diff options
author | Patrick McHardy <kaber@trash.net> | 2006-08-22 03:36:37 -0400 |
---|---|---|
committer | David S. Miller <davem@sunset.davemloft.net> | 2006-09-22 17:55:34 -0400 |
commit | efa741656e9ebf5fd6e0432b0d1b3c7f156392d3 (patch) | |
tree | 18ad158b5972904bd9ba930e5c6ec49181f3b400 /net/ipv4 | |
parent | fe1cb10873b44cf89082465823ee6d4d4ac63ad7 (diff) |
[NETFILTER]: x_tables: remove unused size argument to check/destroy functions
The size is verified by x_tables and isn't needed by the modules anymore.
Signed-off-by: Patrick McHardy <kaber@trash.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/ipv4')
-rw-r--r-- | net/ipv4/netfilter/arp_tables.c | 5 | ||||
-rw-r--r-- | net/ipv4/netfilter/arpt_mangle.c | 2 | ||||
-rw-r--r-- | net/ipv4/netfilter/ip_nat_rule.c | 2 | ||||
-rw-r--r-- | net/ipv4/netfilter/ip_tables.c | 14 | ||||
-rw-r--r-- | net/ipv4/netfilter/ipt_CLUSTERIP.c | 4 | ||||
-rw-r--r-- | net/ipv4/netfilter/ipt_ECN.c | 1 | ||||
-rw-r--r-- | net/ipv4/netfilter/ipt_LOG.c | 1 | ||||
-rw-r--r-- | net/ipv4/netfilter/ipt_MASQUERADE.c | 1 | ||||
-rw-r--r-- | net/ipv4/netfilter/ipt_NETMAP.c | 1 | ||||
-rw-r--r-- | net/ipv4/netfilter/ipt_REDIRECT.c | 1 | ||||
-rw-r--r-- | net/ipv4/netfilter/ipt_REJECT.c | 1 | ||||
-rw-r--r-- | net/ipv4/netfilter/ipt_SAME.c | 4 | ||||
-rw-r--r-- | net/ipv4/netfilter/ipt_TCPMSS.c | 1 | ||||
-rw-r--r-- | net/ipv4/netfilter/ipt_TOS.c | 1 | ||||
-rw-r--r-- | net/ipv4/netfilter/ipt_TTL.c | 1 | ||||
-rw-r--r-- | net/ipv4/netfilter/ipt_ULOG.c | 1 | ||||
-rw-r--r-- | net/ipv4/netfilter/ipt_ah.c | 1 | ||||
-rw-r--r-- | net/ipv4/netfilter/ipt_ecn.c | 3 | ||||
-rw-r--r-- | net/ipv4/netfilter/ipt_hashlimit.c | 4 | ||||
-rw-r--r-- | net/ipv4/netfilter/ipt_owner.c | 1 | ||||
-rw-r--r-- | net/ipv4/netfilter/ipt_recent.c | 5 |
21 files changed, 11 insertions, 44 deletions
diff --git a/net/ipv4/netfilter/arp_tables.c b/net/ipv4/netfilter/arp_tables.c index c6bd270bf4..4f10b06413 100644 --- a/net/ipv4/netfilter/arp_tables.c +++ b/net/ipv4/netfilter/arp_tables.c | |||
@@ -491,8 +491,6 @@ static inline int check_entry(struct arpt_entry *e, const char *name, unsigned i | |||
491 | } | 491 | } |
492 | } else if (t->u.kernel.target->checkentry | 492 | } else if (t->u.kernel.target->checkentry |
493 | && !t->u.kernel.target->checkentry(name, e, target, t->data, | 493 | && !t->u.kernel.target->checkentry(name, e, target, t->data, |
494 | t->u.target_size | ||
495 | - sizeof(*t), | ||
496 | e->comefrom)) { | 494 | e->comefrom)) { |
497 | duprintf("arp_tables: check failed for `%s'.\n", | 495 | duprintf("arp_tables: check failed for `%s'.\n", |
498 | t->u.kernel.target->name); | 496 | t->u.kernel.target->name); |
@@ -559,8 +557,7 @@ static inline int cleanup_entry(struct arpt_entry *e, unsigned int *i) | |||
559 | 557 | ||
560 | t = arpt_get_target(e); | 558 | t = arpt_get_target(e); |
561 | if (t->u.kernel.target->destroy) | 559 | if (t->u.kernel.target->destroy) |
562 | t->u.kernel.target->destroy(t->u.kernel.target, t->data, | 560 | t->u.kernel.target->destroy(t->u.kernel.target, t->data); |
563 | t->u.target_size - sizeof(*t)); | ||
564 | module_put(t->u.kernel.target->me); | 561 | module_put(t->u.kernel.target->me); |
565 | return 0; | 562 | return 0; |
566 | } | 563 | } |
diff --git a/net/ipv4/netfilter/arpt_mangle.c b/net/ipv4/netfilter/arpt_mangle.c index 05fb2421bb..d12b1df252 100644 --- a/net/ipv4/netfilter/arpt_mangle.c +++ b/net/ipv4/netfilter/arpt_mangle.c | |||
@@ -67,7 +67,7 @@ target(struct sk_buff **pskb, | |||
67 | 67 | ||
68 | static int | 68 | static int |
69 | checkentry(const char *tablename, const void *e, const struct xt_target *target, | 69 | checkentry(const char *tablename, const void *e, const struct xt_target *target, |
70 | void *targinfo, unsigned int targinfosize, unsigned int hook_mask) | 70 | void *targinfo, unsigned int hook_mask) |
71 | { | 71 | { |
72 | const struct arpt_mangle *mangle = targinfo; | 72 | const struct arpt_mangle *mangle = targinfo; |
73 | 73 | ||
diff --git a/net/ipv4/netfilter/ip_nat_rule.c b/net/ipv4/netfilter/ip_nat_rule.c index 1aa0e4f462..e59f5a8ecb 100644 --- a/net/ipv4/netfilter/ip_nat_rule.c +++ b/net/ipv4/netfilter/ip_nat_rule.c | |||
@@ -172,7 +172,6 @@ static int ipt_snat_checkentry(const char *tablename, | |||
172 | const void *entry, | 172 | const void *entry, |
173 | const struct ipt_target *target, | 173 | const struct ipt_target *target, |
174 | void *targinfo, | 174 | void *targinfo, |
175 | unsigned int targinfosize, | ||
176 | unsigned int hook_mask) | 175 | unsigned int hook_mask) |
177 | { | 176 | { |
178 | struct ip_nat_multi_range_compat *mr = targinfo; | 177 | struct ip_nat_multi_range_compat *mr = targinfo; |
@@ -189,7 +188,6 @@ static int ipt_dnat_checkentry(const char *tablename, | |||
189 | const void *entry, | 188 | const void *entry, |
190 | const struct ipt_target *target, | 189 | const struct ipt_target *target, |
191 | void *targinfo, | 190 | void *targinfo, |
192 | unsigned int targinfosize, | ||
193 | unsigned int hook_mask) | 191 | unsigned int hook_mask) |
194 | { | 192 | { |
195 | struct ip_nat_multi_range_compat *mr = targinfo; | 193 | struct ip_nat_multi_range_compat *mr = targinfo; |
diff --git a/net/ipv4/netfilter/ip_tables.c b/net/ipv4/netfilter/ip_tables.c index 8ce5b6f764..a0f3680699 100644 --- a/net/ipv4/netfilter/ip_tables.c +++ b/net/ipv4/netfilter/ip_tables.c | |||
@@ -464,8 +464,7 @@ cleanup_match(struct ipt_entry_match *m, unsigned int *i) | |||
464 | return 1; | 464 | return 1; |
465 | 465 | ||
466 | if (m->u.kernel.match->destroy) | 466 | if (m->u.kernel.match->destroy) |
467 | m->u.kernel.match->destroy(m->u.kernel.match, m->data, | 467 | m->u.kernel.match->destroy(m->u.kernel.match, m->data); |
468 | m->u.match_size - sizeof(*m)); | ||
469 | module_put(m->u.kernel.match->me); | 468 | module_put(m->u.kernel.match->me); |
470 | return 0; | 469 | return 0; |
471 | } | 470 | } |
@@ -518,7 +517,6 @@ check_match(struct ipt_entry_match *m, | |||
518 | 517 | ||
519 | if (m->u.kernel.match->checkentry | 518 | if (m->u.kernel.match->checkentry |
520 | && !m->u.kernel.match->checkentry(name, ip, match, m->data, | 519 | && !m->u.kernel.match->checkentry(name, ip, match, m->data, |
521 | m->u.match_size - sizeof(*m), | ||
522 | hookmask)) { | 520 | hookmask)) { |
523 | duprintf("ip_tables: check failed for `%s'.\n", | 521 | duprintf("ip_tables: check failed for `%s'.\n", |
524 | m->u.kernel.match->name); | 522 | m->u.kernel.match->name); |
@@ -579,8 +577,6 @@ check_entry(struct ipt_entry *e, const char *name, unsigned int size, | |||
579 | } | 577 | } |
580 | } else if (t->u.kernel.target->checkentry | 578 | } else if (t->u.kernel.target->checkentry |
581 | && !t->u.kernel.target->checkentry(name, e, target, t->data, | 579 | && !t->u.kernel.target->checkentry(name, e, target, t->data, |
582 | t->u.target_size | ||
583 | - sizeof(*t), | ||
584 | e->comefrom)) { | 580 | e->comefrom)) { |
585 | duprintf("ip_tables: check failed for `%s'.\n", | 581 | duprintf("ip_tables: check failed for `%s'.\n", |
586 | t->u.kernel.target->name); | 582 | t->u.kernel.target->name); |
@@ -652,8 +648,7 @@ cleanup_entry(struct ipt_entry *e, unsigned int *i) | |||
652 | IPT_MATCH_ITERATE(e, cleanup_match, NULL); | 648 | IPT_MATCH_ITERATE(e, cleanup_match, NULL); |
653 | t = ipt_get_target(e); | 649 | t = ipt_get_target(e); |
654 | if (t->u.kernel.target->destroy) | 650 | if (t->u.kernel.target->destroy) |
655 | t->u.kernel.target->destroy(t->u.kernel.target, t->data, | 651 | t->u.kernel.target->destroy(t->u.kernel.target, t->data); |
656 | t->u.target_size - sizeof(*t)); | ||
657 | module_put(t->u.kernel.target->me); | 652 | module_put(t->u.kernel.target->me); |
658 | return 0; | 653 | return 0; |
659 | } | 654 | } |
@@ -1599,7 +1594,6 @@ static inline int compat_copy_match_from_user(struct ipt_entry_match *m, | |||
1599 | 1594 | ||
1600 | if (m->u.kernel.match->checkentry | 1595 | if (m->u.kernel.match->checkentry |
1601 | && !m->u.kernel.match->checkentry(name, ip, match, dm->data, | 1596 | && !m->u.kernel.match->checkentry(name, ip, match, dm->data, |
1602 | dm->u.match_size - sizeof(*dm), | ||
1603 | hookmask)) { | 1597 | hookmask)) { |
1604 | duprintf("ip_tables: check failed for `%s'.\n", | 1598 | duprintf("ip_tables: check failed for `%s'.\n", |
1605 | m->u.kernel.match->name); | 1599 | m->u.kernel.match->name); |
@@ -1658,8 +1652,7 @@ static int compat_copy_entry_from_user(struct ipt_entry *e, void **dstptr, | |||
1658 | goto out; | 1652 | goto out; |
1659 | } else if (t->u.kernel.target->checkentry | 1653 | } else if (t->u.kernel.target->checkentry |
1660 | && !t->u.kernel.target->checkentry(name, de, target, | 1654 | && !t->u.kernel.target->checkentry(name, de, target, |
1661 | t->data, t->u.target_size - sizeof(*t), | 1655 | t->data, de->comefrom)) { |
1662 | de->comefrom)) { | ||
1663 | duprintf("ip_tables: compat: check failed for `%s'.\n", | 1656 | duprintf("ip_tables: compat: check failed for `%s'.\n", |
1664 | t->u.kernel.target->name); | 1657 | t->u.kernel.target->name); |
1665 | goto out; | 1658 | goto out; |
@@ -2182,7 +2175,6 @@ icmp_checkentry(const char *tablename, | |||
2182 | const void *info, | 2175 | const void *info, |
2183 | const struct xt_match *match, | 2176 | const struct xt_match *match, |
2184 | void *matchinfo, | 2177 | void *matchinfo, |
2185 | unsigned int matchsize, | ||
2186 | unsigned int hook_mask) | 2178 | unsigned int hook_mask) |
2187 | { | 2179 | { |
2188 | const struct ipt_icmp *icmpinfo = matchinfo; | 2180 | const struct ipt_icmp *icmpinfo = matchinfo; |
diff --git a/net/ipv4/netfilter/ipt_CLUSTERIP.c b/net/ipv4/netfilter/ipt_CLUSTERIP.c index a08383cf9e..41589665fc 100644 --- a/net/ipv4/netfilter/ipt_CLUSTERIP.c +++ b/net/ipv4/netfilter/ipt_CLUSTERIP.c | |||
@@ -372,7 +372,6 @@ checkentry(const char *tablename, | |||
372 | const void *e_void, | 372 | const void *e_void, |
373 | const struct xt_target *target, | 373 | const struct xt_target *target, |
374 | void *targinfo, | 374 | void *targinfo, |
375 | unsigned int targinfosize, | ||
376 | unsigned int hook_mask) | 375 | unsigned int hook_mask) |
377 | { | 376 | { |
378 | struct ipt_clusterip_tgt_info *cipinfo = targinfo; | 377 | struct ipt_clusterip_tgt_info *cipinfo = targinfo; |
@@ -449,8 +448,7 @@ checkentry(const char *tablename, | |||
449 | } | 448 | } |
450 | 449 | ||
451 | /* drop reference count of cluster config when rule is deleted */ | 450 | /* drop reference count of cluster config when rule is deleted */ |
452 | static void destroy(const struct xt_target *target, void *targinfo, | 451 | static void destroy(const struct xt_target *target, void *targinfo) |
453 | unsigned int targinfosize) | ||
454 | { | 452 | { |
455 | struct ipt_clusterip_tgt_info *cipinfo = targinfo; | 453 | struct ipt_clusterip_tgt_info *cipinfo = targinfo; |
456 | 454 | ||
diff --git a/net/ipv4/netfilter/ipt_ECN.c b/net/ipv4/netfilter/ipt_ECN.c index 1c3da4a48e..23f9c7ebe7 100644 --- a/net/ipv4/netfilter/ipt_ECN.c +++ b/net/ipv4/netfilter/ipt_ECN.c | |||
@@ -106,7 +106,6 @@ checkentry(const char *tablename, | |||
106 | const void *e_void, | 106 | const void *e_void, |
107 | const struct xt_target *target, | 107 | const struct xt_target *target, |
108 | void *targinfo, | 108 | void *targinfo, |
109 | unsigned int targinfosize, | ||
110 | unsigned int hook_mask) | 109 | unsigned int hook_mask) |
111 | { | 110 | { |
112 | const struct ipt_ECN_info *einfo = (struct ipt_ECN_info *)targinfo; | 111 | const struct ipt_ECN_info *einfo = (struct ipt_ECN_info *)targinfo; |
diff --git a/net/ipv4/netfilter/ipt_LOG.c b/net/ipv4/netfilter/ipt_LOG.c index a8d356c619..7dc820df8b 100644 --- a/net/ipv4/netfilter/ipt_LOG.c +++ b/net/ipv4/netfilter/ipt_LOG.c | |||
@@ -439,7 +439,6 @@ static int ipt_log_checkentry(const char *tablename, | |||
439 | const void *e, | 439 | const void *e, |
440 | const struct xt_target *target, | 440 | const struct xt_target *target, |
441 | void *targinfo, | 441 | void *targinfo, |
442 | unsigned int targinfosize, | ||
443 | unsigned int hook_mask) | 442 | unsigned int hook_mask) |
444 | { | 443 | { |
445 | const struct ipt_log_info *loginfo = targinfo; | 444 | const struct ipt_log_info *loginfo = targinfo; |
diff --git a/net/ipv4/netfilter/ipt_MASQUERADE.c b/net/ipv4/netfilter/ipt_MASQUERADE.c index 9659793c66..bc65168a34 100644 --- a/net/ipv4/netfilter/ipt_MASQUERADE.c +++ b/net/ipv4/netfilter/ipt_MASQUERADE.c | |||
@@ -42,7 +42,6 @@ masquerade_check(const char *tablename, | |||
42 | const void *e, | 42 | const void *e, |
43 | const struct xt_target *target, | 43 | const struct xt_target *target, |
44 | void *targinfo, | 44 | void *targinfo, |
45 | unsigned int targinfosize, | ||
46 | unsigned int hook_mask) | 45 | unsigned int hook_mask) |
47 | { | 46 | { |
48 | const struct ip_nat_multi_range_compat *mr = targinfo; | 47 | const struct ip_nat_multi_range_compat *mr = targinfo; |
diff --git a/net/ipv4/netfilter/ipt_NETMAP.c b/net/ipv4/netfilter/ipt_NETMAP.c index fd5e74a19f..beb2914225 100644 --- a/net/ipv4/netfilter/ipt_NETMAP.c +++ b/net/ipv4/netfilter/ipt_NETMAP.c | |||
@@ -33,7 +33,6 @@ check(const char *tablename, | |||
33 | const void *e, | 33 | const void *e, |
34 | const struct xt_target *target, | 34 | const struct xt_target *target, |
35 | void *targinfo, | 35 | void *targinfo, |
36 | unsigned int targinfosize, | ||
37 | unsigned int hook_mask) | 36 | unsigned int hook_mask) |
38 | { | 37 | { |
39 | const struct ip_nat_multi_range_compat *mr = targinfo; | 38 | const struct ip_nat_multi_range_compat *mr = targinfo; |
diff --git a/net/ipv4/netfilter/ipt_REDIRECT.c b/net/ipv4/netfilter/ipt_REDIRECT.c index 839fe99f71..f03d43671c 100644 --- a/net/ipv4/netfilter/ipt_REDIRECT.c +++ b/net/ipv4/netfilter/ipt_REDIRECT.c | |||
@@ -36,7 +36,6 @@ redirect_check(const char *tablename, | |||
36 | const void *e, | 36 | const void *e, |
37 | const struct xt_target *target, | 37 | const struct xt_target *target, |
38 | void *targinfo, | 38 | void *targinfo, |
39 | unsigned int targinfosize, | ||
40 | unsigned int hook_mask) | 39 | unsigned int hook_mask) |
41 | { | 40 | { |
42 | const struct ip_nat_multi_range_compat *mr = targinfo; | 41 | const struct ip_nat_multi_range_compat *mr = targinfo; |
diff --git a/net/ipv4/netfilter/ipt_REJECT.c b/net/ipv4/netfilter/ipt_REJECT.c index 1dfd8e56be..b81821edd8 100644 --- a/net/ipv4/netfilter/ipt_REJECT.c +++ b/net/ipv4/netfilter/ipt_REJECT.c | |||
@@ -276,7 +276,6 @@ static int check(const char *tablename, | |||
276 | const void *e_void, | 276 | const void *e_void, |
277 | const struct xt_target *target, | 277 | const struct xt_target *target, |
278 | void *targinfo, | 278 | void *targinfo, |
279 | unsigned int targinfosize, | ||
280 | unsigned int hook_mask) | 279 | unsigned int hook_mask) |
281 | { | 280 | { |
282 | const struct ipt_reject_info *rejinfo = targinfo; | 281 | const struct ipt_reject_info *rejinfo = targinfo; |
diff --git a/net/ipv4/netfilter/ipt_SAME.c b/net/ipv4/netfilter/ipt_SAME.c index cf80174949..efbcb11988 100644 --- a/net/ipv4/netfilter/ipt_SAME.c +++ b/net/ipv4/netfilter/ipt_SAME.c | |||
@@ -52,7 +52,6 @@ same_check(const char *tablename, | |||
52 | const void *e, | 52 | const void *e, |
53 | const struct xt_target *target, | 53 | const struct xt_target *target, |
54 | void *targinfo, | 54 | void *targinfo, |
55 | unsigned int targinfosize, | ||
56 | unsigned int hook_mask) | 55 | unsigned int hook_mask) |
57 | { | 56 | { |
58 | unsigned int count, countess, rangeip, index = 0; | 57 | unsigned int count, countess, rangeip, index = 0; |
@@ -116,8 +115,7 @@ same_check(const char *tablename, | |||
116 | } | 115 | } |
117 | 116 | ||
118 | static void | 117 | static void |
119 | same_destroy(const struct xt_target *target, void *targinfo, | 118 | same_destroy(const struct xt_target *target, void *targinfo) |
120 | unsigned int targinfosize) | ||
121 | { | 119 | { |
122 | struct ipt_same_info *mr = targinfo; | 120 | struct ipt_same_info *mr = targinfo; |
123 | 121 | ||
diff --git a/net/ipv4/netfilter/ipt_TCPMSS.c b/net/ipv4/netfilter/ipt_TCPMSS.c index 6d668dcfc2..ac8a35eeea 100644 --- a/net/ipv4/netfilter/ipt_TCPMSS.c +++ b/net/ipv4/netfilter/ipt_TCPMSS.c | |||
@@ -207,7 +207,6 @@ ipt_tcpmss_checkentry(const char *tablename, | |||
207 | const void *e_void, | 207 | const void *e_void, |
208 | const struct xt_target *target, | 208 | const struct xt_target *target, |
209 | void *targinfo, | 209 | void *targinfo, |
210 | unsigned int targinfosize, | ||
211 | unsigned int hook_mask) | 210 | unsigned int hook_mask) |
212 | { | 211 | { |
213 | const struct ipt_tcpmss_info *tcpmssinfo = targinfo; | 212 | const struct ipt_tcpmss_info *tcpmssinfo = targinfo; |
diff --git a/net/ipv4/netfilter/ipt_TOS.c b/net/ipv4/netfilter/ipt_TOS.c index 043df01370..471a4c438b 100644 --- a/net/ipv4/netfilter/ipt_TOS.c +++ b/net/ipv4/netfilter/ipt_TOS.c | |||
@@ -49,7 +49,6 @@ checkentry(const char *tablename, | |||
49 | const void *e_void, | 49 | const void *e_void, |
50 | const struct xt_target *target, | 50 | const struct xt_target *target, |
51 | void *targinfo, | 51 | void *targinfo, |
52 | unsigned int targinfosize, | ||
53 | unsigned int hook_mask) | 52 | unsigned int hook_mask) |
54 | { | 53 | { |
55 | const u_int8_t tos = ((struct ipt_tos_target_info *)targinfo)->tos; | 54 | const u_int8_t tos = ((struct ipt_tos_target_info *)targinfo)->tos; |
diff --git a/net/ipv4/netfilter/ipt_TTL.c b/net/ipv4/netfilter/ipt_TTL.c index 164007107b..214d9d9c42 100644 --- a/net/ipv4/netfilter/ipt_TTL.c +++ b/net/ipv4/netfilter/ipt_TTL.c | |||
@@ -67,7 +67,6 @@ static int ipt_ttl_checkentry(const char *tablename, | |||
67 | const void *e, | 67 | const void *e, |
68 | const struct xt_target *target, | 68 | const struct xt_target *target, |
69 | void *targinfo, | 69 | void *targinfo, |
70 | unsigned int targinfosize, | ||
71 | unsigned int hook_mask) | 70 | unsigned int hook_mask) |
72 | { | 71 | { |
73 | struct ipt_TTL_info *info = targinfo; | 72 | struct ipt_TTL_info *info = targinfo; |
diff --git a/net/ipv4/netfilter/ipt_ULOG.c b/net/ipv4/netfilter/ipt_ULOG.c index 4c5f0a1178..2b104ea54f 100644 --- a/net/ipv4/netfilter/ipt_ULOG.c +++ b/net/ipv4/netfilter/ipt_ULOG.c | |||
@@ -346,7 +346,6 @@ static int ipt_ulog_checkentry(const char *tablename, | |||
346 | const void *e, | 346 | const void *e, |
347 | const struct xt_target *target, | 347 | const struct xt_target *target, |
348 | void *targinfo, | 348 | void *targinfo, |
349 | unsigned int targinfosize, | ||
350 | unsigned int hookmask) | 349 | unsigned int hookmask) |
351 | { | 350 | { |
352 | struct ipt_ulog_info *loginfo = (struct ipt_ulog_info *) targinfo; | 351 | struct ipt_ulog_info *loginfo = (struct ipt_ulog_info *) targinfo; |
diff --git a/net/ipv4/netfilter/ipt_ah.c b/net/ipv4/netfilter/ipt_ah.c index 2927135873..1798f86bc5 100644 --- a/net/ipv4/netfilter/ipt_ah.c +++ b/net/ipv4/netfilter/ipt_ah.c | |||
@@ -74,7 +74,6 @@ checkentry(const char *tablename, | |||
74 | const void *ip_void, | 74 | const void *ip_void, |
75 | const struct xt_match *match, | 75 | const struct xt_match *match, |
76 | void *matchinfo, | 76 | void *matchinfo, |
77 | unsigned int matchinfosize, | ||
78 | unsigned int hook_mask) | 77 | unsigned int hook_mask) |
79 | { | 78 | { |
80 | const struct ipt_ah *ahinfo = matchinfo; | 79 | const struct ipt_ah *ahinfo = matchinfo; |
diff --git a/net/ipv4/netfilter/ipt_ecn.c b/net/ipv4/netfilter/ipt_ecn.c index b282504149..dafbdec0ef 100644 --- a/net/ipv4/netfilter/ipt_ecn.c +++ b/net/ipv4/netfilter/ipt_ecn.c | |||
@@ -88,8 +88,7 @@ static int match(const struct sk_buff *skb, | |||
88 | 88 | ||
89 | static int checkentry(const char *tablename, const void *ip_void, | 89 | static int checkentry(const char *tablename, const void *ip_void, |
90 | const struct xt_match *match, | 90 | const struct xt_match *match, |
91 | void *matchinfo, unsigned int matchsize, | 91 | void *matchinfo, unsigned int hook_mask) |
92 | unsigned int hook_mask) | ||
93 | { | 92 | { |
94 | const struct ipt_ecn_info *info = matchinfo; | 93 | const struct ipt_ecn_info *info = matchinfo; |
95 | const struct ipt_ip *ip = ip_void; | 94 | const struct ipt_ip *ip = ip_void; |
diff --git a/net/ipv4/netfilter/ipt_hashlimit.c b/net/ipv4/netfilter/ipt_hashlimit.c index 3bd2368e1f..b5b74b0737 100644 --- a/net/ipv4/netfilter/ipt_hashlimit.c +++ b/net/ipv4/netfilter/ipt_hashlimit.c | |||
@@ -478,7 +478,6 @@ hashlimit_checkentry(const char *tablename, | |||
478 | const void *inf, | 478 | const void *inf, |
479 | const struct xt_match *match, | 479 | const struct xt_match *match, |
480 | void *matchinfo, | 480 | void *matchinfo, |
481 | unsigned int matchsize, | ||
482 | unsigned int hook_mask) | 481 | unsigned int hook_mask) |
483 | { | 482 | { |
484 | struct ipt_hashlimit_info *r = matchinfo; | 483 | struct ipt_hashlimit_info *r = matchinfo; |
@@ -529,8 +528,7 @@ hashlimit_checkentry(const char *tablename, | |||
529 | } | 528 | } |
530 | 529 | ||
531 | static void | 530 | static void |
532 | hashlimit_destroy(const struct xt_match *match, void *matchinfo, | 531 | hashlimit_destroy(const struct xt_match *match, void *matchinfo) |
533 | unsigned int matchsize) | ||
534 | { | 532 | { |
535 | struct ipt_hashlimit_info *r = matchinfo; | 533 | struct ipt_hashlimit_info *r = matchinfo; |
536 | 534 | ||
diff --git a/net/ipv4/netfilter/ipt_owner.c b/net/ipv4/netfilter/ipt_owner.c index 5ac6ac023b..78c336f12a 100644 --- a/net/ipv4/netfilter/ipt_owner.c +++ b/net/ipv4/netfilter/ipt_owner.c | |||
@@ -56,7 +56,6 @@ checkentry(const char *tablename, | |||
56 | const void *ip, | 56 | const void *ip, |
57 | const struct xt_match *match, | 57 | const struct xt_match *match, |
58 | void *matchinfo, | 58 | void *matchinfo, |
59 | unsigned int matchsize, | ||
60 | unsigned int hook_mask) | 59 | unsigned int hook_mask) |
61 | { | 60 | { |
62 | const struct ipt_owner_info *info = matchinfo; | 61 | const struct ipt_owner_info *info = matchinfo; |
diff --git a/net/ipv4/netfilter/ipt_recent.c b/net/ipv4/netfilter/ipt_recent.c index 682c094620..32ae8d7ac5 100644 --- a/net/ipv4/netfilter/ipt_recent.c +++ b/net/ipv4/netfilter/ipt_recent.c | |||
@@ -238,7 +238,7 @@ out: | |||
238 | static int | 238 | static int |
239 | ipt_recent_checkentry(const char *tablename, const void *ip, | 239 | ipt_recent_checkentry(const char *tablename, const void *ip, |
240 | const struct xt_match *match, void *matchinfo, | 240 | const struct xt_match *match, void *matchinfo, |
241 | unsigned int matchsize, unsigned int hook_mask) | 241 | unsigned int hook_mask) |
242 | { | 242 | { |
243 | const struct ipt_recent_info *info = matchinfo; | 243 | const struct ipt_recent_info *info = matchinfo; |
244 | struct recent_table *t; | 244 | struct recent_table *t; |
@@ -294,8 +294,7 @@ out: | |||
294 | } | 294 | } |
295 | 295 | ||
296 | static void | 296 | static void |
297 | ipt_recent_destroy(const struct xt_match *match, void *matchinfo, | 297 | ipt_recent_destroy(const struct xt_match *match, void *matchinfo) |
298 | unsigned int matchsize) | ||
299 | { | 298 | { |
300 | const struct ipt_recent_info *info = matchinfo; | 299 | const struct ipt_recent_info *info = matchinfo; |
301 | struct recent_table *t; | 300 | struct recent_table *t; |