mirror of
https://github.com/torvalds/linux.git
synced 2024-12-27 05:11:48 +00:00
netfilter: ipset: Coding style fixes
Signed-off-by: Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
This commit is contained in:
parent
10111a6ef3
commit
3ace95c0ac
@ -255,7 +255,7 @@ struct ip_set_type_variant {
|
|||||||
* returns negative error code,
|
* returns negative error code,
|
||||||
* zero for no match/success to add/delete
|
* zero for no match/success to add/delete
|
||||||
* positive for matching element */
|
* positive for matching element */
|
||||||
int (*kadt)(struct ip_set *set, const struct sk_buff * skb,
|
int (*kadt)(struct ip_set *set, const struct sk_buff *skb,
|
||||||
const struct xt_action_param *par,
|
const struct xt_action_param *par,
|
||||||
enum ipset_adt adt, const struct ip_set_adt_opt *opt);
|
enum ipset_adt adt, const struct ip_set_adt_opt *opt);
|
||||||
|
|
||||||
@ -430,7 +430,8 @@ static inline int nla_put_ipaddr4(struct sk_buff *skb, int type, __be32 ipaddr)
|
|||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
static inline int nla_put_ipaddr6(struct sk_buff *skb, int type, const struct in6_addr *ipaddrptr)
|
static inline int nla_put_ipaddr6(struct sk_buff *skb, int type,
|
||||||
|
const struct in6_addr *ipaddrptr)
|
||||||
{
|
{
|
||||||
struct nlattr *__nested = ipset_nest_start(skb, type);
|
struct nlattr *__nested = ipset_nest_start(skb, type);
|
||||||
int ret;
|
int ret;
|
||||||
|
@ -696,7 +696,7 @@ nla_put_failure:
|
|||||||
}
|
}
|
||||||
|
|
||||||
static int
|
static int
|
||||||
type_pf_kadt(struct ip_set *set, const struct sk_buff * skb,
|
type_pf_kadt(struct ip_set *set, const struct sk_buff *skb,
|
||||||
const struct xt_action_param *par,
|
const struct xt_action_param *par,
|
||||||
enum ipset_adt adt, const struct ip_set_adt_opt *opt);
|
enum ipset_adt adt, const struct ip_set_adt_opt *opt);
|
||||||
static int
|
static int
|
||||||
|
@ -323,11 +323,11 @@ bitmap_ipmac_tlist(const struct ip_set *set,
|
|||||||
(elem->match == MAC_FILLED &&
|
(elem->match == MAC_FILLED &&
|
||||||
nla_put(skb, IPSET_ATTR_ETHER, ETH_ALEN,
|
nla_put(skb, IPSET_ATTR_ETHER, ETH_ALEN,
|
||||||
elem->ether)))
|
elem->ether)))
|
||||||
goto nla_put_failure;
|
goto nla_put_failure;
|
||||||
timeout = elem->match == MAC_UNSET ? elem->timeout
|
timeout = elem->match == MAC_UNSET ? elem->timeout
|
||||||
: ip_set_timeout_get(elem->timeout);
|
: ip_set_timeout_get(elem->timeout);
|
||||||
if (nla_put_net32(skb, IPSET_ATTR_TIMEOUT, htonl(timeout)))
|
if (nla_put_net32(skb, IPSET_ATTR_TIMEOUT, htonl(timeout)))
|
||||||
goto nla_put_failure;
|
goto nla_put_failure;
|
||||||
ipset_nest_end(skb, nested);
|
ipset_nest_end(skb, nested);
|
||||||
}
|
}
|
||||||
ipset_nest_end(skb, atd);
|
ipset_nest_end(skb, atd);
|
||||||
|
@ -69,7 +69,8 @@ find_set_type(const char *name, u8 family, u8 revision)
|
|||||||
|
|
||||||
list_for_each_entry_rcu(type, &ip_set_type_list, list)
|
list_for_each_entry_rcu(type, &ip_set_type_list, list)
|
||||||
if (STREQ(type->name, name) &&
|
if (STREQ(type->name, name) &&
|
||||||
(type->family == family || type->family == NFPROTO_UNSPEC) &&
|
(type->family == family ||
|
||||||
|
type->family == NFPROTO_UNSPEC) &&
|
||||||
revision >= type->revision_min &&
|
revision >= type->revision_min &&
|
||||||
revision <= type->revision_max)
|
revision <= type->revision_max)
|
||||||
return type;
|
return type;
|
||||||
@ -149,7 +150,8 @@ __find_set_type_minmax(const char *name, u8 family, u8 *min, u8 *max,
|
|||||||
rcu_read_lock();
|
rcu_read_lock();
|
||||||
list_for_each_entry_rcu(type, &ip_set_type_list, list)
|
list_for_each_entry_rcu(type, &ip_set_type_list, list)
|
||||||
if (STREQ(type->name, name) &&
|
if (STREQ(type->name, name) &&
|
||||||
(type->family == family || type->family == NFPROTO_UNSPEC)) {
|
(type->family == family ||
|
||||||
|
type->family == NFPROTO_UNSPEC)) {
|
||||||
found = true;
|
found = true;
|
||||||
if (type->revision_min < *min)
|
if (type->revision_min < *min)
|
||||||
*min = type->revision_min;
|
*min = type->revision_min;
|
||||||
@ -721,7 +723,8 @@ ip_set_create(struct sock *ctnl, struct sk_buff *skb,
|
|||||||
* by the nfnl mutex. Find the first free index in ip_set_list
|
* by the nfnl mutex. Find the first free index in ip_set_list
|
||||||
* and check clashing.
|
* and check clashing.
|
||||||
*/
|
*/
|
||||||
if ((ret = find_free_id(set->name, &index, &clash)) != 0) {
|
ret = find_free_id(set->name, &index, &clash);
|
||||||
|
if (ret != 0) {
|
||||||
/* If this is the same set and requested, ignore error */
|
/* If this is the same set and requested, ignore error */
|
||||||
if (ret == -EEXIST &&
|
if (ret == -EEXIST &&
|
||||||
(flags & IPSET_FLAG_EXIST) &&
|
(flags & IPSET_FLAG_EXIST) &&
|
||||||
|
Loading…
Reference in New Issue
Block a user