diff options
| author | Florian Westphal <fw@strlen.de> | 2018-07-06 20:06:05 +0200 |
|---|---|---|
| committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2018-08-24 13:09:15 +0200 |
| commit | a76e62b50dc0fb869a5371448395700eb3d31bd3 (patch) | |
| tree | dfdd336be423443d1f9ff6d859f3aed846e62a3f /tools/perf/util/scripting-engines/trace-event-python.c | |
| parent | afd13311ee014d52b2d1ca9c452a157b836d987f (diff) | |
netfilter: nft_compat: explicitly reject ERROR and standard target
[ Upstream commit 21d5e078192d244df3d6049f9464fff2f72cfd68 ]
iptables-nft never requests these, but make this explicitly illegal.
If it were quested, kernel could oops as ->eval is NULL, furthermore,
the builtin targets have no owning module so its possible to rmmod
eb/ip/ip6_tables module even if they would be loaded.
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Signed-off-by: Sasha Levin <alexander.levin@microsoft.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'tools/perf/util/scripting-engines/trace-event-python.c')
0 files changed, 0 insertions, 0 deletions
