diff options
Diffstat (limited to 'net/ipv4/netfilter/nf_nat_proto_common.c')
-rw-r--r-- | net/ipv4/netfilter/nf_nat_proto_common.c | 24 |
1 files changed, 12 insertions, 12 deletions
diff --git a/net/ipv4/netfilter/nf_nat_proto_common.c b/net/ipv4/netfilter/nf_nat_proto_common.c index a3d99761860..47fff91c9ae 100644 --- a/net/ipv4/netfilter/nf_nat_proto_common.c +++ b/net/ipv4/netfilter/nf_nat_proto_common.c | |||
@@ -26,7 +26,7 @@ bool nf_nat_proto_in_range(const struct nf_conntrack_tuple *tuple, | |||
26 | { | 26 | { |
27 | __be16 port; | 27 | __be16 port; |
28 | 28 | ||
29 | if (maniptype == IP_NAT_MANIP_SRC) | 29 | if (maniptype == NF_NAT_MANIP_SRC) |
30 | port = tuple->src.u.all; | 30 | port = tuple->src.u.all; |
31 | else | 31 | else |
32 | port = tuple->dst.u.all; | 32 | port = tuple->dst.u.all; |
@@ -37,7 +37,7 @@ bool nf_nat_proto_in_range(const struct nf_conntrack_tuple *tuple, | |||
37 | EXPORT_SYMBOL_GPL(nf_nat_proto_in_range); | 37 | EXPORT_SYMBOL_GPL(nf_nat_proto_in_range); |
38 | 38 | ||
39 | void nf_nat_proto_unique_tuple(struct nf_conntrack_tuple *tuple, | 39 | void nf_nat_proto_unique_tuple(struct nf_conntrack_tuple *tuple, |
40 | const struct nf_nat_range *range, | 40 | const struct nf_nat_ipv4_range *range, |
41 | enum nf_nat_manip_type maniptype, | 41 | enum nf_nat_manip_type maniptype, |
42 | const struct nf_conn *ct, | 42 | const struct nf_conn *ct, |
43 | u_int16_t *rover) | 43 | u_int16_t *rover) |
@@ -46,15 +46,15 @@ void nf_nat_proto_unique_tuple(struct nf_conntrack_tuple *tuple, | |||
46 | __be16 *portptr; | 46 | __be16 *portptr; |
47 | u_int16_t off; | 47 | u_int16_t off; |
48 | 48 | ||
49 | if (maniptype == IP_NAT_MANIP_SRC) | 49 | if (maniptype == NF_NAT_MANIP_SRC) |
50 | portptr = &tuple->src.u.all; | 50 | portptr = &tuple->src.u.all; |
51 | else | 51 | else |
52 | portptr = &tuple->dst.u.all; | 52 | portptr = &tuple->dst.u.all; |
53 | 53 | ||
54 | /* If no range specified... */ | 54 | /* If no range specified... */ |
55 | if (!(range->flags & IP_NAT_RANGE_PROTO_SPECIFIED)) { | 55 | if (!(range->flags & NF_NAT_RANGE_PROTO_SPECIFIED)) { |
56 | /* If it's dst rewrite, can't change port */ | 56 | /* If it's dst rewrite, can't change port */ |
57 | if (maniptype == IP_NAT_MANIP_DST) | 57 | if (maniptype == NF_NAT_MANIP_DST) |
58 | return; | 58 | return; |
59 | 59 | ||
60 | if (ntohs(*portptr) < 1024) { | 60 | if (ntohs(*portptr) < 1024) { |
@@ -75,9 +75,9 @@ void nf_nat_proto_unique_tuple(struct nf_conntrack_tuple *tuple, | |||
75 | range_size = ntohs(range->max.all) - min + 1; | 75 | range_size = ntohs(range->max.all) - min + 1; |
76 | } | 76 | } |
77 | 77 | ||
78 | if (range->flags & IP_NAT_RANGE_PROTO_RANDOM) | 78 | if (range->flags & NF_NAT_RANGE_PROTO_RANDOM) |
79 | off = secure_ipv4_port_ephemeral(tuple->src.u3.ip, tuple->dst.u3.ip, | 79 | off = secure_ipv4_port_ephemeral(tuple->src.u3.ip, tuple->dst.u3.ip, |
80 | maniptype == IP_NAT_MANIP_SRC | 80 | maniptype == NF_NAT_MANIP_SRC |
81 | ? tuple->dst.u.all | 81 | ? tuple->dst.u.all |
82 | : tuple->src.u.all); | 82 | : tuple->src.u.all); |
83 | else | 83 | else |
@@ -87,7 +87,7 @@ void nf_nat_proto_unique_tuple(struct nf_conntrack_tuple *tuple, | |||
87 | *portptr = htons(min + off % range_size); | 87 | *portptr = htons(min + off % range_size); |
88 | if (++i != range_size && nf_nat_used_tuple(tuple, ct)) | 88 | if (++i != range_size && nf_nat_used_tuple(tuple, ct)) |
89 | continue; | 89 | continue; |
90 | if (!(range->flags & IP_NAT_RANGE_PROTO_RANDOM)) | 90 | if (!(range->flags & NF_NAT_RANGE_PROTO_RANDOM)) |
91 | *rover = off; | 91 | *rover = off; |
92 | return; | 92 | return; |
93 | } | 93 | } |
@@ -97,7 +97,7 @@ EXPORT_SYMBOL_GPL(nf_nat_proto_unique_tuple); | |||
97 | 97 | ||
98 | #if defined(CONFIG_NF_CT_NETLINK) || defined(CONFIG_NF_CT_NETLINK_MODULE) | 98 | #if defined(CONFIG_NF_CT_NETLINK) || defined(CONFIG_NF_CT_NETLINK_MODULE) |
99 | int nf_nat_proto_range_to_nlattr(struct sk_buff *skb, | 99 | int nf_nat_proto_range_to_nlattr(struct sk_buff *skb, |
100 | const struct nf_nat_range *range) | 100 | const struct nf_nat_ipv4_range *range) |
101 | { | 101 | { |
102 | NLA_PUT_BE16(skb, CTA_PROTONAT_PORT_MIN, range->min.all); | 102 | NLA_PUT_BE16(skb, CTA_PROTONAT_PORT_MIN, range->min.all); |
103 | NLA_PUT_BE16(skb, CTA_PROTONAT_PORT_MAX, range->max.all); | 103 | NLA_PUT_BE16(skb, CTA_PROTONAT_PORT_MAX, range->max.all); |
@@ -109,16 +109,16 @@ nla_put_failure: | |||
109 | EXPORT_SYMBOL_GPL(nf_nat_proto_nlattr_to_range); | 109 | EXPORT_SYMBOL_GPL(nf_nat_proto_nlattr_to_range); |
110 | 110 | ||
111 | int nf_nat_proto_nlattr_to_range(struct nlattr *tb[], | 111 | int nf_nat_proto_nlattr_to_range(struct nlattr *tb[], |
112 | struct nf_nat_range *range) | 112 | struct nf_nat_ipv4_range *range) |
113 | { | 113 | { |
114 | if (tb[CTA_PROTONAT_PORT_MIN]) { | 114 | if (tb[CTA_PROTONAT_PORT_MIN]) { |
115 | range->min.all = nla_get_be16(tb[CTA_PROTONAT_PORT_MIN]); | 115 | range->min.all = nla_get_be16(tb[CTA_PROTONAT_PORT_MIN]); |
116 | range->max.all = range->min.tcp.port; | 116 | range->max.all = range->min.tcp.port; |
117 | range->flags |= IP_NAT_RANGE_PROTO_SPECIFIED; | 117 | range->flags |= NF_NAT_RANGE_PROTO_SPECIFIED; |
118 | } | 118 | } |
119 | if (tb[CTA_PROTONAT_PORT_MAX]) { | 119 | if (tb[CTA_PROTONAT_PORT_MAX]) { |
120 | range->max.all = nla_get_be16(tb[CTA_PROTONAT_PORT_MAX]); | 120 | range->max.all = nla_get_be16(tb[CTA_PROTONAT_PORT_MAX]); |
121 | range->flags |= IP_NAT_RANGE_PROTO_SPECIFIED; | 121 | range->flags |= NF_NAT_RANGE_PROTO_SPECIFIED; |
122 | } | 122 | } |
123 | return 0; | 123 | return 0; |
124 | } | 124 | } |