2
0
mirror of https://github.com/edk2-porting/linux-next.git synced 2024-12-17 17:53:56 +08:00

netfilter 01/09: remove "happy cracking" message

Don't spam logs for locally generated short packets. these can only
be generated by root.

Signed-off-by: Patrick McHardy <kaber@trash.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
Patrick McHardy 2009-01-12 00:06:00 +00:00 committed by David S. Miller
parent 985ebdb5ed
commit 88843104a1
5 changed files with 5 additions and 25 deletions

View File

@ -93,13 +93,8 @@ ipt_local_out_hook(unsigned int hook,
{
/* root is playing with raw sockets. */
if (skb->len < sizeof(struct iphdr) ||
ip_hdrlen(skb) < sizeof(struct iphdr)) {
if (net_ratelimit())
printk("iptable_filter: ignoring short SOCK_RAW "
"packet.\n");
ip_hdrlen(skb) < sizeof(struct iphdr))
return NF_ACCEPT;
}
return ipt_do_table(skb, hook, in, out,
dev_net(out)->ipv4.iptable_filter);
}

View File

@ -132,12 +132,8 @@ ipt_local_hook(unsigned int hook,
/* root is playing with raw sockets. */
if (skb->len < sizeof(struct iphdr)
|| ip_hdrlen(skb) < sizeof(struct iphdr)) {
if (net_ratelimit())
printk("iptable_mangle: ignoring short SOCK_RAW "
"packet.\n");
|| ip_hdrlen(skb) < sizeof(struct iphdr))
return NF_ACCEPT;
}
/* Save things which could affect route */
mark = skb->mark;

View File

@ -65,12 +65,8 @@ ipt_local_hook(unsigned int hook,
{
/* root is playing with raw sockets. */
if (skb->len < sizeof(struct iphdr) ||
ip_hdrlen(skb) < sizeof(struct iphdr)) {
if (net_ratelimit())
printk("iptable_raw: ignoring short SOCK_RAW "
"packet.\n");
ip_hdrlen(skb) < sizeof(struct iphdr))
return NF_ACCEPT;
}
return ipt_do_table(skb, hook, in, out,
dev_net(out)->ipv4.iptable_raw);
}

View File

@ -96,12 +96,8 @@ ipt_local_out_hook(unsigned int hook,
{
/* Somebody is playing with raw sockets. */
if (skb->len < sizeof(struct iphdr)
|| ip_hdrlen(skb) < sizeof(struct iphdr)) {
if (net_ratelimit())
printk(KERN_INFO "iptable_security: ignoring short "
"SOCK_RAW packet.\n");
|| ip_hdrlen(skb) < sizeof(struct iphdr))
return NF_ACCEPT;
}
return ipt_do_table(skb, hook, in, out,
dev_net(out)->ipv4.iptable_security);
}

View File

@ -145,11 +145,8 @@ static unsigned int ipv4_conntrack_local(unsigned int hooknum,
{
/* root is playing with raw sockets. */
if (skb->len < sizeof(struct iphdr) ||
ip_hdrlen(skb) < sizeof(struct iphdr)) {
if (net_ratelimit())
printk("ipt_hook: happy cracking.\n");
ip_hdrlen(skb) < sizeof(struct iphdr))
return NF_ACCEPT;
}
return nf_conntrack_in(dev_net(out), PF_INET, hooknum, skb);
}