···4343 unsigned int dataoff,4444 enum ip_conntrack_info ctinfo,4545 u_int8_t pf,4646- unsigned int hooknum,4746 unsigned int *timeouts);48474948 /* Called when a new connection for this protocol found;
-1
net/ipv4/netfilter/nf_conntrack_proto_icmp.c
···8282 unsigned int dataoff,8383 enum ip_conntrack_info ctinfo,8484 u_int8_t pf,8585- unsigned int hooknum,8685 unsigned int *timeout)8786{8887 /* Do not immediately delete the connection after the first
+2-4
net/ipv6/netfilter/nf_conntrack_proto_icmpv6.c
···9595 unsigned int dataoff,9696 enum ip_conntrack_info ctinfo,9797 u_int8_t pf,9898- unsigned int hooknum,9998 unsigned int *timeout)10099{101100 /* Do not immediately delete the connection after the first···128129static int129130icmpv6_error_message(struct net *net, struct nf_conn *tmpl,130131 struct sk_buff *skb,131131- unsigned int icmp6off,132132- unsigned int hooknum)132132+ unsigned int icmp6off)133133{134134 struct nf_conntrack_tuple intuple, origtuple;135135 const struct nf_conntrack_tuple_hash *h;···212214 if (icmp6h->icmp6_type >= 128)213215 return NF_ACCEPT;214216215215- return icmpv6_error_message(net, tmpl, skb, dataoff, hooknum);217217+ return icmpv6_error_message(net, tmpl, skb, dataoff);216218}217219218220#if IS_ENABLED(CONFIG_NF_CT_NETLINK)
+1-1
net/netfilter/nf_conntrack_core.c
···14141414 /* Decide what timeout policy we want to apply to this flow. */14151415 timeouts = nf_ct_timeout_lookup(net, ct, l4proto);1416141614171417- ret = l4proto->packet(ct, skb, dataoff, ctinfo, pf, hooknum, timeouts);14171417+ ret = l4proto->packet(ct, skb, dataoff, ctinfo, pf, timeouts);14181418 if (ret <= 0) {14191419 /* Invalid: inverse of the return code tells14201420 * the netfilter core what to do */
+1-1
net/netfilter/nf_conntrack_proto_dccp.c
···469469470470static int dccp_packet(struct nf_conn *ct, const struct sk_buff *skb,471471 unsigned int dataoff, enum ip_conntrack_info ctinfo,472472- u_int8_t pf, unsigned int hooknum,472472+ u_int8_t pf,473473 unsigned int *timeouts)474474{475475 struct net *net = nf_ct_net(ct);
-1
net/netfilter/nf_conntrack_proto_generic.c
···6161 unsigned int dataoff,6262 enum ip_conntrack_info ctinfo,6363 u_int8_t pf,6464- unsigned int hooknum,6564 unsigned int *timeout)6665{6766 nf_ct_refresh_acct(ct, ctinfo, skb, *timeout);
-1
net/netfilter/nf_conntrack_proto_gre.c
···245245 unsigned int dataoff,246246 enum ip_conntrack_info ctinfo,247247 u_int8_t pf,248248- unsigned int hooknum,249248 unsigned int *timeouts)250249{251250 /* If we've seen traffic both ways, this is a GRE connection.
-1
net/netfilter/nf_conntrack_proto_sctp.c
···307307 unsigned int dataoff,308308 enum ip_conntrack_info ctinfo,309309 u_int8_t pf,310310- unsigned int hooknum,311310 unsigned int *timeouts)312311{313312 enum sctp_conntrack new_state, old_state;
-1
net/netfilter/nf_conntrack_proto_tcp.c
···803803 unsigned int dataoff,804804 enum ip_conntrack_info ctinfo,805805 u_int8_t pf,806806- unsigned int hooknum,807806 unsigned int *timeouts)808807{809808 struct net *net = nf_ct_net(ct);
-1
net/netfilter/nf_conntrack_proto_udp.c
···7474 unsigned int dataoff,7575 enum ip_conntrack_info ctinfo,7676 u_int8_t pf,7777- unsigned int hooknum,7877 unsigned int *timeouts)7978{8079 /* If we've seen traffic both ways, this is some kind of UDP