summaryrefslogtreecommitdiff
path: root/include/linux/netfilter/xt_TPROXY.h
diff options
context:
space:
mode:
authorJan Engelhardt <jengelh@medozas.de>2010-12-15 21:58:53 (GMT)
committerPatrick McHardy <kaber@trash.net>2010-12-15 21:58:53 (GMT)
commitf1c722295e029eace7960fc687efd5afd67dc555 (patch)
tree84b24d3dbecde3947520999a2ed297891eae4d5c /include/linux/netfilter/xt_TPROXY.h
parentb880c1f077000956b9f475d5f3b6c5e45ff2e342 (diff)
downloadlinux-fsl-qoriq-f1c722295e029eace7960fc687efd5afd67dc555.tar.xz
netfilter: xtables: use guarded types
We are supposed to use the kernel's own types in userspace exports. Signed-off-by: Jan Engelhardt <jengelh@medozas.de> Signed-off-by: Patrick McHardy <kaber@trash.net>
Diffstat (limited to 'include/linux/netfilter/xt_TPROXY.h')
-rw-r--r--include/linux/netfilter/xt_TPROXY.h8
1 files changed, 4 insertions, 4 deletions
diff --git a/include/linux/netfilter/xt_TPROXY.h b/include/linux/netfilter/xt_TPROXY.h
index 3f3d693..8097e0b 100644
--- a/include/linux/netfilter/xt_TPROXY.h
+++ b/include/linux/netfilter/xt_TPROXY.h
@@ -5,15 +5,15 @@
* redirection. We can get rid of that whenever we get support for
* mutliple targets in the same rule. */
struct xt_tproxy_target_info {
- u_int32_t mark_mask;
- u_int32_t mark_value;
+ __u32 mark_mask;
+ __u32 mark_value;
__be32 laddr;
__be16 lport;
};
struct xt_tproxy_target_info_v1 {
- u_int32_t mark_mask;
- u_int32_t mark_value;
+ __u32 mark_mask;
+ __u32 mark_value;
union nf_inet_addr laddr;
__be16 lport;
};