netfilter: conntrack: remove pf argument from l4 packet functions
authorFlorian Westphal <fw@strlen.de>
Wed, 11 Oct 2017 08:47:42 +0000 (10:47 +0200)
committerPablo Neira Ayuso <pablo@netfilter.org>
Tue, 24 Oct 2017 16:01:49 +0000 (18:01 +0200)
not needed/used anymore.

Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
include/net/netfilter/nf_conntrack_l4proto.h
net/ipv4/netfilter/nf_conntrack_proto_icmp.c
net/ipv6/netfilter/nf_conntrack_proto_icmpv6.c
net/netfilter/nf_conntrack_core.c
net/netfilter/nf_conntrack_proto_dccp.c
net/netfilter/nf_conntrack_proto_generic.c
net/netfilter/nf_conntrack_proto_gre.c
net/netfilter/nf_conntrack_proto_sctp.c
net/netfilter/nf_conntrack_proto_tcp.c
net/netfilter/nf_conntrack_proto_udp.c

index 5d51255..e065188 100644 (file)
@@ -42,7 +42,6 @@ struct nf_conntrack_l4proto {
                      const struct sk_buff *skb,
                      unsigned int dataoff,
                      enum ip_conntrack_info ctinfo,
-                     u_int8_t pf,
                      unsigned int *timeouts);
 
        /* Called when a new connection for this protocol found;
index 7281a7b..8969420 100644 (file)
@@ -81,7 +81,6 @@ static int icmp_packet(struct nf_conn *ct,
                       const struct sk_buff *skb,
                       unsigned int dataoff,
                       enum ip_conntrack_info ctinfo,
-                      u_int8_t pf,
                       unsigned int *timeout)
 {
        /* Do not immediately delete the connection after the first
index 0f227ca..dca921d 100644 (file)
@@ -94,7 +94,6 @@ static int icmpv6_packet(struct nf_conn *ct,
                       const struct sk_buff *skb,
                       unsigned int dataoff,
                       enum ip_conntrack_info ctinfo,
-                      u_int8_t pf,
                       unsigned int *timeout)
 {
        /* Do not immediately delete the connection after the first
index 0113039..28e6751 100644 (file)
@@ -1419,7 +1419,7 @@ repeat:
        /* Decide what timeout policy we want to apply to this flow. */
        timeouts = nf_ct_timeout_lookup(net, ct, l4proto);
 
-       ret = l4proto->packet(ct, skb, dataoff, ctinfo, pf, timeouts);
+       ret = l4proto->packet(ct, skb, dataoff, ctinfo, timeouts);
        if (ret <= 0) {
                /* Invalid: inverse of the return code tells
                 * the netfilter core what to do */
index 49e0abc..2a446f4 100644 (file)
@@ -467,7 +467,6 @@ static unsigned int *dccp_get_timeouts(struct net *net)
 
 static int dccp_packet(struct nf_conn *ct, const struct sk_buff *skb,
                       unsigned int dataoff, enum ip_conntrack_info ctinfo,
-                      u_int8_t pf,
                       unsigned int *timeouts)
 {
        enum ip_conntrack_dir dir = CTINFO2DIR(ctinfo);
index 9cd4070..1f86ddf 100644 (file)
@@ -60,7 +60,6 @@ static int generic_packet(struct nf_conn *ct,
                          const struct sk_buff *skb,
                          unsigned int dataoff,
                          enum ip_conntrack_info ctinfo,
-                         u_int8_t pf,
                          unsigned int *timeout)
 {
        nf_ct_refresh_acct(ct, ctinfo, skb, *timeout);
index 09a9048..a250300 100644 (file)
@@ -244,7 +244,6 @@ static int gre_packet(struct nf_conn *ct,
                      const struct sk_buff *skb,
                      unsigned int dataoff,
                      enum ip_conntrack_info ctinfo,
-                     u_int8_t pf,
                      unsigned int *timeouts)
 {
        /* If we've seen traffic both ways, this is a GRE connection.
index aa630c5..80faf04 100644 (file)
@@ -306,7 +306,6 @@ static int sctp_packet(struct nf_conn *ct,
                       const struct sk_buff *skb,
                       unsigned int dataoff,
                       enum ip_conntrack_info ctinfo,
-                      u_int8_t pf,
                       unsigned int *timeouts)
 {
        enum sctp_conntrack new_state, old_state;
index dced574..8f28329 100644 (file)
@@ -493,8 +493,7 @@ static bool tcp_in_window(const struct nf_conn *ct,
                          unsigned int index,
                          const struct sk_buff *skb,
                          unsigned int dataoff,
-                         const struct tcphdr *tcph,
-                         u_int8_t pf)
+                         const struct tcphdr *tcph)
 {
        struct net *net = nf_ct_net(ct);
        struct nf_tcp_net *tn = tcp_pernet(net);
@@ -801,7 +800,6 @@ static int tcp_packet(struct nf_conn *ct,
                      const struct sk_buff *skb,
                      unsigned int dataoff,
                      enum ip_conntrack_info ctinfo,
-                     u_int8_t pf,
                      unsigned int *timeouts)
 {
        struct net *net = nf_ct_net(ct);
@@ -1013,7 +1011,7 @@ static int tcp_packet(struct nf_conn *ct,
        }
 
        if (!tcp_in_window(ct, &ct->proto.tcp, dir, index,
-                          skb, dataoff, th, pf)) {
+                          skb, dataoff, th)) {
                spin_unlock_bh(&ct->lock);
                return -NF_ACCEPT;
        }
index fc20cf4..3a5f727 100644 (file)
@@ -73,7 +73,6 @@ static int udp_packet(struct nf_conn *ct,
                      const struct sk_buff *skb,
                      unsigned int dataoff,
                      enum ip_conntrack_info ctinfo,
-                     u_int8_t pf,
                      unsigned int *timeouts)
 {
        /* If we've seen traffic both ways, this is some kind of UDP