Skip to content

Commit f90d2d3

Browse files
Florian Westphalummakynes
authored andcommitted
netfilter: ipset: allow a 0 netmask with hash_netiface type
Jozsef says: The correct behaviour is that if we have ipset create test1 hash:net,iface ipset add test1 0.0.0.0/0,eth0 iptables -A INPUT -m set --match-set test1 src,src then the rule should match for any traffic coming in through eth0. This removes the -EINVAL runtime test to make matching work in case packet arrived via the specified interface. Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1297092 Signed-off-by: Florian Westphal <fw@strlen.de> Acked-by: Jozsef Kadlecsik <kadlec@blackhole.kfki.hu> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
1 parent 4b8c4ed commit f90d2d3

File tree

1 file changed

+0
-4
lines changed

1 file changed

+0
-4
lines changed

net/netfilter/ipset/ip_set_hash_netiface.c

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -164,8 +164,6 @@ hash_netiface4_kadt(struct ip_set *set, const struct sk_buff *skb,
164164
};
165165
struct ip_set_ext ext = IP_SET_INIT_KEXT(skb, opt, set);
166166

167-
if (e.cidr == 0)
168-
return -EINVAL;
169167
if (adt == IPSET_TEST)
170168
e.cidr = HOST_MASK;
171169

@@ -377,8 +375,6 @@ hash_netiface6_kadt(struct ip_set *set, const struct sk_buff *skb,
377375
};
378376
struct ip_set_ext ext = IP_SET_INIT_KEXT(skb, opt, set);
379377

380-
if (e.cidr == 0)
381-
return -EINVAL;
382378
if (adt == IPSET_TEST)
383379
e.cidr = HOST_MASK;
384380

0 commit comments

Comments
 (0)