|
@@ -256,11 +256,10 @@ EXPORT_SYMBOL_GPL(nf_nat_icmp_reply_translation);
|
|
|
|
|
|
unsigned int
|
|
|
nf_nat_ipv4_fn(const struct nf_hook_ops *ops, struct sk_buff *skb,
|
|
|
- const struct net_device *in, const struct net_device *out,
|
|
|
+ const struct nf_hook_state *state,
|
|
|
unsigned int (*do_chain)(const struct nf_hook_ops *ops,
|
|
|
struct sk_buff *skb,
|
|
|
- const struct net_device *in,
|
|
|
- const struct net_device *out,
|
|
|
+ const struct nf_hook_state *state,
|
|
|
struct nf_conn *ct))
|
|
|
{
|
|
|
struct nf_conn *ct;
|
|
@@ -309,7 +308,7 @@ nf_nat_ipv4_fn(const struct nf_hook_ops *ops, struct sk_buff *skb,
|
|
|
if (!nf_nat_initialized(ct, maniptype)) {
|
|
|
unsigned int ret;
|
|
|
|
|
|
- ret = do_chain(ops, skb, in, out, ct);
|
|
|
+ ret = do_chain(ops, skb, state, ct);
|
|
|
if (ret != NF_ACCEPT)
|
|
|
return ret;
|
|
|
|
|
@@ -323,7 +322,8 @@ nf_nat_ipv4_fn(const struct nf_hook_ops *ops, struct sk_buff *skb,
|
|
|
pr_debug("Already setup manip %s for ct %p\n",
|
|
|
maniptype == NF_NAT_MANIP_SRC ? "SRC" : "DST",
|
|
|
ct);
|
|
|
- if (nf_nat_oif_changed(ops->hooknum, ctinfo, nat, out))
|
|
|
+ if (nf_nat_oif_changed(ops->hooknum, ctinfo, nat,
|
|
|
+ state->out))
|
|
|
goto oif_changed;
|
|
|
}
|
|
|
break;
|
|
@@ -332,7 +332,7 @@ nf_nat_ipv4_fn(const struct nf_hook_ops *ops, struct sk_buff *skb,
|
|
|
/* ESTABLISHED */
|
|
|
NF_CT_ASSERT(ctinfo == IP_CT_ESTABLISHED ||
|
|
|
ctinfo == IP_CT_ESTABLISHED_REPLY);
|
|
|
- if (nf_nat_oif_changed(ops->hooknum, ctinfo, nat, out))
|
|
|
+ if (nf_nat_oif_changed(ops->hooknum, ctinfo, nat, state->out))
|
|
|
goto oif_changed;
|
|
|
}
|
|
|
|
|
@@ -346,17 +346,16 @@ EXPORT_SYMBOL_GPL(nf_nat_ipv4_fn);
|
|
|
|
|
|
unsigned int
|
|
|
nf_nat_ipv4_in(const struct nf_hook_ops *ops, struct sk_buff *skb,
|
|
|
- const struct net_device *in, const struct net_device *out,
|
|
|
+ const struct nf_hook_state *state,
|
|
|
unsigned int (*do_chain)(const struct nf_hook_ops *ops,
|
|
|
struct sk_buff *skb,
|
|
|
- const struct net_device *in,
|
|
|
- const struct net_device *out,
|
|
|
+ const struct nf_hook_state *state,
|
|
|
struct nf_conn *ct))
|
|
|
{
|
|
|
unsigned int ret;
|
|
|
__be32 daddr = ip_hdr(skb)->daddr;
|
|
|
|
|
|
- ret = nf_nat_ipv4_fn(ops, skb, in, out, do_chain);
|
|
|
+ ret = nf_nat_ipv4_fn(ops, skb, state, do_chain);
|
|
|
if (ret != NF_DROP && ret != NF_STOLEN &&
|
|
|
daddr != ip_hdr(skb)->daddr)
|
|
|
skb_dst_drop(skb);
|
|
@@ -367,11 +366,10 @@ EXPORT_SYMBOL_GPL(nf_nat_ipv4_in);
|
|
|
|
|
|
unsigned int
|
|
|
nf_nat_ipv4_out(const struct nf_hook_ops *ops, struct sk_buff *skb,
|
|
|
- const struct net_device *in, const struct net_device *out,
|
|
|
+ const struct nf_hook_state *state,
|
|
|
unsigned int (*do_chain)(const struct nf_hook_ops *ops,
|
|
|
struct sk_buff *skb,
|
|
|
- const struct net_device *in,
|
|
|
- const struct net_device *out,
|
|
|
+ const struct nf_hook_state *state,
|
|
|
struct nf_conn *ct))
|
|
|
{
|
|
|
#ifdef CONFIG_XFRM
|
|
@@ -386,7 +384,7 @@ nf_nat_ipv4_out(const struct nf_hook_ops *ops, struct sk_buff *skb,
|
|
|
ip_hdrlen(skb) < sizeof(struct iphdr))
|
|
|
return NF_ACCEPT;
|
|
|
|
|
|
- ret = nf_nat_ipv4_fn(ops, skb, in, out, do_chain);
|
|
|
+ ret = nf_nat_ipv4_fn(ops, skb, state, do_chain);
|
|
|
#ifdef CONFIG_XFRM
|
|
|
if (ret != NF_DROP && ret != NF_STOLEN &&
|
|
|
!(IPCB(skb)->flags & IPSKB_XFRM_TRANSFORMED) &&
|
|
@@ -410,11 +408,10 @@ EXPORT_SYMBOL_GPL(nf_nat_ipv4_out);
|
|
|
|
|
|
unsigned int
|
|
|
nf_nat_ipv4_local_fn(const struct nf_hook_ops *ops, struct sk_buff *skb,
|
|
|
- const struct net_device *in, const struct net_device *out,
|
|
|
+ const struct nf_hook_state *state,
|
|
|
unsigned int (*do_chain)(const struct nf_hook_ops *ops,
|
|
|
struct sk_buff *skb,
|
|
|
- const struct net_device *in,
|
|
|
- const struct net_device *out,
|
|
|
+ const struct nf_hook_state *state,
|
|
|
struct nf_conn *ct))
|
|
|
{
|
|
|
const struct nf_conn *ct;
|
|
@@ -427,7 +424,7 @@ nf_nat_ipv4_local_fn(const struct nf_hook_ops *ops, struct sk_buff *skb,
|
|
|
ip_hdrlen(skb) < sizeof(struct iphdr))
|
|
|
return NF_ACCEPT;
|
|
|
|
|
|
- ret = nf_nat_ipv4_fn(ops, skb, in, out, do_chain);
|
|
|
+ ret = nf_nat_ipv4_fn(ops, skb, state, do_chain);
|
|
|
if (ret != NF_DROP && ret != NF_STOLEN &&
|
|
|
(ct = nf_ct_get(skb, &ctinfo)) != NULL) {
|
|
|
enum ip_conntrack_dir dir = CTINFO2DIR(ctinfo);
|