aboutsummaryrefslogtreecommitdiff
path: root/tools/perf/util/scripting-engines/trace-event-python.c
diff options
context:
space:
mode:
authorFlorian Westphal <fw@strlen.de>2018-07-06 20:06:05 +0200
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2018-08-24 13:09:15 +0200
commita76e62b50dc0fb869a5371448395700eb3d31bd3 (patch)
treedfdd336be423443d1f9ff6d859f3aed846e62a3f /tools/perf/util/scripting-engines/trace-event-python.c
parentafd13311ee014d52b2d1ca9c452a157b836d987f (diff)
netfilter: nft_compat: explicitly reject ERROR and standard target
[ Upstream commit 21d5e078192d244df3d6049f9464fff2f72cfd68 ] iptables-nft never requests these, but make this explicitly illegal. If it were quested, kernel could oops as ->eval is NULL, furthermore, the builtin targets have no owning module so its possible to rmmod eb/ip/ip6_tables module even if they would be loaded. Signed-off-by: Florian Westphal <fw@strlen.de> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org> Signed-off-by: Sasha Levin <alexander.levin@microsoft.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'tools/perf/util/scripting-engines/trace-event-python.c')
0 files changed, 0 insertions, 0 deletions