mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-12-12 21:44:06 +08:00
netfilter: iptables: allow use of ipt_do_table as hookfn
This is possible now that the xt_table structure is passed in via *priv. Signed-off-by: Florian Westphal <fw@strlen.de> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
This commit is contained in:
parent
0d7308c0ff
commit
8844e01062
@ -63,9 +63,9 @@ struct ipt_error {
|
||||
}
|
||||
|
||||
extern void *ipt_alloc_initial_table(const struct xt_table *);
|
||||
extern unsigned int ipt_do_table(struct sk_buff *skb,
|
||||
const struct nf_hook_state *state,
|
||||
struct xt_table *table);
|
||||
extern unsigned int ipt_do_table(void *priv,
|
||||
struct sk_buff *skb,
|
||||
const struct nf_hook_state *state);
|
||||
|
||||
#ifdef CONFIG_NETFILTER_XTABLES_COMPAT
|
||||
#include <net/compat.h>
|
||||
|
@ -222,10 +222,11 @@ struct ipt_entry *ipt_next_entry(const struct ipt_entry *entry)
|
||||
|
||||
/* Returns one of the generic firewall policies, like NF_ACCEPT. */
|
||||
unsigned int
|
||||
ipt_do_table(struct sk_buff *skb,
|
||||
const struct nf_hook_state *state,
|
||||
struct xt_table *table)
|
||||
ipt_do_table(void *priv,
|
||||
struct sk_buff *skb,
|
||||
const struct nf_hook_state *state)
|
||||
{
|
||||
const struct xt_table *table = priv;
|
||||
unsigned int hook = state->hook;
|
||||
static const char nulldevname[IFNAMSIZ] __attribute__((aligned(sizeof(long))));
|
||||
const struct iphdr *ip;
|
||||
|
@ -28,13 +28,6 @@ static const struct xt_table packet_filter = {
|
||||
.priority = NF_IP_PRI_FILTER,
|
||||
};
|
||||
|
||||
static unsigned int
|
||||
iptable_filter_hook(void *priv, struct sk_buff *skb,
|
||||
const struct nf_hook_state *state)
|
||||
{
|
||||
return ipt_do_table(skb, state, priv);
|
||||
}
|
||||
|
||||
static struct nf_hook_ops *filter_ops __read_mostly;
|
||||
|
||||
/* Default to forward because I got too much mail already. */
|
||||
@ -90,7 +83,7 @@ static int __init iptable_filter_init(void)
|
||||
if (ret < 0)
|
||||
return ret;
|
||||
|
||||
filter_ops = xt_hook_ops_alloc(&packet_filter, iptable_filter_hook);
|
||||
filter_ops = xt_hook_ops_alloc(&packet_filter, ipt_do_table);
|
||||
if (IS_ERR(filter_ops)) {
|
||||
xt_unregister_template(&packet_filter);
|
||||
return PTR_ERR(filter_ops);
|
||||
|
@ -34,7 +34,7 @@ static const struct xt_table packet_mangler = {
|
||||
};
|
||||
|
||||
static unsigned int
|
||||
ipt_mangle_out(struct sk_buff *skb, const struct nf_hook_state *state, void *priv)
|
||||
ipt_mangle_out(void *priv, struct sk_buff *skb, const struct nf_hook_state *state)
|
||||
{
|
||||
unsigned int ret;
|
||||
const struct iphdr *iph;
|
||||
@ -50,7 +50,7 @@ ipt_mangle_out(struct sk_buff *skb, const struct nf_hook_state *state, void *pri
|
||||
daddr = iph->daddr;
|
||||
tos = iph->tos;
|
||||
|
||||
ret = ipt_do_table(skb, state, priv);
|
||||
ret = ipt_do_table(priv, skb, state);
|
||||
/* Reroute for ANY change. */
|
||||
if (ret != NF_DROP && ret != NF_STOLEN) {
|
||||
iph = ip_hdr(skb);
|
||||
@ -75,8 +75,8 @@ iptable_mangle_hook(void *priv,
|
||||
const struct nf_hook_state *state)
|
||||
{
|
||||
if (state->hook == NF_INET_LOCAL_OUT)
|
||||
return ipt_mangle_out(skb, state, priv);
|
||||
return ipt_do_table(skb, state, priv);
|
||||
return ipt_mangle_out(priv, skb, state);
|
||||
return ipt_do_table(priv, skb, state);
|
||||
}
|
||||
|
||||
static struct nf_hook_ops *mangle_ops __read_mostly;
|
||||
|
@ -29,34 +29,27 @@ static const struct xt_table nf_nat_ipv4_table = {
|
||||
.af = NFPROTO_IPV4,
|
||||
};
|
||||
|
||||
static unsigned int iptable_nat_do_chain(void *priv,
|
||||
struct sk_buff *skb,
|
||||
const struct nf_hook_state *state)
|
||||
{
|
||||
return ipt_do_table(skb, state, priv);
|
||||
}
|
||||
|
||||
static const struct nf_hook_ops nf_nat_ipv4_ops[] = {
|
||||
{
|
||||
.hook = iptable_nat_do_chain,
|
||||
.hook = ipt_do_table,
|
||||
.pf = NFPROTO_IPV4,
|
||||
.hooknum = NF_INET_PRE_ROUTING,
|
||||
.priority = NF_IP_PRI_NAT_DST,
|
||||
},
|
||||
{
|
||||
.hook = iptable_nat_do_chain,
|
||||
.hook = ipt_do_table,
|
||||
.pf = NFPROTO_IPV4,
|
||||
.hooknum = NF_INET_POST_ROUTING,
|
||||
.priority = NF_IP_PRI_NAT_SRC,
|
||||
},
|
||||
{
|
||||
.hook = iptable_nat_do_chain,
|
||||
.hook = ipt_do_table,
|
||||
.pf = NFPROTO_IPV4,
|
||||
.hooknum = NF_INET_LOCAL_OUT,
|
||||
.priority = NF_IP_PRI_NAT_DST,
|
||||
},
|
||||
{
|
||||
.hook = iptable_nat_do_chain,
|
||||
.hook = ipt_do_table,
|
||||
.pf = NFPROTO_IPV4,
|
||||
.hooknum = NF_INET_LOCAL_IN,
|
||||
.priority = NF_IP_PRI_NAT_SRC,
|
||||
|
@ -32,14 +32,6 @@ static const struct xt_table packet_raw_before_defrag = {
|
||||
.priority = NF_IP_PRI_RAW_BEFORE_DEFRAG,
|
||||
};
|
||||
|
||||
/* The work comes in here from netfilter.c. */
|
||||
static unsigned int
|
||||
iptable_raw_hook(void *priv, struct sk_buff *skb,
|
||||
const struct nf_hook_state *state)
|
||||
{
|
||||
return ipt_do_table(skb, state, priv);
|
||||
}
|
||||
|
||||
static struct nf_hook_ops *rawtable_ops __read_mostly;
|
||||
|
||||
static int iptable_raw_table_init(struct net *net)
|
||||
@ -90,7 +82,7 @@ static int __init iptable_raw_init(void)
|
||||
if (ret < 0)
|
||||
return ret;
|
||||
|
||||
rawtable_ops = xt_hook_ops_alloc(table, iptable_raw_hook);
|
||||
rawtable_ops = xt_hook_ops_alloc(table, ipt_do_table);
|
||||
if (IS_ERR(rawtable_ops)) {
|
||||
xt_unregister_template(table);
|
||||
return PTR_ERR(rawtable_ops);
|
||||
|
@ -33,13 +33,6 @@ static const struct xt_table security_table = {
|
||||
.priority = NF_IP_PRI_SECURITY,
|
||||
};
|
||||
|
||||
static unsigned int
|
||||
iptable_security_hook(void *priv, struct sk_buff *skb,
|
||||
const struct nf_hook_state *state)
|
||||
{
|
||||
return ipt_do_table(skb, state, priv);
|
||||
}
|
||||
|
||||
static struct nf_hook_ops *sectbl_ops __read_mostly;
|
||||
|
||||
static int iptable_security_table_init(struct net *net)
|
||||
@ -78,7 +71,7 @@ static int __init iptable_security_init(void)
|
||||
if (ret < 0)
|
||||
return ret;
|
||||
|
||||
sectbl_ops = xt_hook_ops_alloc(&security_table, iptable_security_hook);
|
||||
sectbl_ops = xt_hook_ops_alloc(&security_table, ipt_do_table);
|
||||
if (IS_ERR(sectbl_ops)) {
|
||||
xt_unregister_template(&security_table);
|
||||
return PTR_ERR(sectbl_ops);
|
||||
|
Loading…
Reference in New Issue
Block a user