diff options
| -rw-r--r-- | include/net/netfilter/nf_tables.h | 4 | ||||
| -rw-r--r-- | net/bridge/netfilter/nf_tables_bridge.c | 2 | ||||
| -rw-r--r-- | net/ipv4/netfilter/nf_tables_arp.c | 2 | ||||
| -rw-r--r-- | net/ipv4/netfilter/nf_tables_ipv4.c | 2 | ||||
| -rw-r--r-- | net/ipv4/netfilter/nft_chain_nat_ipv4.c | 2 | ||||
| -rw-r--r-- | net/ipv4/netfilter/nft_chain_route_ipv4.c | 2 | ||||
| -rw-r--r-- | net/ipv6/netfilter/nf_tables_ipv6.c | 2 | ||||
| -rw-r--r-- | net/ipv6/netfilter/nft_chain_nat_ipv6.c | 2 | ||||
| -rw-r--r-- | net/ipv6/netfilter/nft_chain_route_ipv6.c | 2 | ||||
| -rw-r--r-- | net/netfilter/nf_tables_core.c | 4 |
10 files changed, 12 insertions, 12 deletions
diff --git a/include/net/netfilter/nf_tables.h b/include/net/netfilter/nf_tables.h index 342236550ef9..57c8ff7955df 100644 --- a/include/net/netfilter/nf_tables.h +++ b/include/net/netfilter/nf_tables.h | |||
| @@ -447,8 +447,8 @@ static inline struct nft_base_chain *nft_base_chain(const struct nft_chain *chai | |||
| 447 | return container_of(chain, struct nft_base_chain, chain); | 447 | return container_of(chain, struct nft_base_chain, chain); |
| 448 | } | 448 | } |
| 449 | 449 | ||
| 450 | unsigned int nft_do_chain_pktinfo(struct nft_pktinfo *pkt, | 450 | unsigned int nft_do_chain(struct nft_pktinfo *pkt, |
| 451 | const struct nf_hook_ops *ops); | 451 | const struct nf_hook_ops *ops); |
| 452 | 452 | ||
| 453 | /** | 453 | /** |
| 454 | * struct nft_table - nf_tables table | 454 | * struct nft_table - nf_tables table |
diff --git a/net/bridge/netfilter/nf_tables_bridge.c b/net/bridge/netfilter/nf_tables_bridge.c index c83fab5f8736..5bcc0d8b31f2 100644 --- a/net/bridge/netfilter/nf_tables_bridge.c +++ b/net/bridge/netfilter/nf_tables_bridge.c | |||
| @@ -25,7 +25,7 @@ nft_do_chain_bridge(const struct nf_hook_ops *ops, | |||
| 25 | 25 | ||
| 26 | nft_set_pktinfo(&pkt, ops, skb, in, out); | 26 | nft_set_pktinfo(&pkt, ops, skb, in, out); |
| 27 | 27 | ||
| 28 | return nft_do_chain_pktinfo(&pkt, ops); | 28 | return nft_do_chain(&pkt, ops); |
| 29 | } | 29 | } |
| 30 | 30 | ||
| 31 | static struct nft_af_info nft_af_bridge __read_mostly = { | 31 | static struct nft_af_info nft_af_bridge __read_mostly = { |
diff --git a/net/ipv4/netfilter/nf_tables_arp.c b/net/ipv4/netfilter/nf_tables_arp.c index b90d16c332ab..19412a4063fb 100644 --- a/net/ipv4/netfilter/nf_tables_arp.c +++ b/net/ipv4/netfilter/nf_tables_arp.c | |||
| @@ -25,7 +25,7 @@ nft_do_chain_arp(const struct nf_hook_ops *ops, | |||
| 25 | 25 | ||
| 26 | nft_set_pktinfo(&pkt, ops, skb, in, out); | 26 | nft_set_pktinfo(&pkt, ops, skb, in, out); |
| 27 | 27 | ||
| 28 | return nft_do_chain_pktinfo(&pkt, ops); | 28 | return nft_do_chain(&pkt, ops); |
| 29 | } | 29 | } |
| 30 | 30 | ||
| 31 | static struct nft_af_info nft_af_arp __read_mostly = { | 31 | static struct nft_af_info nft_af_arp __read_mostly = { |
diff --git a/net/ipv4/netfilter/nf_tables_ipv4.c b/net/ipv4/netfilter/nf_tables_ipv4.c index 66679fd4b022..fec163a6ac38 100644 --- a/net/ipv4/netfilter/nf_tables_ipv4.c +++ b/net/ipv4/netfilter/nf_tables_ipv4.c | |||
| @@ -28,7 +28,7 @@ static unsigned int nft_do_chain_ipv4(const struct nf_hook_ops *ops, | |||
| 28 | 28 | ||
| 29 | nft_set_pktinfo_ipv4(&pkt, ops, skb, in, out); | 29 | nft_set_pktinfo_ipv4(&pkt, ops, skb, in, out); |
| 30 | 30 | ||
| 31 | return nft_do_chain_pktinfo(&pkt, ops); | 31 | return nft_do_chain(&pkt, ops); |
| 32 | } | 32 | } |
| 33 | 33 | ||
| 34 | static unsigned int nft_ipv4_output(const struct nf_hook_ops *ops, | 34 | static unsigned int nft_ipv4_output(const struct nf_hook_ops *ops, |
diff --git a/net/ipv4/netfilter/nft_chain_nat_ipv4.c b/net/ipv4/netfilter/nft_chain_nat_ipv4.c index 208d60afaaa0..b5b256d45e67 100644 --- a/net/ipv4/netfilter/nft_chain_nat_ipv4.c +++ b/net/ipv4/netfilter/nft_chain_nat_ipv4.c | |||
| @@ -75,7 +75,7 @@ static unsigned int nf_nat_fn(const struct nf_hook_ops *ops, | |||
| 75 | 75 | ||
| 76 | nft_set_pktinfo_ipv4(&pkt, ops, skb, in, out); | 76 | nft_set_pktinfo_ipv4(&pkt, ops, skb, in, out); |
| 77 | 77 | ||
| 78 | ret = nft_do_chain_pktinfo(&pkt, ops); | 78 | ret = nft_do_chain(&pkt, ops); |
| 79 | if (ret != NF_ACCEPT) | 79 | if (ret != NF_ACCEPT) |
| 80 | return ret; | 80 | return ret; |
| 81 | if (!nf_nat_initialized(ct, maniptype)) { | 81 | if (!nf_nat_initialized(ct, maniptype)) { |
diff --git a/net/ipv4/netfilter/nft_chain_route_ipv4.c b/net/ipv4/netfilter/nft_chain_route_ipv4.c index 67db1bbde1c8..125b66766c0a 100644 --- a/net/ipv4/netfilter/nft_chain_route_ipv4.c +++ b/net/ipv4/netfilter/nft_chain_route_ipv4.c | |||
| @@ -47,7 +47,7 @@ static unsigned int nf_route_table_hook(const struct nf_hook_ops *ops, | |||
| 47 | daddr = iph->daddr; | 47 | daddr = iph->daddr; |
| 48 | tos = iph->tos; | 48 | tos = iph->tos; |
| 49 | 49 | ||
| 50 | ret = nft_do_chain_pktinfo(&pkt, ops); | 50 | ret = nft_do_chain(&pkt, ops); |
| 51 | if (ret != NF_DROP && ret != NF_QUEUE) { | 51 | if (ret != NF_DROP && ret != NF_QUEUE) { |
| 52 | iph = ip_hdr(skb); | 52 | iph = ip_hdr(skb); |
| 53 | 53 | ||
diff --git a/net/ipv6/netfilter/nf_tables_ipv6.c b/net/ipv6/netfilter/nf_tables_ipv6.c index 859fca0432ff..59a43b474dca 100644 --- a/net/ipv6/netfilter/nf_tables_ipv6.c +++ b/net/ipv6/netfilter/nf_tables_ipv6.c | |||
| @@ -28,7 +28,7 @@ static unsigned int nft_do_chain_ipv6(const struct nf_hook_ops *ops, | |||
| 28 | if (nft_set_pktinfo_ipv6(&pkt, ops, skb, in, out) < 0) | 28 | if (nft_set_pktinfo_ipv6(&pkt, ops, skb, in, out) < 0) |
| 29 | return NF_DROP; | 29 | return NF_DROP; |
| 30 | 30 | ||
| 31 | return nft_do_chain_pktinfo(&pkt, ops); | 31 | return nft_do_chain(&pkt, ops); |
| 32 | } | 32 | } |
| 33 | 33 | ||
| 34 | static unsigned int nft_ipv6_output(const struct nf_hook_ops *ops, | 34 | static unsigned int nft_ipv6_output(const struct nf_hook_ops *ops, |
diff --git a/net/ipv6/netfilter/nft_chain_nat_ipv6.c b/net/ipv6/netfilter/nft_chain_nat_ipv6.c index 9ed60ab833f5..9c3297a768fd 100644 --- a/net/ipv6/netfilter/nft_chain_nat_ipv6.c +++ b/net/ipv6/netfilter/nft_chain_nat_ipv6.c | |||
| @@ -79,7 +79,7 @@ static unsigned int nf_nat_ipv6_fn(const struct nf_hook_ops *ops, | |||
| 79 | 79 | ||
| 80 | nft_set_pktinfo_ipv6(&pkt, ops, skb, in, out); | 80 | nft_set_pktinfo_ipv6(&pkt, ops, skb, in, out); |
| 81 | 81 | ||
| 82 | ret = nft_do_chain_pktinfo(&pkt, ops); | 82 | ret = nft_do_chain(&pkt, ops); |
| 83 | if (ret != NF_ACCEPT) | 83 | if (ret != NF_ACCEPT) |
| 84 | return ret; | 84 | return ret; |
| 85 | if (!nf_nat_initialized(ct, maniptype)) { | 85 | if (!nf_nat_initialized(ct, maniptype)) { |
diff --git a/net/ipv6/netfilter/nft_chain_route_ipv6.c b/net/ipv6/netfilter/nft_chain_route_ipv6.c index b2b7effa896b..42031299585e 100644 --- a/net/ipv6/netfilter/nft_chain_route_ipv6.c +++ b/net/ipv6/netfilter/nft_chain_route_ipv6.c | |||
| @@ -47,7 +47,7 @@ static unsigned int nf_route_table_hook(const struct nf_hook_ops *ops, | |||
| 47 | /* flowlabel and prio (includes version, which shouldn't change either */ | 47 | /* flowlabel and prio (includes version, which shouldn't change either */ |
| 48 | flowlabel = *((u32 *)ipv6_hdr(skb)); | 48 | flowlabel = *((u32 *)ipv6_hdr(skb)); |
| 49 | 49 | ||
| 50 | ret = nft_do_chain_pktinfo(&pkt, ops); | 50 | ret = nft_do_chain(&pkt, ops); |
| 51 | if (ret != NF_DROP && ret != NF_QUEUE && | 51 | if (ret != NF_DROP && ret != NF_QUEUE && |
| 52 | (memcmp(&ipv6_hdr(skb)->saddr, &saddr, sizeof(saddr)) || | 52 | (memcmp(&ipv6_hdr(skb)->saddr, &saddr, sizeof(saddr)) || |
| 53 | memcmp(&ipv6_hdr(skb)->daddr, &daddr, sizeof(daddr)) || | 53 | memcmp(&ipv6_hdr(skb)->daddr, &daddr, sizeof(daddr)) || |
diff --git a/net/netfilter/nf_tables_core.c b/net/netfilter/nf_tables_core.c index 5aae31772ff7..0d879fcb8763 100644 --- a/net/netfilter/nf_tables_core.c +++ b/net/netfilter/nf_tables_core.c | |||
| @@ -116,7 +116,7 @@ static inline void nft_trace_packet(const struct nft_pktinfo *pkt, | |||
| 116 | } | 116 | } |
| 117 | 117 | ||
| 118 | unsigned int | 118 | unsigned int |
| 119 | nft_do_chain_pktinfo(struct nft_pktinfo *pkt, const struct nf_hook_ops *ops) | 119 | nft_do_chain(struct nft_pktinfo *pkt, const struct nf_hook_ops *ops) |
| 120 | { | 120 | { |
| 121 | const struct nft_chain *chain = ops->priv; | 121 | const struct nft_chain *chain = ops->priv; |
| 122 | const struct nft_rule *rule; | 122 | const struct nft_rule *rule; |
| @@ -216,7 +216,7 @@ next_rule: | |||
| 216 | 216 | ||
| 217 | return nft_base_chain(chain)->policy; | 217 | return nft_base_chain(chain)->policy; |
| 218 | } | 218 | } |
| 219 | EXPORT_SYMBOL_GPL(nft_do_chain_pktinfo); | 219 | EXPORT_SYMBOL_GPL(nft_do_chain); |
| 220 | 220 | ||
| 221 | int __init nf_tables_core_module_init(void) | 221 | int __init nf_tables_core_module_init(void) |
| 222 | { | 222 | { |
