lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 2 Mar 2016 12:20:29 +0100 From: Phil Sutter <phil@....cc> To: Stephen Hemminger <shemming@...cade.com> Cc: netdev@...r.kernel.org Subject: [iproute PATCH 1/3] tc: pedit: Fix layered op parsing After lookup of the layered op submodule, pedit would pass argv and argc including the layered op identifier at first position which confused the submodule parser. Fix this by calling NEXT_ARG() before calling the parse_peopt() callback. Signed-off-by: Phil Sutter <phil@....cc> --- tc/m_pedit.c | 1 + 1 file changed, 1 insertion(+) diff --git a/tc/m_pedit.c b/tc/m_pedit.c index 4fdd189d7d9c6..455e4ffd4b2bb 100644 --- a/tc/m_pedit.c +++ b/tc/m_pedit.c @@ -421,6 +421,7 @@ parse_munge(int *argc_p, char ***argv_p,struct tc_pedit_sel *sel) p = get_pedit_kind(k); if (NULL == p) goto bad_val; + NEXT_ARG(); res = p->parse_peopt(&argc, &argv, sel,&tkey); if (res < 0) { fprintf(stderr,"bad pedit parsing\n"); -- 2.7.2
Powered by blists - more mailing lists