Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
L
linux-davinci
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Redmine
Redmine
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Operations
Operations
Metrics
Environments
Analytics
Analytics
CI / CD
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
linux
linux-davinci
Commits
f88e6a8a
Commit
f88e6a8a
authored
Jun 13, 2009
by
Jan Engelhardt
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
netfilter: xtables: switch table AFs to nfproto
Signed-off-by:
Jan Engelhardt
<
jengelh@medozas.de
>
parent
24c232d8
Changes
9
Show whitespace changes
Inline
Side-by-side
Showing
9 changed files
with
9 additions
and
9 deletions
+9
-9
net/ipv4/netfilter/iptable_filter.c
net/ipv4/netfilter/iptable_filter.c
+1
-1
net/ipv4/netfilter/iptable_mangle.c
net/ipv4/netfilter/iptable_mangle.c
+1
-1
net/ipv4/netfilter/iptable_raw.c
net/ipv4/netfilter/iptable_raw.c
+1
-1
net/ipv4/netfilter/iptable_security.c
net/ipv4/netfilter/iptable_security.c
+1
-1
net/ipv4/netfilter/nf_nat_rule.c
net/ipv4/netfilter/nf_nat_rule.c
+1
-1
net/ipv6/netfilter/ip6table_filter.c
net/ipv6/netfilter/ip6table_filter.c
+1
-1
net/ipv6/netfilter/ip6table_mangle.c
net/ipv6/netfilter/ip6table_mangle.c
+1
-1
net/ipv6/netfilter/ip6table_raw.c
net/ipv6/netfilter/ip6table_raw.c
+1
-1
net/ipv6/netfilter/ip6table_security.c
net/ipv6/netfilter/ip6table_security.c
+1
-1
No files found.
net/ipv4/netfilter/iptable_filter.c
View file @
f88e6a8a
...
@@ -57,7 +57,7 @@ static struct xt_table packet_filter = {
...
@@ -57,7 +57,7 @@ static struct xt_table packet_filter = {
.
name
=
"filter"
,
.
name
=
"filter"
,
.
valid_hooks
=
FILTER_VALID_HOOKS
,
.
valid_hooks
=
FILTER_VALID_HOOKS
,
.
me
=
THIS_MODULE
,
.
me
=
THIS_MODULE
,
.
af
=
AF_INET
,
.
af
=
NFPROTO_IPV4
,
};
};
/* The work comes in here from netfilter.c. */
/* The work comes in here from netfilter.c. */
...
...
net/ipv4/netfilter/iptable_mangle.c
View file @
f88e6a8a
...
@@ -68,7 +68,7 @@ static struct xt_table packet_mangler = {
...
@@ -68,7 +68,7 @@ static struct xt_table packet_mangler = {
.
name
=
"mangle"
,
.
name
=
"mangle"
,
.
valid_hooks
=
MANGLE_VALID_HOOKS
,
.
valid_hooks
=
MANGLE_VALID_HOOKS
,
.
me
=
THIS_MODULE
,
.
me
=
THIS_MODULE
,
.
af
=
AF_INET
,
.
af
=
NFPROTO_IPV4
,
};
};
/* The work comes in here from netfilter.c. */
/* The work comes in here from netfilter.c. */
...
...
net/ipv4/netfilter/iptable_raw.c
View file @
f88e6a8a
...
@@ -40,7 +40,7 @@ static struct xt_table packet_raw = {
...
@@ -40,7 +40,7 @@ static struct xt_table packet_raw = {
.
name
=
"raw"
,
.
name
=
"raw"
,
.
valid_hooks
=
RAW_VALID_HOOKS
,
.
valid_hooks
=
RAW_VALID_HOOKS
,
.
me
=
THIS_MODULE
,
.
me
=
THIS_MODULE
,
.
af
=
AF_INET
,
.
af
=
NFPROTO_IPV4
,
};
};
/* The work comes in here from netfilter.c. */
/* The work comes in here from netfilter.c. */
...
...
net/ipv4/netfilter/iptable_security.c
View file @
f88e6a8a
...
@@ -61,7 +61,7 @@ static struct xt_table security_table = {
...
@@ -61,7 +61,7 @@ static struct xt_table security_table = {
.
name
=
"security"
,
.
name
=
"security"
,
.
valid_hooks
=
SECURITY_VALID_HOOKS
,
.
valid_hooks
=
SECURITY_VALID_HOOKS
,
.
me
=
THIS_MODULE
,
.
me
=
THIS_MODULE
,
.
af
=
AF_INET
,
.
af
=
NFPROTO_IPV4
,
};
};
static
unsigned
int
static
unsigned
int
...
...
net/ipv4/netfilter/nf_nat_rule.c
View file @
f88e6a8a
...
@@ -62,7 +62,7 @@ static struct xt_table nat_table = {
...
@@ -62,7 +62,7 @@ static struct xt_table nat_table = {
.
name
=
"nat"
,
.
name
=
"nat"
,
.
valid_hooks
=
NAT_VALID_HOOKS
,
.
valid_hooks
=
NAT_VALID_HOOKS
,
.
me
=
THIS_MODULE
,
.
me
=
THIS_MODULE
,
.
af
=
AF_INET
,
.
af
=
NFPROTO_IPV4
,
};
};
/* Source NAT */
/* Source NAT */
...
...
net/ipv6/netfilter/ip6table_filter.c
View file @
f88e6a8a
...
@@ -55,7 +55,7 @@ static struct xt_table packet_filter = {
...
@@ -55,7 +55,7 @@ static struct xt_table packet_filter = {
.
name
=
"filter"
,
.
name
=
"filter"
,
.
valid_hooks
=
FILTER_VALID_HOOKS
,
.
valid_hooks
=
FILTER_VALID_HOOKS
,
.
me
=
THIS_MODULE
,
.
me
=
THIS_MODULE
,
.
af
=
AF_INET
6
,
.
af
=
NFPROTO_IPV
6
,
};
};
/* The work comes in here from netfilter.c. */
/* The work comes in here from netfilter.c. */
...
...
net/ipv6/netfilter/ip6table_mangle.c
View file @
f88e6a8a
...
@@ -61,7 +61,7 @@ static struct xt_table packet_mangler = {
...
@@ -61,7 +61,7 @@ static struct xt_table packet_mangler = {
.
name
=
"mangle"
,
.
name
=
"mangle"
,
.
valid_hooks
=
MANGLE_VALID_HOOKS
,
.
valid_hooks
=
MANGLE_VALID_HOOKS
,
.
me
=
THIS_MODULE
,
.
me
=
THIS_MODULE
,
.
af
=
AF_INET
6
,
.
af
=
NFPROTO_IPV
6
,
};
};
/* The work comes in here from netfilter.c. */
/* The work comes in here from netfilter.c. */
...
...
net/ipv6/netfilter/ip6table_raw.c
View file @
f88e6a8a
...
@@ -39,7 +39,7 @@ static struct xt_table packet_raw = {
...
@@ -39,7 +39,7 @@ static struct xt_table packet_raw = {
.
name
=
"raw"
,
.
name
=
"raw"
,
.
valid_hooks
=
RAW_VALID_HOOKS
,
.
valid_hooks
=
RAW_VALID_HOOKS
,
.
me
=
THIS_MODULE
,
.
me
=
THIS_MODULE
,
.
af
=
AF_INET
6
,
.
af
=
NFPROTO_IPV
6
,
};
};
/* The work comes in here from netfilter.c. */
/* The work comes in here from netfilter.c. */
...
...
net/ipv6/netfilter/ip6table_security.c
View file @
f88e6a8a
...
@@ -60,7 +60,7 @@ static struct xt_table security_table = {
...
@@ -60,7 +60,7 @@ static struct xt_table security_table = {
.
name
=
"security"
,
.
name
=
"security"
,
.
valid_hooks
=
SECURITY_VALID_HOOKS
,
.
valid_hooks
=
SECURITY_VALID_HOOKS
,
.
me
=
THIS_MODULE
,
.
me
=
THIS_MODULE
,
.
af
=
AF_INET
6
,
.
af
=
NFPROTO_IPV
6
,
};
};
static
unsigned
int
static
unsigned
int
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment