mirror of
https://github.com/torvalds/linux.git
synced 2024-11-11 14:42:24 +00:00
netfilter: x_tables: move hook entry checks into core
Allow followup patch to change on location instead of three. Signed-off-by: Florian Westphal <fw@strlen.de> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
This commit is contained in:
parent
472ebdcd15
commit
1b293e30f7
@ -281,6 +281,8 @@ int xt_check_entry_offsets(const void *base, const char *elems,
|
||||
unsigned int target_offset,
|
||||
unsigned int next_offset);
|
||||
|
||||
int xt_check_table_hooks(const struct xt_table_info *info, unsigned int valid_hooks);
|
||||
|
||||
unsigned int *xt_alloc_entry_offsets(unsigned int size);
|
||||
bool xt_find_jump_offset(const unsigned int *offsets,
|
||||
unsigned int target, unsigned int size);
|
||||
|
@ -555,16 +555,9 @@ static int translate_table(struct xt_table_info *newinfo, void *entry0,
|
||||
if (i != repl->num_entries)
|
||||
goto out_free;
|
||||
|
||||
/* Check hooks all assigned */
|
||||
for (i = 0; i < NF_ARP_NUMHOOKS; i++) {
|
||||
/* Only hooks which are valid */
|
||||
if (!(repl->valid_hooks & (1 << i)))
|
||||
continue;
|
||||
if (newinfo->hook_entry[i] == 0xFFFFFFFF)
|
||||
goto out_free;
|
||||
if (newinfo->underflow[i] == 0xFFFFFFFF)
|
||||
goto out_free;
|
||||
}
|
||||
ret = xt_check_table_hooks(newinfo, repl->valid_hooks);
|
||||
if (ret)
|
||||
goto out_free;
|
||||
|
||||
if (!mark_source_chains(newinfo, repl->valid_hooks, entry0, offsets)) {
|
||||
ret = -ELOOP;
|
||||
|
@ -702,16 +702,9 @@ translate_table(struct net *net, struct xt_table_info *newinfo, void *entry0,
|
||||
if (i != repl->num_entries)
|
||||
goto out_free;
|
||||
|
||||
/* Check hooks all assigned */
|
||||
for (i = 0; i < NF_INET_NUMHOOKS; i++) {
|
||||
/* Only hooks which are valid */
|
||||
if (!(repl->valid_hooks & (1 << i)))
|
||||
continue;
|
||||
if (newinfo->hook_entry[i] == 0xFFFFFFFF)
|
||||
goto out_free;
|
||||
if (newinfo->underflow[i] == 0xFFFFFFFF)
|
||||
goto out_free;
|
||||
}
|
||||
ret = xt_check_table_hooks(newinfo, repl->valid_hooks);
|
||||
if (ret)
|
||||
goto out_free;
|
||||
|
||||
if (!mark_source_chains(newinfo, repl->valid_hooks, entry0, offsets)) {
|
||||
ret = -ELOOP;
|
||||
|
@ -720,16 +720,9 @@ translate_table(struct net *net, struct xt_table_info *newinfo, void *entry0,
|
||||
if (i != repl->num_entries)
|
||||
goto out_free;
|
||||
|
||||
/* Check hooks all assigned */
|
||||
for (i = 0; i < NF_INET_NUMHOOKS; i++) {
|
||||
/* Only hooks which are valid */
|
||||
if (!(repl->valid_hooks & (1 << i)))
|
||||
continue;
|
||||
if (newinfo->hook_entry[i] == 0xFFFFFFFF)
|
||||
goto out_free;
|
||||
if (newinfo->underflow[i] == 0xFFFFFFFF)
|
||||
goto out_free;
|
||||
}
|
||||
ret = xt_check_table_hooks(newinfo, repl->valid_hooks);
|
||||
if (ret)
|
||||
goto out_free;
|
||||
|
||||
if (!mark_source_chains(newinfo, repl->valid_hooks, entry0, offsets)) {
|
||||
ret = -ELOOP;
|
||||
|
@ -518,6 +518,35 @@ static int xt_check_entry_match(const char *match, const char *target,
|
||||
return 0;
|
||||
}
|
||||
|
||||
/** xt_check_table_hooks - check hook entry points are sane
|
||||
*
|
||||
* @info xt_table_info to check
|
||||
* @valid_hooks - hook entry points that we can enter from
|
||||
*
|
||||
* Validates that the hook entry and underflows points are set up.
|
||||
*
|
||||
* Return: 0 on success, negative errno on failure.
|
||||
*/
|
||||
int xt_check_table_hooks(const struct xt_table_info *info, unsigned int valid_hooks)
|
||||
{
|
||||
unsigned int i;
|
||||
|
||||
BUILD_BUG_ON(ARRAY_SIZE(info->hook_entry) != ARRAY_SIZE(info->underflow));
|
||||
|
||||
for (i = 0; i < ARRAY_SIZE(info->hook_entry); i++) {
|
||||
if (!(valid_hooks & (1 << i)))
|
||||
continue;
|
||||
|
||||
if (info->hook_entry[i] == 0xFFFFFFFF)
|
||||
return -EINVAL;
|
||||
if (info->underflow[i] == 0xFFFFFFFF)
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
EXPORT_SYMBOL(xt_check_table_hooks);
|
||||
|
||||
#ifdef CONFIG_COMPAT
|
||||
int xt_compat_add_offset(u_int8_t af, unsigned int offset, int delta)
|
||||
{
|
||||
|
Loading…
Reference in New Issue
Block a user