diff options
author | Patrick McHardy <kaber@trash.net> | 2007-07-08 01:28:42 -0400 |
---|---|---|
committer | David S. Miller <davem@sunset.davemloft.net> | 2007-07-11 01:17:41 -0400 |
commit | 330f7db5e578e1e298ba3a41748e5ea333a64a2b (patch) | |
tree | 1557656cf800dcee7915cb41c94d4ce644947c61 | |
parent | f205c5e0c28aa7e0fb6eaaa66e97928f9d9e6994 (diff) |
[NETFILTER]: nf_conntrack: remove 'ignore_conntrack' argument from nf_conntrack_find_get
All callers pass NULL, this also doesn't seem very useful for modules.
Signed-off-by: Patrick McHardy <kaber@trash.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
-rw-r--r-- | include/net/netfilter/nf_conntrack_core.h | 3 | ||||
-rw-r--r-- | net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c | 2 | ||||
-rw-r--r-- | net/ipv4/netfilter/nf_conntrack_proto_icmp.c | 4 | ||||
-rw-r--r-- | net/ipv6/netfilter/nf_conntrack_proto_icmpv6.c | 2 | ||||
-rw-r--r-- | net/netfilter/nf_conntrack_core.c | 7 | ||||
-rw-r--r-- | net/netfilter/nf_conntrack_netlink.c | 6 | ||||
-rw-r--r-- | net/netfilter/nf_conntrack_pptp.c | 2 |
7 files changed, 12 insertions, 14 deletions
diff --git a/include/net/netfilter/nf_conntrack_core.h b/include/net/netfilter/nf_conntrack_core.h index 6351948654b3..2fa3a1bbc7f2 100644 --- a/include/net/netfilter/nf_conntrack_core.h +++ b/include/net/netfilter/nf_conntrack_core.h | |||
@@ -58,8 +58,7 @@ nf_ct_invert_tuple(struct nf_conntrack_tuple *inverse, | |||
58 | 58 | ||
59 | /* Find a connection corresponding to a tuple. */ | 59 | /* Find a connection corresponding to a tuple. */ |
60 | extern struct nf_conntrack_tuple_hash * | 60 | extern struct nf_conntrack_tuple_hash * |
61 | nf_conntrack_find_get(const struct nf_conntrack_tuple *tuple, | 61 | nf_conntrack_find_get(const struct nf_conntrack_tuple *tuple); |
62 | const struct nf_conn *ignored_conntrack); | ||
63 | 62 | ||
64 | extern int __nf_conntrack_confirm(struct sk_buff **pskb); | 63 | extern int __nf_conntrack_confirm(struct sk_buff **pskb); |
65 | 64 | ||
diff --git a/net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c b/net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c index 129a8cccf4a1..a103f597d446 100644 --- a/net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c +++ b/net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c | |||
@@ -334,7 +334,7 @@ getorigdst(struct sock *sk, int optval, void __user *user, int *len) | |||
334 | return -EINVAL; | 334 | return -EINVAL; |
335 | } | 335 | } |
336 | 336 | ||
337 | h = nf_conntrack_find_get(&tuple, NULL); | 337 | h = nf_conntrack_find_get(&tuple); |
338 | if (h) { | 338 | if (h) { |
339 | struct sockaddr_in sin; | 339 | struct sockaddr_in sin; |
340 | struct nf_conn *ct = nf_ct_tuplehash_to_ctrack(h); | 340 | struct nf_conn *ct = nf_ct_tuplehash_to_ctrack(h); |
diff --git a/net/ipv4/netfilter/nf_conntrack_proto_icmp.c b/net/ipv4/netfilter/nf_conntrack_proto_icmp.c index f4fc657c1983..91fb277045ef 100644 --- a/net/ipv4/netfilter/nf_conntrack_proto_icmp.c +++ b/net/ipv4/netfilter/nf_conntrack_proto_icmp.c | |||
@@ -187,13 +187,13 @@ icmp_error_message(struct sk_buff *skb, | |||
187 | 187 | ||
188 | *ctinfo = IP_CT_RELATED; | 188 | *ctinfo = IP_CT_RELATED; |
189 | 189 | ||
190 | h = nf_conntrack_find_get(&innertuple, NULL); | 190 | h = nf_conntrack_find_get(&innertuple); |
191 | if (!h) { | 191 | if (!h) { |
192 | /* Locally generated ICMPs will match inverted if they | 192 | /* Locally generated ICMPs will match inverted if they |
193 | haven't been SNAT'ed yet */ | 193 | haven't been SNAT'ed yet */ |
194 | /* FIXME: NAT code has to handle half-done double NAT --RR */ | 194 | /* FIXME: NAT code has to handle half-done double NAT --RR */ |
195 | if (hooknum == NF_IP_LOCAL_OUT) | 195 | if (hooknum == NF_IP_LOCAL_OUT) |
196 | h = nf_conntrack_find_get(&origtuple, NULL); | 196 | h = nf_conntrack_find_get(&origtuple); |
197 | 197 | ||
198 | if (!h) { | 198 | if (!h) { |
199 | DEBUGP("icmp_error_message: no match\n"); | 199 | DEBUGP("icmp_error_message: no match\n"); |
diff --git a/net/ipv6/netfilter/nf_conntrack_proto_icmpv6.c b/net/ipv6/netfilter/nf_conntrack_proto_icmpv6.c index 8814b95b2326..a514661d25dd 100644 --- a/net/ipv6/netfilter/nf_conntrack_proto_icmpv6.c +++ b/net/ipv6/netfilter/nf_conntrack_proto_icmpv6.c | |||
@@ -193,7 +193,7 @@ icmpv6_error_message(struct sk_buff *skb, | |||
193 | 193 | ||
194 | *ctinfo = IP_CT_RELATED; | 194 | *ctinfo = IP_CT_RELATED; |
195 | 195 | ||
196 | h = nf_conntrack_find_get(&intuple, NULL); | 196 | h = nf_conntrack_find_get(&intuple); |
197 | if (!h) { | 197 | if (!h) { |
198 | DEBUGP("icmpv6_error: no match\n"); | 198 | DEBUGP("icmpv6_error: no match\n"); |
199 | return -NF_ACCEPT; | 199 | return -NF_ACCEPT; |
diff --git a/net/netfilter/nf_conntrack_core.c b/net/netfilter/nf_conntrack_core.c index 992d0ef31fa3..8ed761cc0819 100644 --- a/net/netfilter/nf_conntrack_core.c +++ b/net/netfilter/nf_conntrack_core.c | |||
@@ -244,13 +244,12 @@ EXPORT_SYMBOL_GPL(__nf_conntrack_find); | |||
244 | 244 | ||
245 | /* Find a connection corresponding to a tuple. */ | 245 | /* Find a connection corresponding to a tuple. */ |
246 | struct nf_conntrack_tuple_hash * | 246 | struct nf_conntrack_tuple_hash * |
247 | nf_conntrack_find_get(const struct nf_conntrack_tuple *tuple, | 247 | nf_conntrack_find_get(const struct nf_conntrack_tuple *tuple) |
248 | const struct nf_conn *ignored_conntrack) | ||
249 | { | 248 | { |
250 | struct nf_conntrack_tuple_hash *h; | 249 | struct nf_conntrack_tuple_hash *h; |
251 | 250 | ||
252 | read_lock_bh(&nf_conntrack_lock); | 251 | read_lock_bh(&nf_conntrack_lock); |
253 | h = __nf_conntrack_find(tuple, ignored_conntrack); | 252 | h = __nf_conntrack_find(tuple, NULL); |
254 | if (h) | 253 | if (h) |
255 | atomic_inc(&nf_ct_tuplehash_to_ctrack(h)->ct_general.use); | 254 | atomic_inc(&nf_ct_tuplehash_to_ctrack(h)->ct_general.use); |
256 | read_unlock_bh(&nf_conntrack_lock); | 255 | read_unlock_bh(&nf_conntrack_lock); |
@@ -574,7 +573,7 @@ resolve_normal_ct(struct sk_buff *skb, | |||
574 | } | 573 | } |
575 | 574 | ||
576 | /* look for tuple match */ | 575 | /* look for tuple match */ |
577 | h = nf_conntrack_find_get(&tuple, NULL); | 576 | h = nf_conntrack_find_get(&tuple); |
578 | if (!h) { | 577 | if (!h) { |
579 | h = init_conntrack(&tuple, l3proto, l4proto, skb, dataoff); | 578 | h = init_conntrack(&tuple, l3proto, l4proto, skb, dataoff); |
580 | if (!h) | 579 | if (!h) |
diff --git a/net/netfilter/nf_conntrack_netlink.c b/net/netfilter/nf_conntrack_netlink.c index 0627559ca470..d310ec866194 100644 --- a/net/netfilter/nf_conntrack_netlink.c +++ b/net/netfilter/nf_conntrack_netlink.c | |||
@@ -689,7 +689,7 @@ ctnetlink_del_conntrack(struct sock *ctnl, struct sk_buff *skb, | |||
689 | if (err < 0) | 689 | if (err < 0) |
690 | return err; | 690 | return err; |
691 | 691 | ||
692 | h = nf_conntrack_find_get(&tuple, NULL); | 692 | h = nf_conntrack_find_get(&tuple); |
693 | if (!h) | 693 | if (!h) |
694 | return -ENOENT; | 694 | return -ENOENT; |
695 | 695 | ||
@@ -744,7 +744,7 @@ ctnetlink_get_conntrack(struct sock *ctnl, struct sk_buff *skb, | |||
744 | if (err < 0) | 744 | if (err < 0) |
745 | return err; | 745 | return err; |
746 | 746 | ||
747 | h = nf_conntrack_find_get(&tuple, NULL); | 747 | h = nf_conntrack_find_get(&tuple); |
748 | if (!h) | 748 | if (!h) |
749 | return -ENOENT; | 749 | return -ENOENT; |
750 | 750 | ||
@@ -1426,7 +1426,7 @@ ctnetlink_create_expect(struct nfattr *cda[], u_int8_t u3) | |||
1426 | return err; | 1426 | return err; |
1427 | 1427 | ||
1428 | /* Look for master conntrack of this expectation */ | 1428 | /* Look for master conntrack of this expectation */ |
1429 | h = nf_conntrack_find_get(&master_tuple, NULL); | 1429 | h = nf_conntrack_find_get(&master_tuple); |
1430 | if (!h) | 1430 | if (!h) |
1431 | return -ENOENT; | 1431 | return -ENOENT; |
1432 | ct = nf_ct_tuplehash_to_ctrack(h); | 1432 | ct = nf_ct_tuplehash_to_ctrack(h); |
diff --git a/net/netfilter/nf_conntrack_pptp.c b/net/netfilter/nf_conntrack_pptp.c index 115bcb5d5a7c..da36c48177e9 100644 --- a/net/netfilter/nf_conntrack_pptp.c +++ b/net/netfilter/nf_conntrack_pptp.c | |||
@@ -146,7 +146,7 @@ static int destroy_sibling_or_exp(const struct nf_conntrack_tuple *t) | |||
146 | DEBUGP("trying to timeout ct or exp for tuple "); | 146 | DEBUGP("trying to timeout ct or exp for tuple "); |
147 | NF_CT_DUMP_TUPLE(t); | 147 | NF_CT_DUMP_TUPLE(t); |
148 | 148 | ||
149 | h = nf_conntrack_find_get(t, NULL); | 149 | h = nf_conntrack_find_get(t); |
150 | if (h) { | 150 | if (h) { |
151 | sibling = nf_ct_tuplehash_to_ctrack(h); | 151 | sibling = nf_ct_tuplehash_to_ctrack(h); |
152 | DEBUGP("setting timeout of conntrack %p to 0\n", sibling); | 152 | DEBUGP("setting timeout of conntrack %p to 0\n", sibling); |