···232232{233233 const struct xt_standard_target *t = (void *)ipt_get_target_c(s);234234235235- if (strcmp(t->target.u.kernel.target->name, IPT_ERROR_TARGET) == 0) {235235+ if (strcmp(t->target.u.kernel.target->name, XT_ERROR_TARGET) == 0) {236236 /* Head of user chain: ERROR target with chainname */237237 *chainname = t->target.data;238238 (*rulenum) = 0;···241241242242 if (s->target_offset == sizeof(struct ipt_entry) &&243243 strcmp(t->target.u.kernel.target->name,244244- IPT_STANDARD_TARGET) == 0 &&244244+ XT_STANDARD_TARGET) == 0 &&245245 t->verdict < 0 &&246246 unconditional(&s->ip)) {247247 /* Tail of chains: STANDARD target (return/policy) */···383383 v = ((struct xt_standard_target *)t)->verdict;384384 if (v < 0) {385385 /* Pop from stack? */386386- if (v != IPT_RETURN) {386386+ if (v != XT_RETURN) {387387 verdict = (unsigned)(-v) - 1;388388 break;389389 }···421421 verdict = t->u.kernel.target->target(skb, &acpar);422422 /* Target might have changed stuff. */423423 ip = ip_hdr(skb);424424- if (verdict == IPT_CONTINUE)424424+ if (verdict == XT_CONTINUE)425425 e = ipt_next_entry(e);426426 else427427 /* Verdict */···475475 /* Unconditional return/END. */476476 if ((e->target_offset == sizeof(struct ipt_entry) &&477477 (strcmp(t->target.u.user.name,478478- IPT_STANDARD_TARGET) == 0) &&478478+ XT_STANDARD_TARGET) == 0) &&479479 t->verdict < 0 && unconditional(&e->ip)) ||480480 visited) {481481 unsigned int oldpos, size;482482483483 if ((strcmp(t->target.u.user.name,484484- IPT_STANDARD_TARGET) == 0) &&484484+ XT_STANDARD_TARGET) == 0) &&485485 t->verdict < -NF_MAX_VERDICT - 1) {486486 duprintf("mark_source_chains: bad "487487 "negative verdict (%i)\n",···524524 int newpos = t->verdict;525525526526 if (strcmp(t->target.u.user.name,527527- IPT_STANDARD_TARGET) == 0 &&527527+ XT_STANDARD_TARGET) == 0 &&528528 newpos >= 0) {529529 if (newpos > newinfo->size -530530 sizeof(struct ipt_entry)) {···2176217621772177static struct xt_target ipt_builtin_tg[] __read_mostly = {21782178 {21792179- .name = IPT_STANDARD_TARGET,21792179+ .name = XT_STANDARD_TARGET,21802180 .targetsize = sizeof(int),21812181 .family = NFPROTO_IPV4,21822182#ifdef CONFIG_COMPAT···21862186#endif21872187 },21882188 {21892189- .name = IPT_ERROR_TARGET,21892189+ .name = XT_ERROR_TARGET,21902190 .target = ipt_error,21912191 .targetsize = XT_FUNCTION_MAXNAMELEN,21922192 .family = NFPROTO_IPV4,
+9-9
net/ipv6/netfilter/ip6_tables.c
···262262{263263 const struct xt_standard_target *t = (void *)ip6t_get_target_c(s);264264265265- if (strcmp(t->target.u.kernel.target->name, IP6T_ERROR_TARGET) == 0) {265265+ if (strcmp(t->target.u.kernel.target->name, XT_ERROR_TARGET) == 0) {266266 /* Head of user chain: ERROR target with chainname */267267 *chainname = t->target.data;268268 (*rulenum) = 0;···271271272272 if (s->target_offset == sizeof(struct ip6t_entry) &&273273 strcmp(t->target.u.kernel.target->name,274274- IP6T_STANDARD_TARGET) == 0 &&274274+ XT_STANDARD_TARGET) == 0 &&275275 t->verdict < 0 &&276276 unconditional(&s->ipv6)) {277277 /* Tail of chains: STANDARD target (return/policy) */···406406 v = ((struct xt_standard_target *)t)->verdict;407407 if (v < 0) {408408 /* Pop from stack? */409409- if (v != IP6T_RETURN) {409409+ if (v != XT_RETURN) {410410 verdict = (unsigned)(-v) - 1;411411 break;412412 }···434434 acpar.targinfo = t->data;435435436436 verdict = t->u.kernel.target->target(skb, &acpar);437437- if (verdict == IP6T_CONTINUE)437437+ if (verdict == XT_CONTINUE)438438 e = ip6t_next_entry(e);439439 else440440 /* Verdict */···488488 /* Unconditional return/END. */489489 if ((e->target_offset == sizeof(struct ip6t_entry) &&490490 (strcmp(t->target.u.user.name,491491- IP6T_STANDARD_TARGET) == 0) &&491491+ XT_STANDARD_TARGET) == 0) &&492492 t->verdict < 0 &&493493 unconditional(&e->ipv6)) || visited) {494494 unsigned int oldpos, size;495495496496 if ((strcmp(t->target.u.user.name,497497- IP6T_STANDARD_TARGET) == 0) &&497497+ XT_STANDARD_TARGET) == 0) &&498498 t->verdict < -NF_MAX_VERDICT - 1) {499499 duprintf("mark_source_chains: bad "500500 "negative verdict (%i)\n",···537537 int newpos = t->verdict;538538539539 if (strcmp(t->target.u.user.name,540540- IP6T_STANDARD_TARGET) == 0 &&540540+ XT_STANDARD_TARGET) == 0 &&541541 newpos >= 0) {542542 if (newpos > newinfo->size -543543 sizeof(struct ip6t_entry)) {···21912191/* The built-in targets: standard (NULL) and error. */21922192static struct xt_target ip6t_builtin_tg[] __read_mostly = {21932193 {21942194- .name = IP6T_STANDARD_TARGET,21942194+ .name = XT_STANDARD_TARGET,21952195 .targetsize = sizeof(int),21962196 .family = NFPROTO_IPV6,21972197#ifdef CONFIG_COMPAT···22012201#endif22022202 },22032203 {22042204- .name = IP6T_ERROR_TARGET,22042204+ .name = XT_ERROR_TARGET,22052205 .target = ip6t_error,22062206 .targetsize = XT_FUNCTION_MAXNAMELEN,22072207 .family = NFPROTO_IPV6,
+1-1
net/sched/act_ipt.c
···230230 result = TC_ACT_SHOT;231231 ipt->tcf_qstats.drops++;232232 break;233233- case IPT_CONTINUE:233233+ case XT_CONTINUE:234234 result = TC_ACT_PIPE;235235 break;236236 default: