diff options
author | David S. Miller <davem@davemloft.net> | 2014-10-20 17:57:47 +0200 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2014-10-20 17:57:47 +0200 |
commit | ce8ec4896749783bd6cdc457e6012cfc18e09c8b (patch) | |
tree | 3d58d88f4e4030ddf0f926ac2ef52c3ee2c9f65a /net/mpls/mpls_gso.c | |
parent | ax88179_178a: fix bonding failure (diff) | |
parent | netfilter: nft_nat: dump attributes if they are set (diff) | |
download | linux-ce8ec4896749783bd6cdc457e6012cfc18e09c8b.tar.xz linux-ce8ec4896749783bd6cdc457e6012cfc18e09c8b.zip |
Merge git://git.kernel.org/pub/scm/linux/kernel/git/pablo/nf
Pablo Neira Ayuso says:
====================
netfilter fixes for net
The following patchset contains netfilter fixes for your net tree,
they are:
1) Fix missing MODULE_LICENSE() in the new nf_reject_ipv{4,6} modules.
2) Restrict nat and masq expressions to the nat chain type. Otherwise,
users may crash their kernel if they attach a nat/masq rule to a non
nat chain.
3) Fix hook validation in nft_compat when non-base chains are used.
Basically, initialize hook_mask to zero.
4) Make sure you use match/targets in nft_compat from the right chain
type. The existing validation relies on the table name which can be
avoided by
5) Better netlink attribute validation in nft_nat. This expression has
to reject the configuration when no address and proto configurations
are specified.
6) Interpret NFTA_NAT_REG_*_MAX if only if NFTA_NAT_REG_*_MIN is set.
Yet another sanity check to reject incorrect configurations from
userspace.
7) Conditional NAT attribute dumping depending on the existing
configuration.
====================
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/mpls/mpls_gso.c')
0 files changed, 0 insertions, 0 deletions