef CONFIG_COMPAT |
| 1123 | if (compat) | 1123 | if (compat) |
| 1124 | xt_compat_lock(AF_INET6); | 1124 | xt_compat_lock(AF_INET6); |
| @@ -1415,7 +1415,7 @@ do_add_counters(struct net *net, const void __user *user, unsigned int len, | |||
| 1415 | 1415 | ||
| 1416 | #ifdef CONFIG_COMPAT | 1416 | #ifdef CONFIG_COMPAT |
| 1417 | struct compat_ip6t_replace { | 1417 | struct compat_ip6t_replace { |
| 1418 | char name[IP6T_TABLE_MAXNAMELEN]; | 1418 | char name[XT_TABLE_MAXNAMELEN]; |
| 1419 | u32 valid_hooks; | 1419 | u32 valid_hooks; |
| 1420 | u32 num_entries; | 1420 | u32 num_entries; |
| 1421 | u32 size; | 1421 | u32 size; |
| @@ -1899,7 +1899,7 @@ compat_do_ip6t_set_ctl(struct sock *sk, int cmd, void __user *user, | |||
| 1899 | } | 1899 | } |
| 1900 | 1900 | ||
| 1901 | struct compat_ip6t_get_entries { | 1901 | struct compat_ip6t_get_entries { |
| 1902 | char name[IP6T_TABLE_MAXNAMELEN]; | 1902 | char name[XT_TABLE_MAXNAMELEN]; |
| 1903 | compat_uint_t size; | 1903 | compat_uint_t size; |
| 1904 | struct compat_ip6t_entry entrytable[0]; | 1904 | struct compat_ip6t_entry entrytable[0]; |
| 1905 | }; | 1905 | }; |
| @@ -2054,7 +2054,7 @@ do_ip6t_get_ctl(struct sock *sk, int cmd, void __user *user, int *len) | |||
| 2054 | 2054 | ||
| 2055 | case IP6T_SO_GET_REVISION_MATCH: | 2055 | case IP6T_SO_GET_REVISION_MATCH: |
| 2056 | case IP6T_SO_GET_REVISION_TARGET: { | 2056 | case IP6T_SO_GET_REVISION_TARGET: { |
| 2057 | struct ip6t_get_revision rev; | 2057 | struct xt_get_revision rev; |
| 2058 | int target; | 2058 | int target; |
| 2059 | 2059 | ||
| 2060 | if (*len != sizeof(rev)) { | 2060 | if (*len != sizeof(rev)) { |
| @@ -2203,7 +2203,7 @@ static struct xt_target ip6t_builtin_tg[] __read_mostly = { | |||
| 2203 | { | 2203 | { |
| 2204 | .name = IP6T_ERROR_TARGET, | 2204 | .name = IP6T_ERROR_TARGET, |
| 2205 | .target = ip6t_error, | 2205 | .target = ip6t_error, |
| 2206 | .targetsize = IP6T_FUNCTION_MAXNAMELEN, | 2206 | .targetsize = XT_FUNCTION_MAXNAMELEN, |
| 2207 | .family = NFPROTO_IPV6, | 2207 | .family = NFPROTO_IPV6, |
| 2208 | }, | 2208 | }, |
| 2209 | }; | 2209 | }; |
