forked from Minki/linux
netfilter: replace old NF_ARP calls with NFPROTO_ARP
(Supplements: ee999d8b95
)
NFPROTO_ARP actually has a different value from NF_ARP, so ensure all
callers use the new value so that packets _do_ get delivered to the
registered hooks.
Signed-off-by: Jan Engelhardt <jengelh@medozas.de>
Signed-off-by: Patrick McHardy <kaber@trash.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
parent
67671841df
commit
fdc9314cbe
@ -719,7 +719,7 @@ static unsigned int br_nf_forward_arp(unsigned int hook, struct sk_buff *skb,
|
||||
return NF_ACCEPT;
|
||||
}
|
||||
*d = (struct net_device *)in;
|
||||
NF_HOOK(NF_ARP, NF_ARP_FORWARD, skb, (struct net_device *)in,
|
||||
NF_HOOK(NFPROTO_ARP, NF_ARP_FORWARD, skb, (struct net_device *)in,
|
||||
(struct net_device *)out, br_nf_forward_finish);
|
||||
|
||||
return NF_STOLEN;
|
||||
|
@ -663,7 +663,7 @@ out:
|
||||
void arp_xmit(struct sk_buff *skb)
|
||||
{
|
||||
/* Send it off, maybe filter it using firewalling first. */
|
||||
NF_HOOK(NF_ARP, NF_ARP_OUT, skb, NULL, skb->dev, dev_queue_xmit);
|
||||
NF_HOOK(NFPROTO_ARP, NF_ARP_OUT, skb, NULL, skb->dev, dev_queue_xmit);
|
||||
}
|
||||
|
||||
/*
|
||||
@ -928,7 +928,7 @@ static int arp_rcv(struct sk_buff *skb, struct net_device *dev,
|
||||
|
||||
memset(NEIGH_CB(skb), 0, sizeof(struct neighbour_cb));
|
||||
|
||||
return NF_HOOK(NF_ARP, NF_ARP_IN, skb, dev, NULL, arp_process);
|
||||
return NF_HOOK(NFPROTO_ARP, NF_ARP_IN, skb, dev, NULL, arp_process);
|
||||
|
||||
freeskb:
|
||||
kfree_skb(skb);
|
||||
|
@ -48,7 +48,7 @@ static struct xt_target nfqueue_tg_reg[] __read_mostly = {
|
||||
},
|
||||
{
|
||||
.name = "NFQUEUE",
|
||||
.family = NF_ARP,
|
||||
.family = NFPROTO_ARP,
|
||||
.target = nfqueue_tg,
|
||||
.targetsize = sizeof(struct xt_NFQ_info),
|
||||
.me = THIS_MODULE,
|
||||
|
Loading…
Reference in New Issue
Block a user