Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
L
linux
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
Kirill Smelkov
linux
Commits
4b560b44
Commit
4b560b44
authored
Jul 05, 2009
by
Jan Engelhardt
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
netfilter: xtables: substitute temporary defines by final name
Signed-off-by:
Jan Engelhardt
<
jengelh@medozas.de
>
parent
de74c169
Changes
97
Hide whitespace changes
Inline
Side-by-side
Showing
97 changed files
with
133 additions
and
123 deletions
+133
-123
include/linux/netfilter/x_tables.h
include/linux/netfilter/x_tables.h
+0
-2
net/bridge/netfilter/ebt_802_3.c
net/bridge/netfilter/ebt_802_3.c
+1
-1
net/bridge/netfilter/ebt_among.c
net/bridge/netfilter/ebt_among.c
+1
-1
net/bridge/netfilter/ebt_arp.c
net/bridge/netfilter/ebt_arp.c
+1
-1
net/bridge/netfilter/ebt_arpreply.c
net/bridge/netfilter/ebt_arpreply.c
+1
-1
net/bridge/netfilter/ebt_dnat.c
net/bridge/netfilter/ebt_dnat.c
+1
-1
net/bridge/netfilter/ebt_ip.c
net/bridge/netfilter/ebt_ip.c
+1
-1
net/bridge/netfilter/ebt_ip6.c
net/bridge/netfilter/ebt_ip6.c
+1
-1
net/bridge/netfilter/ebt_limit.c
net/bridge/netfilter/ebt_limit.c
+1
-1
net/bridge/netfilter/ebt_log.c
net/bridge/netfilter/ebt_log.c
+1
-1
net/bridge/netfilter/ebt_mark.c
net/bridge/netfilter/ebt_mark.c
+1
-1
net/bridge/netfilter/ebt_mark_m.c
net/bridge/netfilter/ebt_mark_m.c
+1
-1
net/bridge/netfilter/ebt_nflog.c
net/bridge/netfilter/ebt_nflog.c
+1
-1
net/bridge/netfilter/ebt_pkttype.c
net/bridge/netfilter/ebt_pkttype.c
+1
-1
net/bridge/netfilter/ebt_redirect.c
net/bridge/netfilter/ebt_redirect.c
+1
-1
net/bridge/netfilter/ebt_snat.c
net/bridge/netfilter/ebt_snat.c
+1
-1
net/bridge/netfilter/ebt_stp.c
net/bridge/netfilter/ebt_stp.c
+1
-1
net/bridge/netfilter/ebt_ulog.c
net/bridge/netfilter/ebt_ulog.c
+1
-1
net/bridge/netfilter/ebt_vlan.c
net/bridge/netfilter/ebt_vlan.c
+1
-1
net/ipv4/netfilter/arp_tables.c
net/ipv4/netfilter/arp_tables.c
+1
-1
net/ipv4/netfilter/arpt_mangle.c
net/ipv4/netfilter/arpt_mangle.c
+1
-1
net/ipv4/netfilter/ip_tables.c
net/ipv4/netfilter/ip_tables.c
+2
-2
net/ipv4/netfilter/ipt_CLUSTERIP.c
net/ipv4/netfilter/ipt_CLUSTERIP.c
+1
-1
net/ipv4/netfilter/ipt_ECN.c
net/ipv4/netfilter/ipt_ECN.c
+1
-1
net/ipv4/netfilter/ipt_LOG.c
net/ipv4/netfilter/ipt_LOG.c
+1
-1
net/ipv4/netfilter/ipt_MASQUERADE.c
net/ipv4/netfilter/ipt_MASQUERADE.c
+1
-1
net/ipv4/netfilter/ipt_NETMAP.c
net/ipv4/netfilter/ipt_NETMAP.c
+1
-1
net/ipv4/netfilter/ipt_REDIRECT.c
net/ipv4/netfilter/ipt_REDIRECT.c
+1
-1
net/ipv4/netfilter/ipt_REJECT.c
net/ipv4/netfilter/ipt_REJECT.c
+1
-1
net/ipv4/netfilter/ipt_ULOG.c
net/ipv4/netfilter/ipt_ULOG.c
+1
-1
net/ipv4/netfilter/ipt_addrtype.c
net/ipv4/netfilter/ipt_addrtype.c
+2
-2
net/ipv4/netfilter/ipt_ah.c
net/ipv4/netfilter/ipt_ah.c
+1
-1
net/ipv4/netfilter/ipt_ecn.c
net/ipv4/netfilter/ipt_ecn.c
+2
-1
net/ipv4/netfilter/nf_nat_rule.c
net/ipv4/netfilter/nf_nat_rule.c
+2
-2
net/ipv6/netfilter/ip6_tables.c
net/ipv6/netfilter/ip6_tables.c
+2
-2
net/ipv6/netfilter/ip6t_LOG.c
net/ipv6/netfilter/ip6t_LOG.c
+1
-1
net/ipv6/netfilter/ip6t_REJECT.c
net/ipv6/netfilter/ip6t_REJECT.c
+1
-1
net/ipv6/netfilter/ip6t_ah.c
net/ipv6/netfilter/ip6t_ah.c
+2
-1
net/ipv6/netfilter/ip6t_eui64.c
net/ipv6/netfilter/ip6t_eui64.c
+1
-1
net/ipv6/netfilter/ip6t_frag.c
net/ipv6/netfilter/ip6t_frag.c
+1
-1
net/ipv6/netfilter/ip6t_hbh.c
net/ipv6/netfilter/ip6t_hbh.c
+1
-1
net/ipv6/netfilter/ip6t_ipv6header.c
net/ipv6/netfilter/ip6t_ipv6header.c
+1
-1
net/ipv6/netfilter/ip6t_mh.c
net/ipv6/netfilter/ip6t_mh.c
+2
-1
net/ipv6/netfilter/ip6t_rt.c
net/ipv6/netfilter/ip6t_rt.c
+2
-1
net/netfilter/xt_CLASSIFY.c
net/netfilter/xt_CLASSIFY.c
+1
-1
net/netfilter/xt_CONNSECMARK.c
net/netfilter/xt_CONNSECMARK.c
+1
-1
net/netfilter/xt_CT.c
net/netfilter/xt_CT.c
+1
-1
net/netfilter/xt_DSCP.c
net/netfilter/xt_DSCP.c
+4
-4
net/netfilter/xt_HL.c
net/netfilter/xt_HL.c
+2
-2
net/netfilter/xt_LED.c
net/netfilter/xt_LED.c
+1
-1
net/netfilter/xt_NFLOG.c
net/netfilter/xt_NFLOG.c
+1
-1
net/netfilter/xt_NFQUEUE.c
net/netfilter/xt_NFQUEUE.c
+2
-2
net/netfilter/xt_NOTRACK.c
net/netfilter/xt_NOTRACK.c
+1
-1
net/netfilter/xt_RATEEST.c
net/netfilter/xt_RATEEST.c
+1
-1
net/netfilter/xt_SECMARK.c
net/netfilter/xt_SECMARK.c
+1
-1
net/netfilter/xt_TCPMSS.c
net/netfilter/xt_TCPMSS.c
+2
-2
net/netfilter/xt_TCPOPTSTRIP.c
net/netfilter/xt_TCPOPTSTRIP.c
+2
-2
net/netfilter/xt_TEE.c
net/netfilter/xt_TEE.c
+2
-2
net/netfilter/xt_TPROXY.c
net/netfilter/xt_TPROXY.c
+1
-1
net/netfilter/xt_TRACE.c
net/netfilter/xt_TRACE.c
+1
-1
net/netfilter/xt_cluster.c
net/netfilter/xt_cluster.c
+1
-1
net/netfilter/xt_comment.c
net/netfilter/xt_comment.c
+1
-1
net/netfilter/xt_connbytes.c
net/netfilter/xt_connbytes.c
+1
-1
net/netfilter/xt_connlimit.c
net/netfilter/xt_connlimit.c
+1
-1
net/netfilter/xt_connmark.c
net/netfilter/xt_connmark.c
+2
-2
net/netfilter/xt_conntrack.c
net/netfilter/xt_conntrack.c
+3
-3
net/netfilter/xt_dccp.c
net/netfilter/xt_dccp.c
+1
-1
net/netfilter/xt_dscp.c
net/netfilter/xt_dscp.c
+4
-3
net/netfilter/xt_esp.c
net/netfilter/xt_esp.c
+2
-1
net/netfilter/xt_hashlimit.c
net/netfilter/xt_hashlimit.c
+1
-1
net/netfilter/xt_helper.c
net/netfilter/xt_helper.c
+1
-1
net/netfilter/xt_hl.c
net/netfilter/xt_hl.c
+4
-2
net/netfilter/xt_iprange.c
net/netfilter/xt_iprange.c
+2
-2
net/netfilter/xt_length.c
net/netfilter/xt_length.c
+2
-2
net/netfilter/xt_limit.c
net/netfilter/xt_limit.c
+1
-1
net/netfilter/xt_mac.c
net/netfilter/xt_mac.c
+2
-1
net/netfilter/xt_mark.c
net/netfilter/xt_mark.c
+2
-2
net/netfilter/xt_multiport.c
net/netfilter/xt_multiport.c
+1
-1
net/netfilter/xt_osf.c
net/netfilter/xt_osf.c
+2
-2
net/netfilter/xt_owner.c
net/netfilter/xt_owner.c
+1
-1
net/netfilter/xt_physdev.c
net/netfilter/xt_physdev.c
+1
-1
net/netfilter/xt_pkttype.c
net/netfilter/xt_pkttype.c
+1
-1
net/netfilter/xt_policy.c
net/netfilter/xt_policy.c
+1
-1
net/netfilter/xt_quota.c
net/netfilter/xt_quota.c
+1
-1
net/netfilter/xt_rateest.c
net/netfilter/xt_rateest.c
+1
-1
net/netfilter/xt_realm.c
net/netfilter/xt_realm.c
+1
-1
net/netfilter/xt_recent.c
net/netfilter/xt_recent.c
+1
-1
net/netfilter/xt_sctp.c
net/netfilter/xt_sctp.c
+1
-1
net/netfilter/xt_socket.c
net/netfilter/xt_socket.c
+3
-3
net/netfilter/xt_state.c
net/netfilter/xt_state.c
+1
-1
net/netfilter/xt_statistic.c
net/netfilter/xt_statistic.c
+1
-1
net/netfilter/xt_string.c
net/netfilter/xt_string.c
+1
-1
net/netfilter/xt_tcpmss.c
net/netfilter/xt_tcpmss.c
+1
-1
net/netfilter/xt_tcpudp.c
net/netfilter/xt_tcpudp.c
+4
-2
net/netfilter/xt_time.c
net/netfilter/xt_time.c
+1
-1
net/netfilter/xt_u32.c
net/netfilter/xt_u32.c
+2
-1
net/sched/act_ipt.c
net/sched/act_ipt.c
+1
-1
No files found.
include/linux/netfilter/x_tables.h
View file @
4b560b44
...
...
@@ -182,8 +182,6 @@ struct xt_counters_info {
#include <linux/netdevice.h>
#define xt_match_param xt_action_param
#define xt_target_param xt_action_param
/**
* struct xt_action_param - parameters for matches/targets
*
...
...
net/bridge/netfilter/ebt_802_3.c
View file @
4b560b44
...
...
@@ -13,7 +13,7 @@
#include <linux/netfilter_bridge/ebt_802_3.h>
static
bool
ebt_802_3_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
ebt_802_3_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
ebt_802_3_info
*
info
=
par
->
matchinfo
;
const
struct
ebt_802_3_hdr
*
hdr
=
ebt_802_3_hdr
(
skb
);
...
...
net/bridge/netfilter/ebt_among.c
View file @
4b560b44
...
...
@@ -129,7 +129,7 @@ static int get_ip_src(const struct sk_buff *skb, __be32 *addr)
}
static
bool
ebt_among_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
ebt_among_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
ebt_among_info
*
info
=
par
->
matchinfo
;
const
char
*
dmac
,
*
smac
;
...
...
net/bridge/netfilter/ebt_arp.c
View file @
4b560b44
...
...
@@ -16,7 +16,7 @@
#include <linux/netfilter_bridge/ebt_arp.h>
static
bool
ebt_arp_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
ebt_arp_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
ebt_arp_info
*
info
=
par
->
matchinfo
;
const
struct
arphdr
*
ah
;
...
...
net/bridge/netfilter/ebt_arpreply.c
View file @
4b560b44
...
...
@@ -16,7 +16,7 @@
#include <linux/netfilter_bridge/ebt_arpreply.h>
static
unsigned
int
ebt_arpreply_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
ebt_arpreply_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
ebt_arpreply_info
*
info
=
par
->
targinfo
;
const
__be32
*
siptr
,
*
diptr
;
...
...
net/bridge/netfilter/ebt_dnat.c
View file @
4b560b44
...
...
@@ -15,7 +15,7 @@
#include <linux/netfilter_bridge/ebt_nat.h>
static
unsigned
int
ebt_dnat_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
ebt_dnat_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
ebt_nat_info
*
info
=
par
->
targinfo
;
...
...
net/bridge/netfilter/ebt_ip.c
View file @
4b560b44
...
...
@@ -25,7 +25,7 @@ struct tcpudphdr {
};
static
bool
ebt_ip_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
ebt_ip_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
ebt_ip_info
*
info
=
par
->
matchinfo
;
const
struct
iphdr
*
ih
;
...
...
net/bridge/netfilter/ebt_ip6.c
View file @
4b560b44
...
...
@@ -28,7 +28,7 @@ struct tcpudphdr {
};
static
bool
ebt_ip6_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
ebt_ip6_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
ebt_ip6_info
*
info
=
par
->
matchinfo
;
const
struct
ipv6hdr
*
ih6
;
...
...
net/bridge/netfilter/ebt_limit.c
View file @
4b560b44
...
...
@@ -32,7 +32,7 @@ static DEFINE_SPINLOCK(limit_lock);
#define CREDITS_PER_JIFFY POW2_BELOW32(MAX_CPJ)
static
bool
ebt_limit_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
ebt_limit_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
struct
ebt_limit_info
*
info
=
(
void
*
)
par
->
matchinfo
;
unsigned
long
now
=
jiffies
;
...
...
net/bridge/netfilter/ebt_log.c
View file @
4b560b44
...
...
@@ -171,7 +171,7 @@ ebt_log_packet(u_int8_t pf, unsigned int hooknum,
}
static
unsigned
int
ebt_log_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
ebt_log_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
ebt_log_info
*
info
=
par
->
targinfo
;
struct
nf_loginfo
li
;
...
...
net/bridge/netfilter/ebt_mark.c
View file @
4b560b44
...
...
@@ -19,7 +19,7 @@
#include <linux/netfilter_bridge/ebt_mark_t.h>
static
unsigned
int
ebt_mark_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
ebt_mark_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
ebt_mark_t_info
*
info
=
par
->
targinfo
;
int
action
=
info
->
target
&
-
16
;
...
...
net/bridge/netfilter/ebt_mark_m.c
View file @
4b560b44
...
...
@@ -13,7 +13,7 @@
#include <linux/netfilter_bridge/ebt_mark_m.h>
static
bool
ebt_mark_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
ebt_mark_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
ebt_mark_m_info
*
info
=
par
->
matchinfo
;
...
...
net/bridge/netfilter/ebt_nflog.c
View file @
4b560b44
...
...
@@ -20,7 +20,7 @@
#include <net/netfilter/nf_log.h>
static
unsigned
int
ebt_nflog_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
ebt_nflog_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
ebt_nflog_info
*
info
=
par
->
targinfo
;
struct
nf_loginfo
li
;
...
...
net/bridge/netfilter/ebt_pkttype.c
View file @
4b560b44
...
...
@@ -13,7 +13,7 @@
#include <linux/netfilter_bridge/ebt_pkttype.h>
static
bool
ebt_pkttype_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
ebt_pkttype_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
ebt_pkttype_info
*
info
=
par
->
matchinfo
;
...
...
net/bridge/netfilter/ebt_redirect.c
View file @
4b560b44
...
...
@@ -16,7 +16,7 @@
#include <linux/netfilter_bridge/ebt_redirect.h>
static
unsigned
int
ebt_redirect_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
ebt_redirect_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
ebt_redirect_info
*
info
=
par
->
targinfo
;
...
...
net/bridge/netfilter/ebt_snat.c
View file @
4b560b44
...
...
@@ -17,7 +17,7 @@
#include <linux/netfilter_bridge/ebt_nat.h>
static
unsigned
int
ebt_snat_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
ebt_snat_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
ebt_nat_info
*
info
=
par
->
targinfo
;
...
...
net/bridge/netfilter/ebt_stp.c
View file @
4b560b44
...
...
@@ -120,7 +120,7 @@ static bool ebt_filter_config(const struct ebt_stp_info *info,
}
static
bool
ebt_stp_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
ebt_stp_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
ebt_stp_info
*
info
=
par
->
matchinfo
;
const
struct
stp_header
*
sp
;
...
...
net/bridge/netfilter/ebt_ulog.c
View file @
4b560b44
...
...
@@ -243,7 +243,7 @@ static void ebt_log_packet(u_int8_t pf, unsigned int hooknum,
}
static
unsigned
int
ebt_ulog_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
ebt_ulog_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
ebt_ulog_packet
(
par
->
hooknum
,
skb
,
par
->
in
,
par
->
out
,
par
->
targinfo
,
NULL
);
...
...
net/bridge/netfilter/ebt_vlan.c
View file @
4b560b44
...
...
@@ -36,7 +36,7 @@ MODULE_LICENSE("GPL");
#define EXIT_ON_MISMATCH(_MATCH_,_MASK_) {if (!((info->_MATCH_ == _MATCH_)^!!(info->invflags & _MASK_))) return false; }
static
bool
ebt_vlan_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
ebt_vlan_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
ebt_vlan_info
*
info
=
par
->
matchinfo
;
const
struct
vlan_hdr
*
fp
;
...
...
net/ipv4/netfilter/arp_tables.c
View file @
4b560b44
...
...
@@ -224,7 +224,7 @@ static inline int arp_checkentry(const struct arpt_arp *arp)
}
static
unsigned
int
arpt_error
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
arpt_error
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
if
(
net_ratelimit
())
printk
(
"arp_tables: error: '%s'
\n
"
,
...
...
net/ipv4/netfilter/arpt_mangle.c
View file @
4b560b44
...
...
@@ -9,7 +9,7 @@ MODULE_AUTHOR("Bart De Schuymer <bdschuym@pandora.be>");
MODULE_DESCRIPTION
(
"arptables arp payload mangle target"
);
static
unsigned
int
target
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
target
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
arpt_mangle
*
mangle
=
par
->
targinfo
;
const
struct
arphdr
*
arp
;
...
...
net/ipv4/netfilter/ip_tables.c
View file @
4b560b44
...
...
@@ -165,7 +165,7 @@ ip_checkentry(const struct ipt_ip *ip)
}
static
unsigned
int
ipt_error
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
ipt_error
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
if
(
net_ratelimit
())
pr_info
(
"error: `%s'
\n
"
,
(
const
char
*
)
par
->
targinfo
);
...
...
@@ -2138,7 +2138,7 @@ icmp_type_code_match(u_int8_t test_type, u_int8_t min_code, u_int8_t max_code,
}
static
bool
icmp_match
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
icmp_match
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
icmphdr
*
ic
;
struct
icmphdr
_icmph
;
...
...
net/ipv4/netfilter/ipt_CLUSTERIP.c
View file @
4b560b44
...
...
@@ -282,7 +282,7 @@ clusterip_responsible(const struct clusterip_config *config, u_int32_t hash)
***********************************************************************/
static
unsigned
int
clusterip_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
clusterip_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
ipt_clusterip_tgt_info
*
cipinfo
=
par
->
targinfo
;
struct
nf_conn
*
ct
;
...
...
net/ipv4/netfilter/ipt_ECN.c
View file @
4b560b44
...
...
@@ -77,7 +77,7 @@ set_ect_tcp(struct sk_buff *skb, const struct ipt_ECN_info *einfo)
}
static
unsigned
int
ecn_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
ecn_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
ipt_ECN_info
*
einfo
=
par
->
targinfo
;
...
...
net/ipv4/netfilter/ipt_LOG.c
View file @
4b560b44
...
...
@@ -425,7 +425,7 @@ ipt_log_packet(u_int8_t pf,
}
static
unsigned
int
log_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
log_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
ipt_log_info
*
loginfo
=
par
->
targinfo
;
struct
nf_loginfo
li
;
...
...
net/ipv4/netfilter/ipt_MASQUERADE.c
View file @
4b560b44
...
...
@@ -44,7 +44,7 @@ static int masquerade_tg_check(const struct xt_tgchk_param *par)
}
static
unsigned
int
masquerade_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
masquerade_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
struct
nf_conn
*
ct
;
struct
nf_conn_nat
*
nat
;
...
...
net/ipv4/netfilter/ipt_NETMAP.c
View file @
4b560b44
...
...
@@ -38,7 +38,7 @@ static int netmap_tg_check(const struct xt_tgchk_param *par)
}
static
unsigned
int
netmap_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
netmap_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
struct
nf_conn
*
ct
;
enum
ip_conntrack_info
ctinfo
;
...
...
net/ipv4/netfilter/ipt_REDIRECT.c
View file @
4b560b44
...
...
@@ -42,7 +42,7 @@ static int redirect_tg_check(const struct xt_tgchk_param *par)
}
static
unsigned
int
redirect_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
redirect_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
struct
nf_conn
*
ct
;
enum
ip_conntrack_info
ctinfo
;
...
...
net/ipv4/netfilter/ipt_REJECT.c
View file @
4b560b44
...
...
@@ -136,7 +136,7 @@ static inline void send_unreach(struct sk_buff *skb_in, int code)
}
static
unsigned
int
reject_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
reject_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
ipt_reject_info
*
reject
=
par
->
targinfo
;
...
...
net/ipv4/netfilter/ipt_ULOG.c
View file @
4b560b44
...
...
@@ -276,7 +276,7 @@ static void ipt_ulog_packet(unsigned int hooknum,
}
static
unsigned
int
ulog_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
ulog_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
ipt_ulog_packet
(
par
->
hooknum
,
skb
,
par
->
in
,
par
->
out
,
par
->
targinfo
,
NULL
);
...
...
net/ipv4/netfilter/ipt_addrtype.c
View file @
4b560b44
...
...
@@ -30,7 +30,7 @@ static inline bool match_type(struct net *net, const struct net_device *dev,
}
static
bool
addrtype_mt_v0
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
addrtype_mt_v0
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
struct
net
*
net
=
dev_net
(
par
->
in
?
par
->
in
:
par
->
out
);
const
struct
ipt_addrtype_info
*
info
=
par
->
matchinfo
;
...
...
@@ -48,7 +48,7 @@ addrtype_mt_v0(const struct sk_buff *skb, const struct xt_match_param *par)
}
static
bool
addrtype_mt_v1
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
addrtype_mt_v1
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
struct
net
*
net
=
dev_net
(
par
->
in
?
par
->
in
:
par
->
out
);
const
struct
ipt_addrtype_info_v1
*
info
=
par
->
matchinfo
;
...
...
net/ipv4/netfilter/ipt_ah.c
View file @
4b560b44
...
...
@@ -30,7 +30,7 @@ spi_match(u_int32_t min, u_int32_t max, u_int32_t spi, bool invert)
return
r
;
}
static
bool
ah_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
static
bool
ah_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
struct
ip_auth_hdr
_ahdr
;
const
struct
ip_auth_hdr
*
ah
;
...
...
net/ipv4/netfilter/ipt_ecn.c
View file @
4b560b44
...
...
@@ -67,7 +67,8 @@ static inline bool match_tcp(const struct sk_buff *skb,
return
true
;
}
static
bool
ecn_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_match_param
*
par
)
static
bool
ecn_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_action_param
*
par
)
{
const
struct
ipt_ecn_info
*
info
=
par
->
matchinfo
;
...
...
net/ipv4/netfilter/nf_nat_rule.c
View file @
4b560b44
...
...
@@ -39,7 +39,7 @@ static const struct xt_table nat_table = {
/* Source NAT */
static
unsigned
int
ipt_snat_target
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
ipt_snat_target
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
struct
nf_conn
*
ct
;
enum
ip_conntrack_info
ctinfo
;
...
...
@@ -58,7 +58,7 @@ ipt_snat_target(struct sk_buff *skb, const struct xt_target_param *par)
}
static
unsigned
int
ipt_dnat_target
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
ipt_dnat_target
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
struct
nf_conn
*
ct
;
enum
ip_conntrack_info
ctinfo
;
...
...
net/ipv6/netfilter/ip6_tables.c
View file @
4b560b44
...
...
@@ -197,7 +197,7 @@ ip6_checkentry(const struct ip6t_ip6 *ipv6)
}
static
unsigned
int
ip6t_error
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
ip6t_error
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
if
(
net_ratelimit
())
pr_info
(
"error: `%s'
\n
"
,
(
const
char
*
)
par
->
targinfo
);
...
...
@@ -2154,7 +2154,7 @@ icmp6_type_code_match(u_int8_t test_type, u_int8_t min_code, u_int8_t max_code,
}
static
bool
icmp6_match
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
icmp6_match
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
icmp6hdr
*
ic
;
struct
icmp6hdr
_icmph
;
...
...
net/ipv6/netfilter/ip6t_LOG.c
View file @
4b560b44
...
...
@@ -436,7 +436,7 @@ ip6t_log_packet(u_int8_t pf,
}
static
unsigned
int
log_tg6
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
log_tg6
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
ip6t_log_info
*
loginfo
=
par
->
targinfo
;
struct
nf_loginfo
li
;
...
...
net/ipv6/netfilter/ip6t_REJECT.c
View file @
4b560b44
...
...
@@ -175,7 +175,7 @@ send_unreach(struct net *net, struct sk_buff *skb_in, unsigned char code,
}
static
unsigned
int
reject_tg6
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
reject_tg6
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
ip6t_reject_info
*
reject
=
par
->
targinfo
;
struct
net
*
net
=
dev_net
((
par
->
in
!=
NULL
)
?
par
->
in
:
par
->
out
);
...
...
net/ipv6/netfilter/ip6t_ah.c
View file @
4b560b44
...
...
@@ -36,7 +36,8 @@ spi_match(u_int32_t min, u_int32_t max, u_int32_t spi, bool invert)
return
r
;
}
static
bool
ah_mt6
(
const
struct
sk_buff
*
skb
,
const
struct
xt_match_param
*
par
)
static
bool
ah_mt6
(
const
struct
sk_buff
*
skb
,
const
struct
xt_action_param
*
par
)
{
struct
ip_auth_hdr
_ah
;
const
struct
ip_auth_hdr
*
ah
;
...
...
net/ipv6/netfilter/ip6t_eui64.c
View file @
4b560b44
...
...
@@ -20,7 +20,7 @@ MODULE_LICENSE("GPL");
MODULE_AUTHOR
(
"Andras Kis-Szabo <kisza@sch.bme.hu>"
);
static
bool
eui64_mt6
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
eui64_mt6
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
unsigned
char
eui64
[
8
];
...
...
net/ipv6/netfilter/ip6t_frag.c
View file @
4b560b44
...
...
@@ -35,7 +35,7 @@ id_match(u_int32_t min, u_int32_t max, u_int32_t id, bool invert)
}
static
bool
frag_mt6
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
frag_mt6
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
struct
frag_hdr
_frag
;
const
struct
frag_hdr
*
fh
;
...
...
net/ipv6/netfilter/ip6t_hbh.c
View file @
4b560b44
...
...
@@ -44,7 +44,7 @@ MODULE_ALIAS("ip6t_dst");
static
struct
xt_match
hbh_mt6_reg
[]
__read_mostly
;
static
bool
hbh_mt6
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
hbh_mt6
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
struct
ipv6_opt_hdr
_optsh
;
const
struct
ipv6_opt_hdr
*
oh
;
...
...
net/ipv6/netfilter/ip6t_ipv6header.c
View file @
4b560b44
...
...
@@ -27,7 +27,7 @@ MODULE_DESCRIPTION("Xtables: IPv6 header types match");
MODULE_AUTHOR
(
"Andras Kis-Szabo <kisza@sch.bme.hu>"
);
static
bool
ipv6header_mt6
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
ipv6header_mt6
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
ip6t_ipv6header_info
*
info
=
par
->
matchinfo
;
unsigned
int
temp
;
...
...
net/ipv6/netfilter/ip6t_mh.c
View file @
4b560b44
...
...
@@ -32,7 +32,8 @@ type_match(u_int8_t min, u_int8_t max, u_int8_t type, bool invert)
return
(
type
>=
min
&&
type
<=
max
)
^
invert
;
}
static
bool
mh_mt6
(
const
struct
sk_buff
*
skb
,
const
struct
xt_match_param
*
par
)
static
bool
mh_mt6
(
const
struct
sk_buff
*
skb
,
const
struct
xt_action_param
*
par
)
{
struct
ip6_mh
_mh
;
const
struct
ip6_mh
*
mh
;
...
...
net/ipv6/netfilter/ip6t_rt.c
View file @
4b560b44
...
...
@@ -36,7 +36,8 @@ segsleft_match(u_int32_t min, u_int32_t max, u_int32_t id, bool invert)
return
r
;
}
static
bool
rt_mt6
(
const
struct
sk_buff
*
skb
,
const
struct
xt_match_param
*
par
)
static
bool
rt_mt6
(
const
struct
sk_buff
*
skb
,
const
struct
xt_action_param
*
par
)
{
struct
ipv6_rt_hdr
_route
;
const
struct
ipv6_rt_hdr
*
rh
;
...
...
net/netfilter/xt_CLASSIFY.c
View file @
4b560b44
...
...
@@ -27,7 +27,7 @@ MODULE_ALIAS("ipt_CLASSIFY");
MODULE_ALIAS
(
"ip6t_CLASSIFY"
);
static
unsigned
int
classify_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
classify_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_classify_target_info
*
clinfo
=
par
->
targinfo
;
...
...
net/netfilter/xt_CONNSECMARK.c
View file @
4b560b44
...
...
@@ -64,7 +64,7 @@ static void secmark_restore(struct sk_buff *skb)
}
static
unsigned
int
connsecmark_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
connsecmark_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_connsecmark_target_info
*
info
=
par
->
targinfo
;
...
...
net/netfilter/xt_CT.c
View file @
4b560b44
...
...
@@ -20,7 +20,7 @@
#include <net/netfilter/nf_conntrack_zones.h>
static
unsigned
int
xt_ct_target
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_ct_target_info
*
info
=
par
->
targinfo
;
struct
nf_conn
*
ct
=
info
->
ct
;
...
...
net/netfilter/xt_DSCP.c
View file @
4b560b44
...
...
@@ -28,7 +28,7 @@ MODULE_ALIAS("ipt_TOS");
MODULE_ALIAS
(
"ip6t_TOS"
);
static
unsigned
int
dscp_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
dscp_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_DSCP_info
*
dinfo
=
par
->
targinfo
;
u_int8_t
dscp
=
ipv4_get_dsfield
(
ip_hdr
(
skb
))
>>
XT_DSCP_SHIFT
;
...
...
@@ -45,7 +45,7 @@ dscp_tg(struct sk_buff *skb, const struct xt_target_param *par)
}
static
unsigned
int
dscp_tg6
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
dscp_tg6
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_DSCP_info
*
dinfo
=
par
->
targinfo
;
u_int8_t
dscp
=
ipv6_get_dsfield
(
ipv6_hdr
(
skb
))
>>
XT_DSCP_SHIFT
;
...
...
@@ -72,7 +72,7 @@ static int dscp_tg_check(const struct xt_tgchk_param *par)
}
static
unsigned
int
tos_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
tos_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_tos_target_info
*
info
=
par
->
targinfo
;
struct
iphdr
*
iph
=
ip_hdr
(
skb
);
...
...
@@ -92,7 +92,7 @@ tos_tg(struct sk_buff *skb, const struct xt_target_param *par)
}
static
unsigned
int
tos_tg6
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
tos_tg6
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_tos_target_info
*
info
=
par
->
targinfo
;
struct
ipv6hdr
*
iph
=
ipv6_hdr
(
skb
);
...
...
net/netfilter/xt_HL.c
View file @
4b560b44
...
...
@@ -26,7 +26,7 @@ MODULE_DESCRIPTION("Xtables: Hoplimit/TTL Limit field modification target");
MODULE_LICENSE
(
"GPL"
);
static
unsigned
int
ttl_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
ttl_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
struct
iphdr
*
iph
;
const
struct
ipt_TTL_info
*
info
=
par
->
targinfo
;
...
...
@@ -66,7 +66,7 @@ ttl_tg(struct sk_buff *skb, const struct xt_target_param *par)
}
static
unsigned
int
hl_tg6
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
hl_tg6
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
struct
ipv6hdr
*
ip6h
;
const
struct
ip6t_HL_info
*
info
=
par
->
targinfo
;
...
...
net/netfilter/xt_LED.c
View file @
4b560b44
...
...
@@ -49,7 +49,7 @@ struct xt_led_info_internal {
};
static
unsigned
int
led_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
led_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_led_info
*
ledinfo
=
par
->
targinfo
;
struct
xt_led_info_internal
*
ledinternal
=
ledinfo
->
internal_data
;
...
...
net/netfilter/xt_NFLOG.c
View file @
4b560b44
...
...
@@ -22,7 +22,7 @@ MODULE_ALIAS("ipt_NFLOG");
MODULE_ALIAS
(
"ip6t_NFLOG"
);
static
unsigned
int
nflog_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
nflog_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_nflog_info
*
info
=
par
->
targinfo
;
struct
nf_loginfo
li
;
...
...
net/netfilter/xt_NFQUEUE.c
View file @
4b560b44
...
...
@@ -31,7 +31,7 @@ static u32 jhash_initval __read_mostly;
static
bool
rnd_inited
__read_mostly
;
static
unsigned
int
nfqueue_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
nfqueue_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_NFQ_info
*
tinfo
=
par
->
targinfo
;
...
...
@@ -65,7 +65,7 @@ static u32 hash_v6(const struct sk_buff *skb)
#endif
static
unsigned
int
nfqueue_tg_v1
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
nfqueue_tg_v1
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_NFQ_info_v1
*
info
=
par
->
targinfo
;
u32
queue
=
info
->
queuenum
;
...
...
net/netfilter/xt_NOTRACK.c
View file @
4b560b44
...
...
@@ -13,7 +13,7 @@ MODULE_ALIAS("ipt_NOTRACK");
MODULE_ALIAS
(
"ip6t_NOTRACK"
);
static
unsigned
int
notrack_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
notrack_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
/* Previously seen (loopback)? Ignore. */
if
(
skb
->
nfct
!=
NULL
)
...
...
net/netfilter/xt_RATEEST.c
View file @
4b560b44
...
...
@@ -73,7 +73,7 @@ void xt_rateest_put(struct xt_rateest *est)
EXPORT_SYMBOL_GPL
(
xt_rateest_put
);
static
unsigned
int
xt_rateest_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
xt_rateest_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_rateest_target_info
*
info
=
par
->
targinfo
;
struct
gnet_stats_basic_packed
*
stats
=
&
info
->
est
->
bstats
;
...
...
net/netfilter/xt_SECMARK.c
View file @
4b560b44
...
...
@@ -30,7 +30,7 @@ MODULE_ALIAS("ip6t_SECMARK");
static
u8
mode
;
static
unsigned
int
secmark_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
secmark_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
u32
secmark
=
0
;
const
struct
xt_secmark_target_info
*
info
=
par
->
targinfo
;
...
...
net/netfilter/xt_TCPMSS.c
View file @
4b560b44
...
...
@@ -172,7 +172,7 @@ static u_int32_t tcpmss_reverse_mtu(const struct sk_buff *skb,
}
static
unsigned
int
tcpmss_tg4
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
tcpmss_tg4
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
struct
iphdr
*
iph
=
ip_hdr
(
skb
);
__be16
newlen
;
...
...
@@ -195,7 +195,7 @@ tcpmss_tg4(struct sk_buff *skb, const struct xt_target_param *par)
#if defined(CONFIG_IP6_NF_IPTABLES) || defined(CONFIG_IP6_NF_IPTABLES_MODULE)
static
unsigned
int
tcpmss_tg6
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
tcpmss_tg6
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
struct
ipv6hdr
*
ipv6h
=
ipv6_hdr
(
skb
);
u8
nexthdr
;
...
...
net/netfilter/xt_TCPOPTSTRIP.c
View file @
4b560b44
...
...
@@ -74,7 +74,7 @@ tcpoptstrip_mangle_packet(struct sk_buff *skb,
}
static
unsigned
int
tcpoptstrip_tg4
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
tcpoptstrip_tg4
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
return
tcpoptstrip_mangle_packet
(
skb
,
par
->
targinfo
,
ip_hdrlen
(
skb
),
sizeof
(
struct
iphdr
)
+
sizeof
(
struct
tcphdr
));
...
...
@@ -82,7 +82,7 @@ tcpoptstrip_tg4(struct sk_buff *skb, const struct xt_target_param *par)
#if defined(CONFIG_IP6_NF_MANGLE) || defined(CONFIG_IP6_NF_MANGLE_MODULE)
static
unsigned
int
tcpoptstrip_tg6
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
tcpoptstrip_tg6
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
struct
ipv6hdr
*
ipv6h
=
ipv6_hdr
(
skb
);
int
tcphoff
;
...
...
net/netfilter/xt_TEE.c
View file @
4b560b44
...
...
@@ -84,7 +84,7 @@ tee_tg_route4(struct sk_buff *skb, const struct xt_tee_tginfo *info)
}
static
unsigned
int
tee_tg4
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
tee_tg4
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_tee_tginfo
*
info
=
par
->
targinfo
;
struct
iphdr
*
iph
;
...
...
@@ -165,7 +165,7 @@ tee_tg_route6(struct sk_buff *skb, const struct xt_tee_tginfo *info)
}
static
unsigned
int
tee_tg6
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
tee_tg6
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_tee_tginfo
*
info
=
par
->
targinfo
;
...
...
net/netfilter/xt_TPROXY.c
View file @
4b560b44
...
...
@@ -25,7 +25,7 @@
#include <net/netfilter/nf_tproxy_core.h>
static
unsigned
int
tproxy_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
tproxy_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
iphdr
*
iph
=
ip_hdr
(
skb
);
const
struct
xt_tproxy_target_info
*
tgi
=
par
->
targinfo
;
...
...
net/netfilter/xt_TRACE.c
View file @
4b560b44
...
...
@@ -11,7 +11,7 @@ MODULE_ALIAS("ipt_TRACE");
MODULE_ALIAS
(
"ip6t_TRACE"
);
static
unsigned
int
trace_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
trace_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
skb
->
nf_trace
=
1
;
return
XT_CONTINUE
;
...
...
net/netfilter/xt_cluster.c
View file @
4b560b44
...
...
@@ -86,7 +86,7 @@ xt_cluster_is_multicast_addr(const struct sk_buff *skb, u_int8_t family)
}
static
bool
xt_cluster_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
xt_cluster_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
struct
sk_buff
*
pskb
=
(
struct
sk_buff
*
)
skb
;
const
struct
xt_cluster_match_info
*
info
=
par
->
matchinfo
;
...
...
net/netfilter/xt_comment.c
View file @
4b560b44
...
...
@@ -16,7 +16,7 @@ MODULE_ALIAS("ipt_comment");
MODULE_ALIAS
(
"ip6t_comment"
);
static
bool
comment_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
comment_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
/* We always match */
return
true
;
...
...
net/netfilter/xt_connbytes.c
View file @
4b560b44
...
...
@@ -18,7 +18,7 @@ MODULE_ALIAS("ipt_connbytes");
MODULE_ALIAS
(
"ip6t_connbytes"
);
static
bool
connbytes_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
connbytes_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_connbytes_info
*
sinfo
=
par
->
matchinfo
;
const
struct
nf_conn
*
ct
;
...
...
net/netfilter/xt_connlimit.c
View file @
4b560b44
...
...
@@ -173,7 +173,7 @@ static int count_them(struct net *net,
}
static
bool
connlimit_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
connlimit_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
struct
net
*
net
=
dev_net
(
par
->
in
?
par
->
in
:
par
->
out
);
const
struct
xt_connlimit_info
*
info
=
par
->
matchinfo
;
...
...
net/netfilter/xt_connmark.c
View file @
4b560b44
...
...
@@ -37,7 +37,7 @@ MODULE_ALIAS("ipt_connmark");
MODULE_ALIAS
(
"ip6t_connmark"
);
static
unsigned
int
connmark_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
connmark_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_connmark_tginfo1
*
info
=
par
->
targinfo
;
enum
ip_conntrack_info
ctinfo
;
...
...
@@ -91,7 +91,7 @@ static void connmark_tg_destroy(const struct xt_tgdtor_param *par)
}
static
bool
connmark_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
connmark_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_connmark_mtinfo1
*
info
=
par
->
matchinfo
;
enum
ip_conntrack_info
ctinfo
;
...
...
net/netfilter/xt_conntrack.c
View file @
4b560b44
...
...
@@ -113,7 +113,7 @@ ct_proto_port_check(const struct xt_conntrack_mtinfo2 *info,
}
static
bool
conntrack_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
,
conntrack_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
,
u16
state_mask
,
u16
status_mask
)
{
const
struct
xt_conntrack_mtinfo2
*
info
=
par
->
matchinfo
;
...
...
@@ -191,7 +191,7 @@ conntrack_mt(const struct sk_buff *skb, const struct xt_match_param *par,
}
static
bool
conntrack_mt_v1
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
conntrack_mt_v1
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_conntrack_mtinfo1
*
info
=
par
->
matchinfo
;
...
...
@@ -199,7 +199,7 @@ conntrack_mt_v1(const struct sk_buff *skb, const struct xt_match_param *par)
}
static
bool
conntrack_mt_v2
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
conntrack_mt_v2
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_conntrack_mtinfo2
*
info
=
par
->
matchinfo
;
...
...
net/netfilter/xt_dccp.c
View file @
4b560b44
...
...
@@ -96,7 +96,7 @@ match_option(u_int8_t option, const struct sk_buff *skb, unsigned int protoff,
}
static
bool
dccp_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
dccp_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_dccp_info
*
info
=
par
->
matchinfo
;
const
struct
dccp_hdr
*
dh
;
...
...
net/netfilter/xt_dscp.c
View file @
4b560b44
...
...
@@ -25,7 +25,7 @@ MODULE_ALIAS("ipt_tos");
MODULE_ALIAS
(
"ip6t_tos"
);
static
bool
dscp_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
dscp_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_dscp_info
*
info
=
par
->
matchinfo
;
u_int8_t
dscp
=
ipv4_get_dsfield
(
ip_hdr
(
skb
))
>>
XT_DSCP_SHIFT
;
...
...
@@ -34,7 +34,7 @@ dscp_mt(const struct sk_buff *skb, const struct xt_match_param *par)
}
static
bool
dscp_mt6
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
dscp_mt6
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_dscp_info
*
info
=
par
->
matchinfo
;
u_int8_t
dscp
=
ipv6_get_dsfield
(
ipv6_hdr
(
skb
))
>>
XT_DSCP_SHIFT
;
...
...
@@ -54,7 +54,8 @@ static int dscp_mt_check(const struct xt_mtchk_param *par)
return
0
;
}
static
bool
tos_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_match_param
*
par
)
static
bool
tos_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_action_param
*
par
)
{
const
struct
xt_tos_match_info
*
info
=
par
->
matchinfo
;
...
...
net/netfilter/xt_esp.c
View file @
4b560b44
...
...
@@ -36,7 +36,8 @@ spi_match(u_int32_t min, u_int32_t max, u_int32_t spi, bool invert)
return
r
;
}
static
bool
esp_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_match_param
*
par
)
static
bool
esp_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_action_param
*
par
)
{
const
struct
ip_esp_hdr
*
eh
;
struct
ip_esp_hdr
_esp
;
...
...
net/netfilter/xt_hashlimit.c
View file @
4b560b44
...
...
@@ -516,7 +516,7 @@ hashlimit_init_dst(const struct xt_hashlimit_htable *hinfo,
}
static
bool
hashlimit_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
hashlimit_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_hashlimit_mtinfo1
*
info
=
par
->
matchinfo
;
struct
xt_hashlimit_htable
*
hinfo
=
info
->
hinfo
;
...
...
net/netfilter/xt_helper.c
View file @
4b560b44
...
...
@@ -24,7 +24,7 @@ MODULE_ALIAS("ip6t_helper");
static
bool
helper_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
helper_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_helper_info
*
info
=
par
->
matchinfo
;
const
struct
nf_conn
*
ct
;
...
...
net/netfilter/xt_hl.c
View file @
4b560b44
...
...
@@ -25,7 +25,8 @@ MODULE_LICENSE("GPL");
MODULE_ALIAS
(
"ipt_ttl"
);
MODULE_ALIAS
(
"ip6t_hl"
);
static
bool
ttl_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_match_param
*
par
)
static
bool
ttl_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_action_param
*
par
)
{
const
struct
ipt_ttl_info
*
info
=
par
->
matchinfo
;
const
u8
ttl
=
ip_hdr
(
skb
)
->
ttl
;
...
...
@@ -44,7 +45,8 @@ static bool ttl_mt(const struct sk_buff *skb, const struct xt_match_param *par)
return
false
;
}
static
bool
hl_mt6
(
const
struct
sk_buff
*
skb
,
const
struct
xt_match_param
*
par
)
static
bool
hl_mt6
(
const
struct
sk_buff
*
skb
,
const
struct
xt_action_param
*
par
)
{
const
struct
ip6t_hl_info
*
info
=
par
->
matchinfo
;
const
struct
ipv6hdr
*
ip6h
=
ipv6_hdr
(
skb
);
...
...
net/netfilter/xt_iprange.c
View file @
4b560b44
...
...
@@ -17,7 +17,7 @@
#include <linux/netfilter/xt_iprange.h>
static
bool
iprange_mt4
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
iprange_mt4
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_iprange_mtinfo
*
info
=
par
->
matchinfo
;
const
struct
iphdr
*
iph
=
ip_hdr
(
skb
);
...
...
@@ -68,7 +68,7 @@ iprange_ipv6_sub(const struct in6_addr *a, const struct in6_addr *b)
}
static
bool
iprange_mt6
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
iprange_mt6
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_iprange_mtinfo
*
info
=
par
->
matchinfo
;
const
struct
ipv6hdr
*
iph
=
ipv6_hdr
(
skb
);
...
...
net/netfilter/xt_length.c
View file @
4b560b44
...
...
@@ -21,7 +21,7 @@ MODULE_ALIAS("ipt_length");
MODULE_ALIAS
(
"ip6t_length"
);
static
bool
length_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
length_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_length_info
*
info
=
par
->
matchinfo
;
u_int16_t
pktlen
=
ntohs
(
ip_hdr
(
skb
)
->
tot_len
);
...
...
@@ -30,7 +30,7 @@ length_mt(const struct sk_buff *skb, const struct xt_match_param *par)
}
static
bool
length_mt6
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
length_mt6
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_length_info
*
info
=
par
->
matchinfo
;
const
u_int16_t
pktlen
=
ntohs
(
ipv6_hdr
(
skb
)
->
payload_len
)
+
...
...
net/netfilter/xt_limit.c
View file @
4b560b44
...
...
@@ -65,7 +65,7 @@ static DEFINE_SPINLOCK(limit_lock);
#define CREDITS_PER_JIFFY POW2_BELOW32(MAX_CPJ)
static
bool
limit_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
limit_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_rateinfo
*
r
=
par
->
matchinfo
;
struct
xt_limit_priv
*
priv
=
r
->
master
;
...
...
net/netfilter/xt_mac.c
View file @
4b560b44
...
...
@@ -25,7 +25,8 @@ MODULE_DESCRIPTION("Xtables: MAC address match");
MODULE_ALIAS
(
"ipt_mac"
);
MODULE_ALIAS
(
"ip6t_mac"
);
static
bool
mac_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_match_param
*
par
)
static
bool
mac_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_action_param
*
par
)
{
const
struct
xt_mac_info
*
info
=
par
->
matchinfo
;
bool
ret
;
...
...
net/netfilter/xt_mark.c
View file @
4b560b44
...
...
@@ -25,7 +25,7 @@ MODULE_ALIAS("ipt_MARK");
MODULE_ALIAS
(
"ip6t_MARK"
);
static
unsigned
int
mark_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
target
_param
*
par
)
mark_tg
(
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_mark_tginfo2
*
info
=
par
->
targinfo
;
...
...
@@ -34,7 +34,7 @@ mark_tg(struct sk_buff *skb, const struct xt_target_param *par)
}
static
bool
mark_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
mark_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_mark_mtinfo1
*
info
=
par
->
matchinfo
;
...
...
net/netfilter/xt_multiport.c
View file @
4b560b44
...
...
@@ -72,7 +72,7 @@ ports_match_v1(const struct xt_multiport_v1 *minfo,
}
static
bool
multiport_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
multiport_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
__be16
*
pptr
;
__be16
_ports
[
2
];
...
...
net/netfilter/xt_osf.c
View file @
4b560b44
...
...
@@ -193,8 +193,8 @@ static inline int xt_osf_ttl(const struct sk_buff *skb, const struct xt_osf_info
return
ip
->
ttl
==
f_ttl
;
}
static
bool
xt_osf_match_packet
(
const
struct
sk_buff
*
skb
,
const
struct
xt_match
_param
*
p
)
static
bool
xt_osf_match_packet
(
const
struct
sk_buff
*
skb
,
const
struct
xt_action
_param
*
p
)
{
const
struct
xt_osf_info
*
info
=
p
->
matchinfo
;
const
struct
iphdr
*
ip
=
ip_hdr
(
skb
);
...
...
net/netfilter/xt_owner.c
View file @
4b560b44
...
...
@@ -18,7 +18,7 @@
#include <linux/netfilter/xt_owner.h>
static
bool
owner_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
owner_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_owner_match_info
*
info
=
par
->
matchinfo
;
const
struct
file
*
filp
;
...
...
net/netfilter/xt_physdev.c
View file @
4b560b44
...
...
@@ -22,7 +22,7 @@ MODULE_ALIAS("ip6t_physdev");
static
bool
physdev_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
physdev_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
static
const
char
nulldevname
[
IFNAMSIZ
]
__attribute__
((
aligned
(
sizeof
(
long
))));
const
struct
xt_physdev_info
*
info
=
par
->
matchinfo
;
...
...
net/netfilter/xt_pkttype.c
View file @
4b560b44
...
...
@@ -23,7 +23,7 @@ MODULE_ALIAS("ipt_pkttype");
MODULE_ALIAS
(
"ip6t_pkttype"
);
static
bool
pkttype_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
pkttype_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_pkttype_info
*
info
=
par
->
matchinfo
;
u_int8_t
type
;
...
...
net/netfilter/xt_policy.c
View file @
4b560b44
...
...
@@ -110,7 +110,7 @@ match_policy_out(const struct sk_buff *skb, const struct xt_policy_info *info,
}
static
bool
policy_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
policy_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_policy_info
*
info
=
par
->
matchinfo
;
int
ret
;
...
...
net/netfilter/xt_quota.c
View file @
4b560b44
...
...
@@ -23,7 +23,7 @@ MODULE_ALIAS("ip6t_quota");
static
DEFINE_SPINLOCK
(
quota_lock
);
static
bool
quota_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
quota_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
struct
xt_quota_info
*
q
=
(
void
*
)
par
->
matchinfo
;
struct
xt_quota_priv
*
priv
=
q
->
master
;
...
...
net/netfilter/xt_rateest.c
View file @
4b560b44
...
...
@@ -15,7 +15,7 @@
static
bool
xt_rateest_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
xt_rateest_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_rateest_match_info
*
info
=
par
->
matchinfo
;
struct
gnet_stats_rate_est
*
r
;
...
...
net/netfilter/xt_realm.c
View file @
4b560b44
...
...
@@ -22,7 +22,7 @@ MODULE_DESCRIPTION("Xtables: Routing realm match");
MODULE_ALIAS
(
"ipt_realm"
);
static
bool
realm_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
realm_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_realm_info
*
info
=
par
->
matchinfo
;
const
struct
dst_entry
*
dst
=
skb_dst
(
skb
);
...
...
net/netfilter/xt_recent.c
View file @
4b560b44
...
...
@@ -224,7 +224,7 @@ static void recent_table_flush(struct recent_table *t)
}
static
bool
recent_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
recent_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
struct
net
*
net
=
dev_net
(
par
->
in
?
par
->
in
:
par
->
out
);
struct
recent_net
*
recent_net
=
recent_pernet
(
net
);
...
...
net/netfilter/xt_sctp.c
View file @
4b560b44
...
...
@@ -114,7 +114,7 @@ match_packet(const struct sk_buff *skb,
}
static
bool
sctp_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
sctp_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_sctp_info
*
info
=
par
->
matchinfo
;
const
sctp_sctphdr_t
*
sh
;
...
...
net/netfilter/xt_socket.c
View file @
4b560b44
...
...
@@ -88,7 +88,7 @@ extract_icmp_fields(const struct sk_buff *skb,
static
bool
socket_match
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
,
socket_match
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
,
const
struct
xt_socket_mtinfo1
*
info
)
{
const
struct
iphdr
*
iph
=
ip_hdr
(
skb
);
...
...
@@ -174,13 +174,13 @@ socket_match(const struct sk_buff *skb, const struct xt_match_param *par,
}
static
bool
socket_mt_v0
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
socket_mt_v0
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
return
socket_match
(
skb
,
par
,
NULL
);
}
static
bool
socket_mt_v1
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
socket_mt_v1
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
return
socket_match
(
skb
,
par
,
par
->
matchinfo
);
}
...
...
net/netfilter/xt_state.c
View file @
4b560b44
...
...
@@ -21,7 +21,7 @@ MODULE_ALIAS("ipt_state");
MODULE_ALIAS
(
"ip6t_state"
);
static
bool
state_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
state_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_state_info
*
sinfo
=
par
->
matchinfo
;
enum
ip_conntrack_info
ctinfo
;
...
...
net/netfilter/xt_statistic.c
View file @
4b560b44
...
...
@@ -30,7 +30,7 @@ MODULE_ALIAS("ip6t_statistic");
static
DEFINE_SPINLOCK
(
nth_lock
);
static
bool
statistic_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
statistic_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_statistic_info
*
info
=
par
->
matchinfo
;
bool
ret
=
info
->
flags
&
XT_STATISTIC_INVERT
;
...
...
net/netfilter/xt_string.c
View file @
4b560b44
...
...
@@ -23,7 +23,7 @@ MODULE_ALIAS("ipt_string");
MODULE_ALIAS
(
"ip6t_string"
);
static
bool
string_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
string_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_string_info
*
conf
=
par
->
matchinfo
;
struct
ts_state
state
;
...
...
net/netfilter/xt_tcpmss.c
View file @
4b560b44
...
...
@@ -25,7 +25,7 @@ MODULE_ALIAS("ipt_tcpmss");
MODULE_ALIAS
(
"ip6t_tcpmss"
);
static
bool
tcpmss_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
tcpmss_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_tcpmss_match_info
*
info
=
par
->
matchinfo
;
const
struct
tcphdr
*
th
;
...
...
net/netfilter/xt_tcpudp.c
View file @
4b560b44
...
...
@@ -62,7 +62,8 @@ tcp_find_option(u_int8_t option,
return
invert
;
}
static
bool
tcp_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_match_param
*
par
)
static
bool
tcp_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_action_param
*
par
)
{
const
struct
tcphdr
*
th
;
struct
tcphdr
_tcph
;
...
...
@@ -128,7 +129,8 @@ static int tcp_mt_check(const struct xt_mtchk_param *par)
return
(
tcpinfo
->
invflags
&
~
XT_TCP_INV_MASK
)
?
-
EINVAL
:
0
;
}
static
bool
udp_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_match_param
*
par
)
static
bool
udp_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_action_param
*
par
)
{
const
struct
udphdr
*
uh
;
struct
udphdr
_udph
;
...
...
net/netfilter/xt_time.c
View file @
4b560b44
...
...
@@ -152,7 +152,7 @@ static void localtime_3(struct xtm *r, time_t time)
}
static
bool
time_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
match
_param
*
par
)
time_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_
action
_param
*
par
)
{
const
struct
xt_time_info
*
info
=
par
->
matchinfo
;
unsigned
int
packet_time
;
...
...
net/netfilter/xt_u32.c
View file @
4b560b44
...
...
@@ -86,7 +86,8 @@ static bool u32_match_it(const struct xt_u32 *data,
return
true
;
}
static
bool
u32_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_match_param
*
par
)
static
bool
u32_mt
(
const
struct
sk_buff
*
skb
,
const
struct
xt_action_param
*
par
)
{
const
struct
xt_u32
*
data
=
par
->
matchinfo
;
bool
ret
;
...
...
net/sched/act_ipt.c
View file @
4b560b44
...
...
@@ -199,7 +199,7 @@ static int tcf_ipt(struct sk_buff *skb, struct tc_action *a,
{
int
ret
=
0
,
result
=
0
;
struct
tcf_ipt
*
ipt
=
a
->
priv
;
struct
xt_
target
_param
par
;
struct
xt_
action
_param
par
;
if
(
skb_cloned
(
skb
))
{
if
(
pskb_expand_head
(
skb
,
0
,
0
,
GFP_ATOMIC
))
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment