597 lines
12 KiB
Diff
597 lines
12 KiB
Diff
|
Rename xfree() to libnftnl_xfree() to avoid symbol naming conflict
|
||
|
|
||
|
When ELF binaries and shared libraries are used, the internal
|
||
|
functions of libnftnl such as xfree() are not visible to the outside
|
||
|
world (their visibility is 'hidden'). Therefore, the fact that other
|
||
|
programs (especially nftables) may have symbols with the same name
|
||
|
does not cause any problem.
|
||
|
|
||
|
However, when doing static linking on a non-ELF platform (such as
|
||
|
Blackfin, which uses the FLAT binary format), there is no way of
|
||
|
encoding this visibility. Therefore, the xfree() symbols of libnftnl
|
||
|
becomes visible to the outside world, causing a conflict with the
|
||
|
xfree() symbol defined by nftables.
|
||
|
|
||
|
To solve this, this patch renames the libnftnl xfree() function to
|
||
|
libnftnl_xfree().
|
||
|
|
||
|
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
|
||
|
|
||
|
Index: b/src/chain.c
|
||
|
===================================================================
|
||
|
--- a/src/chain.c
|
||
|
+++ b/src/chain.c
|
||
|
@@ -88,11 +88,11 @@
|
||
|
void nft_chain_free(struct nft_chain *c)
|
||
|
{
|
||
|
if (c->table != NULL)
|
||
|
- xfree(c->table);
|
||
|
+ nftnl_xfree(c->table);
|
||
|
if (c->type != NULL)
|
||
|
- xfree(c->type);
|
||
|
+ nftnl_xfree(c->type);
|
||
|
|
||
|
- xfree(c);
|
||
|
+ nftnl_xfree(c);
|
||
|
}
|
||
|
EXPORT_SYMBOL(nft_chain_free);
|
||
|
|
||
|
@@ -110,7 +110,7 @@
|
||
|
switch (attr) {
|
||
|
case NFT_CHAIN_ATTR_TABLE:
|
||
|
if (c->table) {
|
||
|
- xfree(c->table);
|
||
|
+ nftnl_xfree(c->table);
|
||
|
c->table = NULL;
|
||
|
}
|
||
|
break;
|
||
|
@@ -119,7 +119,7 @@
|
||
|
return;
|
||
|
case NFT_CHAIN_ATTR_TYPE:
|
||
|
if (c->type) {
|
||
|
- xfree(c->type);
|
||
|
+ nftnl_xfree(c->type);
|
||
|
c->type = NULL;
|
||
|
}
|
||
|
break;
|
||
|
@@ -164,7 +164,7 @@
|
||
|
break;
|
||
|
case NFT_CHAIN_ATTR_TABLE:
|
||
|
if (c->table)
|
||
|
- xfree(c->table);
|
||
|
+ nftnl_xfree(c->table);
|
||
|
|
||
|
c->table = strdup(data);
|
||
|
break;
|
||
|
@@ -194,7 +194,7 @@
|
||
|
break;
|
||
|
case NFT_CHAIN_ATTR_TYPE:
|
||
|
if (c->type)
|
||
|
- xfree(c->type);
|
||
|
+ nftnl_xfree(c->type);
|
||
|
|
||
|
c->type = strdup(data);
|
||
|
break;
|
||
|
@@ -714,7 +714,7 @@
|
||
|
return -1;
|
||
|
|
||
|
if (c->table)
|
||
|
- xfree(c->table);
|
||
|
+ nftnl_xfree(c->table);
|
||
|
|
||
|
c->table = strdup(table);
|
||
|
c->flags |= (1 << NFT_CHAIN_ATTR_TABLE);
|
||
|
@@ -743,7 +743,7 @@
|
||
|
return -1;
|
||
|
|
||
|
if (c->type)
|
||
|
- xfree(c->type);
|
||
|
+ nftnl_xfree(c->type);
|
||
|
|
||
|
c->type = strdup(type);
|
||
|
c->flags |= (1 << NFT_CHAIN_ATTR_TYPE);
|
||
|
@@ -991,7 +991,7 @@
|
||
|
list_del(&r->head);
|
||
|
nft_chain_free(r);
|
||
|
}
|
||
|
- xfree(list);
|
||
|
+ nftnl_xfree(list);
|
||
|
}
|
||
|
EXPORT_SYMBOL(nft_chain_list_free);
|
||
|
|
||
|
@@ -1070,6 +1070,6 @@
|
||
|
|
||
|
void nft_chain_list_iter_destroy(struct nft_chain_list_iter *iter)
|
||
|
{
|
||
|
- xfree(iter);
|
||
|
+ nftnl_xfree(iter);
|
||
|
}
|
||
|
EXPORT_SYMBOL(nft_chain_list_iter_destroy);
|
||
|
Index: b/src/common.c
|
||
|
===================================================================
|
||
|
--- a/src/common.c
|
||
|
+++ b/src/common.c
|
||
|
@@ -45,7 +45,7 @@
|
||
|
|
||
|
void nft_parse_err_free(struct nft_parse_err *err)
|
||
|
{
|
||
|
- xfree(err);
|
||
|
+ nftnl_xfree(err);
|
||
|
}
|
||
|
EXPORT_SYMBOL(nft_parse_err_free);
|
||
|
|
||
|
Index: b/src/expr.c
|
||
|
===================================================================
|
||
|
--- a/src/expr.c
|
||
|
+++ b/src/expr.c
|
||
|
@@ -52,7 +52,7 @@
|
||
|
if (expr->ops->free)
|
||
|
expr->ops->free(expr);
|
||
|
|
||
|
- xfree(expr);
|
||
|
+ nftnl_xfree(expr);
|
||
|
}
|
||
|
EXPORT_SYMBOL(nft_rule_expr_free);
|
||
|
|
||
|
Index: b/src/expr/data_reg.c
|
||
|
===================================================================
|
||
|
--- a/src/expr/data_reg.c
|
||
|
+++ b/src/expr/data_reg.c
|
||
|
@@ -130,7 +130,7 @@
|
||
|
NFT_XML_OPT, err);
|
||
|
if (chain != NULL) {
|
||
|
if (reg->chain)
|
||
|
- xfree(reg->chain);
|
||
|
+ nftnl_xfree(reg->chain);
|
||
|
|
||
|
reg->chain = strdup(chain);
|
||
|
}
|
||
|
Index: b/src/expr/immediate.c
|
||
|
===================================================================
|
||
|
--- a/src/expr/immediate.c
|
||
|
+++ b/src/expr/immediate.c
|
||
|
@@ -46,7 +46,7 @@
|
||
|
break;
|
||
|
case NFT_EXPR_IMM_CHAIN:
|
||
|
if (imm->data.chain)
|
||
|
- xfree(imm->data.chain);
|
||
|
+ nftnl_xfree(imm->data.chain);
|
||
|
|
||
|
imm->data.chain = strdup(data);
|
||
|
break;
|
||
|
Index: b/src/expr/log.c
|
||
|
===================================================================
|
||
|
--- a/src/expr/log.c
|
||
|
+++ b/src/expr/log.c
|
||
|
@@ -37,7 +37,7 @@
|
||
|
switch(type) {
|
||
|
case NFT_EXPR_LOG_PREFIX:
|
||
|
if (log->prefix)
|
||
|
- xfree(log->prefix);
|
||
|
+ nftnl_xfree(log->prefix);
|
||
|
|
||
|
log->prefix = strdup(data);
|
||
|
break;
|
||
|
@@ -139,7 +139,7 @@
|
||
|
|
||
|
if (tb[NFTA_LOG_PREFIX]) {
|
||
|
if (log->prefix)
|
||
|
- xfree(log->prefix);
|
||
|
+ nftnl_xfree(log->prefix);
|
||
|
|
||
|
log->prefix = strdup(mnl_attr_get_str(tb[NFTA_LOG_PREFIX]));
|
||
|
e->flags |= (1 << NFT_EXPR_LOG_PREFIX);
|
||
|
@@ -320,7 +320,7 @@
|
||
|
{
|
||
|
struct nft_expr_log *log = nft_expr_data(e);
|
||
|
|
||
|
- xfree(log->prefix);
|
||
|
+ nftnl_xfree(log->prefix);
|
||
|
}
|
||
|
|
||
|
struct expr_ops expr_ops_log = {
|
||
|
Index: b/src/expr/match.c
|
||
|
===================================================================
|
||
|
--- a/src/expr/match.c
|
||
|
+++ b/src/expr/match.c
|
||
|
@@ -50,7 +50,7 @@
|
||
|
break;
|
||
|
case NFT_EXPR_MT_INFO:
|
||
|
if (mt->data)
|
||
|
- xfree(mt->data);
|
||
|
+ nftnl_xfree(mt->data);
|
||
|
|
||
|
mt->data = data;
|
||
|
mt->data_len = data_len;
|
||
|
@@ -153,7 +153,7 @@
|
||
|
void *match_data;
|
||
|
|
||
|
if (match->data)
|
||
|
- xfree(match->data);
|
||
|
+ nftnl_xfree(match->data);
|
||
|
|
||
|
match_data = calloc(1, len);
|
||
|
if (match_data == NULL)
|
||
|
@@ -261,7 +261,7 @@
|
||
|
{
|
||
|
struct nft_expr_match *match = nft_expr_data(e);
|
||
|
|
||
|
- xfree(match->data);
|
||
|
+ nftnl_xfree(match->data);
|
||
|
}
|
||
|
|
||
|
struct expr_ops expr_ops_match = {
|
||
|
Index: b/src/expr/target.c
|
||
|
===================================================================
|
||
|
--- a/src/expr/target.c
|
||
|
+++ b/src/expr/target.c
|
||
|
@@ -50,7 +50,7 @@
|
||
|
break;
|
||
|
case NFT_EXPR_TG_INFO:
|
||
|
if (tg->data)
|
||
|
- xfree(tg->data);
|
||
|
+ nftnl_xfree(tg->data);
|
||
|
|
||
|
tg->data = data;
|
||
|
tg->data_len = data_len;
|
||
|
@@ -153,7 +153,7 @@
|
||
|
void *target_data;
|
||
|
|
||
|
if (target->data)
|
||
|
- xfree(target->data);
|
||
|
+ nftnl_xfree(target->data);
|
||
|
|
||
|
target_data = calloc(1, len);
|
||
|
if (target_data == NULL)
|
||
|
@@ -262,7 +262,7 @@
|
||
|
{
|
||
|
struct nft_expr_target *target = nft_expr_data(e);
|
||
|
|
||
|
- xfree(target->data);
|
||
|
+ nftnl_xfree(target->data);
|
||
|
}
|
||
|
|
||
|
struct expr_ops expr_ops_target = {
|
||
|
Index: b/src/internal.h
|
||
|
===================================================================
|
||
|
--- a/src/internal.h
|
||
|
+++ b/src/internal.h
|
||
|
@@ -143,7 +143,7 @@
|
||
|
uint32_t format, uint32_t flags);
|
||
|
int nft_event_footer_fprintf(FILE *fp, uint32_t format, uint32_t flags);
|
||
|
|
||
|
-void xfree(const void *ptr);
|
||
|
+void nftnl_xfree(const void *ptr);
|
||
|
|
||
|
struct expr_ops;
|
||
|
|
||
|
Index: b/src/mxml.c
|
||
|
===================================================================
|
||
|
--- a/src/mxml.c
|
||
|
+++ b/src/mxml.c
|
||
|
@@ -82,7 +82,7 @@
|
||
|
goto err_expr;
|
||
|
|
||
|
tree = mxmlLoadString(NULL, xml_text, MXML_OPAQUE_CALLBACK);
|
||
|
- xfree(xml_text);
|
||
|
+ nftnl_xfree(xml_text);
|
||
|
|
||
|
if (tree == NULL)
|
||
|
goto err_expr;
|
||
|
Index: b/src/rule.c
|
||
|
===================================================================
|
||
|
--- a/src/rule.c
|
||
|
+++ b/src/rule.c
|
||
|
@@ -74,11 +74,11 @@
|
||
|
nft_rule_expr_free(e);
|
||
|
|
||
|
if (r->table != NULL)
|
||
|
- xfree(r->table);
|
||
|
+ nftnl_xfree(r->table);
|
||
|
if (r->chain != NULL)
|
||
|
- xfree(r->chain);
|
||
|
+ nftnl_xfree(r->chain);
|
||
|
|
||
|
- xfree(r);
|
||
|
+ nftnl_xfree(r);
|
||
|
}
|
||
|
EXPORT_SYMBOL(nft_rule_free);
|
||
|
|
||
|
@@ -96,13 +96,13 @@
|
||
|
switch (attr) {
|
||
|
case NFT_RULE_ATTR_TABLE:
|
||
|
if (r->table) {
|
||
|
- xfree(r->table);
|
||
|
+ nftnl_xfree(r->table);
|
||
|
r->table = NULL;
|
||
|
}
|
||
|
break;
|
||
|
case NFT_RULE_ATTR_CHAIN:
|
||
|
if (r->chain) {
|
||
|
- xfree(r->chain);
|
||
|
+ nftnl_xfree(r->chain);
|
||
|
r->chain = NULL;
|
||
|
}
|
||
|
break;
|
||
|
@@ -138,13 +138,13 @@
|
||
|
switch(attr) {
|
||
|
case NFT_RULE_ATTR_TABLE:
|
||
|
if (r->table)
|
||
|
- xfree(r->table);
|
||
|
+ nftnl_xfree(r->table);
|
||
|
|
||
|
r->table = strdup(data);
|
||
|
break;
|
||
|
case NFT_RULE_ATTR_CHAIN:
|
||
|
if (r->chain)
|
||
|
- xfree(r->chain);
|
||
|
+ nftnl_xfree(r->chain);
|
||
|
|
||
|
r->chain = strdup(data);
|
||
|
break;
|
||
|
@@ -408,7 +408,7 @@
|
||
|
|
||
|
if (tb[NFTA_EXPR_DATA]) {
|
||
|
if (expr->ops->parse(expr, tb[NFTA_EXPR_DATA]) < 0) {
|
||
|
- xfree(expr);
|
||
|
+ nftnl_xfree(expr);
|
||
|
return -1;
|
||
|
}
|
||
|
}
|
||
|
@@ -506,7 +506,7 @@
|
||
|
mnl_attr_get_payload(tb[NFTA_RULE_USERDATA]);
|
||
|
|
||
|
if (r->user.data)
|
||
|
- xfree(r->user.data);
|
||
|
+ nftnl_xfree(r->user.data);
|
||
|
|
||
|
r->user.len = mnl_attr_get_payload_len(tb[NFTA_RULE_USERDATA]);
|
||
|
|
||
|
@@ -1074,7 +1074,7 @@
|
||
|
|
||
|
void nft_rule_expr_iter_destroy(struct nft_rule_expr_iter *iter)
|
||
|
{
|
||
|
- xfree(iter);
|
||
|
+ nftnl_xfree(iter);
|
||
|
}
|
||
|
EXPORT_SYMBOL(nft_rule_expr_iter_destroy);
|
||
|
|
||
|
@@ -1104,7 +1104,7 @@
|
||
|
list_del(&r->head);
|
||
|
nft_rule_free(r);
|
||
|
}
|
||
|
- xfree(list);
|
||
|
+ nftnl_xfree(list);
|
||
|
}
|
||
|
EXPORT_SYMBOL(nft_rule_list_free);
|
||
|
|
||
|
@@ -1189,6 +1189,6 @@
|
||
|
|
||
|
void nft_rule_list_iter_destroy(struct nft_rule_list_iter *iter)
|
||
|
{
|
||
|
- xfree(iter);
|
||
|
+ nftnl_xfree(iter);
|
||
|
}
|
||
|
EXPORT_SYMBOL(nft_rule_list_iter_destroy);
|
||
|
Index: b/src/ruleset.c
|
||
|
===================================================================
|
||
|
--- a/src/ruleset.c
|
||
|
+++ b/src/ruleset.c
|
||
|
@@ -48,7 +48,7 @@
|
||
|
nft_set_list_free(r->set_list);
|
||
|
if (r->flags & (1 << NFT_RULESET_ATTR_RULELIST))
|
||
|
nft_rule_list_free(r->rule_list);
|
||
|
- xfree(r);
|
||
|
+ nftnl_xfree(r);
|
||
|
}
|
||
|
EXPORT_SYMBOL(nft_ruleset_free);
|
||
|
|
||
|
Index: b/src/set.c
|
||
|
===================================================================
|
||
|
--- a/src/set.c
|
||
|
+++ b/src/set.c
|
||
|
@@ -46,15 +46,15 @@
|
||
|
struct nft_set_elem *elem, *tmp;
|
||
|
|
||
|
if (s->table != NULL)
|
||
|
- xfree(s->table);
|
||
|
+ nftnl_xfree(s->table);
|
||
|
if (s->name != NULL)
|
||
|
- xfree(s->name);
|
||
|
+ nftnl_xfree(s->name);
|
||
|
|
||
|
list_for_each_entry_safe(elem, tmp, &s->element_list, head) {
|
||
|
list_del(&elem->head);
|
||
|
nft_set_elem_free(elem);
|
||
|
}
|
||
|
- xfree(s);
|
||
|
+ nftnl_xfree(s);
|
||
|
}
|
||
|
EXPORT_SYMBOL(nft_set_free);
|
||
|
|
||
|
@@ -70,14 +70,14 @@
|
||
|
case NFT_SET_ATTR_TABLE:
|
||
|
if (s->flags & (1 << NFT_SET_ATTR_TABLE))
|
||
|
if (s->table) {
|
||
|
- xfree(s->table);
|
||
|
+ nftnl_xfree(s->table);
|
||
|
s->table = NULL;
|
||
|
}
|
||
|
break;
|
||
|
case NFT_SET_ATTR_NAME:
|
||
|
if (s->flags & (1 << NFT_SET_ATTR_NAME))
|
||
|
if (s->name) {
|
||
|
- xfree(s->name);
|
||
|
+ nftnl_xfree(s->name);
|
||
|
s->name = NULL;
|
||
|
}
|
||
|
break;
|
||
|
@@ -117,13 +117,13 @@
|
||
|
switch(attr) {
|
||
|
case NFT_SET_ATTR_TABLE:
|
||
|
if (s->table)
|
||
|
- xfree(s->table);
|
||
|
+ nftnl_xfree(s->table);
|
||
|
|
||
|
s->table = strdup(data);
|
||
|
break;
|
||
|
case NFT_SET_ATTR_NAME:
|
||
|
if (s->name)
|
||
|
- xfree(s->name);
|
||
|
+ nftnl_xfree(s->name);
|
||
|
|
||
|
s->name = strdup(data);
|
||
|
break;
|
||
|
@@ -827,7 +827,7 @@
|
||
|
list_del(&s->head);
|
||
|
nft_set_free(s);
|
||
|
}
|
||
|
- xfree(list);
|
||
|
+ nftnl_xfree(list);
|
||
|
}
|
||
|
EXPORT_SYMBOL(nft_set_list_free);
|
||
|
|
||
|
@@ -911,6 +911,6 @@
|
||
|
|
||
|
void nft_set_list_iter_destroy(struct nft_set_list_iter *iter)
|
||
|
{
|
||
|
- xfree(iter);
|
||
|
+ nftnl_xfree(iter);
|
||
|
}
|
||
|
EXPORT_SYMBOL(nft_set_list_iter_destroy);
|
||
|
Index: b/src/set_elem.c
|
||
|
===================================================================
|
||
|
--- a/src/set_elem.c
|
||
|
+++ b/src/set_elem.c
|
||
|
@@ -44,11 +44,11 @@
|
||
|
{
|
||
|
if (s->flags & (1 << NFT_SET_ELEM_ATTR_CHAIN)) {
|
||
|
if (s->data.chain) {
|
||
|
- xfree(s->data.chain);
|
||
|
+ nftnl_xfree(s->data.chain);
|
||
|
s->data.chain = NULL;
|
||
|
}
|
||
|
}
|
||
|
- xfree(s);
|
||
|
+ nftnl_xfree(s);
|
||
|
}
|
||
|
EXPORT_SYMBOL(nft_set_elem_free);
|
||
|
|
||
|
@@ -64,7 +64,7 @@
|
||
|
case NFT_SET_ELEM_ATTR_CHAIN:
|
||
|
if (s->flags & (1 << NFT_SET_ELEM_ATTR_CHAIN)) {
|
||
|
if (s->data.chain) {
|
||
|
- xfree(s->data.chain);
|
||
|
+ nftnl_xfree(s->data.chain);
|
||
|
s->data.chain = NULL;
|
||
|
}
|
||
|
}
|
||
|
@@ -98,7 +98,7 @@
|
||
|
break;
|
||
|
case NFT_SET_ELEM_ATTR_CHAIN: /* NFTA_SET_ELEM_DATA */
|
||
|
if (s->data.chain)
|
||
|
- xfree(s->data.chain);
|
||
|
+ nftnl_xfree(s->data.chain);
|
||
|
|
||
|
s->data.chain = strdup(data);
|
||
|
break;
|
||
|
@@ -290,7 +290,7 @@
|
||
|
}
|
||
|
}
|
||
|
if (ret < 0) {
|
||
|
- xfree(e);
|
||
|
+ nftnl_xfree(e);
|
||
|
return -1;
|
||
|
}
|
||
|
|
||
|
@@ -708,6 +708,6 @@
|
||
|
|
||
|
void nft_set_elems_iter_destroy(struct nft_set_elems_iter *iter)
|
||
|
{
|
||
|
- xfree(iter);
|
||
|
+ nftnl_xfree(iter);
|
||
|
}
|
||
|
EXPORT_SYMBOL(nft_set_elems_iter_destroy);
|
||
|
Index: b/src/table.c
|
||
|
===================================================================
|
||
|
--- a/src/table.c
|
||
|
+++ b/src/table.c
|
||
|
@@ -44,9 +44,9 @@
|
||
|
void nft_table_free(struct nft_table *t)
|
||
|
{
|
||
|
if (t->flags & (1 << NFT_TABLE_ATTR_NAME))
|
||
|
- xfree(t->name);
|
||
|
+ nftnl_xfree(t->name);
|
||
|
|
||
|
- xfree(t);
|
||
|
+ nftnl_xfree(t);
|
||
|
}
|
||
|
EXPORT_SYMBOL(nft_table_free);
|
||
|
|
||
|
@@ -64,7 +64,7 @@
|
||
|
switch (attr) {
|
||
|
case NFT_TABLE_ATTR_NAME:
|
||
|
if (t->name) {
|
||
|
- xfree(t->name);
|
||
|
+ nftnl_xfree(t->name);
|
||
|
t->name = NULL;
|
||
|
}
|
||
|
break;
|
||
|
@@ -95,7 +95,7 @@
|
||
|
switch (attr) {
|
||
|
case NFT_TABLE_ATTR_NAME:
|
||
|
if (t->name)
|
||
|
- xfree(t->name);
|
||
|
+ nftnl_xfree(t->name);
|
||
|
|
||
|
t->name = strdup(data);
|
||
|
break;
|
||
|
@@ -270,7 +270,7 @@
|
||
|
return -1;
|
||
|
|
||
|
if (t->name)
|
||
|
- xfree(t->name);
|
||
|
+ nftnl_xfree(t->name);
|
||
|
|
||
|
t->name = strdup(name);
|
||
|
t->flags |= (1 << NFT_TABLE_ATTR_NAME);
|
||
|
@@ -507,7 +507,7 @@
|
||
|
list_del(&r->head);
|
||
|
nft_table_free(r);
|
||
|
}
|
||
|
- xfree(list);
|
||
|
+ nftnl_xfree(list);
|
||
|
}
|
||
|
EXPORT_SYMBOL(nft_table_list_free);
|
||
|
|
||
|
@@ -586,6 +586,6 @@
|
||
|
|
||
|
void nft_table_list_iter_destroy(struct nft_table_list_iter *iter)
|
||
|
{
|
||
|
- xfree(iter);
|
||
|
+ nftnl_xfree(iter);
|
||
|
}
|
||
|
EXPORT_SYMBOL(nft_table_list_iter_destroy);
|
||
|
Index: b/src/utils.c
|
||
|
===================================================================
|
||
|
--- a/src/utils.c
|
||
|
+++ b/src/utils.c
|
||
|
@@ -180,7 +180,7 @@
|
||
|
return -1;
|
||
|
}
|
||
|
|
||
|
-void xfree(const void *ptr)
|
||
|
+void nftnl_xfree(const void *ptr)
|
||
|
{
|
||
|
free((void *)ptr);
|
||
|
}
|
||
|
@@ -214,7 +214,7 @@
|
||
|
|
||
|
out:
|
||
|
if (buf != _buf)
|
||
|
- xfree(buf);
|
||
|
+ nftnl_xfree(buf);
|
||
|
|
||
|
return ret;
|
||
|
}
|