Merge branch 'master' of git://blackhole.kfki.hu/nf
Jozsef Kadlecsik says: ==================== ipset patches for nf Please apply the next patches for ipset in your nf branch. Both patches should go into the stable kernel branches as well, because these are important bugfixes: * Sometimes valid entries in hash:* types of sets were evicted due to a typo in an index. The wrong evictions happen when entries are deleted from the set and the bucket is shrinked. Bug was reported by Eric Ewanco and the patch fixes netfilter bugzilla id #1119. * Fixing of a null pointer exception when someone wants to add an entry to an empty list type of set and specifies an add before/after option. The fix is from Vishwanath Pai. ==================== Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
This commit is contained in:
commit
3ef767e5cb
|
@ -897,7 +897,7 @@ mtype_del(struct ip_set *set, void *value, const struct ip_set_ext *ext,
|
||||||
continue;
|
continue;
|
||||||
data = ahash_data(n, j, dsize);
|
data = ahash_data(n, j, dsize);
|
||||||
memcpy(tmp->value + k * dsize, data, dsize);
|
memcpy(tmp->value + k * dsize, data, dsize);
|
||||||
set_bit(j, tmp->used);
|
set_bit(k, tmp->used);
|
||||||
k++;
|
k++;
|
||||||
}
|
}
|
||||||
tmp->pos = k;
|
tmp->pos = k;
|
||||||
|
|
|
@ -260,11 +260,14 @@ list_set_uadd(struct ip_set *set, void *value, const struct ip_set_ext *ext,
|
||||||
else
|
else
|
||||||
prev = e;
|
prev = e;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/* If before/after is used on an empty set */
|
||||||
|
if ((d->before > 0 && !next) ||
|
||||||
|
(d->before < 0 && !prev))
|
||||||
|
return -IPSET_ERR_REF_EXIST;
|
||||||
|
|
||||||
/* Re-add already existing element */
|
/* Re-add already existing element */
|
||||||
if (n) {
|
if (n) {
|
||||||
if ((d->before > 0 && !next) ||
|
|
||||||
(d->before < 0 && !prev))
|
|
||||||
return -IPSET_ERR_REF_EXIST;
|
|
||||||
if (!flag_exist)
|
if (!flag_exist)
|
||||||
return -IPSET_ERR_EXIST;
|
return -IPSET_ERR_EXIST;
|
||||||
/* Update extensions */
|
/* Update extensions */
|
||||||
|
|
Loading…
Reference in New Issue