History log of /external/iptables/extensions/libxt_set.h
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
cf1f03f8f3cf2db577a9ddee254cc7f886129d18 04-Sep-2013 Jozsef Kadlecsik <kadlec@blackhole.kfki.hu> extensions: libxt_set, libxt_SET: check the set family too

Do not accept silently sets with wrong protocol family but reject
them with an error message. It makes straightforward to catch user
errors.

[ Use afinfo instead to avoid a binary interface update --pablo ]

Signed-off-by: Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
/external/iptables/extensions/libxt_set.h
c0aa38e22e8a09fcb1898ad0e042eaf6314d2d42 21-Mar-2012 Maciej Żenczykowski <maze@google.com> src: mark newly opened fds as FD_CLOEXEC (close on exec)

By default, Unix-like systems leak file descriptors after fork/exec
call. I think this seem to result in SELinux spotting a strange AVC
log messages according to what I can find on the web.

Fedora 18 iptables source includes this change.

Maciej says:
"iptables does potentially fork/exec modprobe to load modules.
That can cause a selinux 'domain'/'role'/whatever-it-is-called crossing.
You can do automated inspection of what gets carried across such
privilege changes and any unexpected open file descriptors flag
problems, patches like this cut down on the noise."

Signed-off-by: Maciej enczykowski <maze@google.com>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
/external/iptables/extensions/libxt_set.h
aeb8af909befedbfc85e9f184471b219e4ea191a 09-Apr-2011 Jozsef Kadlecsik <kadlec@blackhole.kfki.hu> Fix set match/target direction parser

The direction parser did not catch when more src/dst direction
parameters were supplied than allowed.
/external/iptables/extensions/libxt_set.h
d40f1628c3717daebc437a398a285e371b5b6f7f 16-Jun-2010 Jozsef Kadlecsik <kadlec@blackhole.kfki.hu> libxt_set: new revision added

libipt_set renamed to libxt_set and the support for the forthcoming
ipset release added. I have tested backward (IPv4) and forward
compatibility (IPv4/IPv6):

ipset -N test iphash
ipset -A test test-address
iptables -N test-set
iptables -A test-set -j LOG --log-prefix "match "
iptables -A test-set -j DROP
iptables -A OUTPUT -m set --match-set test dst -j test-set
ping test-address
/external/iptables/extensions/libxt_set.h