package/libnftnl: bump to version 1.1.3

Rebase patch #1.

Cc: Yegor Yefremov <yegorslists@googlemail.com>
Signed-off-by: Baruch Siach <baruch@tkos.co.il>
Signed-off-by: Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
This commit is contained in:
Baruch Siach 2019-07-01 15:12:54 +03:00 committed by Arnout Vandecappelle (Essensium/Mind)
parent 44af8386f8
commit 1208e41561
3 changed files with 70 additions and 52 deletions

View File

@ -22,11 +22,11 @@ libnftnl_xfree().
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
[Gustavo: update for version 1.0.7] [Gustavo: update for version 1.0.7]
Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar> Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar>
[baruch: update for versions 1.0.9, 1.1.2] [baruch: update for versions 1.0.9, 1.1.2, 1.1.3]
Signed-off-by: Baruch Siach <baruch@tkos.co.il> Signed-off-by: Baruch Siach <baruch@tkos.co.il>
--- ---
include/utils.h | 2 +- include/utils.h | 2 +-
src/chain.c | 36 ++++++++++++++++++------------------ src/chain.c | 38 +++++++++++++++++++-------------------
src/common.c | 2 +- src/common.c | 2 +-
src/expr.c | 4 ++-- src/expr.c | 4 ++--
src/expr/data_reg.c | 2 +- src/expr/data_reg.c | 2 +-
@ -37,7 +37,7 @@ Signed-off-by: Baruch Siach <baruch@tkos.co.il>
src/expr/lookup.c | 2 +- src/expr/lookup.c | 2 +-
src/expr/match.c | 6 +++--- src/expr/match.c | 6 +++---
src/expr/target.c | 6 +++--- src/expr/target.c | 6 +++---
src/flowtable.c | 32 ++++++++++++++++---------------- src/flowtable.c | 34 +++++++++++++++++-----------------
src/gen.c | 2 +- src/gen.c | 2 +-
src/object.c | 14 +++++++------- src/object.c | 14 +++++++-------
src/rule.c | 32 ++++++++++++++++---------------- src/rule.c | 32 ++++++++++++++++----------------
@ -48,7 +48,7 @@ Signed-off-by: Baruch Siach <baruch@tkos.co.il>
src/trace.c | 14 +++++++------- src/trace.c | 14 +++++++-------
src/udata.c | 2 +- src/udata.c | 2 +-
src/utils.c | 2 +- src/utils.c | 2 +-
23 files changed, 121 insertions(+), 121 deletions(-) 23 files changed, 123 insertions(+), 123 deletions(-)
diff --git a/include/utils.h b/include/utils.h diff --git a/include/utils.h b/include/utils.h
index 3cc659652fe2..820556715013 100644 index 3cc659652fe2..820556715013 100644
@ -64,12 +64,12 @@ index 3cc659652fe2..820556715013 100644
#define div_round_up(n, d) (((n) + (d) - 1) / (d)) #define div_round_up(n, d) (((n) + (d) - 1) / (d))
diff --git a/src/chain.c b/src/chain.c diff --git a/src/chain.c b/src/chain.c
index 01d62c84f140..93e193955934 100644 index 26f9b9d61053..06316a26b075 100644
--- a/src/chain.c --- a/src/chain.c
+++ b/src/chain.c +++ b/src/chain.c
@@ -97,14 +97,14 @@ EXPORT_SYMBOL(nftnl_chain_free); @@ -114,14 +114,14 @@ void nftnl_chain_free(const struct nftnl_chain *c)
void nftnl_chain_free(const struct nftnl_chain *c) nftnl_rule_free(r);
{
if (c->flags & (1 << NFTNL_CHAIN_NAME)) if (c->flags & (1 << NFTNL_CHAIN_NAME))
- xfree(c->name); - xfree(c->name);
+ nftnl_xfree(c->name); + nftnl_xfree(c->name);
@ -87,7 +87,7 @@ index 01d62c84f140..93e193955934 100644
} }
EXPORT_SYMBOL(nftnl_chain_is_set); EXPORT_SYMBOL(nftnl_chain_is_set);
@@ -121,15 +121,15 @@ void nftnl_chain_unset(struct nftnl_chain *c, uint16_t attr) @@ -138,15 +138,15 @@ void nftnl_chain_unset(struct nftnl_chain *c, uint16_t attr)
switch (attr) { switch (attr) {
case NFTNL_CHAIN_NAME: case NFTNL_CHAIN_NAME:
@ -106,7 +106,7 @@ index 01d62c84f140..93e193955934 100644
break; break;
case NFTNL_CHAIN_HOOKNUM: case NFTNL_CHAIN_HOOKNUM:
case NFTNL_CHAIN_PRIO: case NFTNL_CHAIN_PRIO:
@@ -140,7 +140,7 @@ void nftnl_chain_unset(struct nftnl_chain *c, uint16_t attr) @@ -157,7 +157,7 @@ void nftnl_chain_unset(struct nftnl_chain *c, uint16_t attr)
case NFTNL_CHAIN_FAMILY: case NFTNL_CHAIN_FAMILY:
break; break;
case NFTNL_CHAIN_DEV: case NFTNL_CHAIN_DEV:
@ -115,7 +115,7 @@ index 01d62c84f140..93e193955934 100644
break; break;
default: default:
return; return;
@@ -169,7 +169,7 @@ int nftnl_chain_set_data(struct nftnl_chain *c, uint16_t attr, @@ -186,7 +186,7 @@ int nftnl_chain_set_data(struct nftnl_chain *c, uint16_t attr,
switch(attr) { switch(attr) {
case NFTNL_CHAIN_NAME: case NFTNL_CHAIN_NAME:
if (c->flags & (1 << NFTNL_CHAIN_NAME)) if (c->flags & (1 << NFTNL_CHAIN_NAME))
@ -124,7 +124,7 @@ index 01d62c84f140..93e193955934 100644
c->name = strdup(data); c->name = strdup(data);
if (!c->name) if (!c->name)
@@ -177,7 +177,7 @@ int nftnl_chain_set_data(struct nftnl_chain *c, uint16_t attr, @@ -194,7 +194,7 @@ int nftnl_chain_set_data(struct nftnl_chain *c, uint16_t attr,
break; break;
case NFTNL_CHAIN_TABLE: case NFTNL_CHAIN_TABLE:
if (c->flags & (1 << NFTNL_CHAIN_TABLE)) if (c->flags & (1 << NFTNL_CHAIN_TABLE))
@ -133,7 +133,7 @@ index 01d62c84f140..93e193955934 100644
c->table = strdup(data); c->table = strdup(data);
if (!c->table) if (!c->table)
@@ -209,7 +209,7 @@ int nftnl_chain_set_data(struct nftnl_chain *c, uint16_t attr, @@ -226,7 +226,7 @@ int nftnl_chain_set_data(struct nftnl_chain *c, uint16_t attr,
break; break;
case NFTNL_CHAIN_TYPE: case NFTNL_CHAIN_TYPE:
if (c->flags & (1 << NFTNL_CHAIN_TYPE)) if (c->flags & (1 << NFTNL_CHAIN_TYPE))
@ -142,7 +142,7 @@ index 01d62c84f140..93e193955934 100644
c->type = strdup(data); c->type = strdup(data);
if (!c->type) if (!c->type)
@@ -217,7 +217,7 @@ int nftnl_chain_set_data(struct nftnl_chain *c, uint16_t attr, @@ -234,7 +234,7 @@ int nftnl_chain_set_data(struct nftnl_chain *c, uint16_t attr,
break; break;
case NFTNL_CHAIN_DEV: case NFTNL_CHAIN_DEV:
if (c->flags & (1 << NFTNL_CHAIN_DEV)) if (c->flags & (1 << NFTNL_CHAIN_DEV))
@ -151,7 +151,7 @@ index 01d62c84f140..93e193955934 100644
c->dev = strdup(data); c->dev = strdup(data);
if (!c->dev) if (!c->dev)
@@ -541,7 +541,7 @@ int nftnl_chain_nlmsg_parse(const struct nlmsghdr *nlh, struct nftnl_chain *c) @@ -588,7 +588,7 @@ int nftnl_chain_nlmsg_parse(const struct nlmsghdr *nlh, struct nftnl_chain *c)
if (tb[NFTA_CHAIN_NAME]) { if (tb[NFTA_CHAIN_NAME]) {
if (c->flags & (1 << NFTNL_CHAIN_NAME)) if (c->flags & (1 << NFTNL_CHAIN_NAME))
@ -160,7 +160,7 @@ index 01d62c84f140..93e193955934 100644
c->name = strdup(mnl_attr_get_str(tb[NFTA_CHAIN_NAME])); c->name = strdup(mnl_attr_get_str(tb[NFTA_CHAIN_NAME]));
if (!c->name) if (!c->name)
return -1; return -1;
@@ -549,7 +549,7 @@ int nftnl_chain_nlmsg_parse(const struct nlmsghdr *nlh, struct nftnl_chain *c) @@ -596,7 +596,7 @@ int nftnl_chain_nlmsg_parse(const struct nlmsghdr *nlh, struct nftnl_chain *c)
} }
if (tb[NFTA_CHAIN_TABLE]) { if (tb[NFTA_CHAIN_TABLE]) {
if (c->flags & (1 << NFTNL_CHAIN_TABLE)) if (c->flags & (1 << NFTNL_CHAIN_TABLE))
@ -169,7 +169,7 @@ index 01d62c84f140..93e193955934 100644
c->table = strdup(mnl_attr_get_str(tb[NFTA_CHAIN_TABLE])); c->table = strdup(mnl_attr_get_str(tb[NFTA_CHAIN_TABLE]));
if (!c->table) if (!c->table)
return -1; return -1;
@@ -579,7 +579,7 @@ int nftnl_chain_nlmsg_parse(const struct nlmsghdr *nlh, struct nftnl_chain *c) @@ -626,7 +626,7 @@ int nftnl_chain_nlmsg_parse(const struct nlmsghdr *nlh, struct nftnl_chain *c)
} }
if (tb[NFTA_CHAIN_TYPE]) { if (tb[NFTA_CHAIN_TYPE]) {
if (c->flags & (1 << NFTNL_CHAIN_TYPE)) if (c->flags & (1 << NFTNL_CHAIN_TYPE))
@ -178,8 +178,17 @@ index 01d62c84f140..93e193955934 100644
c->type = strdup(mnl_attr_get_str(tb[NFTA_CHAIN_TYPE])); c->type = strdup(mnl_attr_get_str(tb[NFTA_CHAIN_TYPE]));
if (!c->type) if (!c->type)
return -1; return -1;
@@ -711,7 +711,7 @@ void nftnl_chain_list_free(struct nftnl_chain_list *list) @@ -810,7 +810,7 @@ struct nftnl_rule *nftnl_rule_iter_next(struct nftnl_rule_iter *iter)
list_del(&r->head); EXPORT_SYMBOL(nftnl_rule_iter_destroy);
void nftnl_rule_iter_destroy(struct nftnl_rule_iter *iter)
{
- xfree(iter);
+ nftnl_xfree(iter);
}
#define CHAIN_NAME_HSIZE 512
@@ -848,7 +848,7 @@ void nftnl_chain_list_free(struct nftnl_chain_list *list)
hlist_del(&r->hnode);
nftnl_chain_free(r); nftnl_chain_free(r);
} }
- xfree(list); - xfree(list);
@ -187,7 +196,7 @@ index 01d62c84f140..93e193955934 100644
} }
EXPORT_SYMBOL(nftnl_chain_list_is_empty); EXPORT_SYMBOL(nftnl_chain_list_is_empty);
@@ -797,5 +797,5 @@ struct nftnl_chain *nftnl_chain_list_iter_next(struct nftnl_chain_list_iter *ite @@ -967,5 +967,5 @@ struct nftnl_chain *nftnl_chain_list_iter_next(struct nftnl_chain_list_iter *ite
EXPORT_SYMBOL(nftnl_chain_list_iter_destroy); EXPORT_SYMBOL(nftnl_chain_list_iter_destroy);
void nftnl_chain_list_iter_destroy(struct nftnl_chain_list_iter *iter) void nftnl_chain_list_iter_destroy(struct nftnl_chain_list_iter *iter)
{ {
@ -388,7 +397,7 @@ index 91000386704a..5d0763edf63f 100644
struct expr_ops expr_ops_target = { struct expr_ops expr_ops_target = {
diff --git a/src/flowtable.c b/src/flowtable.c diff --git a/src/flowtable.c b/src/flowtable.c
index c939306b56c4..f1b3eef48b73 100644 index 1f7ba3052d4f..7f3f6bbcfd13 100644
--- a/src/flowtable.c --- a/src/flowtable.c
+++ b/src/flowtable.c +++ b/src/flowtable.c
@@ -45,16 +45,16 @@ void nftnl_flowtable_free(const struct nftnl_flowtable *c) @@ -45,16 +45,16 @@ void nftnl_flowtable_free(const struct nftnl_flowtable *c)
@ -429,15 +438,15 @@ index c939306b56c4..f1b3eef48b73 100644
@@ -86,8 +86,8 @@ void nftnl_flowtable_unset(struct nftnl_flowtable *c, uint16_t attr) @@ -86,8 +86,8 @@ void nftnl_flowtable_unset(struct nftnl_flowtable *c, uint16_t attr)
break; break;
case NFTNL_FLOWTABLE_DEVICES: case NFTNL_FLOWTABLE_DEVICES:
for (i = 0; i < c->dev_array_len; i++) { for (i = 0; i < c->dev_array_len; i++)
- xfree(c->dev_array[i]); - xfree(c->dev_array[i]);
- xfree(c->dev_array); - xfree(c->dev_array);
+ nftnl_xfree(c->dev_array[i]); + nftnl_xfree(c->dev_array[i]);
+ nftnl_xfree(c->dev_array); + nftnl_xfree(c->dev_array);
}
break; break;
default: default:
@@ -117,7 +117,7 @@ int nftnl_flowtable_set_data(struct nftnl_flowtable *c, uint16_t attr, return;
@@ -116,7 +116,7 @@ int nftnl_flowtable_set_data(struct nftnl_flowtable *c, uint16_t attr,
switch(attr) { switch(attr) {
case NFTNL_FLOWTABLE_NAME: case NFTNL_FLOWTABLE_NAME:
if (c->flags & (1 << NFTNL_FLOWTABLE_NAME)) if (c->flags & (1 << NFTNL_FLOWTABLE_NAME))
@ -446,7 +455,7 @@ index c939306b56c4..f1b3eef48b73 100644
c->name = strdup(data); c->name = strdup(data);
if (!c->name) if (!c->name)
@@ -125,7 +125,7 @@ int nftnl_flowtable_set_data(struct nftnl_flowtable *c, uint16_t attr, @@ -124,7 +124,7 @@ int nftnl_flowtable_set_data(struct nftnl_flowtable *c, uint16_t attr,
break; break;
case NFTNL_FLOWTABLE_TABLE: case NFTNL_FLOWTABLE_TABLE:
if (c->flags & (1 << NFTNL_FLOWTABLE_TABLE)) if (c->flags & (1 << NFTNL_FLOWTABLE_TABLE))
@ -455,18 +464,27 @@ index c939306b56c4..f1b3eef48b73 100644
c->table = strdup(data); c->table = strdup(data);
if (!c->table) if (!c->table)
@@ -147,8 +147,8 @@ int nftnl_flowtable_set_data(struct nftnl_flowtable *c, uint16_t attr, @@ -146,8 +146,8 @@ int nftnl_flowtable_set_data(struct nftnl_flowtable *c, uint16_t attr,
if (c->flags & (1 << NFTNL_FLOWTABLE_DEVICES)) { if (c->flags & (1 << NFTNL_FLOWTABLE_DEVICES)) {
for (i = 0; i < c->dev_array_len; i++) { for (i = 0; i < c->dev_array_len; i++)
- xfree(c->dev_array[i]); - xfree(c->dev_array[i]);
- xfree(c->dev_array); - xfree(c->dev_array);
+ nftnl_xfree(c->dev_array[i]); + nftnl_xfree(c->dev_array[i]);
+ nftnl_xfree(c->dev_array); + nftnl_xfree(c->dev_array);
}
} }
@@ -423,7 +423,7 @@ int nftnl_flowtable_nlmsg_parse(const struct nlmsghdr *nlh, struct nftnl_flowtab c->dev_array = calloc(len + 1, sizeof(char *));
@@ -385,7 +385,7 @@ static int nftnl_flowtable_parse_devs(struct nlattr *nest,
return 0;
err:
while (len--)
- xfree(dev_array[len]);
+ nftnl_xfree(dev_array[len]);
return -1;
}
@@ -426,7 +426,7 @@ int nftnl_flowtable_nlmsg_parse(const struct nlmsghdr *nlh, struct nftnl_flowtab
if (tb[NFTA_FLOWTABLE_NAME]) { if (tb[NFTA_FLOWTABLE_NAME]) {
if (c->flags & (1 << NFTNL_FLOWTABLE_NAME)) if (c->flags & (1 << NFTNL_FLOWTABLE_NAME))
@ -475,7 +493,7 @@ index c939306b56c4..f1b3eef48b73 100644
c->name = strdup(mnl_attr_get_str(tb[NFTA_FLOWTABLE_NAME])); c->name = strdup(mnl_attr_get_str(tb[NFTA_FLOWTABLE_NAME]));
if (!c->name) if (!c->name)
return -1; return -1;
@@ -431,7 +431,7 @@ int nftnl_flowtable_nlmsg_parse(const struct nlmsghdr *nlh, struct nftnl_flowtab @@ -434,7 +434,7 @@ int nftnl_flowtable_nlmsg_parse(const struct nlmsghdr *nlh, struct nftnl_flowtab
} }
if (tb[NFTA_FLOWTABLE_TABLE]) { if (tb[NFTA_FLOWTABLE_TABLE]) {
if (c->flags & (1 << NFTNL_FLOWTABLE_TABLE)) if (c->flags & (1 << NFTNL_FLOWTABLE_TABLE))
@ -484,7 +502,7 @@ index c939306b56c4..f1b3eef48b73 100644
c->table = strdup(mnl_attr_get_str(tb[NFTA_FLOWTABLE_TABLE])); c->table = strdup(mnl_attr_get_str(tb[NFTA_FLOWTABLE_TABLE]));
if (!c->table) if (!c->table)
return -1; return -1;
@@ -635,7 +635,7 @@ void nftnl_flowtable_list_free(struct nftnl_flowtable_list *list) @@ -638,7 +638,7 @@ void nftnl_flowtable_list_free(struct nftnl_flowtable_list *list)
list_del(&s->head); list_del(&s->head);
nftnl_flowtable_free(s); nftnl_flowtable_free(s);
} }
@ -507,7 +525,7 @@ index 1fc909930d86..c69f6f87deae 100644
EXPORT_SYMBOL(nftnl_gen_is_set); EXPORT_SYMBOL(nftnl_gen_is_set);
diff --git a/src/object.c b/src/object.c diff --git a/src/object.c b/src/object.c
index e88203a82441..28e04486c76c 100644 index 5c8d1835ca97..1de1b35d2217 100644
--- a/src/object.c --- a/src/object.c
+++ b/src/object.c +++ b/src/object.c
@@ -53,11 +53,11 @@ EXPORT_SYMBOL(nftnl_obj_free); @@ -53,11 +53,11 @@ EXPORT_SYMBOL(nftnl_obj_free);
@ -556,10 +574,10 @@ index e88203a82441..28e04486c76c 100644
+ nftnl_xfree(iter); + nftnl_xfree(iter);
} }
diff --git a/src/rule.c b/src/rule.c diff --git a/src/rule.c b/src/rule.c
index 9af8fae2a803..0fce46e5c944 100644 index 8173fcdd863d..36446de29dbe 100644
--- a/src/rule.c --- a/src/rule.c
+++ b/src/rule.c +++ b/src/rule.c
@@ -75,13 +75,13 @@ void nftnl_rule_free(const struct nftnl_rule *r) @@ -53,13 +53,13 @@ void nftnl_rule_free(const struct nftnl_rule *r)
nftnl_expr_free(e); nftnl_expr_free(e);
if (r->flags & (1 << (NFTNL_RULE_TABLE))) if (r->flags & (1 << (NFTNL_RULE_TABLE)))
@ -577,7 +595,7 @@ index 9af8fae2a803..0fce46e5c944 100644
} }
EXPORT_SYMBOL(nftnl_rule_is_set); EXPORT_SYMBOL(nftnl_rule_is_set);
@@ -98,10 +98,10 @@ void nftnl_rule_unset(struct nftnl_rule *r, uint16_t attr) @@ -76,10 +76,10 @@ void nftnl_rule_unset(struct nftnl_rule *r, uint16_t attr)
switch (attr) { switch (attr) {
case NFTNL_RULE_TABLE: case NFTNL_RULE_TABLE:
@ -590,8 +608,8 @@ index 9af8fae2a803..0fce46e5c944 100644
break; break;
case NFTNL_RULE_HANDLE: case NFTNL_RULE_HANDLE:
case NFTNL_RULE_COMPAT_PROTO: case NFTNL_RULE_COMPAT_PROTO:
@@ -111,7 +111,7 @@ void nftnl_rule_unset(struct nftnl_rule *r, uint16_t attr) @@ -90,7 +90,7 @@ void nftnl_rule_unset(struct nftnl_rule *r, uint16_t attr)
case NFTNL_RULE_ID: case NFTNL_RULE_POSITION_ID:
break; break;
case NFTNL_RULE_USERDATA: case NFTNL_RULE_USERDATA:
- xfree(r->user.data); - xfree(r->user.data);
@ -599,7 +617,7 @@ index 9af8fae2a803..0fce46e5c944 100644
break; break;
} }
@@ -137,7 +137,7 @@ int nftnl_rule_set_data(struct nftnl_rule *r, uint16_t attr, @@ -117,7 +117,7 @@ int nftnl_rule_set_data(struct nftnl_rule *r, uint16_t attr,
switch(attr) { switch(attr) {
case NFTNL_RULE_TABLE: case NFTNL_RULE_TABLE:
if (r->flags & (1 << NFTNL_RULE_TABLE)) if (r->flags & (1 << NFTNL_RULE_TABLE))
@ -608,7 +626,7 @@ index 9af8fae2a803..0fce46e5c944 100644
r->table = strdup(data); r->table = strdup(data);
if (!r->table) if (!r->table)
@@ -145,7 +145,7 @@ int nftnl_rule_set_data(struct nftnl_rule *r, uint16_t attr, @@ -125,7 +125,7 @@ int nftnl_rule_set_data(struct nftnl_rule *r, uint16_t attr,
break; break;
case NFTNL_RULE_CHAIN: case NFTNL_RULE_CHAIN:
if (r->flags & (1 << NFTNL_RULE_CHAIN)) if (r->flags & (1 << NFTNL_RULE_CHAIN))
@ -617,7 +635,7 @@ index 9af8fae2a803..0fce46e5c944 100644
r->chain = strdup(data); r->chain = strdup(data);
if (!r->chain) if (!r->chain)
@@ -168,7 +168,7 @@ int nftnl_rule_set_data(struct nftnl_rule *r, uint16_t attr, @@ -148,7 +148,7 @@ int nftnl_rule_set_data(struct nftnl_rule *r, uint16_t attr,
break; break;
case NFTNL_RULE_USERDATA: case NFTNL_RULE_USERDATA:
if (r->flags & (1 << NFTNL_RULE_USERDATA)) if (r->flags & (1 << NFTNL_RULE_USERDATA))
@ -626,7 +644,7 @@ index 9af8fae2a803..0fce46e5c944 100644
r->user.data = malloc(data_len); r->user.data = malloc(data_len);
if (!r->user.data) if (!r->user.data)
@@ -453,7 +453,7 @@ int nftnl_rule_nlmsg_parse(const struct nlmsghdr *nlh, struct nftnl_rule *r) @@ -442,7 +442,7 @@ int nftnl_rule_nlmsg_parse(const struct nlmsghdr *nlh, struct nftnl_rule *r)
if (tb[NFTA_RULE_TABLE]) { if (tb[NFTA_RULE_TABLE]) {
if (r->flags & (1 << NFTNL_RULE_TABLE)) if (r->flags & (1 << NFTNL_RULE_TABLE))
@ -635,7 +653,7 @@ index 9af8fae2a803..0fce46e5c944 100644
r->table = strdup(mnl_attr_get_str(tb[NFTA_RULE_TABLE])); r->table = strdup(mnl_attr_get_str(tb[NFTA_RULE_TABLE]));
if (!r->table) if (!r->table)
return -1; return -1;
@@ -461,7 +461,7 @@ int nftnl_rule_nlmsg_parse(const struct nlmsghdr *nlh, struct nftnl_rule *r) @@ -450,7 +450,7 @@ int nftnl_rule_nlmsg_parse(const struct nlmsghdr *nlh, struct nftnl_rule *r)
} }
if (tb[NFTA_RULE_CHAIN]) { if (tb[NFTA_RULE_CHAIN]) {
if (r->flags & (1 << NFTNL_RULE_CHAIN)) if (r->flags & (1 << NFTNL_RULE_CHAIN))
@ -644,7 +662,7 @@ index 9af8fae2a803..0fce46e5c944 100644
r->chain = strdup(mnl_attr_get_str(tb[NFTA_RULE_CHAIN])); r->chain = strdup(mnl_attr_get_str(tb[NFTA_RULE_CHAIN]));
if (!r->chain) if (!r->chain)
return -1; return -1;
@@ -490,7 +490,7 @@ int nftnl_rule_nlmsg_parse(const struct nlmsghdr *nlh, struct nftnl_rule *r) @@ -479,7 +479,7 @@ int nftnl_rule_nlmsg_parse(const struct nlmsghdr *nlh, struct nftnl_rule *r)
mnl_attr_get_payload(tb[NFTA_RULE_USERDATA]); mnl_attr_get_payload(tb[NFTA_RULE_USERDATA]);
if (r->flags & (1 << NFTNL_RULE_USERDATA)) if (r->flags & (1 << NFTNL_RULE_USERDATA))
@ -653,7 +671,7 @@ index 9af8fae2a803..0fce46e5c944 100644
r->user.len = mnl_attr_get_payload_len(tb[NFTA_RULE_USERDATA]); r->user.len = mnl_attr_get_payload_len(tb[NFTA_RULE_USERDATA]);
@@ -737,7 +737,7 @@ struct nftnl_expr *nftnl_expr_iter_next(struct nftnl_expr_iter *iter) @@ -735,7 +735,7 @@ struct nftnl_expr *nftnl_expr_iter_next(struct nftnl_expr_iter *iter)
EXPORT_SYMBOL(nftnl_expr_iter_destroy); EXPORT_SYMBOL(nftnl_expr_iter_destroy);
void nftnl_expr_iter_destroy(struct nftnl_expr_iter *iter) void nftnl_expr_iter_destroy(struct nftnl_expr_iter *iter)
{ {
@ -662,7 +680,7 @@ index 9af8fae2a803..0fce46e5c944 100644
} }
struct nftnl_rule_list { struct nftnl_rule_list {
@@ -767,7 +767,7 @@ void nftnl_rule_list_free(struct nftnl_rule_list *list) @@ -765,7 +765,7 @@ void nftnl_rule_list_free(struct nftnl_rule_list *list)
list_del(&r->head); list_del(&r->head);
nftnl_rule_free(r); nftnl_rule_free(r);
} }
@ -671,7 +689,7 @@ index 9af8fae2a803..0fce46e5c944 100644
} }
EXPORT_SYMBOL(nftnl_rule_list_is_empty); EXPORT_SYMBOL(nftnl_rule_list_is_empty);
@@ -865,5 +865,5 @@ struct nftnl_rule *nftnl_rule_list_iter_next(struct nftnl_rule_list_iter *iter) @@ -863,5 +863,5 @@ struct nftnl_rule *nftnl_rule_list_iter_next(struct nftnl_rule_list_iter *iter)
EXPORT_SYMBOL(nftnl_rule_list_iter_destroy); EXPORT_SYMBOL(nftnl_rule_list_iter_destroy);
void nftnl_rule_list_iter_destroy(const struct nftnl_rule_list_iter *iter) void nftnl_rule_list_iter_destroy(const struct nftnl_rule_list_iter *iter)
{ {

View File

@ -1,3 +1,3 @@
# From http://www.netfilter.org/projects/libnftnl/downloads.html # From http://www.netfilter.org/projects/libnftnl/downloads.html
sha256 a5c7b7a6c13c9c5898b13fcb1126fefce2015d5a96d7c354b19aaa40b6aece5d libnftnl-1.1.2.tar.bz2 sha256 22dd97d3b06ae8c67499506e2bfd6803ce116479076ec3700e7a4c7cd9fcba0f libnftnl-1.1.3.tar.bz2
sha256 98193898c663001eff2fdcfb676e210c13042bc1a05e8d570c363efa396f8e24 COPYING sha256 98193898c663001eff2fdcfb676e210c13042bc1a05e8d570c363efa396f8e24 COPYING

View File

@ -4,7 +4,7 @@
# #
################################################################################ ################################################################################
LIBNFTNL_VERSION = 1.1.2 LIBNFTNL_VERSION = 1.1.3
LIBNFTNL_SITE = https://netfilter.org/projects/libnftnl/files LIBNFTNL_SITE = https://netfilter.org/projects/libnftnl/files
LIBNFTNL_SOURCE = libnftnl-$(LIBNFTNL_VERSION).tar.bz2 LIBNFTNL_SOURCE = libnftnl-$(LIBNFTNL_VERSION).tar.bz2
LIBNFTNL_LICENSE = GPL-2.0+ LIBNFTNL_LICENSE = GPL-2.0+