lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20190508183114.7507-1-j.k.motwani@gmail.com> Date: Thu, 9 May 2019 00:01:14 +0530 From: Jagdish Motwani <j.k.motwani@...il.com> To: netdev@...r.kernel.org Cc: j.k.motwani@...il.com, Jagdish Motwani <jagdish.motwani@...hos.com>, Pablo Neira Ayuso <pablo@...filter.org>, Jozsef Kadlecsik <kadlec@...ckhole.kfki.hu>, Florian Westphal <fw@...len.de>, "David S. Miller" <davem@...emloft.net>, netfilter-devel@...r.kernel.org, coreteam@...filter.org, linux-kernel@...r.kernel.org Subject: [PATCH net] netfilter: nf_queue:fix reinject verdict handling From: Jagdish Motwani <jagdish.motwani@...hos.com> In case of more than 1 nf_queues, hooks between them are being executed more than once. Signed-off-by: Jagdish Motwani <jagdish.motwani@...hos.com> --- net/netfilter/nf_queue.c | 1 + 1 file changed, 1 insertion(+) diff --git a/net/netfilter/nf_queue.c b/net/netfilter/nf_queue.c index 9dc1d6e..b5b2be5 100644 --- a/net/netfilter/nf_queue.c +++ b/net/netfilter/nf_queue.c @@ -255,6 +255,7 @@ static unsigned int nf_iterate(struct sk_buff *skb, repeat: verdict = nf_hook_entry_hookfn(hook, skb, state); if (verdict != NF_ACCEPT) { + *index = i; if (verdict != NF_REPEAT) return verdict; goto repeat; -- 2.9.5
Powered by blists - more mailing lists