act_ipt.c (1b34ec43c9b3de44a5420841ab293d1b2035a94c) | act_ipt.c (e87cc4728f0e2fb663e592a1141742b1d6c63256) |
---|---|
1/* | 1/* |
2 * net/sched/ipt.c iptables target interface | 2 * net/sched/ipt.c iptables target interface |
3 * 4 *TODO: Add other tables. For now we only support the ipv4 table targets 5 * 6 * This program is free software; you can redistribute it and/or 7 * modify it under the terms of the GNU General Public License 8 * as published by the Free Software Foundation; either version 9 * 2 of the License, or (at your option) any later version. 10 * --- 219 unchanged lines hidden (view full) --- 230 case NF_DROP: 231 result = TC_ACT_SHOT; 232 ipt->tcf_qstats.drops++; 233 break; 234 case XT_CONTINUE: 235 result = TC_ACT_PIPE; 236 break; 237 default: | 3 * 4 *TODO: Add other tables. For now we only support the ipv4 table targets 5 * 6 * This program is free software; you can redistribute it and/or 7 * modify it under the terms of the GNU General Public License 8 * as published by the Free Software Foundation; either version 9 * 2 of the License, or (at your option) any later version. 10 * --- 219 unchanged lines hidden (view full) --- 230 case NF_DROP: 231 result = TC_ACT_SHOT; 232 ipt->tcf_qstats.drops++; 233 break; 234 case XT_CONTINUE: 235 result = TC_ACT_PIPE; 236 break; 237 default: |
238 if (net_ratelimit()) 239 pr_notice("tc filter: Bogus netfilter code" 240 " %d assume ACCEPT\n", ret); | 238 net_notice_ratelimited("tc filter: Bogus netfilter code %d assume ACCEPT\n", 239 ret); |
241 result = TC_POLICE_OK; 242 break; 243 } 244 spin_unlock(&ipt->tcf_lock); 245 return result; 246 247} 248 --- 71 unchanged lines hidden --- | 240 result = TC_POLICE_OK; 241 break; 242 } 243 spin_unlock(&ipt->tcf_lock); 244 return result; 245 246} 247 --- 71 unchanged lines hidden --- |