diff options
| author | Patrick McHardy <kaber@trash.net> | 2014-01-09 13:42:43 -0500 |
|---|---|---|
| committer | Pablo Neira Ayuso <pablo@netfilter.org> | 2014-01-09 14:17:16 -0500 |
| commit | 3876d22dba62ebf6582f33e1ef2160eeb95e1129 (patch) | |
| tree | b4ee6d922f5523a03f78268d9e958abb768c70a8 /net | |
| parent | 44a6f0df039ee7ddeebc88327dd61f0afb53baa7 (diff) | |
netfilter: nf_tables: rename nft_do_chain_pktinfo() to nft_do_chain()
We don't encode argument types into function names and since besides
nft_do_chain() there are only AF-specific versions, there is no risk
of confusion.
Signed-off-by: Patrick McHardy <kaber@trash.net>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Diffstat (limited to 'net')
| -rw-r--r-- | net/bridge/netfilter/nf_tables_bridge.c | 2 | ||||
| -rw-r--r-- | net/ipv4/netfilter/nf_tables_arp.c | 2 | ||||
| -rw-r--r-- | net/ipv4/netfilter/nf_tables_ipv4.c | 2 | ||||
| -rw-r--r-- | net/ipv4/netfilter/nft_chain_nat_ipv4.c | 2 | ||||
| -rw-r--r-- | net/ipv4/netfilter/nft_chain_route_ipv4.c | 2 | ||||
| -rw-r--r-- | net/ipv6/netfilter/nf_tables_ipv6.c | 2 | ||||
| -rw-r--r-- | net/ipv6/netfilter/nft_chain_nat_ipv6.c | 2 | ||||
| -rw-r--r-- | net/ipv6/netfilter/nft_chain_route_ipv6.c | 2 | ||||
| -rw-r--r-- | net/netfilter/nf_tables_core.c | 4 |
9 files changed, 10 insertions, 10 deletions
diff --git a/net/bridge/netfilter/nf_tables_bridge.c b/net/bridge/netfilter/nf_tables_bridge.c index c83fab5f8736..5bcc0d8b31f2 100644 --- a/net/bridge/netfilter/nf_tables_bridge.c +++ b/net/bridge/netfilter/nf_tables_bridge.c | |||
| @@ -25,7 +25,7 @@ nft_do_chain_bridge(const struct nf_hook_ops *ops, | |||
| 25 | 25 | ||
| 26 | nft_set_pktinfo(&pkt, ops, skb, in, out); | 26 | nft_set_pktinfo(&pkt, ops, skb, in, out); |
| 27 | 27 | ||
| 28 | return nft_do_chain_pktinfo(&pkt, ops); | 28 | return nft_do_chain(&pkt, ops); |
| 29 | } | 29 | } |
| 30 | 30 | ||
| 31 | static struct nft_af_info nft_af_bridge __read_mostly = { | 31 | static struct nft_af_info nft_af_bridge __read_mostly = { |
diff --git a/net/ipv4/netfilter/nf_tables_arp.c b/net/ipv4/netfilter/nf_tables_arp.c index b90d16c332ab..19412a4063fb 100644 --- a/net/ipv4/netfilter/nf_tables_arp.c +++ b/net/ipv4/netfilter/nf_tables_arp.c | |||
| @@ -25,7 +25,7 @@ nft_do_chain_arp(const struct nf_hook_ops *ops, | |||
| 25 | 25 | ||
| 26 | nft_set_pktinfo(&pkt, ops, skb, in, out); | 26 | nft_set_pktinfo(&pkt, ops, skb, in, out); |
| 27 | 27 | ||
| 28 | return nft_do_chain_pktinfo(&pkt, ops); | 28 | return nft_do_chain(&pkt, ops); |
| 29 | } | 29 | } |
| 30 | 30 | ||
| 31 | static struct nft_af_info nft_af_arp __read_mostly = { | 31 | static struct nft_af_info nft_af_arp __read_mostly = { |
diff --git a/net/ipv4/netfilter/nf_tables_ipv4.c b/net/ipv4/netfilter/nf_tables_ipv4.c index 66679fd4b022..fec163a6ac38 100644 --- a/net/ipv4/netfilter/nf_tables_ipv4.c +++ b/net/ipv4/netfilter/nf_tables_ipv4.c | |||
| @@ -28,7 +28,7 @@ static unsigned int nft_do_chain_ipv4(const struct nf_hook_ops *ops, | |||
| 28 | 28 | ||
| 29 | nft_set_pktinfo_ipv4(&pkt, ops, skb, in, out); | 29 | nft_set_pktinfo_ipv4(&pkt, ops, skb, in, out); |
| 30 | 30 | ||
| 31 | return nft_do_chain_pktinfo(&pkt, ops); | 31 | return nft_do_chain(&pkt, ops); |
| 32 | } | 32 | } |
| 33 | 33 | ||
| 34 | static unsigned int nft_ipv4_output(const struct nf_hook_ops *ops, | 34 | static unsigned int nft_ipv4_output(const struct nf_hook_ops *ops, |
diff --git a/net/ipv4/netfilter/nft_chain_nat_ipv4.c b/net/ipv4/netfilter/nft_chain_nat_ipv4.c index 208d60afaaa0..b5b256d45e67 100644 --- a/net/ipv4/netfilter/nft_chain_nat_ipv4.c +++ b/net/ipv4/netfilter/nft_chain_nat_ipv4.c | |||
| @@ -75,7 +75,7 @@ static unsigned int nf_nat_fn(const struct nf_hook_ops *ops, | |||
| 75 | 75 | ||
| 76 | nft_set_pktinfo_ipv4(&pkt, ops, skb, in, out); | 76 | nft_set_pktinfo_ipv4(&pkt, ops, skb, in, out); |
| 77 | 77 | ||
| 78 | ret = nft_do_chain_pktinfo(&pkt, ops); | 78 | ret = nft_do_chain(&pkt, ops); |
| 79 | if (ret != NF_ACCEPT) | 79 | if (ret != NF_ACCEPT) |
| 80 | return ret; | 80 | return ret; |
| 81 | if (!nf_nat_initialized(ct, maniptype)) { | 81 | if (!nf_nat_initialized(ct, maniptype)) { |
diff --git a/net/ipv4/netfilter/nft_chain_route_ipv4.c b/net/ipv4/netfilter/nft_chain_route_ipv4.c index 67db1bbde1c8..125b66766c0a 100644 --- a/net/ipv4/netfilter/nft_chain_route_ipv4.c +++ b/net/ipv4/netfilter/nft_chain_route_ipv4.c | |||
| @@ -47,7 +47,7 @@ static unsigned int nf_route_table_hook(const struct nf_hook_ops *ops, | |||
| 47 | daddr = iph->daddr; | 47 | daddr = iph->daddr; |
| 48 | tos = iph->tos; | 48 | tos = iph->tos; |
| 49 | 49 | ||
| 50 | ret = nft_do_chain_pktinfo(&pkt, ops); | 50 | ret = nft_do_chain(&pkt, ops); |
| 51 | if (ret != NF_DROP && ret != NF_QUEUE) { | 51 | if (ret != NF_DROP && ret != NF_QUEUE) { |
| 52 | iph = ip_hdr(skb); | 52 | iph = ip_hdr(skb); |
| 53 | 53 | ||
diff --git a/net/ipv6/netfilter/nf_tables_ipv6.c b/net/ipv6/netfilter/nf_tables_ipv6.c index 859fca0432ff..59a43b474dca 100644 --- a/net/ipv6/netfilter/nf_tables_ipv6.c +++ b/net/ipv6/netfilter/nf_tables_ipv6.c | |||
| @@ -28,7 +28,7 @@ static unsigned int nft_do_chain_ipv6(const struct nf_hook_ops *ops, | |||
| 28 | if (nft_set_pktinfo_ipv6(&pkt, ops, skb, in, out) < 0) | 28 | if (nft_set_pktinfo_ipv6(&pkt, ops, skb, in, out) < 0) |
| 29 | return NF_DROP; | 29 | return NF_DROP; |
| 30 | 30 | ||
| 31 | return nft_do_chain_pktinfo(&pkt, ops); | 31 | return nft_do_chain(&pkt, ops); |
| 32 | } | 32 | } |
| 33 | 33 | ||
| 34 | static unsigned int nft_ipv6_output(const struct nf_hook_ops *ops, | 34 | static unsigned int nft_ipv6_output(const struct nf_hook_ops *ops, |
diff --git a/net/ipv6/netfilter/nft_chain_nat_ipv6.c b/net/ipv6/netfilter/nft_chain_nat_ipv6.c index 9ed60ab833f5..9c3297a768fd 100644 --- a/net/ipv6/netfilter/nft_chain_nat_ipv6.c +++ b/net/ipv6/netfilter/nft_chain_nat_ipv6.c | |||
| @@ -79,7 +79,7 @@ static unsigned int nf_nat_ipv6_fn(const struct nf_hook_ops *ops, | |||
| 79 | 79 | ||
| 80 | nft_set_pktinfo_ipv6(&pkt, ops, skb, in, out); | 80 | nft_set_pktinfo_ipv6(&pkt, ops, skb, in, out); |
| 81 | 81 | ||
| 82 | ret = nft_do_chain_pktinfo(&pkt, ops); | 82 | ret = nft_do_chain(&pkt, ops); |
| 83 | if (ret != NF_ACCEPT) | 83 | if (ret != NF_ACCEPT) |
| 84 | return ret; | 84 | return ret; |
| 85 | if (!nf_nat_initialized(ct, maniptype)) { | 85 | if (!nf_nat_initialized(ct, maniptype)) { |
diff --git a/net/ipv6/netfilter/nft_chain_route_ipv6.c b/net/ipv6/netfilter/nft_chain_route_ipv6.c index b2b7effa896b..42031299585e 100644 --- a/net/ipv6/netfilter/nft_chain_route_ipv6.c +++ b/net/ipv6/netfilter/nft_chain_route_ipv6.c | |||
| @@ -47,7 +47,7 @@ static unsigned int nf_route_table_hook(const struct nf_hook_ops *ops, | |||
| 47 | /* flowlabel and prio (includes version, which shouldn't change either */ | 47 | /* flowlabel and prio (includes version, which shouldn't change either */ |
| 48 | flowlabel = *((u32 *)ipv6_hdr(skb)); | 48 | flowlabel = *((u32 *)ipv6_hdr(skb)); |
| 49 | 49 | ||
| 50 | ret = nft_do_chain_pktinfo(&pkt, ops); | 50 | ret = nft_do_chain(&pkt, ops); |
| 51 | if (ret != NF_DROP && ret != NF_QUEUE && | 51 | if (ret != NF_DROP && ret != NF_QUEUE && |
| 52 | (memcmp(&ipv6_hdr(skb)->saddr, &saddr, sizeof(saddr)) || | 52 | (memcmp(&ipv6_hdr(skb)->saddr, &saddr, sizeof(saddr)) || |
| 53 | memcmp(&ipv6_hdr(skb)->daddr, &daddr, sizeof(daddr)) || | 53 | memcmp(&ipv6_hdr(skb)->daddr, &daddr, sizeof(daddr)) || |
diff --git a/net/netfilter/nf_tables_core.c b/net/netfilter/nf_tables_core.c index 5aae31772ff7..0d879fcb8763 100644 --- a/net/netfilter/nf_tables_core.c +++ b/net/netfilter/nf_tables_core.c | |||
| @@ -116,7 +116,7 @@ static inline void nft_trace_packet(const struct nft_pktinfo *pkt, | |||
| 116 | } | 116 | } |
| 117 | 117 | ||
| 118 | unsigned int | 118 | unsigned int |
| 119 | nft_do_chain_pktinfo(struct nft_pktinfo *pkt, const struct nf_hook_ops *ops) | 119 | nft_do_chain(struct nft_pktinfo *pkt, const struct nf_hook_ops *ops) |
| 120 | { | 120 | { |
| 121 | const struct nft_chain *chain = ops->priv; | 121 | const struct nft_chain *chain = ops->priv; |
| 122 | const struct nft_rule *rule; | 122 | const struct nft_rule *rule; |
| @@ -216,7 +216,7 @@ next_rule: | |||
| 216 | 216 | ||
| 217 | return nft_base_chain(chain)->policy; | 217 | return nft_base_chain(chain)->policy; |
| 218 | } | 218 | } |
| 219 | EXPORT_SYMBOL_GPL(nft_do_chain_pktinfo); | 219 | EXPORT_SYMBOL_GPL(nft_do_chain); |
| 220 | 220 | ||
| 221 | int __init nf_tables_core_module_init(void) | 221 | int __init nf_tables_core_module_init(void) |
| 222 | { | 222 | { |
