Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

netfilter: xtables: substitute temporary defines by final name

Signed-off-by: Jan Engelhardt <jengelh@medozas.de>

+133 -123
-2
include/linux/netfilter/x_tables.h
··· 182 182 183 183 #include <linux/netdevice.h> 184 184 185 - #define xt_match_param xt_action_param 186 - #define xt_target_param xt_action_param 187 185 /** 188 186 * struct xt_action_param - parameters for matches/targets 189 187 *
+1 -1
net/bridge/netfilter/ebt_802_3.c
··· 13 13 #include <linux/netfilter_bridge/ebt_802_3.h> 14 14 15 15 static bool 16 - ebt_802_3_mt(const struct sk_buff *skb, const struct xt_match_param *par) 16 + ebt_802_3_mt(const struct sk_buff *skb, const struct xt_action_param *par) 17 17 { 18 18 const struct ebt_802_3_info *info = par->matchinfo; 19 19 const struct ebt_802_3_hdr *hdr = ebt_802_3_hdr(skb);
+1 -1
net/bridge/netfilter/ebt_among.c
··· 129 129 } 130 130 131 131 static bool 132 - ebt_among_mt(const struct sk_buff *skb, const struct xt_match_param *par) 132 + ebt_among_mt(const struct sk_buff *skb, const struct xt_action_param *par) 133 133 { 134 134 const struct ebt_among_info *info = par->matchinfo; 135 135 const char *dmac, *smac;
+1 -1
net/bridge/netfilter/ebt_arp.c
··· 16 16 #include <linux/netfilter_bridge/ebt_arp.h> 17 17 18 18 static bool 19 - ebt_arp_mt(const struct sk_buff *skb, const struct xt_match_param *par) 19 + ebt_arp_mt(const struct sk_buff *skb, const struct xt_action_param *par) 20 20 { 21 21 const struct ebt_arp_info *info = par->matchinfo; 22 22 const struct arphdr *ah;
+1 -1
net/bridge/netfilter/ebt_arpreply.c
··· 16 16 #include <linux/netfilter_bridge/ebt_arpreply.h> 17 17 18 18 static unsigned int 19 - ebt_arpreply_tg(struct sk_buff *skb, const struct xt_target_param *par) 19 + ebt_arpreply_tg(struct sk_buff *skb, const struct xt_action_param *par) 20 20 { 21 21 const struct ebt_arpreply_info *info = par->targinfo; 22 22 const __be32 *siptr, *diptr;
+1 -1
net/bridge/netfilter/ebt_dnat.c
··· 15 15 #include <linux/netfilter_bridge/ebt_nat.h> 16 16 17 17 static unsigned int 18 - ebt_dnat_tg(struct sk_buff *skb, const struct xt_target_param *par) 18 + ebt_dnat_tg(struct sk_buff *skb, const struct xt_action_param *par) 19 19 { 20 20 const struct ebt_nat_info *info = par->targinfo; 21 21
+1 -1
net/bridge/netfilter/ebt_ip.c
··· 25 25 }; 26 26 27 27 static bool 28 - ebt_ip_mt(const struct sk_buff *skb, const struct xt_match_param *par) 28 + ebt_ip_mt(const struct sk_buff *skb, const struct xt_action_param *par) 29 29 { 30 30 const struct ebt_ip_info *info = par->matchinfo; 31 31 const struct iphdr *ih;
+1 -1
net/bridge/netfilter/ebt_ip6.c
··· 28 28 }; 29 29 30 30 static bool 31 - ebt_ip6_mt(const struct sk_buff *skb, const struct xt_match_param *par) 31 + ebt_ip6_mt(const struct sk_buff *skb, const struct xt_action_param *par) 32 32 { 33 33 const struct ebt_ip6_info *info = par->matchinfo; 34 34 const struct ipv6hdr *ih6;
+1 -1
net/bridge/netfilter/ebt_limit.c
··· 32 32 #define CREDITS_PER_JIFFY POW2_BELOW32(MAX_CPJ) 33 33 34 34 static bool 35 - ebt_limit_mt(const struct sk_buff *skb, const struct xt_match_param *par) 35 + ebt_limit_mt(const struct sk_buff *skb, const struct xt_action_param *par) 36 36 { 37 37 struct ebt_limit_info *info = (void *)par->matchinfo; 38 38 unsigned long now = jiffies;
+1 -1
net/bridge/netfilter/ebt_log.c
··· 171 171 } 172 172 173 173 static unsigned int 174 - ebt_log_tg(struct sk_buff *skb, const struct xt_target_param *par) 174 + ebt_log_tg(struct sk_buff *skb, const struct xt_action_param *par) 175 175 { 176 176 const struct ebt_log_info *info = par->targinfo; 177 177 struct nf_loginfo li;
+1 -1
net/bridge/netfilter/ebt_mark.c
··· 19 19 #include <linux/netfilter_bridge/ebt_mark_t.h> 20 20 21 21 static unsigned int 22 - ebt_mark_tg(struct sk_buff *skb, const struct xt_target_param *par) 22 + ebt_mark_tg(struct sk_buff *skb, const struct xt_action_param *par) 23 23 { 24 24 const struct ebt_mark_t_info *info = par->targinfo; 25 25 int action = info->target & -16;
+1 -1
net/bridge/netfilter/ebt_mark_m.c
··· 13 13 #include <linux/netfilter_bridge/ebt_mark_m.h> 14 14 15 15 static bool 16 - ebt_mark_mt(const struct sk_buff *skb, const struct xt_match_param *par) 16 + ebt_mark_mt(const struct sk_buff *skb, const struct xt_action_param *par) 17 17 { 18 18 const struct ebt_mark_m_info *info = par->matchinfo; 19 19
+1 -1
net/bridge/netfilter/ebt_nflog.c
··· 20 20 #include <net/netfilter/nf_log.h> 21 21 22 22 static unsigned int 23 - ebt_nflog_tg(struct sk_buff *skb, const struct xt_target_param *par) 23 + ebt_nflog_tg(struct sk_buff *skb, const struct xt_action_param *par) 24 24 { 25 25 const struct ebt_nflog_info *info = par->targinfo; 26 26 struct nf_loginfo li;
+1 -1
net/bridge/netfilter/ebt_pkttype.c
··· 13 13 #include <linux/netfilter_bridge/ebt_pkttype.h> 14 14 15 15 static bool 16 - ebt_pkttype_mt(const struct sk_buff *skb, const struct xt_match_param *par) 16 + ebt_pkttype_mt(const struct sk_buff *skb, const struct xt_action_param *par) 17 17 { 18 18 const struct ebt_pkttype_info *info = par->matchinfo; 19 19
+1 -1
net/bridge/netfilter/ebt_redirect.c
··· 16 16 #include <linux/netfilter_bridge/ebt_redirect.h> 17 17 18 18 static unsigned int 19 - ebt_redirect_tg(struct sk_buff *skb, const struct xt_target_param *par) 19 + ebt_redirect_tg(struct sk_buff *skb, const struct xt_action_param *par) 20 20 { 21 21 const struct ebt_redirect_info *info = par->targinfo; 22 22
+1 -1
net/bridge/netfilter/ebt_snat.c
··· 17 17 #include <linux/netfilter_bridge/ebt_nat.h> 18 18 19 19 static unsigned int 20 - ebt_snat_tg(struct sk_buff *skb, const struct xt_target_param *par) 20 + ebt_snat_tg(struct sk_buff *skb, const struct xt_action_param *par) 21 21 { 22 22 const struct ebt_nat_info *info = par->targinfo; 23 23
+1 -1
net/bridge/netfilter/ebt_stp.c
··· 120 120 } 121 121 122 122 static bool 123 - ebt_stp_mt(const struct sk_buff *skb, const struct xt_match_param *par) 123 + ebt_stp_mt(const struct sk_buff *skb, const struct xt_action_param *par) 124 124 { 125 125 const struct ebt_stp_info *info = par->matchinfo; 126 126 const struct stp_header *sp;
+1 -1
net/bridge/netfilter/ebt_ulog.c
··· 243 243 } 244 244 245 245 static unsigned int 246 - ebt_ulog_tg(struct sk_buff *skb, const struct xt_target_param *par) 246 + ebt_ulog_tg(struct sk_buff *skb, const struct xt_action_param *par) 247 247 { 248 248 ebt_ulog_packet(par->hooknum, skb, par->in, par->out, 249 249 par->targinfo, NULL);
+1 -1
net/bridge/netfilter/ebt_vlan.c
··· 36 36 #define EXIT_ON_MISMATCH(_MATCH_,_MASK_) {if (!((info->_MATCH_ == _MATCH_)^!!(info->invflags & _MASK_))) return false; } 37 37 38 38 static bool 39 - ebt_vlan_mt(const struct sk_buff *skb, const struct xt_match_param *par) 39 + ebt_vlan_mt(const struct sk_buff *skb, const struct xt_action_param *par) 40 40 { 41 41 const struct ebt_vlan_info *info = par->matchinfo; 42 42 const struct vlan_hdr *fp;
+1 -1
net/ipv4/netfilter/arp_tables.c
··· 224 224 } 225 225 226 226 static unsigned int 227 - arpt_error(struct sk_buff *skb, const struct xt_target_param *par) 227 + arpt_error(struct sk_buff *skb, const struct xt_action_param *par) 228 228 { 229 229 if (net_ratelimit()) 230 230 printk("arp_tables: error: '%s'\n",
+1 -1
net/ipv4/netfilter/arpt_mangle.c
··· 9 9 MODULE_DESCRIPTION("arptables arp payload mangle target"); 10 10 11 11 static unsigned int 12 - target(struct sk_buff *skb, const struct xt_target_param *par) 12 + target(struct sk_buff *skb, const struct xt_action_param *par) 13 13 { 14 14 const struct arpt_mangle *mangle = par->targinfo; 15 15 const struct arphdr *arp;
+2 -2
net/ipv4/netfilter/ip_tables.c
··· 165 165 } 166 166 167 167 static unsigned int 168 - ipt_error(struct sk_buff *skb, const struct xt_target_param *par) 168 + ipt_error(struct sk_buff *skb, const struct xt_action_param *par) 169 169 { 170 170 if (net_ratelimit()) 171 171 pr_info("error: `%s'\n", (const char *)par->targinfo); ··· 2138 2138 } 2139 2139 2140 2140 static bool 2141 - icmp_match(const struct sk_buff *skb, const struct xt_match_param *par) 2141 + icmp_match(const struct sk_buff *skb, const struct xt_action_param *par) 2142 2142 { 2143 2143 const struct icmphdr *ic; 2144 2144 struct icmphdr _icmph;
+1 -1
net/ipv4/netfilter/ipt_CLUSTERIP.c
··· 282 282 ***********************************************************************/ 283 283 284 284 static unsigned int 285 - clusterip_tg(struct sk_buff *skb, const struct xt_target_param *par) 285 + clusterip_tg(struct sk_buff *skb, const struct xt_action_param *par) 286 286 { 287 287 const struct ipt_clusterip_tgt_info *cipinfo = par->targinfo; 288 288 struct nf_conn *ct;
+1 -1
net/ipv4/netfilter/ipt_ECN.c
··· 77 77 } 78 78 79 79 static unsigned int 80 - ecn_tg(struct sk_buff *skb, const struct xt_target_param *par) 80 + ecn_tg(struct sk_buff *skb, const struct xt_action_param *par) 81 81 { 82 82 const struct ipt_ECN_info *einfo = par->targinfo; 83 83
+1 -1
net/ipv4/netfilter/ipt_LOG.c
··· 425 425 } 426 426 427 427 static unsigned int 428 - log_tg(struct sk_buff *skb, const struct xt_target_param *par) 428 + log_tg(struct sk_buff *skb, const struct xt_action_param *par) 429 429 { 430 430 const struct ipt_log_info *loginfo = par->targinfo; 431 431 struct nf_loginfo li;
+1 -1
net/ipv4/netfilter/ipt_MASQUERADE.c
··· 44 44 } 45 45 46 46 static unsigned int 47 - masquerade_tg(struct sk_buff *skb, const struct xt_target_param *par) 47 + masquerade_tg(struct sk_buff *skb, const struct xt_action_param *par) 48 48 { 49 49 struct nf_conn *ct; 50 50 struct nf_conn_nat *nat;
+1 -1
net/ipv4/netfilter/ipt_NETMAP.c
··· 38 38 } 39 39 40 40 static unsigned int 41 - netmap_tg(struct sk_buff *skb, const struct xt_target_param *par) 41 + netmap_tg(struct sk_buff *skb, const struct xt_action_param *par) 42 42 { 43 43 struct nf_conn *ct; 44 44 enum ip_conntrack_info ctinfo;
+1 -1
net/ipv4/netfilter/ipt_REDIRECT.c
··· 42 42 } 43 43 44 44 static unsigned int 45 - redirect_tg(struct sk_buff *skb, const struct xt_target_param *par) 45 + redirect_tg(struct sk_buff *skb, const struct xt_action_param *par) 46 46 { 47 47 struct nf_conn *ct; 48 48 enum ip_conntrack_info ctinfo;
+1 -1
net/ipv4/netfilter/ipt_REJECT.c
··· 136 136 } 137 137 138 138 static unsigned int 139 - reject_tg(struct sk_buff *skb, const struct xt_target_param *par) 139 + reject_tg(struct sk_buff *skb, const struct xt_action_param *par) 140 140 { 141 141 const struct ipt_reject_info *reject = par->targinfo; 142 142
+1 -1
net/ipv4/netfilter/ipt_ULOG.c
··· 276 276 } 277 277 278 278 static unsigned int 279 - ulog_tg(struct sk_buff *skb, const struct xt_target_param *par) 279 + ulog_tg(struct sk_buff *skb, const struct xt_action_param *par) 280 280 { 281 281 ipt_ulog_packet(par->hooknum, skb, par->in, par->out, 282 282 par->targinfo, NULL);
+2 -2
net/ipv4/netfilter/ipt_addrtype.c
··· 30 30 } 31 31 32 32 static bool 33 - addrtype_mt_v0(const struct sk_buff *skb, const struct xt_match_param *par) 33 + addrtype_mt_v0(const struct sk_buff *skb, const struct xt_action_param *par) 34 34 { 35 35 struct net *net = dev_net(par->in ? par->in : par->out); 36 36 const struct ipt_addrtype_info *info = par->matchinfo; ··· 48 48 } 49 49 50 50 static bool 51 - addrtype_mt_v1(const struct sk_buff *skb, const struct xt_match_param *par) 51 + addrtype_mt_v1(const struct sk_buff *skb, const struct xt_action_param *par) 52 52 { 53 53 struct net *net = dev_net(par->in ? par->in : par->out); 54 54 const struct ipt_addrtype_info_v1 *info = par->matchinfo;
+1 -1
net/ipv4/netfilter/ipt_ah.c
··· 30 30 return r; 31 31 } 32 32 33 - static bool ah_mt(const struct sk_buff *skb, const struct xt_match_param *par) 33 + static bool ah_mt(const struct sk_buff *skb, const struct xt_action_param *par) 34 34 { 35 35 struct ip_auth_hdr _ahdr; 36 36 const struct ip_auth_hdr *ah;
+2 -1
net/ipv4/netfilter/ipt_ecn.c
··· 67 67 return true; 68 68 } 69 69 70 - static bool ecn_mt(const struct sk_buff *skb, const struct xt_match_param *par) 70 + static bool ecn_mt(const struct sk_buff *skb, 71 + const struct xt_action_param *par) 71 72 { 72 73 const struct ipt_ecn_info *info = par->matchinfo; 73 74
+2 -2
net/ipv4/netfilter/nf_nat_rule.c
··· 39 39 40 40 /* Source NAT */ 41 41 static unsigned int 42 - ipt_snat_target(struct sk_buff *skb, const struct xt_target_param *par) 42 + ipt_snat_target(struct sk_buff *skb, const struct xt_action_param *par) 43 43 { 44 44 struct nf_conn *ct; 45 45 enum ip_conntrack_info ctinfo; ··· 58 58 } 59 59 60 60 static unsigned int 61 - ipt_dnat_target(struct sk_buff *skb, const struct xt_target_param *par) 61 + ipt_dnat_target(struct sk_buff *skb, const struct xt_action_param *par) 62 62 { 63 63 struct nf_conn *ct; 64 64 enum ip_conntrack_info ctinfo;
+2 -2
net/ipv6/netfilter/ip6_tables.c
··· 197 197 } 198 198 199 199 static unsigned int 200 - ip6t_error(struct sk_buff *skb, const struct xt_target_param *par) 200 + ip6t_error(struct sk_buff *skb, const struct xt_action_param *par) 201 201 { 202 202 if (net_ratelimit()) 203 203 pr_info("error: `%s'\n", (const char *)par->targinfo); ··· 2154 2154 } 2155 2155 2156 2156 static bool 2157 - icmp6_match(const struct sk_buff *skb, const struct xt_match_param *par) 2157 + icmp6_match(const struct sk_buff *skb, const struct xt_action_param *par) 2158 2158 { 2159 2159 const struct icmp6hdr *ic; 2160 2160 struct icmp6hdr _icmph;
+1 -1
net/ipv6/netfilter/ip6t_LOG.c
··· 436 436 } 437 437 438 438 static unsigned int 439 - log_tg6(struct sk_buff *skb, const struct xt_target_param *par) 439 + log_tg6(struct sk_buff *skb, const struct xt_action_param *par) 440 440 { 441 441 const struct ip6t_log_info *loginfo = par->targinfo; 442 442 struct nf_loginfo li;
+1 -1
net/ipv6/netfilter/ip6t_REJECT.c
··· 175 175 } 176 176 177 177 static unsigned int 178 - reject_tg6(struct sk_buff *skb, const struct xt_target_param *par) 178 + reject_tg6(struct sk_buff *skb, const struct xt_action_param *par) 179 179 { 180 180 const struct ip6t_reject_info *reject = par->targinfo; 181 181 struct net *net = dev_net((par->in != NULL) ? par->in : par->out);
+2 -1
net/ipv6/netfilter/ip6t_ah.c
··· 36 36 return r; 37 37 } 38 38 39 - static bool ah_mt6(const struct sk_buff *skb, const struct xt_match_param *par) 39 + static bool ah_mt6(const struct sk_buff *skb, 40 + const struct xt_action_param *par) 40 41 { 41 42 struct ip_auth_hdr _ah; 42 43 const struct ip_auth_hdr *ah;
+1 -1
net/ipv6/netfilter/ip6t_eui64.c
··· 20 20 MODULE_AUTHOR("Andras Kis-Szabo <kisza@sch.bme.hu>"); 21 21 22 22 static bool 23 - eui64_mt6(const struct sk_buff *skb, const struct xt_match_param *par) 23 + eui64_mt6(const struct sk_buff *skb, const struct xt_action_param *par) 24 24 { 25 25 unsigned char eui64[8]; 26 26
+1 -1
net/ipv6/netfilter/ip6t_frag.c
··· 35 35 } 36 36 37 37 static bool 38 - frag_mt6(const struct sk_buff *skb, const struct xt_match_param *par) 38 + frag_mt6(const struct sk_buff *skb, const struct xt_action_param *par) 39 39 { 40 40 struct frag_hdr _frag; 41 41 const struct frag_hdr *fh;
+1 -1
net/ipv6/netfilter/ip6t_hbh.c
··· 44 44 static struct xt_match hbh_mt6_reg[] __read_mostly; 45 45 46 46 static bool 47 - hbh_mt6(const struct sk_buff *skb, const struct xt_match_param *par) 47 + hbh_mt6(const struct sk_buff *skb, const struct xt_action_param *par) 48 48 { 49 49 struct ipv6_opt_hdr _optsh; 50 50 const struct ipv6_opt_hdr *oh;
+1 -1
net/ipv6/netfilter/ip6t_ipv6header.c
··· 27 27 MODULE_AUTHOR("Andras Kis-Szabo <kisza@sch.bme.hu>"); 28 28 29 29 static bool 30 - ipv6header_mt6(const struct sk_buff *skb, const struct xt_match_param *par) 30 + ipv6header_mt6(const struct sk_buff *skb, const struct xt_action_param *par) 31 31 { 32 32 const struct ip6t_ipv6header_info *info = par->matchinfo; 33 33 unsigned int temp;
+2 -1
net/ipv6/netfilter/ip6t_mh.c
··· 32 32 return (type >= min && type <= max) ^ invert; 33 33 } 34 34 35 - static bool mh_mt6(const struct sk_buff *skb, const struct xt_match_param *par) 35 + static bool mh_mt6(const struct sk_buff *skb, 36 + const struct xt_action_param *par) 36 37 { 37 38 struct ip6_mh _mh; 38 39 const struct ip6_mh *mh;
+2 -1
net/ipv6/netfilter/ip6t_rt.c
··· 36 36 return r; 37 37 } 38 38 39 - static bool rt_mt6(const struct sk_buff *skb, const struct xt_match_param *par) 39 + static bool rt_mt6(const struct sk_buff *skb, 40 + const struct xt_action_param *par) 40 41 { 41 42 struct ipv6_rt_hdr _route; 42 43 const struct ipv6_rt_hdr *rh;
+1 -1
net/netfilter/xt_CLASSIFY.c
··· 27 27 MODULE_ALIAS("ip6t_CLASSIFY"); 28 28 29 29 static unsigned int 30 - classify_tg(struct sk_buff *skb, const struct xt_target_param *par) 30 + classify_tg(struct sk_buff *skb, const struct xt_action_param *par) 31 31 { 32 32 const struct xt_classify_target_info *clinfo = par->targinfo; 33 33
+1 -1
net/netfilter/xt_CONNSECMARK.c
··· 64 64 } 65 65 66 66 static unsigned int 67 - connsecmark_tg(struct sk_buff *skb, const struct xt_target_param *par) 67 + connsecmark_tg(struct sk_buff *skb, const struct xt_action_param *par) 68 68 { 69 69 const struct xt_connsecmark_target_info *info = par->targinfo; 70 70
+1 -1
net/netfilter/xt_CT.c
··· 20 20 #include <net/netfilter/nf_conntrack_zones.h> 21 21 22 22 static unsigned int xt_ct_target(struct sk_buff *skb, 23 - const struct xt_target_param *par) 23 + const struct xt_action_param *par) 24 24 { 25 25 const struct xt_ct_target_info *info = par->targinfo; 26 26 struct nf_conn *ct = info->ct;
+4 -4
net/netfilter/xt_DSCP.c
··· 28 28 MODULE_ALIAS("ip6t_TOS"); 29 29 30 30 static unsigned int 31 - dscp_tg(struct sk_buff *skb, const struct xt_target_param *par) 31 + dscp_tg(struct sk_buff *skb, const struct xt_action_param *par) 32 32 { 33 33 const struct xt_DSCP_info *dinfo = par->targinfo; 34 34 u_int8_t dscp = ipv4_get_dsfield(ip_hdr(skb)) >> XT_DSCP_SHIFT; ··· 45 45 } 46 46 47 47 static unsigned int 48 - dscp_tg6(struct sk_buff *skb, const struct xt_target_param *par) 48 + dscp_tg6(struct sk_buff *skb, const struct xt_action_param *par) 49 49 { 50 50 const struct xt_DSCP_info *dinfo = par->targinfo; 51 51 u_int8_t dscp = ipv6_get_dsfield(ipv6_hdr(skb)) >> XT_DSCP_SHIFT; ··· 72 72 } 73 73 74 74 static unsigned int 75 - tos_tg(struct sk_buff *skb, const struct xt_target_param *par) 75 + tos_tg(struct sk_buff *skb, const struct xt_action_param *par) 76 76 { 77 77 const struct xt_tos_target_info *info = par->targinfo; 78 78 struct iphdr *iph = ip_hdr(skb); ··· 92 92 } 93 93 94 94 static unsigned int 95 - tos_tg6(struct sk_buff *skb, const struct xt_target_param *par) 95 + tos_tg6(struct sk_buff *skb, const struct xt_action_param *par) 96 96 { 97 97 const struct xt_tos_target_info *info = par->targinfo; 98 98 struct ipv6hdr *iph = ipv6_hdr(skb);
+2 -2
net/netfilter/xt_HL.c
··· 26 26 MODULE_LICENSE("GPL"); 27 27 28 28 static unsigned int 29 - ttl_tg(struct sk_buff *skb, const struct xt_target_param *par) 29 + ttl_tg(struct sk_buff *skb, const struct xt_action_param *par) 30 30 { 31 31 struct iphdr *iph; 32 32 const struct ipt_TTL_info *info = par->targinfo; ··· 66 66 } 67 67 68 68 static unsigned int 69 - hl_tg6(struct sk_buff *skb, const struct xt_target_param *par) 69 + hl_tg6(struct sk_buff *skb, const struct xt_action_param *par) 70 70 { 71 71 struct ipv6hdr *ip6h; 72 72 const struct ip6t_HL_info *info = par->targinfo;
+1 -1
net/netfilter/xt_LED.c
··· 49 49 }; 50 50 51 51 static unsigned int 52 - led_tg(struct sk_buff *skb, const struct xt_target_param *par) 52 + led_tg(struct sk_buff *skb, const struct xt_action_param *par) 53 53 { 54 54 const struct xt_led_info *ledinfo = par->targinfo; 55 55 struct xt_led_info_internal *ledinternal = ledinfo->internal_data;
+1 -1
net/netfilter/xt_NFLOG.c
··· 22 22 MODULE_ALIAS("ip6t_NFLOG"); 23 23 24 24 static unsigned int 25 - nflog_tg(struct sk_buff *skb, const struct xt_target_param *par) 25 + nflog_tg(struct sk_buff *skb, const struct xt_action_param *par) 26 26 { 27 27 const struct xt_nflog_info *info = par->targinfo; 28 28 struct nf_loginfo li;
+2 -2
net/netfilter/xt_NFQUEUE.c
··· 31 31 static bool rnd_inited __read_mostly; 32 32 33 33 static unsigned int 34 - nfqueue_tg(struct sk_buff *skb, const struct xt_target_param *par) 34 + nfqueue_tg(struct sk_buff *skb, const struct xt_action_param *par) 35 35 { 36 36 const struct xt_NFQ_info *tinfo = par->targinfo; 37 37 ··· 65 65 #endif 66 66 67 67 static unsigned int 68 - nfqueue_tg_v1(struct sk_buff *skb, const struct xt_target_param *par) 68 + nfqueue_tg_v1(struct sk_buff *skb, const struct xt_action_param *par) 69 69 { 70 70 const struct xt_NFQ_info_v1 *info = par->targinfo; 71 71 u32 queue = info->queuenum;
+1 -1
net/netfilter/xt_NOTRACK.c
··· 13 13 MODULE_ALIAS("ip6t_NOTRACK"); 14 14 15 15 static unsigned int 16 - notrack_tg(struct sk_buff *skb, const struct xt_target_param *par) 16 + notrack_tg(struct sk_buff *skb, const struct xt_action_param *par) 17 17 { 18 18 /* Previously seen (loopback)? Ignore. */ 19 19 if (skb->nfct != NULL)
+1 -1
net/netfilter/xt_RATEEST.c
··· 73 73 EXPORT_SYMBOL_GPL(xt_rateest_put); 74 74 75 75 static unsigned int 76 - xt_rateest_tg(struct sk_buff *skb, const struct xt_target_param *par) 76 + xt_rateest_tg(struct sk_buff *skb, const struct xt_action_param *par) 77 77 { 78 78 const struct xt_rateest_target_info *info = par->targinfo; 79 79 struct gnet_stats_basic_packed *stats = &info->est->bstats;
+1 -1
net/netfilter/xt_SECMARK.c
··· 30 30 static u8 mode; 31 31 32 32 static unsigned int 33 - secmark_tg(struct sk_buff *skb, const struct xt_target_param *par) 33 + secmark_tg(struct sk_buff *skb, const struct xt_action_param *par) 34 34 { 35 35 u32 secmark = 0; 36 36 const struct xt_secmark_target_info *info = par->targinfo;
+2 -2
net/netfilter/xt_TCPMSS.c
··· 172 172 } 173 173 174 174 static unsigned int 175 - tcpmss_tg4(struct sk_buff *skb, const struct xt_target_param *par) 175 + tcpmss_tg4(struct sk_buff *skb, const struct xt_action_param *par) 176 176 { 177 177 struct iphdr *iph = ip_hdr(skb); 178 178 __be16 newlen; ··· 195 195 196 196 #if defined(CONFIG_IP6_NF_IPTABLES) || defined(CONFIG_IP6_NF_IPTABLES_MODULE) 197 197 static unsigned int 198 - tcpmss_tg6(struct sk_buff *skb, const struct xt_target_param *par) 198 + tcpmss_tg6(struct sk_buff *skb, const struct xt_action_param *par) 199 199 { 200 200 struct ipv6hdr *ipv6h = ipv6_hdr(skb); 201 201 u8 nexthdr;
+2 -2
net/netfilter/xt_TCPOPTSTRIP.c
··· 74 74 } 75 75 76 76 static unsigned int 77 - tcpoptstrip_tg4(struct sk_buff *skb, const struct xt_target_param *par) 77 + tcpoptstrip_tg4(struct sk_buff *skb, const struct xt_action_param *par) 78 78 { 79 79 return tcpoptstrip_mangle_packet(skb, par->targinfo, ip_hdrlen(skb), 80 80 sizeof(struct iphdr) + sizeof(struct tcphdr)); ··· 82 82 83 83 #if defined(CONFIG_IP6_NF_MANGLE) || defined(CONFIG_IP6_NF_MANGLE_MODULE) 84 84 static unsigned int 85 - tcpoptstrip_tg6(struct sk_buff *skb, const struct xt_target_param *par) 85 + tcpoptstrip_tg6(struct sk_buff *skb, const struct xt_action_param *par) 86 86 { 87 87 struct ipv6hdr *ipv6h = ipv6_hdr(skb); 88 88 int tcphoff;
+2 -2
net/netfilter/xt_TEE.c
··· 84 84 } 85 85 86 86 static unsigned int 87 - tee_tg4(struct sk_buff *skb, const struct xt_target_param *par) 87 + tee_tg4(struct sk_buff *skb, const struct xt_action_param *par) 88 88 { 89 89 const struct xt_tee_tginfo *info = par->targinfo; 90 90 struct iphdr *iph; ··· 165 165 } 166 166 167 167 static unsigned int 168 - tee_tg6(struct sk_buff *skb, const struct xt_target_param *par) 168 + tee_tg6(struct sk_buff *skb, const struct xt_action_param *par) 169 169 { 170 170 const struct xt_tee_tginfo *info = par->targinfo; 171 171
+1 -1
net/netfilter/xt_TPROXY.c
··· 25 25 #include <net/netfilter/nf_tproxy_core.h> 26 26 27 27 static unsigned int 28 - tproxy_tg(struct sk_buff *skb, const struct xt_target_param *par) 28 + tproxy_tg(struct sk_buff *skb, const struct xt_action_param *par) 29 29 { 30 30 const struct iphdr *iph = ip_hdr(skb); 31 31 const struct xt_tproxy_target_info *tgi = par->targinfo;
+1 -1
net/netfilter/xt_TRACE.c
··· 11 11 MODULE_ALIAS("ip6t_TRACE"); 12 12 13 13 static unsigned int 14 - trace_tg(struct sk_buff *skb, const struct xt_target_param *par) 14 + trace_tg(struct sk_buff *skb, const struct xt_action_param *par) 15 15 { 16 16 skb->nf_trace = 1; 17 17 return XT_CONTINUE;
+1 -1
net/netfilter/xt_cluster.c
··· 86 86 } 87 87 88 88 static bool 89 - xt_cluster_mt(const struct sk_buff *skb, const struct xt_match_param *par) 89 + xt_cluster_mt(const struct sk_buff *skb, const struct xt_action_param *par) 90 90 { 91 91 struct sk_buff *pskb = (struct sk_buff *)skb; 92 92 const struct xt_cluster_match_info *info = par->matchinfo;
+1 -1
net/netfilter/xt_comment.c
··· 16 16 MODULE_ALIAS("ip6t_comment"); 17 17 18 18 static bool 19 - comment_mt(const struct sk_buff *skb, const struct xt_match_param *par) 19 + comment_mt(const struct sk_buff *skb, const struct xt_action_param *par) 20 20 { 21 21 /* We always match */ 22 22 return true;
+1 -1
net/netfilter/xt_connbytes.c
··· 18 18 MODULE_ALIAS("ip6t_connbytes"); 19 19 20 20 static bool 21 - connbytes_mt(const struct sk_buff *skb, const struct xt_match_param *par) 21 + connbytes_mt(const struct sk_buff *skb, const struct xt_action_param *par) 22 22 { 23 23 const struct xt_connbytes_info *sinfo = par->matchinfo; 24 24 const struct nf_conn *ct;
+1 -1
net/netfilter/xt_connlimit.c
··· 173 173 } 174 174 175 175 static bool 176 - connlimit_mt(const struct sk_buff *skb, const struct xt_match_param *par) 176 + connlimit_mt(const struct sk_buff *skb, const struct xt_action_param *par) 177 177 { 178 178 struct net *net = dev_net(par->in ? par->in : par->out); 179 179 const struct xt_connlimit_info *info = par->matchinfo;
+2 -2
net/netfilter/xt_connmark.c
··· 37 37 MODULE_ALIAS("ip6t_connmark"); 38 38 39 39 static unsigned int 40 - connmark_tg(struct sk_buff *skb, const struct xt_target_param *par) 40 + connmark_tg(struct sk_buff *skb, const struct xt_action_param *par) 41 41 { 42 42 const struct xt_connmark_tginfo1 *info = par->targinfo; 43 43 enum ip_conntrack_info ctinfo; ··· 91 91 } 92 92 93 93 static bool 94 - connmark_mt(const struct sk_buff *skb, const struct xt_match_param *par) 94 + connmark_mt(const struct sk_buff *skb, const struct xt_action_param *par) 95 95 { 96 96 const struct xt_connmark_mtinfo1 *info = par->matchinfo; 97 97 enum ip_conntrack_info ctinfo;
+3 -3
net/netfilter/xt_conntrack.c
··· 113 113 } 114 114 115 115 static bool 116 - conntrack_mt(const struct sk_buff *skb, const struct xt_match_param *par, 116 + conntrack_mt(const struct sk_buff *skb, const struct xt_action_param *par, 117 117 u16 state_mask, u16 status_mask) 118 118 { 119 119 const struct xt_conntrack_mtinfo2 *info = par->matchinfo; ··· 191 191 } 192 192 193 193 static bool 194 - conntrack_mt_v1(const struct sk_buff *skb, const struct xt_match_param *par) 194 + conntrack_mt_v1(const struct sk_buff *skb, const struct xt_action_param *par) 195 195 { 196 196 const struct xt_conntrack_mtinfo1 *info = par->matchinfo; 197 197 ··· 199 199 } 200 200 201 201 static bool 202 - conntrack_mt_v2(const struct sk_buff *skb, const struct xt_match_param *par) 202 + conntrack_mt_v2(const struct sk_buff *skb, const struct xt_action_param *par) 203 203 { 204 204 const struct xt_conntrack_mtinfo2 *info = par->matchinfo; 205 205
+1 -1
net/netfilter/xt_dccp.c
··· 96 96 } 97 97 98 98 static bool 99 - dccp_mt(const struct sk_buff *skb, const struct xt_match_param *par) 99 + dccp_mt(const struct sk_buff *skb, const struct xt_action_param *par) 100 100 { 101 101 const struct xt_dccp_info *info = par->matchinfo; 102 102 const struct dccp_hdr *dh;
+4 -3
net/netfilter/xt_dscp.c
··· 25 25 MODULE_ALIAS("ip6t_tos"); 26 26 27 27 static bool 28 - dscp_mt(const struct sk_buff *skb, const struct xt_match_param *par) 28 + dscp_mt(const struct sk_buff *skb, const struct xt_action_param *par) 29 29 { 30 30 const struct xt_dscp_info *info = par->matchinfo; 31 31 u_int8_t dscp = ipv4_get_dsfield(ip_hdr(skb)) >> XT_DSCP_SHIFT; ··· 34 34 } 35 35 36 36 static bool 37 - dscp_mt6(const struct sk_buff *skb, const struct xt_match_param *par) 37 + dscp_mt6(const struct sk_buff *skb, const struct xt_action_param *par) 38 38 { 39 39 const struct xt_dscp_info *info = par->matchinfo; 40 40 u_int8_t dscp = ipv6_get_dsfield(ipv6_hdr(skb)) >> XT_DSCP_SHIFT; ··· 54 54 return 0; 55 55 } 56 56 57 - static bool tos_mt(const struct sk_buff *skb, const struct xt_match_param *par) 57 + static bool tos_mt(const struct sk_buff *skb, 58 + const struct xt_action_param *par) 58 59 { 59 60 const struct xt_tos_match_info *info = par->matchinfo; 60 61
+2 -1
net/netfilter/xt_esp.c
··· 36 36 return r; 37 37 } 38 38 39 - static bool esp_mt(const struct sk_buff *skb, const struct xt_match_param *par) 39 + static bool esp_mt(const struct sk_buff *skb, 40 + const struct xt_action_param *par) 40 41 { 41 42 const struct ip_esp_hdr *eh; 42 43 struct ip_esp_hdr _esp;
+1 -1
net/netfilter/xt_hashlimit.c
··· 516 516 } 517 517 518 518 static bool 519 - hashlimit_mt(const struct sk_buff *skb, const struct xt_match_param *par) 519 + hashlimit_mt(const struct sk_buff *skb, const struct xt_action_param *par) 520 520 { 521 521 const struct xt_hashlimit_mtinfo1 *info = par->matchinfo; 522 522 struct xt_hashlimit_htable *hinfo = info->hinfo;
+1 -1
net/netfilter/xt_helper.c
··· 24 24 25 25 26 26 static bool 27 - helper_mt(const struct sk_buff *skb, const struct xt_match_param *par) 27 + helper_mt(const struct sk_buff *skb, const struct xt_action_param *par) 28 28 { 29 29 const struct xt_helper_info *info = par->matchinfo; 30 30 const struct nf_conn *ct;
+4 -2
net/netfilter/xt_hl.c
··· 25 25 MODULE_ALIAS("ipt_ttl"); 26 26 MODULE_ALIAS("ip6t_hl"); 27 27 28 - static bool ttl_mt(const struct sk_buff *skb, const struct xt_match_param *par) 28 + static bool ttl_mt(const struct sk_buff *skb, 29 + const struct xt_action_param *par) 29 30 { 30 31 const struct ipt_ttl_info *info = par->matchinfo; 31 32 const u8 ttl = ip_hdr(skb)->ttl; ··· 45 44 return false; 46 45 } 47 46 48 - static bool hl_mt6(const struct sk_buff *skb, const struct xt_match_param *par) 47 + static bool hl_mt6(const struct sk_buff *skb, 48 + const struct xt_action_param *par) 49 49 { 50 50 const struct ip6t_hl_info *info = par->matchinfo; 51 51 const struct ipv6hdr *ip6h = ipv6_hdr(skb);
+2 -2
net/netfilter/xt_iprange.c
··· 17 17 #include <linux/netfilter/xt_iprange.h> 18 18 19 19 static bool 20 - iprange_mt4(const struct sk_buff *skb, const struct xt_match_param *par) 20 + iprange_mt4(const struct sk_buff *skb, const struct xt_action_param *par) 21 21 { 22 22 const struct xt_iprange_mtinfo *info = par->matchinfo; 23 23 const struct iphdr *iph = ip_hdr(skb); ··· 68 68 } 69 69 70 70 static bool 71 - iprange_mt6(const struct sk_buff *skb, const struct xt_match_param *par) 71 + iprange_mt6(const struct sk_buff *skb, const struct xt_action_param *par) 72 72 { 73 73 const struct xt_iprange_mtinfo *info = par->matchinfo; 74 74 const struct ipv6hdr *iph = ipv6_hdr(skb);
+2 -2
net/netfilter/xt_length.c
··· 21 21 MODULE_ALIAS("ip6t_length"); 22 22 23 23 static bool 24 - length_mt(const struct sk_buff *skb, const struct xt_match_param *par) 24 + length_mt(const struct sk_buff *skb, const struct xt_action_param *par) 25 25 { 26 26 const struct xt_length_info *info = par->matchinfo; 27 27 u_int16_t pktlen = ntohs(ip_hdr(skb)->tot_len); ··· 30 30 } 31 31 32 32 static bool 33 - length_mt6(const struct sk_buff *skb, const struct xt_match_param *par) 33 + length_mt6(const struct sk_buff *skb, const struct xt_action_param *par) 34 34 { 35 35 const struct xt_length_info *info = par->matchinfo; 36 36 const u_int16_t pktlen = ntohs(ipv6_hdr(skb)->payload_len) +
+1 -1
net/netfilter/xt_limit.c
··· 65 65 #define CREDITS_PER_JIFFY POW2_BELOW32(MAX_CPJ) 66 66 67 67 static bool 68 - limit_mt(const struct sk_buff *skb, const struct xt_match_param *par) 68 + limit_mt(const struct sk_buff *skb, const struct xt_action_param *par) 69 69 { 70 70 const struct xt_rateinfo *r = par->matchinfo; 71 71 struct xt_limit_priv *priv = r->master;
+2 -1
net/netfilter/xt_mac.c
··· 25 25 MODULE_ALIAS("ipt_mac"); 26 26 MODULE_ALIAS("ip6t_mac"); 27 27 28 - static bool mac_mt(const struct sk_buff *skb, const struct xt_match_param *par) 28 + static bool mac_mt(const struct sk_buff *skb, 29 + const struct xt_action_param *par) 29 30 { 30 31 const struct xt_mac_info *info = par->matchinfo; 31 32 bool ret;
+2 -2
net/netfilter/xt_mark.c
··· 25 25 MODULE_ALIAS("ip6t_MARK"); 26 26 27 27 static unsigned int 28 - mark_tg(struct sk_buff *skb, const struct xt_target_param *par) 28 + mark_tg(struct sk_buff *skb, const struct xt_action_param *par) 29 29 { 30 30 const struct xt_mark_tginfo2 *info = par->targinfo; 31 31 ··· 34 34 } 35 35 36 36 static bool 37 - mark_mt(const struct sk_buff *skb, const struct xt_match_param *par) 37 + mark_mt(const struct sk_buff *skb, const struct xt_action_param *par) 38 38 { 39 39 const struct xt_mark_mtinfo1 *info = par->matchinfo; 40 40
+1 -1
net/netfilter/xt_multiport.c
··· 72 72 } 73 73 74 74 static bool 75 - multiport_mt(const struct sk_buff *skb, const struct xt_match_param *par) 75 + multiport_mt(const struct sk_buff *skb, const struct xt_action_param *par) 76 76 { 77 77 const __be16 *pptr; 78 78 __be16 _ports[2];
+2 -2
net/netfilter/xt_osf.c
··· 193 193 return ip->ttl == f_ttl; 194 194 } 195 195 196 - static bool xt_osf_match_packet(const struct sk_buff *skb, 197 - const struct xt_match_param *p) 196 + static bool 197 + xt_osf_match_packet(const struct sk_buff *skb, const struct xt_action_param *p) 198 198 { 199 199 const struct xt_osf_info *info = p->matchinfo; 200 200 const struct iphdr *ip = ip_hdr(skb);
+1 -1
net/netfilter/xt_owner.c
··· 18 18 #include <linux/netfilter/xt_owner.h> 19 19 20 20 static bool 21 - owner_mt(const struct sk_buff *skb, const struct xt_match_param *par) 21 + owner_mt(const struct sk_buff *skb, const struct xt_action_param *par) 22 22 { 23 23 const struct xt_owner_match_info *info = par->matchinfo; 24 24 const struct file *filp;
+1 -1
net/netfilter/xt_physdev.c
··· 22 22 23 23 24 24 static bool 25 - physdev_mt(const struct sk_buff *skb, const struct xt_match_param *par) 25 + physdev_mt(const struct sk_buff *skb, const struct xt_action_param *par) 26 26 { 27 27 static const char nulldevname[IFNAMSIZ] __attribute__((aligned(sizeof(long)))); 28 28 const struct xt_physdev_info *info = par->matchinfo;
+1 -1
net/netfilter/xt_pkttype.c
··· 23 23 MODULE_ALIAS("ip6t_pkttype"); 24 24 25 25 static bool 26 - pkttype_mt(const struct sk_buff *skb, const struct xt_match_param *par) 26 + pkttype_mt(const struct sk_buff *skb, const struct xt_action_param *par) 27 27 { 28 28 const struct xt_pkttype_info *info = par->matchinfo; 29 29 u_int8_t type;
+1 -1
net/netfilter/xt_policy.c
··· 110 110 } 111 111 112 112 static bool 113 - policy_mt(const struct sk_buff *skb, const struct xt_match_param *par) 113 + policy_mt(const struct sk_buff *skb, const struct xt_action_param *par) 114 114 { 115 115 const struct xt_policy_info *info = par->matchinfo; 116 116 int ret;
+1 -1
net/netfilter/xt_quota.c
··· 23 23 static DEFINE_SPINLOCK(quota_lock); 24 24 25 25 static bool 26 - quota_mt(const struct sk_buff *skb, const struct xt_match_param *par) 26 + quota_mt(const struct sk_buff *skb, const struct xt_action_param *par) 27 27 { 28 28 struct xt_quota_info *q = (void *)par->matchinfo; 29 29 struct xt_quota_priv *priv = q->master;
+1 -1
net/netfilter/xt_rateest.c
··· 15 15 16 16 17 17 static bool 18 - xt_rateest_mt(const struct sk_buff *skb, const struct xt_match_param *par) 18 + xt_rateest_mt(const struct sk_buff *skb, const struct xt_action_param *par) 19 19 { 20 20 const struct xt_rateest_match_info *info = par->matchinfo; 21 21 struct gnet_stats_rate_est *r;
+1 -1
net/netfilter/xt_realm.c
··· 22 22 MODULE_ALIAS("ipt_realm"); 23 23 24 24 static bool 25 - realm_mt(const struct sk_buff *skb, const struct xt_match_param *par) 25 + realm_mt(const struct sk_buff *skb, const struct xt_action_param *par) 26 26 { 27 27 const struct xt_realm_info *info = par->matchinfo; 28 28 const struct dst_entry *dst = skb_dst(skb);
+1 -1
net/netfilter/xt_recent.c
··· 224 224 } 225 225 226 226 static bool 227 - recent_mt(const struct sk_buff *skb, const struct xt_match_param *par) 227 + recent_mt(const struct sk_buff *skb, const struct xt_action_param *par) 228 228 { 229 229 struct net *net = dev_net(par->in ? par->in : par->out); 230 230 struct recent_net *recent_net = recent_pernet(net);
+1 -1
net/netfilter/xt_sctp.c
··· 114 114 } 115 115 116 116 static bool 117 - sctp_mt(const struct sk_buff *skb, const struct xt_match_param *par) 117 + sctp_mt(const struct sk_buff *skb, const struct xt_action_param *par) 118 118 { 119 119 const struct xt_sctp_info *info = par->matchinfo; 120 120 const sctp_sctphdr_t *sh;
+3 -3
net/netfilter/xt_socket.c
··· 88 88 89 89 90 90 static bool 91 - socket_match(const struct sk_buff *skb, const struct xt_match_param *par, 91 + socket_match(const struct sk_buff *skb, const struct xt_action_param *par, 92 92 const struct xt_socket_mtinfo1 *info) 93 93 { 94 94 const struct iphdr *iph = ip_hdr(skb); ··· 174 174 } 175 175 176 176 static bool 177 - socket_mt_v0(const struct sk_buff *skb, const struct xt_match_param *par) 177 + socket_mt_v0(const struct sk_buff *skb, const struct xt_action_param *par) 178 178 { 179 179 return socket_match(skb, par, NULL); 180 180 } 181 181 182 182 static bool 183 - socket_mt_v1(const struct sk_buff *skb, const struct xt_match_param *par) 183 + socket_mt_v1(const struct sk_buff *skb, const struct xt_action_param *par) 184 184 { 185 185 return socket_match(skb, par, par->matchinfo); 186 186 }
+1 -1
net/netfilter/xt_state.c
··· 21 21 MODULE_ALIAS("ip6t_state"); 22 22 23 23 static bool 24 - state_mt(const struct sk_buff *skb, const struct xt_match_param *par) 24 + state_mt(const struct sk_buff *skb, const struct xt_action_param *par) 25 25 { 26 26 const struct xt_state_info *sinfo = par->matchinfo; 27 27 enum ip_conntrack_info ctinfo;
+1 -1
net/netfilter/xt_statistic.c
··· 30 30 static DEFINE_SPINLOCK(nth_lock); 31 31 32 32 static bool 33 - statistic_mt(const struct sk_buff *skb, const struct xt_match_param *par) 33 + statistic_mt(const struct sk_buff *skb, const struct xt_action_param *par) 34 34 { 35 35 const struct xt_statistic_info *info = par->matchinfo; 36 36 bool ret = info->flags & XT_STATISTIC_INVERT;
+1 -1
net/netfilter/xt_string.c
··· 23 23 MODULE_ALIAS("ip6t_string"); 24 24 25 25 static bool 26 - string_mt(const struct sk_buff *skb, const struct xt_match_param *par) 26 + string_mt(const struct sk_buff *skb, const struct xt_action_param *par) 27 27 { 28 28 const struct xt_string_info *conf = par->matchinfo; 29 29 struct ts_state state;
+1 -1
net/netfilter/xt_tcpmss.c
··· 25 25 MODULE_ALIAS("ip6t_tcpmss"); 26 26 27 27 static bool 28 - tcpmss_mt(const struct sk_buff *skb, const struct xt_match_param *par) 28 + tcpmss_mt(const struct sk_buff *skb, const struct xt_action_param *par) 29 29 { 30 30 const struct xt_tcpmss_match_info *info = par->matchinfo; 31 31 const struct tcphdr *th;
+4 -2
net/netfilter/xt_tcpudp.c
··· 62 62 return invert; 63 63 } 64 64 65 - static bool tcp_mt(const struct sk_buff *skb, const struct xt_match_param *par) 65 + static bool tcp_mt(const struct sk_buff *skb, 66 + const struct xt_action_param *par) 66 67 { 67 68 const struct tcphdr *th; 68 69 struct tcphdr _tcph; ··· 129 128 return (tcpinfo->invflags & ~XT_TCP_INV_MASK) ? -EINVAL : 0; 130 129 } 131 130 132 - static bool udp_mt(const struct sk_buff *skb, const struct xt_match_param *par) 131 + static bool udp_mt(const struct sk_buff *skb, 132 + const struct xt_action_param *par) 133 133 { 134 134 const struct udphdr *uh; 135 135 struct udphdr _udph;
+1 -1
net/netfilter/xt_time.c
··· 152 152 } 153 153 154 154 static bool 155 - time_mt(const struct sk_buff *skb, const struct xt_match_param *par) 155 + time_mt(const struct sk_buff *skb, const struct xt_action_param *par) 156 156 { 157 157 const struct xt_time_info *info = par->matchinfo; 158 158 unsigned int packet_time;
+2 -1
net/netfilter/xt_u32.c
··· 86 86 return true; 87 87 } 88 88 89 - static bool u32_mt(const struct sk_buff *skb, const struct xt_match_param *par) 89 + static bool u32_mt(const struct sk_buff *skb, 90 + const struct xt_action_param *par) 90 91 { 91 92 const struct xt_u32 *data = par->matchinfo; 92 93 bool ret;
+1 -1
net/sched/act_ipt.c
··· 199 199 { 200 200 int ret = 0, result = 0; 201 201 struct tcf_ipt *ipt = a->priv; 202 - struct xt_target_param par; 202 + struct xt_action_param par; 203 203 204 204 if (skb_cloned(skb)) { 205 205 if (pskb_expand_head(skb, 0, 0, GFP_ATOMIC))