summaryrefslogtreecommitdiffstats
path: root/include/linux/netfilter
diff options
context:
space:
mode:
authorFlorian Westphal <fw@strlen.de>2012-05-10 22:11:54 +0000
committerPablo Neira Ayuso <pablo@netfilter.org>2012-05-17 00:56:31 +0200
commit1f27e2516c1d95ae19024bec5be68a3f489cc47e (patch)
tree9eeb1a8d5b8248ec36602198aeafaf9e07e7fcc5 /include/linux/netfilter
parent6d8823db422ae6719c7840fe11f737a40ffe4993 (diff)
downloadlinux-stable-1f27e2516c1d95ae19024bec5be68a3f489cc47e.tar.gz
linux-stable-1f27e2516c1d95ae19024bec5be68a3f489cc47e.tar.bz2
linux-stable-1f27e2516c1d95ae19024bec5be68a3f489cc47e.zip
netfilter: xt_hashlimit: use _ALL macro to reject unknown flag bits
David Miller says: The canonical way to validate if the set bits are in a valid range is to have a "_ALL" macro, and test: if (val & ~XT_HASHLIMIT_ALL) goto err;" make it so. Signed-off-by: Florian Westphal <fw@strlen.de> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Diffstat (limited to 'include/linux/netfilter')
-rw-r--r--include/linux/netfilter/xt_hashlimit.h6
1 files changed, 4 insertions, 2 deletions
diff --git a/include/linux/netfilter/xt_hashlimit.h b/include/linux/netfilter/xt_hashlimit.h
index 05fe7993dd76..c42e52f39f8f 100644
--- a/include/linux/netfilter/xt_hashlimit.h
+++ b/include/linux/netfilter/xt_hashlimit.h
@@ -22,10 +22,12 @@ enum {
XT_HASHLIMIT_HASH_SPT = 1 << 3,
XT_HASHLIMIT_INVERT = 1 << 4,
XT_HASHLIMIT_BYTES = 1 << 5,
+};
#ifdef __KERNEL__
- XT_HASHLIMIT_MAX = 1 << 6,
+#define XT_HASHLIMIT_ALL (XT_HASHLIMIT_HASH_DIP | XT_HASHLIMIT_HASH_DPT | \
+ XT_HASHLIMIT_HASH_SIP | XT_HASHLIMIT_HASH_SPT | \
+ XT_HASHLIMIT_INVERT | XT_HASHLIMIT_BYTES)
#endif
-};
struct hashlimit_cfg {
__u32 mode; /* bitmask of XT_HASHLIMIT_HASH_* */