diff options
Diffstat (limited to 'net')
| -rw-r--r-- | net/ipv4/netfilter/arp_tables.c | 14 | ||||
| -rw-r--r-- | net/ipv4/netfilter/arpt_mangle.c | 2 | ||||
| -rw-r--r-- | net/ipv4/netfilter/ip_tables.c | 18 | ||||
| -rw-r--r-- | net/ipv6/netfilter/ip6_tables.c | 18 | ||||
| -rw-r--r-- | net/sched/act_ipt.c | 2 |
5 files changed, 27 insertions, 27 deletions
diff --git a/net/ipv4/netfilter/arp_tables.c b/net/ipv4/netfilter/arp_tables.c index ed178cbe6626..d756edae59ec 100644 --- a/net/ipv4/netfilter/arp_tables.c +++ b/net/ipv4/netfilter/arp_tables.c | |||
| @@ -300,7 +300,7 @@ unsigned int arpt_do_table(struct sk_buff *skb, | |||
| 300 | v = ((struct xt_standard_target *)t)->verdict; | 300 | v = ((struct xt_standard_target *)t)->verdict; |
| 301 | if (v < 0) { | 301 | if (v < 0) { |
| 302 | /* Pop from stack? */ | 302 | /* Pop from stack? */ |
| 303 | if (v != ARPT_RETURN) { | 303 | if (v != XT_RETURN) { |
| 304 | verdict = (unsigned)(-v) - 1; | 304 | verdict = (unsigned)(-v) - 1; |
| 305 | break; | 305 | break; |
| 306 | } | 306 | } |
| @@ -332,7 +332,7 @@ unsigned int arpt_do_table(struct sk_buff *skb, | |||
| 332 | /* Target might have changed stuff. */ | 332 | /* Target might have changed stuff. */ |
| 333 | arp = arp_hdr(skb); | 333 | arp = arp_hdr(skb); |
| 334 | 334 | ||
| 335 | if (verdict == ARPT_CONTINUE) | 335 | if (verdict == XT_CONTINUE) |
| 336 | e = arpt_next_entry(e); | 336 | e = arpt_next_entry(e); |
| 337 | else | 337 | else |
| 338 | /* Verdict */ | 338 | /* Verdict */ |
| @@ -392,13 +392,13 @@ static int mark_source_chains(const struct xt_table_info *newinfo, | |||
| 392 | /* Unconditional return/END. */ | 392 | /* Unconditional return/END. */ |
| 393 | if ((e->target_offset == sizeof(struct arpt_entry) && | 393 | if ((e->target_offset == sizeof(struct arpt_entry) && |
| 394 | (strcmp(t->target.u.user.name, | 394 | (strcmp(t->target.u.user.name, |
| 395 | ARPT_STANDARD_TARGET) == 0) && | 395 | XT_STANDARD_TARGET) == 0) && |
| 396 | t->verdict < 0 && unconditional(&e->arp)) || | 396 | t->verdict < 0 && unconditional(&e->arp)) || |
| 397 | visited) { | 397 | visited) { |
| 398 | unsigned int oldpos, size; | 398 | unsigned int oldpos, size; |
| 399 | 399 | ||
| 400 | if ((strcmp(t->target.u.user.name, | 400 | if ((strcmp(t->target.u.user.name, |
| 401 | ARPT_STANDARD_TARGET) == 0) && | 401 | XT_STANDARD_TARGET) == 0) && |
| 402 | t->verdict < -NF_MAX_VERDICT - 1) { | 402 | t->verdict < -NF_MAX_VERDICT - 1) { |
| 403 | duprintf("mark_source_chains: bad " | 403 | duprintf("mark_source_chains: bad " |
| 404 | "negative verdict (%i)\n", | 404 | "negative verdict (%i)\n", |
| @@ -433,7 +433,7 @@ static int mark_source_chains(const struct xt_table_info *newinfo, | |||
| 433 | int newpos = t->verdict; | 433 | int newpos = t->verdict; |
| 434 | 434 | ||
| 435 | if (strcmp(t->target.u.user.name, | 435 | if (strcmp(t->target.u.user.name, |
| 436 | ARPT_STANDARD_TARGET) == 0 && | 436 | XT_STANDARD_TARGET) == 0 && |
| 437 | newpos >= 0) { | 437 | newpos >= 0) { |
| 438 | if (newpos > newinfo->size - | 438 | if (newpos > newinfo->size - |
| 439 | sizeof(struct arpt_entry)) { | 439 | sizeof(struct arpt_entry)) { |
| @@ -1828,7 +1828,7 @@ void arpt_unregister_table(struct xt_table *table) | |||
| 1828 | /* The built-in targets: standard (NULL) and error. */ | 1828 | /* The built-in targets: standard (NULL) and error. */ |
| 1829 | static struct xt_target arpt_builtin_tg[] __read_mostly = { | 1829 | static struct xt_target arpt_builtin_tg[] __read_mostly = { |
| 1830 | { | 1830 | { |
| 1831 | .name = ARPT_STANDARD_TARGET, | 1831 | .name = XT_STANDARD_TARGET, |
| 1832 | .targetsize = sizeof(int), | 1832 | .targetsize = sizeof(int), |
| 1833 | .family = NFPROTO_ARP, | 1833 | .family = NFPROTO_ARP, |
| 1834 | #ifdef CONFIG_COMPAT | 1834 | #ifdef CONFIG_COMPAT |
| @@ -1838,7 +1838,7 @@ static struct xt_target arpt_builtin_tg[] __read_mostly = { | |||
| 1838 | #endif | 1838 | #endif |
| 1839 | }, | 1839 | }, |
| 1840 | { | 1840 | { |
| 1841 | .name = ARPT_ERROR_TARGET, | 1841 | .name = XT_ERROR_TARGET, |
| 1842 | .target = arpt_error, | 1842 | .target = arpt_error, |
| 1843 | .targetsize = XT_FUNCTION_MAXNAMELEN, | 1843 | .targetsize = XT_FUNCTION_MAXNAMELEN, |
| 1844 | .family = NFPROTO_ARP, | 1844 | .family = NFPROTO_ARP, |
diff --git a/net/ipv4/netfilter/arpt_mangle.c b/net/ipv4/netfilter/arpt_mangle.c index e1be7dd1171b..b8ddcc480ed9 100644 --- a/net/ipv4/netfilter/arpt_mangle.c +++ b/net/ipv4/netfilter/arpt_mangle.c | |||
| @@ -63,7 +63,7 @@ static int checkentry(const struct xt_tgchk_param *par) | |||
| 63 | return false; | 63 | return false; |
| 64 | 64 | ||
| 65 | if (mangle->target != NF_DROP && mangle->target != NF_ACCEPT && | 65 | if (mangle->target != NF_DROP && mangle->target != NF_ACCEPT && |
| 66 | mangle->target != ARPT_CONTINUE) | 66 | mangle->target != XT_CONTINUE) |
| 67 | return false; | 67 | return false; |
| 68 | return true; | 68 | return true; |
| 69 | } | 69 | } |
diff --git a/net/ipv4/netfilter/ip_tables.c b/net/ipv4/netfilter/ip_tables.c index cb108880050a..d31b007a6d80 100644 --- a/net/ipv4/netfilter/ip_tables.c +++ b/net/ipv4/netfilter/ip_tables.c | |||
| @@ -232,7 +232,7 @@ get_chainname_rulenum(const struct ipt_entry *s, const struct ipt_entry *e, | |||
| 232 | { | 232 | { |
| 233 | const struct xt_standard_target *t = (void *)ipt_get_target_c(s); | 233 | const struct xt_standard_target *t = (void *)ipt_get_target_c(s); |
| 234 | 234 | ||
| 235 | if (strcmp(t->target.u.kernel.target->name, IPT_ERROR_TARGET) == 0) { | 235 | if (strcmp(t->target.u.kernel.target->name, XT_ERROR_TARGET) == 0) { |
| 236 | /* Head of user chain: ERROR target with chainname */ | 236 | /* Head of user chain: ERROR target with chainname */ |
| 237 | *chainname = t->target.data; | 237 | *chainname = t->target.data; |
| 238 | (*rulenum) = 0; | 238 | (*rulenum) = 0; |
| @@ -241,7 +241,7 @@ get_chainname_rulenum(const struct ipt_entry *s, const struct ipt_entry *e, | |||
| 241 | 241 | ||
| 242 | if (s->target_offset == sizeof(struct ipt_entry) && | 242 | if (s->target_offset == sizeof(struct ipt_entry) && |
| 243 | strcmp(t->target.u.kernel.target->name, | 243 | strcmp(t->target.u.kernel.target->name, |
| 244 | IPT_STANDARD_TARGET) == 0 && | 244 | XT_STANDARD_TARGET) == 0 && |
| 245 | t->verdict < 0 && | 245 | t->verdict < 0 && |
| 246 | unconditional(&s->ip)) { | 246 | unconditional(&s->ip)) { |
| 247 | /* Tail of chains: STANDARD target (return/policy) */ | 247 | /* Tail of chains: STANDARD target (return/policy) */ |
| @@ -383,7 +383,7 @@ ipt_do_table(struct sk_buff *skb, | |||
| 383 | v = ((struct xt_standard_target *)t)->verdict; | 383 | v = ((struct xt_standard_target *)t)->verdict; |
| 384 | if (v < 0) { | 384 | if (v < 0) { |
| 385 | /* Pop from stack? */ | 385 | /* Pop from stack? */ |
| 386 | if (v != IPT_RETURN) { | 386 | if (v != XT_RETURN) { |
| 387 | verdict = (unsigned)(-v) - 1; | 387 | verdict = (unsigned)(-v) - 1; |
| 388 | break; | 388 | break; |
| 389 | } | 389 | } |
| @@ -421,7 +421,7 @@ ipt_do_table(struct sk_buff *skb, | |||
| 421 | verdict = t->u.kernel.target->target(skb, &acpar); | 421 | verdict = t->u.kernel.target->target(skb, &acpar); |
| 422 | /* Target might have changed stuff. */ | 422 | /* Target might have changed stuff. */ |
| 423 | ip = ip_hdr(skb); | 423 | ip = ip_hdr(skb); |
| 424 | if (verdict == IPT_CONTINUE) | 424 | if (verdict == XT_CONTINUE) |
| 425 | e = ipt_next_entry(e); | 425 | e = ipt_next_entry(e); |
| 426 | else | 426 | else |
| 427 | /* Verdict */ | 427 | /* Verdict */ |
| @@ -475,13 +475,13 @@ mark_source_chains(const struct xt_table_info *newinfo, | |||
| 475 | /* Unconditional return/END. */ | 475 | /* Unconditional return/END. */ |
| 476 | if ((e->target_offset == sizeof(struct ipt_entry) && | 476 | if ((e->target_offset == sizeof(struct ipt_entry) && |
| 477 | (strcmp(t->target.u.user.name, | 477 | (strcmp(t->target.u.user.name, |
| 478 | IPT_STANDARD_TARGET) == 0) && | 478 | XT_STANDARD_TARGET) == 0) && |
| 479 | t->verdict < 0 && unconditional(&e->ip)) || | 479 | t->verdict < 0 && unconditional(&e->ip)) || |
| 480 | visited) { | 480 | visited) { |
| 481 | unsigned int oldpos, size; | 481 | unsigned int oldpos, size; |
| 482 | 482 | ||
| 483 | if ((strcmp(t->target.u.user.name, | 483 | if ((strcmp(t->target.u.user.name, |
| 484 | IPT_STANDARD_TARGET) == 0) && | 484 | XT_STANDARD_TARGET) == 0) && |
| 485 | t->verdict < -NF_MAX_VERDICT - 1) { | 485 | t->verdict < -NF_MAX_VERDICT - 1) { |
| 486 | duprintf("mark_source_chains: bad " | 486 | duprintf("mark_source_chains: bad " |
| 487 | "negative verdict (%i)\n", | 487 | "negative verdict (%i)\n", |
| @@ -524,7 +524,7 @@ mark_source_chains(const struct xt_table_info *newinfo, | |||
| 524 | int newpos = t->verdict; | 524 | int newpos = t->verdict; |
| 525 | 525 | ||
| 526 | if (strcmp(t->target.u.user.name, | 526 | if (strcmp(t->target.u.user.name, |
| 527 | IPT_STANDARD_TARGET) == 0 && | 527 | XT_STANDARD_TARGET) == 0 && |
| 528 | newpos >= 0) { | 528 | newpos >= 0) { |
| 529 | if (newpos > newinfo->size - | 529 | if (newpos > newinfo->size - |
| 530 | sizeof(struct ipt_entry)) { | 530 | sizeof(struct ipt_entry)) { |
| @@ -2176,7 +2176,7 @@ static int icmp_checkentry(const struct xt_mtchk_param *par) | |||
| 2176 | 2176 | ||
| 2177 | static struct xt_target ipt_builtin_tg[] __read_mostly = { | 2177 | static struct xt_target ipt_builtin_tg[] __read_mostly = { |
| 2178 | { | 2178 | { |
| 2179 | .name = IPT_STANDARD_TARGET, | 2179 | .name = XT_STANDARD_TARGET, |
| 2180 | .targetsize = sizeof(int), | 2180 | .targetsize = sizeof(int), |
| 2181 | .family = NFPROTO_IPV4, | 2181 | .family = NFPROTO_IPV4, |
| 2182 | #ifdef CONFIG_COMPAT | 2182 | #ifdef CONFIG_COMPAT |
| @@ -2186,7 +2186,7 @@ static struct xt_target ipt_builtin_tg[] __read_mostly = { | |||
| 2186 | #endif | 2186 | #endif |
| 2187 | }, | 2187 | }, |
| 2188 | { | 2188 | { |
| 2189 | .name = IPT_ERROR_TARGET, | 2189 | .name = XT_ERROR_TARGET, |
| 2190 | .target = ipt_error, | 2190 | .target = ipt_error, |
| 2191 | .targetsize = XT_FUNCTION_MAXNAMELEN, | 2191 | .targetsize = XT_FUNCTION_MAXNAMELEN, |
| 2192 | .family = NFPROTO_IPV4, | 2192 | .family = NFPROTO_IPV4, |
diff --git a/net/ipv6/netfilter/ip6_tables.c b/net/ipv6/netfilter/ip6_tables.c index c7334c10a4b3..c683e9e7023b 100644 --- a/net/ipv6/netfilter/ip6_tables.c +++ b/net/ipv6/netfilter/ip6_tables.c | |||
| @@ -262,7 +262,7 @@ get_chainname_rulenum(const struct ip6t_entry *s, const struct ip6t_entry *e, | |||
| 262 | { | 262 | { |
| 263 | const struct xt_standard_target *t = (void *)ip6t_get_target_c(s); | 263 | const struct xt_standard_target *t = (void *)ip6t_get_target_c(s); |
| 264 | 264 | ||
| 265 | if (strcmp(t->target.u.kernel.target->name, IP6T_ERROR_TARGET) == 0) { | 265 | if (strcmp(t->target.u.kernel.target->name, XT_ERROR_TARGET) == 0) { |
| 266 | /* Head of user chain: ERROR target with chainname */ | 266 | /* Head of user chain: ERROR target with chainname */ |
| 267 | *chainname = t->target.data; | 267 | *chainname = t->target.data; |
| 268 | (*rulenum) = 0; | 268 | (*rulenum) = 0; |
| @@ -271,7 +271,7 @@ get_chainname_rulenum(const struct ip6t_entry *s, const struct ip6t_entry *e, | |||
| 271 | 271 | ||
| 272 | if (s->target_offset == sizeof(struct ip6t_entry) && | 272 | if (s->target_offset == sizeof(struct ip6t_entry) && |
| 273 | strcmp(t->target.u.kernel.target->name, | 273 | strcmp(t->target.u.kernel.target->name, |
| 274 | IP6T_STANDARD_TARGET) == 0 && | 274 | XT_STANDARD_TARGET) == 0 && |
| 275 | t->verdict < 0 && | 275 | t->verdict < 0 && |
| 276 | unconditional(&s->ipv6)) { | 276 | unconditional(&s->ipv6)) { |
| 277 | /* Tail of chains: STANDARD target (return/policy) */ | 277 | /* Tail of chains: STANDARD target (return/policy) */ |
| @@ -406,7 +406,7 @@ ip6t_do_table(struct sk_buff *skb, | |||
| 406 | v = ((struct xt_standard_target *)t)->verdict; | 406 | v = ((struct xt_standard_target *)t)->verdict; |
| 407 | if (v < 0) { | 407 | if (v < 0) { |
| 408 | /* Pop from stack? */ | 408 | /* Pop from stack? */ |
| 409 | if (v != IP6T_RETURN) { | 409 | if (v != XT_RETURN) { |
| 410 | verdict = (unsigned)(-v) - 1; | 410 | verdict = (unsigned)(-v) - 1; |
| 411 | break; | 411 | break; |
| 412 | } | 412 | } |
| @@ -434,7 +434,7 @@ ip6t_do_table(struct sk_buff *skb, | |||
| 434 | acpar.targinfo = t->data; | 434 | acpar.targinfo = t->data; |
| 435 | 435 | ||
| 436 | verdict = t->u.kernel.target->target(skb, &acpar); | 436 | verdict = t->u.kernel.target->target(skb, &acpar); |
| 437 | if (verdict == IP6T_CONTINUE) | 437 | if (verdict == XT_CONTINUE) |
| 438 | e = ip6t_next_entry(e); | 438 | e = ip6t_next_entry(e); |
| 439 | else | 439 | else |
| 440 | /* Verdict */ | 440 | /* Verdict */ |
| @@ -488,13 +488,13 @@ mark_source_chains(const struct xt_table_info *newinfo, | |||
| 488 | /* Unconditional return/END. */ | 488 | /* Unconditional return/END. */ |
| 489 | if ((e->target_offset == sizeof(struct ip6t_entry) && | 489 | if ((e->target_offset == sizeof(struct ip6t_entry) && |
| 490 | (strcmp(t->target.u.user.name, | 490 | (strcmp(t->target.u.user.name, |
| 491 | IP6T_STANDARD_TARGET) == 0) && | 491 | XT_STANDARD_TARGET) == 0) && |
| 492 | t->verdict < 0 && | 492 | t->verdict < 0 && |
| 493 | unconditional(&e->ipv6)) || visited) { | 493 | unconditional(&e->ipv6)) || visited) { |
| 494 | unsigned int oldpos, size; | 494 | unsigned int oldpos, size; |
| 495 | 495 | ||
| 496 | if ((strcmp(t->target.u.user.name, | 496 | if ((strcmp(t->target.u.user.name, |
| 497 | IP6T_STANDARD_TARGET) == 0) && | 497 | XT_STANDARD_TARGET) == 0) && |
| 498 | t->verdict < -NF_MAX_VERDICT - 1) { | 498 | t->verdict < -NF_MAX_VERDICT - 1) { |
| 499 | duprintf("mark_source_chains: bad " | 499 | duprintf("mark_source_chains: bad " |
| 500 | "negative verdict (%i)\n", | 500 | "negative verdict (%i)\n", |
| @@ -537,7 +537,7 @@ mark_source_chains(const struct xt_table_info *newinfo, | |||
| 537 | int newpos = t->verdict; | 537 | int newpos = t->verdict; |
| 538 | 538 | ||
| 539 | if (strcmp(t->target.u.user.name, | 539 | if (strcmp(t->target.u.user.name, |
| 540 | IP6T_STANDARD_TARGET) == 0 && | 540 | XT_STANDARD_TARGET) == 0 && |
| 541 | newpos >= 0) { | 541 | newpos >= 0) { |
| 542 | if (newpos > newinfo->size - | 542 | if (newpos > newinfo->size - |
| 543 | sizeof(struct ip6t_entry)) { | 543 | sizeof(struct ip6t_entry)) { |
| @@ -2191,7 +2191,7 @@ static int icmp6_checkentry(const struct xt_mtchk_param *par) | |||
| 2191 | /* The built-in targets: standard (NULL) and error. */ | 2191 | /* The built-in targets: standard (NULL) and error. */ |
| 2192 | static struct xt_target ip6t_builtin_tg[] __read_mostly = { | 2192 | static struct xt_target ip6t_builtin_tg[] __read_mostly = { |
| 2193 | { | 2193 | { |
| 2194 | .name = IP6T_STANDARD_TARGET, | 2194 | .name = XT_STANDARD_TARGET, |
| 2195 | .targetsize = sizeof(int), | 2195 | .targetsize = sizeof(int), |
| 2196 | .family = NFPROTO_IPV6, | 2196 | .family = NFPROTO_IPV6, |
| 2197 | #ifdef CONFIG_COMPAT | 2197 | #ifdef CONFIG_COMPAT |
| @@ -2201,7 +2201,7 @@ static struct xt_target ip6t_builtin_tg[] __read_mostly = { | |||
| 2201 | #endif | 2201 | #endif |
| 2202 | }, | 2202 | }, |
| 2203 | { | 2203 | { |
| 2204 | .name = IP6T_ERROR_TARGET, | 2204 | .name = XT_ERROR_TARGET, |
| 2205 | .target = ip6t_error, | 2205 | .target = ip6t_error, |
| 2206 | .targetsize = XT_FUNCTION_MAXNAMELEN, | 2206 | .targetsize = XT_FUNCTION_MAXNAMELEN, |
| 2207 | .family = NFPROTO_IPV6, | 2207 | .family = NFPROTO_IPV6, |
diff --git a/net/sched/act_ipt.c b/net/sched/act_ipt.c index f6d464f993ef..8daef9632255 100644 --- a/net/sched/act_ipt.c +++ b/net/sched/act_ipt.c | |||
| @@ -230,7 +230,7 @@ static int tcf_ipt(struct sk_buff *skb, struct tc_action *a, | |||
| 230 | result = TC_ACT_SHOT; | 230 | result = TC_ACT_SHOT; |
| 231 | ipt->tcf_qstats.drops++; | 231 | ipt->tcf_qstats.drops++; |
| 232 | break; | 232 | break; |
| 233 | case IPT_CONTINUE: | 233 | case XT_CONTINUE: |
| 234 | result = TC_ACT_PIPE; | 234 | result = TC_ACT_PIPE; |
| 235 | break; | 235 | break; |
| 236 | default: | 236 | default: |
