summaryrefslogtreecommitdiff
path: root/net/bridge/br_netfilter_ipv6.c
diff options
context:
space:
mode:
authorFlorian Westphal <fw@strlen.de>2023-10-11 10:59:39 +0300
committerFlorian Westphal <fw@strlen.de>2023-10-18 11:26:43 +0300
commitcf8b7c1a5be7ef2850c46a17fea5f867f71922ff (patch)
tree07949268df9748991fc81607ee982af2f8c45bd8 /net/bridge/br_netfilter_ipv6.c
parente0d4593140b01b8da513a0c88c26da28b4906413 (diff)
downloadlinux-cf8b7c1a5be7ef2850c46a17fea5f867f71922ff.tar.xz
netfilter: bridge: convert br_netfilter to NF_DROP_REASON
errno is 0 because these hooks are called from prerouting and forward. There is no socket that the errno would ever be propagated to. Other netfilter modules (e.g. nf_nat, conntrack, ...) can be converted in a similar way. Signed-off-by: Florian Westphal <fw@strlen.de>
Diffstat (limited to 'net/bridge/br_netfilter_ipv6.c')
-rw-r--r--net/bridge/br_netfilter_ipv6.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/net/bridge/br_netfilter_ipv6.c b/net/bridge/br_netfilter_ipv6.c
index 550039dfc31a..2e24a743f917 100644
--- a/net/bridge/br_netfilter_ipv6.c
+++ b/net/bridge/br_netfilter_ipv6.c
@@ -161,13 +161,13 @@ unsigned int br_nf_pre_routing_ipv6(void *priv,
struct nf_bridge_info *nf_bridge;
if (br_validate_ipv6(state->net, skb))
- return NF_DROP;
+ return NF_DROP_REASON(skb, SKB_DROP_REASON_IP_INHDR, 0);
nf_bridge = nf_bridge_alloc(skb);
if (!nf_bridge)
- return NF_DROP;
+ return NF_DROP_REASON(skb, SKB_DROP_REASON_NOMEM, 0);
if (!setup_pre_routing(skb, state->net))
- return NF_DROP;
+ return NF_DROP_REASON(skb, SKB_DROP_REASON_DEV_READY, 0);
nf_bridge = nf_bridge_info_get(skb);
nf_bridge->ipv6_daddr = ipv6_hdr(skb)->daddr;