diff options
-rw-r--r-- | include/net/netfilter/nf_conntrack_tuple.h | 2 | ||||
-rw-r--r-- | net/ipv4/netfilter/ipt_CLUSTERIP.c | 2 | ||||
-rw-r--r-- | net/ipv4/netfilter/nf_conntrack_proto_icmp.c | 2 | ||||
-rw-r--r-- | net/ipv4/netfilter/nf_nat_pptp.c | 2 | ||||
-rw-r--r-- | net/ipv6/netfilter/nf_conntrack_proto_icmpv6.c | 2 | ||||
-rw-r--r-- | net/netfilter/nf_conntrack_core.c | 2 | ||||
-rw-r--r-- | net/netfilter/nf_conntrack_h323_main.c | 26 | ||||
-rw-r--r-- | net/netfilter/nf_conntrack_pptp.c | 4 | ||||
-rw-r--r-- | net/netfilter/nf_conntrack_proto_gre.c | 6 | ||||
-rw-r--r-- | net/netfilter/nf_conntrack_proto_tcp.c | 6 | ||||
-rw-r--r-- | net/netfilter/nf_conntrack_sane.c | 2 | ||||
-rw-r--r-- | net/netfilter/nf_conntrack_tftp.c | 6 |
12 files changed, 30 insertions, 32 deletions
diff --git a/include/net/netfilter/nf_conntrack_tuple.h b/include/net/netfilter/nf_conntrack_tuple.h index 2722b13ecd6c..1bb7087833d3 100644 --- a/include/net/netfilter/nf_conntrack_tuple.h +++ b/include/net/netfilter/nf_conntrack_tuple.h | |||
@@ -151,8 +151,6 @@ static inline void nf_ct_dump_tuple(const struct nf_conntrack_tuple *t) | |||
151 | } | 151 | } |
152 | } | 152 | } |
153 | 153 | ||
154 | #define NF_CT_DUMP_TUPLE(tp) nf_ct_dump_tuple(tp) | ||
155 | |||
156 | /* If we're the first tuple, it's the original dir. */ | 154 | /* If we're the first tuple, it's the original dir. */ |
157 | #define NF_CT_DIRECTION(h) \ | 155 | #define NF_CT_DIRECTION(h) \ |
158 | ((enum ip_conntrack_dir)(h)->tuple.dst.dir) | 156 | ((enum ip_conntrack_dir)(h)->tuple.dst.dir) |
diff --git a/net/ipv4/netfilter/ipt_CLUSTERIP.c b/net/ipv4/netfilter/ipt_CLUSTERIP.c index 2510d4fcdb54..c1f970cb7221 100644 --- a/net/ipv4/netfilter/ipt_CLUSTERIP.c +++ b/net/ipv4/netfilter/ipt_CLUSTERIP.c | |||
@@ -331,7 +331,7 @@ clusterip_tg(struct sk_buff *skb, const struct net_device *in, | |||
331 | } | 331 | } |
332 | 332 | ||
333 | #ifdef DEBUG | 333 | #ifdef DEBUG |
334 | NF_CT_DUMP_TUPLE(&ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple); | 334 | nf_ct_dump_tuple_ip(&ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple); |
335 | #endif | 335 | #endif |
336 | pr_debug("hash=%u ct_hash=%u ", hash, ct->mark); | 336 | pr_debug("hash=%u ct_hash=%u ", hash, ct->mark); |
337 | if (!clusterip_responsible(cipinfo->config, hash)) { | 337 | if (!clusterip_responsible(cipinfo->config, hash)) { |
diff --git a/net/ipv4/netfilter/nf_conntrack_proto_icmp.c b/net/ipv4/netfilter/nf_conntrack_proto_icmp.c index 193a845fe7f8..78ab19accace 100644 --- a/net/ipv4/netfilter/nf_conntrack_proto_icmp.c +++ b/net/ipv4/netfilter/nf_conntrack_proto_icmp.c | |||
@@ -115,7 +115,7 @@ static bool icmp_new(struct nf_conn *ct, const struct sk_buff *skb, | |||
115 | /* Can't create a new ICMP `conn' with this. */ | 115 | /* Can't create a new ICMP `conn' with this. */ |
116 | pr_debug("icmp: can't create new conn with type %u\n", | 116 | pr_debug("icmp: can't create new conn with type %u\n", |
117 | ct->tuplehash[0].tuple.dst.u.icmp.type); | 117 | ct->tuplehash[0].tuple.dst.u.icmp.type); |
118 | NF_CT_DUMP_TUPLE(&ct->tuplehash[0].tuple); | 118 | nf_ct_dump_tuple_ip(&ct->tuplehash[0].tuple); |
119 | return false; | 119 | return false; |
120 | } | 120 | } |
121 | atomic_set(&ct->proto.icmp.count, 0); | 121 | atomic_set(&ct->proto.icmp.count, 0); |
diff --git a/net/ipv4/netfilter/nf_nat_pptp.c b/net/ipv4/netfilter/nf_nat_pptp.c index 3a1e6d6afc0a..da3d91a5ef5c 100644 --- a/net/ipv4/netfilter/nf_nat_pptp.c +++ b/net/ipv4/netfilter/nf_nat_pptp.c | |||
@@ -72,7 +72,7 @@ static void pptp_nat_expected(struct nf_conn *ct, | |||
72 | } | 72 | } |
73 | 73 | ||
74 | pr_debug("trying to unexpect other dir: "); | 74 | pr_debug("trying to unexpect other dir: "); |
75 | NF_CT_DUMP_TUPLE(&t); | 75 | nf_ct_dump_tuple_ip(&t); |
76 | other_exp = nf_ct_expect_find_get(&t); | 76 | other_exp = nf_ct_expect_find_get(&t); |
77 | if (other_exp) { | 77 | if (other_exp) { |
78 | nf_ct_unexpect_related(other_exp); | 78 | nf_ct_unexpect_related(other_exp); |
diff --git a/net/ipv6/netfilter/nf_conntrack_proto_icmpv6.c b/net/ipv6/netfilter/nf_conntrack_proto_icmpv6.c index 9ad40e0e17fc..ee713b03e9ec 100644 --- a/net/ipv6/netfilter/nf_conntrack_proto_icmpv6.c +++ b/net/ipv6/netfilter/nf_conntrack_proto_icmpv6.c | |||
@@ -115,7 +115,7 @@ static bool icmpv6_new(struct nf_conn *ct, const struct sk_buff *skb, | |||
115 | /* Can't create a new ICMPv6 `conn' with this. */ | 115 | /* Can't create a new ICMPv6 `conn' with this. */ |
116 | pr_debug("icmpv6: can't create new conn with type %u\n", | 116 | pr_debug("icmpv6: can't create new conn with type %u\n", |
117 | type + 128); | 117 | type + 128); |
118 | NF_CT_DUMP_TUPLE(&ct->tuplehash[0].tuple); | 118 | nf_ct_dump_tuple_ipv6(&ct->tuplehash[0].tuple); |
119 | return false; | 119 | return false; |
120 | } | 120 | } |
121 | atomic_set(&ct->proto.icmp.count, 0); | 121 | atomic_set(&ct->proto.icmp.count, 0); |
diff --git a/net/netfilter/nf_conntrack_core.c b/net/netfilter/nf_conntrack_core.c index a3fe9db412d3..351237399e27 100644 --- a/net/netfilter/nf_conntrack_core.c +++ b/net/netfilter/nf_conntrack_core.c | |||
@@ -763,7 +763,7 @@ void nf_conntrack_alter_reply(struct nf_conn *ct, | |||
763 | NF_CT_ASSERT(!nf_ct_is_confirmed(ct)); | 763 | NF_CT_ASSERT(!nf_ct_is_confirmed(ct)); |
764 | 764 | ||
765 | pr_debug("Altering reply tuple of %p to ", ct); | 765 | pr_debug("Altering reply tuple of %p to ", ct); |
766 | NF_CT_DUMP_TUPLE(newreply); | 766 | nf_ct_dump_tuple(newreply); |
767 | 767 | ||
768 | ct->tuplehash[IP_CT_DIR_REPLY].tuple = *newreply; | 768 | ct->tuplehash[IP_CT_DIR_REPLY].tuple = *newreply; |
769 | if (ct->master || (help && help->expecting != 0)) | 769 | if (ct->master || (help && help->expecting != 0)) |
diff --git a/net/netfilter/nf_conntrack_h323_main.c b/net/netfilter/nf_conntrack_h323_main.c index c3f87094de43..95da1a24aab7 100644 --- a/net/netfilter/nf_conntrack_h323_main.c +++ b/net/netfilter/nf_conntrack_h323_main.c | |||
@@ -303,9 +303,9 @@ static int expect_rtp_rtcp(struct sk_buff *skb, struct nf_conn *ct, | |||
303 | if (nf_ct_expect_related(rtp_exp) == 0) { | 303 | if (nf_ct_expect_related(rtp_exp) == 0) { |
304 | if (nf_ct_expect_related(rtcp_exp) == 0) { | 304 | if (nf_ct_expect_related(rtcp_exp) == 0) { |
305 | pr_debug("nf_ct_h323: expect RTP "); | 305 | pr_debug("nf_ct_h323: expect RTP "); |
306 | NF_CT_DUMP_TUPLE(&rtp_exp->tuple); | 306 | nf_ct_dump_tuple(&rtp_exp->tuple); |
307 | pr_debug("nf_ct_h323: expect RTCP "); | 307 | pr_debug("nf_ct_h323: expect RTCP "); |
308 | NF_CT_DUMP_TUPLE(&rtcp_exp->tuple); | 308 | nf_ct_dump_tuple(&rtcp_exp->tuple); |
309 | } else { | 309 | } else { |
310 | nf_ct_unexpect_related(rtp_exp); | 310 | nf_ct_unexpect_related(rtp_exp); |
311 | ret = -1; | 311 | ret = -1; |
@@ -360,7 +360,7 @@ static int expect_t120(struct sk_buff *skb, | |||
360 | } else { /* Conntrack only */ | 360 | } else { /* Conntrack only */ |
361 | if (nf_ct_expect_related(exp) == 0) { | 361 | if (nf_ct_expect_related(exp) == 0) { |
362 | pr_debug("nf_ct_h323: expect T.120 "); | 362 | pr_debug("nf_ct_h323: expect T.120 "); |
363 | NF_CT_DUMP_TUPLE(&exp->tuple); | 363 | nf_ct_dump_tuple(&exp->tuple); |
364 | } else | 364 | } else |
365 | ret = -1; | 365 | ret = -1; |
366 | } | 366 | } |
@@ -582,7 +582,7 @@ static int h245_help(struct sk_buff *skb, unsigned int protoff, | |||
582 | while (get_tpkt_data(skb, protoff, ct, ctinfo, | 582 | while (get_tpkt_data(skb, protoff, ct, ctinfo, |
583 | &data, &datalen, &dataoff)) { | 583 | &data, &datalen, &dataoff)) { |
584 | pr_debug("nf_ct_h245: TPKT len=%d ", datalen); | 584 | pr_debug("nf_ct_h245: TPKT len=%d ", datalen); |
585 | NF_CT_DUMP_TUPLE(&ct->tuplehash[CTINFO2DIR(ctinfo)].tuple); | 585 | nf_ct_dump_tuple(&ct->tuplehash[CTINFO2DIR(ctinfo)].tuple); |
586 | 586 | ||
587 | /* Decode H.245 signal */ | 587 | /* Decode H.245 signal */ |
588 | ret = DecodeMultimediaSystemControlMessage(data, datalen, | 588 | ret = DecodeMultimediaSystemControlMessage(data, datalen, |
@@ -695,7 +695,7 @@ static int expect_h245(struct sk_buff *skb, struct nf_conn *ct, | |||
695 | } else { /* Conntrack only */ | 695 | } else { /* Conntrack only */ |
696 | if (nf_ct_expect_related(exp) == 0) { | 696 | if (nf_ct_expect_related(exp) == 0) { |
697 | pr_debug("nf_ct_q931: expect H.245 "); | 697 | pr_debug("nf_ct_q931: expect H.245 "); |
698 | NF_CT_DUMP_TUPLE(&exp->tuple); | 698 | nf_ct_dump_tuple(&exp->tuple); |
699 | } else | 699 | } else |
700 | ret = -1; | 700 | ret = -1; |
701 | } | 701 | } |
@@ -810,7 +810,7 @@ static int expect_callforwarding(struct sk_buff *skb, | |||
810 | } else { /* Conntrack only */ | 810 | } else { /* Conntrack only */ |
811 | if (nf_ct_expect_related(exp) == 0) { | 811 | if (nf_ct_expect_related(exp) == 0) { |
812 | pr_debug("nf_ct_q931: expect Call Forwarding "); | 812 | pr_debug("nf_ct_q931: expect Call Forwarding "); |
813 | NF_CT_DUMP_TUPLE(&exp->tuple); | 813 | nf_ct_dump_tuple(&exp->tuple); |
814 | } else | 814 | } else |
815 | ret = -1; | 815 | ret = -1; |
816 | } | 816 | } |
@@ -1130,7 +1130,7 @@ static int q931_help(struct sk_buff *skb, unsigned int protoff, | |||
1130 | while (get_tpkt_data(skb, protoff, ct, ctinfo, | 1130 | while (get_tpkt_data(skb, protoff, ct, ctinfo, |
1131 | &data, &datalen, &dataoff)) { | 1131 | &data, &datalen, &dataoff)) { |
1132 | pr_debug("nf_ct_q931: TPKT len=%d ", datalen); | 1132 | pr_debug("nf_ct_q931: TPKT len=%d ", datalen); |
1133 | NF_CT_DUMP_TUPLE(&ct->tuplehash[CTINFO2DIR(ctinfo)].tuple); | 1133 | nf_ct_dump_tuple(&ct->tuplehash[CTINFO2DIR(ctinfo)].tuple); |
1134 | 1134 | ||
1135 | /* Decode Q.931 signal */ | 1135 | /* Decode Q.931 signal */ |
1136 | ret = DecodeQ931(data, datalen, &q931); | 1136 | ret = DecodeQ931(data, datalen, &q931); |
@@ -1279,7 +1279,7 @@ static int expect_q931(struct sk_buff *skb, struct nf_conn *ct, | |||
1279 | } else { /* Conntrack only */ | 1279 | } else { /* Conntrack only */ |
1280 | if (nf_ct_expect_related(exp) == 0) { | 1280 | if (nf_ct_expect_related(exp) == 0) { |
1281 | pr_debug("nf_ct_ras: expect Q.931 "); | 1281 | pr_debug("nf_ct_ras: expect Q.931 "); |
1282 | NF_CT_DUMP_TUPLE(&exp->tuple); | 1282 | nf_ct_dump_tuple(&exp->tuple); |
1283 | 1283 | ||
1284 | /* Save port for looking up expect in processing RCF */ | 1284 | /* Save port for looking up expect in processing RCF */ |
1285 | info->sig_port[dir] = port; | 1285 | info->sig_port[dir] = port; |
@@ -1343,7 +1343,7 @@ static int process_gcf(struct sk_buff *skb, struct nf_conn *ct, | |||
1343 | 1343 | ||
1344 | if (nf_ct_expect_related(exp) == 0) { | 1344 | if (nf_ct_expect_related(exp) == 0) { |
1345 | pr_debug("nf_ct_ras: expect RAS "); | 1345 | pr_debug("nf_ct_ras: expect RAS "); |
1346 | NF_CT_DUMP_TUPLE(&exp->tuple); | 1346 | nf_ct_dump_tuple(&exp->tuple); |
1347 | } else | 1347 | } else |
1348 | ret = -1; | 1348 | ret = -1; |
1349 | 1349 | ||
@@ -1427,7 +1427,7 @@ static int process_rcf(struct sk_buff *skb, struct nf_conn *ct, | |||
1427 | pr_debug("nf_ct_ras: set Q.931 expect " | 1427 | pr_debug("nf_ct_ras: set Q.931 expect " |
1428 | "timeout to %u seconds for", | 1428 | "timeout to %u seconds for", |
1429 | info->timeout); | 1429 | info->timeout); |
1430 | NF_CT_DUMP_TUPLE(&exp->tuple); | 1430 | nf_ct_dump_tuple(&exp->tuple); |
1431 | set_expect_timeout(exp, info->timeout); | 1431 | set_expect_timeout(exp, info->timeout); |
1432 | } | 1432 | } |
1433 | spin_unlock_bh(&nf_conntrack_lock); | 1433 | spin_unlock_bh(&nf_conntrack_lock); |
@@ -1548,7 +1548,7 @@ static int process_acf(struct sk_buff *skb, struct nf_conn *ct, | |||
1548 | 1548 | ||
1549 | if (nf_ct_expect_related(exp) == 0) { | 1549 | if (nf_ct_expect_related(exp) == 0) { |
1550 | pr_debug("nf_ct_ras: expect Q.931 "); | 1550 | pr_debug("nf_ct_ras: expect Q.931 "); |
1551 | NF_CT_DUMP_TUPLE(&exp->tuple); | 1551 | nf_ct_dump_tuple(&exp->tuple); |
1552 | } else | 1552 | } else |
1553 | ret = -1; | 1553 | ret = -1; |
1554 | 1554 | ||
@@ -1601,7 +1601,7 @@ static int process_lcf(struct sk_buff *skb, struct nf_conn *ct, | |||
1601 | 1601 | ||
1602 | if (nf_ct_expect_related(exp) == 0) { | 1602 | if (nf_ct_expect_related(exp) == 0) { |
1603 | pr_debug("nf_ct_ras: expect Q.931 "); | 1603 | pr_debug("nf_ct_ras: expect Q.931 "); |
1604 | NF_CT_DUMP_TUPLE(&exp->tuple); | 1604 | nf_ct_dump_tuple(&exp->tuple); |
1605 | } else | 1605 | } else |
1606 | ret = -1; | 1606 | ret = -1; |
1607 | 1607 | ||
@@ -1705,7 +1705,7 @@ static int ras_help(struct sk_buff *skb, unsigned int protoff, | |||
1705 | if (data == NULL) | 1705 | if (data == NULL) |
1706 | goto accept; | 1706 | goto accept; |
1707 | pr_debug("nf_ct_ras: RAS message len=%d ", datalen); | 1707 | pr_debug("nf_ct_ras: RAS message len=%d ", datalen); |
1708 | NF_CT_DUMP_TUPLE(&ct->tuplehash[CTINFO2DIR(ctinfo)].tuple); | 1708 | nf_ct_dump_tuple(&ct->tuplehash[CTINFO2DIR(ctinfo)].tuple); |
1709 | 1709 | ||
1710 | /* Decode RAS message */ | 1710 | /* Decode RAS message */ |
1711 | ret = DecodeRasMessage(data, datalen, &ras); | 1711 | ret = DecodeRasMessage(data, datalen, &ras); |
diff --git a/net/netfilter/nf_conntrack_pptp.c b/net/netfilter/nf_conntrack_pptp.c index 4793cc078789..97e54b0e43a3 100644 --- a/net/netfilter/nf_conntrack_pptp.c +++ b/net/netfilter/nf_conntrack_pptp.c | |||
@@ -119,7 +119,7 @@ static void pptp_expectfn(struct nf_conn *ct, | |||
119 | /* obviously this tuple inversion only works until you do NAT */ | 119 | /* obviously this tuple inversion only works until you do NAT */ |
120 | nf_ct_invert_tuplepr(&inv_t, &exp->tuple); | 120 | nf_ct_invert_tuplepr(&inv_t, &exp->tuple); |
121 | pr_debug("trying to unexpect other dir: "); | 121 | pr_debug("trying to unexpect other dir: "); |
122 | NF_CT_DUMP_TUPLE(&inv_t); | 122 | nf_ct_dump_tuple(&inv_t); |
123 | 123 | ||
124 | exp_other = nf_ct_expect_find_get(&inv_t); | 124 | exp_other = nf_ct_expect_find_get(&inv_t); |
125 | if (exp_other) { | 125 | if (exp_other) { |
@@ -141,7 +141,7 @@ static int destroy_sibling_or_exp(const struct nf_conntrack_tuple *t) | |||
141 | struct nf_conn *sibling; | 141 | struct nf_conn *sibling; |
142 | 142 | ||
143 | pr_debug("trying to timeout ct or exp for tuple "); | 143 | pr_debug("trying to timeout ct or exp for tuple "); |
144 | NF_CT_DUMP_TUPLE(t); | 144 | nf_ct_dump_tuple(t); |
145 | 145 | ||
146 | h = nf_conntrack_find_get(t); | 146 | h = nf_conntrack_find_get(t); |
147 | if (h) { | 147 | if (h) { |
diff --git a/net/netfilter/nf_conntrack_proto_gre.c b/net/netfilter/nf_conntrack_proto_gre.c index 7d37a2ea67b2..654a4f7f12c6 100644 --- a/net/netfilter/nf_conntrack_proto_gre.c +++ b/net/netfilter/nf_conntrack_proto_gre.c | |||
@@ -82,7 +82,7 @@ static __be16 gre_keymap_lookup(struct nf_conntrack_tuple *t) | |||
82 | read_unlock_bh(&nf_ct_gre_lock); | 82 | read_unlock_bh(&nf_ct_gre_lock); |
83 | 83 | ||
84 | pr_debug("lookup src key 0x%x for ", key); | 84 | pr_debug("lookup src key 0x%x for ", key); |
85 | NF_CT_DUMP_TUPLE(t); | 85 | nf_ct_dump_tuple(t); |
86 | 86 | ||
87 | return key; | 87 | return key; |
88 | } | 88 | } |
@@ -113,7 +113,7 @@ int nf_ct_gre_keymap_add(struct nf_conn *ct, enum ip_conntrack_dir dir, | |||
113 | *kmp = km; | 113 | *kmp = km; |
114 | 114 | ||
115 | pr_debug("adding new entry %p: ", km); | 115 | pr_debug("adding new entry %p: ", km); |
116 | NF_CT_DUMP_TUPLE(&km->tuple); | 116 | nf_ct_dump_tuple(&km->tuple); |
117 | 117 | ||
118 | write_lock_bh(&nf_ct_gre_lock); | 118 | write_lock_bh(&nf_ct_gre_lock); |
119 | list_add_tail(&km->list, &gre_keymap_list); | 119 | list_add_tail(&km->list, &gre_keymap_list); |
@@ -238,7 +238,7 @@ static bool gre_new(struct nf_conn *ct, const struct sk_buff *skb, | |||
238 | unsigned int dataoff) | 238 | unsigned int dataoff) |
239 | { | 239 | { |
240 | pr_debug(": "); | 240 | pr_debug(": "); |
241 | NF_CT_DUMP_TUPLE(&ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple); | 241 | nf_ct_dump_tuple(&ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple); |
242 | 242 | ||
243 | /* initialize to sane value. Ideally a conntrack helper | 243 | /* initialize to sane value. Ideally a conntrack helper |
244 | * (e.g. in case of pptp) is increasing them */ | 244 | * (e.g. in case of pptp) is increasing them */ |
diff --git a/net/netfilter/nf_conntrack_proto_tcp.c b/net/netfilter/nf_conntrack_proto_tcp.c index 73a8b32db7be..ba94004fe323 100644 --- a/net/netfilter/nf_conntrack_proto_tcp.c +++ b/net/netfilter/nf_conntrack_proto_tcp.c | |||
@@ -505,7 +505,7 @@ static bool tcp_in_window(const struct nf_conn *ct, | |||
505 | 505 | ||
506 | pr_debug("tcp_in_window: START\n"); | 506 | pr_debug("tcp_in_window: START\n"); |
507 | pr_debug("tcp_in_window: "); | 507 | pr_debug("tcp_in_window: "); |
508 | NF_CT_DUMP_TUPLE(tuple); | 508 | nf_ct_dump_tuple(tuple); |
509 | pr_debug("seq=%u ack=%u sack=%u win=%u end=%u\n", | 509 | pr_debug("seq=%u ack=%u sack=%u win=%u end=%u\n", |
510 | seq, ack, sack, win, end); | 510 | seq, ack, sack, win, end); |
511 | pr_debug("tcp_in_window: sender end=%u maxend=%u maxwin=%u scale=%i " | 511 | pr_debug("tcp_in_window: sender end=%u maxend=%u maxwin=%u scale=%i " |
@@ -592,7 +592,7 @@ static bool tcp_in_window(const struct nf_conn *ct, | |||
592 | seq = end = sender->td_end; | 592 | seq = end = sender->td_end; |
593 | 593 | ||
594 | pr_debug("tcp_in_window: "); | 594 | pr_debug("tcp_in_window: "); |
595 | NF_CT_DUMP_TUPLE(tuple); | 595 | nf_ct_dump_tuple(tuple); |
596 | pr_debug("seq=%u ack=%u sack =%u win=%u end=%u\n", | 596 | pr_debug("seq=%u ack=%u sack =%u win=%u end=%u\n", |
597 | seq, ack, sack, win, end); | 597 | seq, ack, sack, win, end); |
598 | pr_debug("tcp_in_window: sender end=%u maxend=%u maxwin=%u scale=%i " | 598 | pr_debug("tcp_in_window: sender end=%u maxend=%u maxwin=%u scale=%i " |
@@ -936,7 +936,7 @@ static int tcp_packet(struct nf_conn *ct, | |||
936 | ct->proto.tcp.last_dir = dir; | 936 | ct->proto.tcp.last_dir = dir; |
937 | 937 | ||
938 | pr_debug("tcp_conntracks: "); | 938 | pr_debug("tcp_conntracks: "); |
939 | NF_CT_DUMP_TUPLE(tuple); | 939 | nf_ct_dump_tuple(tuple); |
940 | pr_debug("syn=%i ack=%i fin=%i rst=%i old=%i new=%i\n", | 940 | pr_debug("syn=%i ack=%i fin=%i rst=%i old=%i new=%i\n", |
941 | (th->syn ? 1 : 0), (th->ack ? 1 : 0), | 941 | (th->syn ? 1 : 0), (th->ack ? 1 : 0), |
942 | (th->fin ? 1 : 0), (th->rst ? 1 : 0), | 942 | (th->fin ? 1 : 0), (th->rst ? 1 : 0), |
diff --git a/net/netfilter/nf_conntrack_sane.c b/net/netfilter/nf_conntrack_sane.c index c3d5e84dcc9b..a94294b2b23c 100644 --- a/net/netfilter/nf_conntrack_sane.c +++ b/net/netfilter/nf_conntrack_sane.c | |||
@@ -147,7 +147,7 @@ static int help(struct sk_buff *skb, | |||
147 | IPPROTO_TCP, NULL, &reply->port); | 147 | IPPROTO_TCP, NULL, &reply->port); |
148 | 148 | ||
149 | pr_debug("nf_ct_sane: expect: "); | 149 | pr_debug("nf_ct_sane: expect: "); |
150 | NF_CT_DUMP_TUPLE(&exp->tuple); | 150 | nf_ct_dump_tuple(&exp->tuple); |
151 | 151 | ||
152 | /* Can't expect this? Best to drop packet now. */ | 152 | /* Can't expect this? Best to drop packet now. */ |
153 | if (nf_ct_expect_related(exp) != 0) | 153 | if (nf_ct_expect_related(exp) != 0) |
diff --git a/net/netfilter/nf_conntrack_tftp.c b/net/netfilter/nf_conntrack_tftp.c index ea5ff49d77bc..f57f6e7a71ee 100644 --- a/net/netfilter/nf_conntrack_tftp.c +++ b/net/netfilter/nf_conntrack_tftp.c | |||
@@ -55,8 +55,8 @@ static int tftp_help(struct sk_buff *skb, | |||
55 | case TFTP_OPCODE_READ: | 55 | case TFTP_OPCODE_READ: |
56 | case TFTP_OPCODE_WRITE: | 56 | case TFTP_OPCODE_WRITE: |
57 | /* RRQ and WRQ works the same way */ | 57 | /* RRQ and WRQ works the same way */ |
58 | NF_CT_DUMP_TUPLE(&ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple); | 58 | nf_ct_dump_tuple(&ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple); |
59 | NF_CT_DUMP_TUPLE(&ct->tuplehash[IP_CT_DIR_REPLY].tuple); | 59 | nf_ct_dump_tuple(&ct->tuplehash[IP_CT_DIR_REPLY].tuple); |
60 | 60 | ||
61 | exp = nf_ct_expect_alloc(ct); | 61 | exp = nf_ct_expect_alloc(ct); |
62 | if (exp == NULL) | 62 | if (exp == NULL) |
@@ -68,7 +68,7 @@ static int tftp_help(struct sk_buff *skb, | |||
68 | IPPROTO_UDP, NULL, &tuple->dst.u.udp.port); | 68 | IPPROTO_UDP, NULL, &tuple->dst.u.udp.port); |
69 | 69 | ||
70 | pr_debug("expect: "); | 70 | pr_debug("expect: "); |
71 | NF_CT_DUMP_TUPLE(&exp->tuple); | 71 | nf_ct_dump_tuple(&exp->tuple); |
72 | 72 | ||
73 | nf_nat_tftp = rcu_dereference(nf_nat_tftp_hook); | 73 | nf_nat_tftp = rcu_dereference(nf_nat_tftp_hook); |
74 | if (nf_nat_tftp && ct->status & IPS_NAT_MASK) | 74 | if (nf_nat_tftp && ct->status & IPS_NAT_MASK) |