SOURCES (LINUX_2_6): kernel-pom-ng-rpc.patch - updated for 2.6.22 ...
zbyniu
zbyniu at pld-linux.org
Wed Aug 15 03:48:09 CEST 2007
Author: zbyniu Date: Wed Aug 15 01:48:09 2007 GMT
Module: SOURCES Tag: LINUX_2_6
---- Log message:
- updated for 2.6.22 API; should work but still dirty
---- Files affected:
SOURCES:
kernel-pom-ng-rpc.patch (1.1.2.1 -> 1.1.2.2)
---- Diffs:
================================================================
Index: SOURCES/kernel-pom-ng-rpc.patch
diff -u SOURCES/kernel-pom-ng-rpc.patch:1.1.2.1 SOURCES/kernel-pom-ng-rpc.patch:1.1.2.2
--- SOURCES/kernel-pom-ng-rpc.patch:1.1.2.1 Wed Aug 15 03:44:25 2007
+++ SOURCES/kernel-pom-ng-rpc.patch Wed Aug 15 03:48:03 2007
@@ -1,15 +1,6 @@
- include/linux/netfilter_ipv4/ip_conntrack_rpc.h | 71 +++
- include/linux/netfilter_ipv4/ipt_rpc.h | 35 +
- net/ipv4/netfilter/Kconfig | 32 +
- net/ipv4/netfilter/Makefile | 1
- net/ipv4/netfilter/ip_conntrack_rpc_tcp.c | 554 ++++++++++++++++++++++++
- net/ipv4/netfilter/ip_conntrack_rpc_udp.c | 527 ++++++++++++++++++++++
- net/ipv4/netfilter/ipt_rpc.c | 443 +++++++++++++++++++
- 7 files changed, 1663 insertions(+)
-
-diff -Nur --exclude '*.orig' linux/include/linux/netfilter_ipv4/ip_conntrack_rpc.h linux/include/linux/netfilter_ipv4/ip_conntrack_rpc.h
---- linux/include/linux/netfilter_ipv4/ip_conntrack_rpc.h 1970-01-01 01:00:00.000000000 +0100
-+++ linux/include/linux/netfilter_ipv4/ip_conntrack_rpc.h 2006-05-04 11:26:08.000000000 +0200
+diff -Nur --exclude '*.orig' linux/include/linux/netfilter/nf_conntrack_rpc.h linux/include/linux/netfilter/nf_conntrack_rpc.h
+--- linux/include/linux/netfilter/nf_conntrack_rpc.h 1970-01-01 01:00:00.000000000 +0100
++++ linux/include/linux/netfilter/nf_conntrack_rpc.h 2006-05-04 11:26:08.000000000 +0200
@@ -0,0 +1,71 @@
+/* RPC extension for IP connection tracking, Version 2.2
+ * (C) 2000 by Marcelo Barbosa Lima <marcelo.lima at dcc.unicamp.br>
@@ -41,7 +32,7 @@
+#include <linux/stddef.h>
+#include <linux/list.h>
+
-+#include <linux/netfilter_ipv4/ip_conntrack_helper.h>
++#include <net/netfilter/nf_conntrack_helper.h>
+
+#ifndef _IP_CONNTRACK_RPC_H
+#define _IP_CONNTRACK_RPC_H
@@ -130,7 +121,7 @@
+config IP_NF_MATCH_RPC
+ tristate 'RPC match support'
-+ depends on IP_NF_CONNTRACK && IP_NF_IPTABLES
++ depends on NF_CONNTRACK && IP_NF_IPTABLES
+ help
+ This adds CONFIG_IP_NF_MATCH_RPC, which is the RPC connection
+ matcher and tracker.
@@ -169,8 +160,8 @@
+obj-$(CONFIG_IP_NF_MATCH_RPC) += ip_conntrack_rpc_tcp.o ip_conntrack_rpc_udp.o ipt_rpc.o
diff -Nur --exclude '*.orig' linux/net/ipv4/netfilter/ip_conntrack_rpc_tcp.c linux/net/ipv4/netfilter/ip_conntrack_rpc_tcp.c
--- linux/net/ipv4/netfilter/ip_conntrack_rpc_tcp.c 1970-01-01 01:00:00.000000000 +0100
-+++ linux/net/ipv4/netfilter/ip_conntrack_rpc_tcp.c 2006-05-04 11:26:08.000000000 +0200
-@@ -0,0 +1,554 @@
++++ linux/net/ipv4/netfilter/ip_conntrack_rpc_tcp.c 2007-08-15 03:04:53.000000000 +0200
+@@ -0,0 +1,567 @@
+/* RPC extension for IP (TCP) connection tracking, Version 2.2
+ * (C) 2000 by Marcelo Barbosa Lima <marcelo.lima at dcc.unicamp.br>
+ * - original rpc tracking module
@@ -240,8 +231,9 @@
+#include <linux/list.h>
+
+#include <linux/netfilter_ipv4/ip_tables.h>
-+#include <linux/netfilter_ipv4/ip_conntrack_helper.h>
-+#include <linux/netfilter_ipv4/ip_conntrack_rpc.h>
++#include <net/netfilter/nf_conntrack_expect.h>
++#include <net/netfilter/nf_conntrack_helper.h>
++#include <linux/netfilter/nf_conntrack_rpc.h>
+
+#define MAX_PORTS 8
+static int ports[MAX_PORTS];
@@ -271,10 +263,10 @@
+
+DEFINE_RWLOCK(ipct_rpc_tcp_lock);
+
-+#define ASSERT_READ_LOCK(x)
-+#define ASSERT_WRITE_LOCK(x)
++//#define ASSERT_READ_LOCK(x)
++//#define ASSERT_WRITE_LOCK(x)
+
-+#include <linux/netfilter_ipv4/listhelp.h>
++//#include <linux/netfilter_ipv4/listhelp.h>
+
+/* For future conections RPC, using client's cache bindings
+ * I'll use ip_conntrack_lock to lock these lists */
@@ -287,7 +279,7 @@
+ struct request_p *p = (void *)request_p_ul;
+
+ write_lock_bh(&ipct_rpc_tcp_lock);
-+ LIST_DELETE(&request_p_list_tcp, p);
++ list_del(&p->list);
+ write_unlock_bh(&ipct_rpc_tcp_lock);
+ kfree(p);
+ return;
@@ -298,7 +290,7 @@
+{
+ write_lock_bh(&ipct_rpc_tcp_lock);
+ del_timer(&r->timeout);
-+ LIST_DELETE(&request_p_list_tcp, r);
++ list_del(&r->list);
+ write_unlock_bh(&ipct_rpc_tcp_lock);
+ kfree(r);
+ return;
@@ -327,12 +319,16 @@
+static void alloc_request_p(u_int32_t xid, u_int16_t proto, u_int32_t ip,
+ u_int16_t port)
+{
-+ struct request_p *req_p;
++ struct request_p *req_p = NULL, *p;
+
+ /* Verifies if entry already exists */
+ write_lock_bh(&ipct_rpc_tcp_lock);
-+ req_p = LIST_FIND(&request_p_list_tcp, request_p_cmp,
-+ struct request_p *, xid, ip, port);
++// req_p = LIST_FIND(&request_p_list_tcp, request_p_cmp,
++// struct request_p *, xid, ip, port);
++
++ list_for_each_entry(p, &request_p_list_tcp, list)
++ if (p->xid == xid && p->ip == ip && p->port == port)
++ req_p = p;
+
+ if (req_p) {
+ /* Refresh timeout */
@@ -369,20 +365,20 @@
+
+ /* Put in list */
+ write_lock_bh(&ipct_rpc_tcp_lock);
-+ list_prepend(&request_p_list_tcp, req_p);
++ list_add(req_p, &request_p_list_tcp);
+ write_unlock_bh(&ipct_rpc_tcp_lock);
+ return;
+}
+
+
+static int check_rpc_packet(const u_int32_t *data,
-+ int dir, struct ip_conntrack *ct,
++ int dir, struct nf_conn *ct,
+ struct list_head request_p_list)
+{
+ u_int32_t xid;
+ int ret = NF_ACCEPT;
-+ struct request_p *req_p;
-+ struct ip_conntrack_expect *exp;
++ struct request_p *req_p = NULL, *p;
++ struct nf_conntrack_expect *exp;
+
+
+ if (ct == NULL) {
@@ -426,12 +422,12 @@
+
+ /* Get RPC protocol and store against client parameters */
+ data = data + 2;
-+ alloc_request_p(xid, IXDR_GET_INT32(data), ct->tuplehash[dir].tuple.src.ip,
++ alloc_request_p(xid, IXDR_GET_INT32(data), ct->tuplehash[dir].tuple.src.u3.ip,
+ ct->tuplehash[dir].tuple.src.u.all);
+
+ DEBUGP("allocated RPC req_p for xid=%u proto=%u %u.%u.%u.%u:%u\n",
+ xid, IXDR_GET_INT32(data),
-+ NIPQUAD(ct->tuplehash[dir].tuple.src.ip),
++ NIPQUAD(ct->tuplehash[dir].tuple.src.u3.ip),
+ ntohs(ct->tuplehash[dir].tuple.src.u.all));
+
+ DEBUGP("allocated RPC request for protocol %u. [done]\n",
@@ -440,10 +436,17 @@
+ } else {
+
+ /* Check for returning packet's stored counterpart */
-+ req_p = LIST_FIND(&request_p_list_tcp, request_p_cmp,
++ /* req_p = LIST_FIND(&request_p_list_tcp, request_p_cmp,
+ struct request_p *, xid,
-+ ct->tuplehash[!dir].tuple.src.ip,
++ ct->tuplehash[!dir].tuple.src.u3.ip,
+ ct->tuplehash[!dir].tuple.src.u.all);
++ */
++
++ list_for_each_entry(p, &request_p_list_tcp, list)
++ if (p->xid == xid &&
++ p->ip == ct->tuplehash[!dir].tuple.src.u3.ip &&
++ p->port == ct->tuplehash[!dir].tuple.src.u.all)
++ req_p = p;
+
+ /* Drop unexpected packets */
+ if (!req_p) {
@@ -486,17 +489,17 @@
+ if (port_buf && port_buf != nsrexec) {
+ DEBUGP("port found: %u\n", port_buf);
+
-+ exp = ip_conntrack_expect_alloc(ct);
++ exp = nf_conntrack_expect_alloc(ct);
+ if (!exp) {
+ ret = NF_DROP;
+ goto out;
+ }
+
+ /* Watch out, Radioactive-Man! */
-+ exp->tuple.src.ip = ct->tuplehash[!dir].tuple.src.ip;
-+ exp->tuple.dst.ip = ct->tuplehash[!dir].tuple.dst.ip;
-+ exp->mask.src.ip = 0xffffffff;
-+ exp->mask.dst.ip = 0xffffffff;
++ exp->tuple.src.u3.ip = ct->tuplehash[!dir].tuple.src.u3.ip;
++ exp->tuple.dst.u3.ip = ct->tuplehash[!dir].tuple.dst.u3.ip;
++ exp->mask.src.u3.ip = 0xffffffff;
++ exp->mask.dst.u3.ip = 0xffffffff;
+
+ switch (req_p->proto) {
+ case IPPROTO_UDP:
@@ -520,14 +523,15 @@
+ exp->expectfn = NULL;
+ exp->master = ct;
+
-+ if (exp->master->helper == NULL) {
++ struct nf_conn_help *m_help = nfct_help(exp->master);
++ if (m_help->helper == NULL) {
+ DEBUGP("master helper NULL");
+ ret = NF_ACCEPT;
+ }
+
+ DEBUGP("expect related ip %u.%u.%u.%u:0-%u.%u.%u.%u:%u proto=%u\n",
-+ NIPQUAD(exp->tuple.src.ip),
-+ NIPQUAD(exp->tuple.dst.ip),
++ NIPQUAD(exp->tuple.src.u3.ip),
++ NIPQUAD(exp->tuple.dst.u3.ip),
+ port_buf, req_p->proto);
+
+ DEBUGP("expect related mask %u.%u.%u.%u:0-%u.%u.%u.%u:65535 proto=%u\n",
@@ -535,7 +539,7 @@
+ NIPQUAD(exp->mask.dst.ip),
+ exp->mask.dst.protonum);
+
-+ if (ip_conntrack_expect_related(exp) != 0) {
++ if (nf_conntrack_expect_related(exp) != 0) {
+ ret = NF_DROP;
+ }
+
@@ -554,9 +558,9 @@
+
+/* RPC TCP helper */
+/* static int help(const struct iphdr *iph, size_t len,
-+ struct ip_conntrack *ct, enum ip_conntrack_info ctinfo) */
-+static int help(struct sk_buff **pskb,
-+ struct ip_conntrack *ct, enum ip_conntrack_info ctinfo)
++ struct nf_conn *ct, enum ip_conntrack_info ctinfo) */
++static int help(struct sk_buff **pskb, unsigned int protoff,
++ struct nf_conn *ct, enum ip_conntrack_info ctinfo)
+{
+ int dir;
+ int crp_ret;
@@ -567,7 +571,7 @@
+ size_t len;
+
+ /* Not whole TCP header? */
-+ iph=(*pskb)->nh.iph;
++ iph=ip_hdr(*pskb);
+ tcph = skb_header_pointer(*pskb,iph->ihl*4,sizeof(_tcph),&_tcph);
+ if (!tcph)
+ return NF_ACCEPT;
@@ -634,7 +638,7 @@
+}
+
+
-+static struct ip_conntrack_helper rpc_helpers[MAX_PORTS];
++static struct nf_conntrack_helper rpc_helpers[MAX_PORTS];
+static char rpc_names[MAX_PORTS][10];
+
+static void fini(void);
@@ -649,7 +653,7 @@
+ ports[0] = RPC_PORT;
+
+ for (port = 0; (port < MAX_PORTS) && ports[port]; port++) {
-+ memset(&rpc_helpers[port], 0, sizeof(struct ip_conntrack_helper));
++ memset(&rpc_helpers[port], 0, sizeof(struct nf_conntrack_helper));
+
+ tmpname = &rpc_names[port][0];
+ if (ports[port] == RPC_PORT)
@@ -674,17 +678,17 @@
+
+ PRINTK("registering helper for port #%d: %d/TCP\n", port, ports[port]);
+ PRINTK("helper match ip %u.%u.%u.%u:%u->%u.%u.%u.%u:%u\n",
-+ NIPQUAD(rpc_helpers[port].tuple.dst.ip),
++ NIPQUAD(rpc_helpers[port].tuple.dst.u3.ip),
+ ntohs(rpc_helpers[port].tuple.dst.u.tcp.port),
-+ NIPQUAD(rpc_helpers[port].tuple.src.ip),
++ NIPQUAD(rpc_helpers[port].tuple.src.u3.ip),
+ ntohs(rpc_helpers[port].tuple.src.u.tcp.port));
+ PRINTK("helper match mask %u.%u.%u.%u:%u->%u.%u.%u.%u:%u\n",
-+ NIPQUAD(rpc_helpers[port].mask.dst.ip),
++ NIPQUAD(rpc_helpers[port].mask.dst.u3.ip),
+ ntohs(rpc_helpers[port].mask.dst.u.tcp.port),
-+ NIPQUAD(rpc_helpers[port].mask.src.ip),
++ NIPQUAD(rpc_helpers[port].mask.src.u3.ip),
+ ntohs(rpc_helpers[port].mask.src.u.tcp.port));
+
-+ ret = ip_conntrack_helper_register(&rpc_helpers[port]);
++ ret = nf_conntrack_helper_register(&rpc_helpers[port]);
+
+ if (ret) {
+ printk("ERROR registering port %d\n",
@@ -712,7 +716,7 @@
+
+ for (port = 0; (port < ports_n_c) && ports[port]; port++) {
+ DEBUGP("unregistering port %d\n", ports[port]);
-+ ip_conntrack_helper_unregister(&rpc_helpers[port]);
++ nf_conntrack_helper_unregister(&rpc_helpers[port]);
+ }
+}
+
@@ -727,8 +731,8 @@
+
diff -Nur --exclude '*.orig' linux/net/ipv4/netfilter/ip_conntrack_rpc_udp.c linux/net/ipv4/netfilter/ip_conntrack_rpc_udp.c
--- linux/net/ipv4/netfilter/ip_conntrack_rpc_udp.c 1970-01-01 01:00:00.000000000 +0100
-+++ linux/net/ipv4/netfilter/ip_conntrack_rpc_udp.c 2006-05-04 11:26:08.000000000 +0200
-@@ -0,0 +1,528 @@
++++ linux/net/ipv4/netfilter/ip_conntrack_rpc_udp.c 2007-08-15 01:44:02.000000000 +0200
+@@ -0,0 +1,540 @@
+/* RPC extension for IP (UDP) connection tracking, Version 2.2
+ * (C) 2000 by Marcelo Barbosa Lima <marcelo.lima at dcc.unicamp.br>
+ * - original rpc tracking module
@@ -793,8 +797,9 @@
+#include <linux/udp.h>
+
+#include <linux/netfilter_ipv4/ip_tables.h>
-+#include <linux/netfilter_ipv4/ip_conntrack_helper.h>
-+#include <linux/netfilter_ipv4/ip_conntrack_rpc.h>
++#include <net/netfilter/nf_conntrack_expect.h>
++#include <net/netfilter/nf_conntrack_helper.h>
++#include <linux/netfilter/nf_conntrack_rpc.h>
+
+#define MAX_PORTS 8
+static int ports[MAX_PORTS];
@@ -820,9 +825,9 @@
+#endif
+
+DEFINE_RWLOCK(ipct_rpc_udp_lock);
-+#define ASSERT_READ_LOCK(x)
-+#define ASSERT_WRITE_LOCK(x)
-+#include <linux/netfilter_ipv4/listhelp.h>
++//#define ASSERT_READ_LOCK(x)
++//#define ASSERT_WRITE_LOCK(x)
++//#include <linux/netfilter_ipv4/listhelp.h>
+
+/* For future conections RPC, using client's cache bindings
+ * I'll use ip_conntrack_lock to lock these lists */
@@ -835,7 +840,7 @@
+ struct request_p *p = (void *)request_p_ul;
+
+ write_lock_bh(&ipct_rpc_udp_lock);
-+ LIST_DELETE(&request_p_list_udp, p);
++ list_del(&p->list);
+ write_unlock_bh(&ipct_rpc_udp_lock);
+ kfree(p);
+ return;
@@ -846,7 +851,7 @@
+{
+ write_lock_bh(&ipct_rpc_udp_lock);
+ del_timer(&r->timeout);
-+ LIST_DELETE(&request_p_list_udp, r);
++ list_del(&r->list);
+ write_unlock_bh(&ipct_rpc_udp_lock);
+ kfree(r);
+ return;
@@ -875,12 +880,16 @@
+static void alloc_request_p(u_int32_t xid, u_int16_t proto, u_int32_t ip,
+ u_int16_t port)
+{
-+ struct request_p *req_p;
++ struct request_p *req_p = NULL, *p;
+
+ /* Verifies if entry already exists */
+ write_lock_bh(&ipct_rpc_udp_lock);
-+ req_p = LIST_FIND(&request_p_list_udp, request_p_cmp,
-+ struct request_p *, xid, ip, port);
++// req_p = LIST_FIND(&request_p_list_udp, request_p_cmp,
++// struct request_p *, xid, ip, port);
++
++ list_for_each_entry(p, &request_p_list_udp, list)
++ if (p->xid == xid && p->ip == ip && p->port == port)
++ req_p = p;
+
+ if (req_p) {
+ /* Refresh timeout */
@@ -917,7 +926,7 @@
+
+ /* Put in list */
+ write_lock_bh(&ipct_rpc_udp_lock);
-+ list_prepend(&request_p_list_udp, req_p);
++ list_add(req_p, &request_p_list_udp);
+ write_unlock_bh(&ipct_rpc_udp_lock);
+ return;
+
@@ -925,13 +934,13 @@
+
+
+static int check_rpc_packet(const u_int32_t *data,
-+ int dir, struct ip_conntrack *ct,
++ int dir, struct nf_conn *ct,
+ struct list_head request_p_list)
+{
+ int ret = NF_ACCEPT;
+ u_int32_t xid;
-+ struct request_p *req_p;
-+ struct ip_conntrack_expect *exp;
++ struct request_p *req_p = NULL, *p;
++ struct nf_conntrack_expect *exp;
+
+ /* Translstion's buffer for XDR */
+ u_int16_t port_buf;
@@ -970,12 +979,12 @@
+
+ /* Get RPC protocol and store against client parameters */
+ data = data + 2;
-+ alloc_request_p(xid, IXDR_GET_INT32(data), ct->tuplehash[dir].tuple.src.ip,
++ alloc_request_p(xid, IXDR_GET_INT32(data), ct->tuplehash[dir].tuple.src.u3.ip,
+ ct->tuplehash[dir].tuple.src.u.all);
+
+ DEBUGP("allocated RPC req_p for xid=%u proto=%u %u.%u.%u.%u:%u\n",
+ xid, IXDR_GET_INT32(data),
-+ NIPQUAD(ct->tuplehash[dir].tuple.src.ip),
++ NIPQUAD(ct->tuplehash[dir].tuple.src.u3.ip),
+ ntohs(ct->tuplehash[dir].tuple.src.u.all));
+
+ DEBUGP("allocated RPC request for protocol %u. [done]\n",
@@ -984,11 +993,18 @@
+ } else {
+
+ /* Check for returning packet's stored counterpart */
-+ req_p = LIST_FIND(&request_p_list_udp, request_p_cmp,
++ /* req_p = LIST_FIND(&request_p_list_udp, request_p_cmp,
+ struct request_p *, xid,
-+ ct->tuplehash[!dir].tuple.src.ip,
++ ct->tuplehash[!dir].tuple.src.u3.ip,
+ ct->tuplehash[!dir].tuple.src.u.all);
+
++ */
++ list_for_each_entry(p, &request_p_list_udp, list)
++ if (p->xid == xid &&
++ p->ip == ct->tuplehash[!dir].tuple.src.u3.ip &&
++ p->port == ct->tuplehash[!dir].tuple.src.u.all)
++ req_p = p;
++
+ /* Drop unexpected packets */
+ if (!req_p) {
+ DEBUGP("packet is not expected. [skip]\n");
@@ -1030,17 +1046,17 @@
+ if (port_buf) {
+ DEBUGP("port found: %u\n", port_buf);
+
-+ exp = ip_conntrack_expect_alloc(ct);
++ exp = nf_conntrack_expect_alloc(ct);
+ if (!exp) {
+ ret = NF_DROP;
+ goto out;
+ }
+
+ /* Watch out, Radioactive-Man! */
-+ exp->tuple.src.ip = ct->tuplehash[!dir].tuple.src.ip;
-+ exp->tuple.dst.ip = ct->tuplehash[!dir].tuple.dst.ip;
-+ exp->mask.src.ip = 0xffffffff;
-+ exp->mask.dst.ip = 0xffffffff;
++ exp->tuple.src.u3.ip = ct->tuplehash[!dir].tuple.src.u3.ip;
++ exp->tuple.dst.u3.ip = ct->tuplehash[!dir].tuple.dst.u3.ip;
++ exp->mask.src.u3.ip = 0xffffffff;
++ exp->mask.dst.u3.ip = 0xffffffff;
+
+ switch (req_p->proto) {
+ case IPPROTO_UDP:
@@ -1065,8 +1081,8 @@
+ exp->master = ct;
+
+ DEBUGP("expect related ip %u.%u.%u.%u:0-%u.%u.%u.%u:%u proto=%u\n",
-+ NIPQUAD(exp->tuple.src.ip),
-+ NIPQUAD(exp->tuple.dst.ip),
++ NIPQUAD(exp->tuple.src.u3.ip),
++ NIPQUAD(exp->tuple.dst.u3.ip),
+ port_buf, req_p->proto);
+
+ DEBUGP("expect related mask %u.%u.%u.%u:0-%u.%u.%u.%u:65535 proto=%u\n",
@@ -1074,7 +1090,7 @@
+ NIPQUAD(exp->mask.dst.ip),
+ exp->mask.dst.protonum);
+
-+ if (ip_conntrack_expect_related(exp) != 0) {
++ if (nf_conntrack_expect_related(exp) != 0) {
+ ret = NF_DROP;
+ }
+ }
@@ -1091,9 +1107,9 @@
+
+/* RPC UDP helper */
+/* static int help(const struct iphdr *iph, size_t len,
-+ struct ip_conntrack *ct, enum ip_conntrack_info ctinfo) */
-+static int help(struct sk_buff **pskb,
-+ struct ip_conntrack *ct, enum ip_conntrack_info ctinfo)
++ struct nf_conn *ct, enum ip_conntrack_info ctinfo) */
++static int help(struct sk_buff **pskb, unsigned int protoff,
++ struct nf_conn *ct, enum ip_conntrack_info ctinfo)
+{
+ int dir;
+ int crp_ret;
@@ -1105,7 +1121,7 @@
+ const u_int16_t *chsm;
+
+ /* Not whole UDP header? */
-+ iph=(*pskb)->nh.iph;
++ iph=ip_hdr(*pskb);
+ udph = skb_header_pointer(*pskb,iph->ihl*4,sizeof(_udph),&_udph);
+ if (!udph)
+ return NF_ACCEPT;
@@ -1169,7 +1185,7 @@
+}
+
+
-+static struct ip_conntrack_helper rpc_helpers[MAX_PORTS];
++static struct nf_conntrack_helper rpc_helpers[MAX_PORTS];
+static char rpc_names[MAX_PORTS][10];
+
+static void fini(void);
@@ -1184,7 +1200,7 @@
+ ports[0] = RPC_PORT;
+
+ for (port = 0; (port < MAX_PORTS) && ports[port]; port++) {
-+ memset(&rpc_helpers[port], 0, sizeof(struct ip_conntrack_helper));
++ memset(&rpc_helpers[port], 0, sizeof(struct nf_conntrack_helper));
+
+ tmpname = &rpc_names[port][0];
+ if (ports[port] == RPC_PORT)
@@ -1209,17 +1225,17 @@
+
+ PRINTK("registering helper for port #%d: %d/UDP\n", port, ports[port]);
+ PRINTK("helper match ip %u.%u.%u.%u:%u->%u.%u.%u.%u:%u\n",
-+ NIPQUAD(rpc_helpers[port].tuple.dst.ip),
++ NIPQUAD(rpc_helpers[port].tuple.dst.u3.ip),
+ ntohs(rpc_helpers[port].tuple.dst.u.udp.port),
-+ NIPQUAD(rpc_helpers[port].tuple.src.ip),
++ NIPQUAD(rpc_helpers[port].tuple.src.u3.ip),
+ ntohs(rpc_helpers[port].tuple.src.u.udp.port));
+ PRINTK("helper match mask %u.%u.%u.%u:%u->%u.%u.%u.%u:%u\n",
-+ NIPQUAD(rpc_helpers[port].mask.dst.ip),
++ NIPQUAD(rpc_helpers[port].mask.dst.u3.ip),
+ ntohs(rpc_helpers[port].mask.dst.u.udp.port),
-+ NIPQUAD(rpc_helpers[port].mask.src.ip),
++ NIPQUAD(rpc_helpers[port].mask.src.u3.ip),
+ ntohs(rpc_helpers[port].mask.src.u.udp.port));
+
-+ ret = ip_conntrack_helper_register(&rpc_helpers[port]);
++ ret = nf_conntrack_helper_register(&rpc_helpers[port]);
+
+ if (ret) {
+ printk("ERROR registering port %d\n",
@@ -1244,7 +1260,7 @@
+
+ for (port = 0; (port < ports_n_c) && ports[port]; port++) {
+ DEBUGP("unregistering port %d\n", ports[port]);
-+ ip_conntrack_helper_unregister(&rpc_helpers[port]);
++ nf_conntrack_helper_unregister(&rpc_helpers[port]);
+ }
+}
+
@@ -1259,8 +1275,8 @@
+
diff -Nur --exclude '*.orig' linux/net/ipv4/netfilter/ipt_rpc.c linux/net/ipv4/netfilter/ipt_rpc.c
--- linux/net/ipv4/netfilter/ipt_rpc.c 1970-01-01 01:00:00.000000000 +0100
-+++ linux/net/ipv4/netfilter/ipt_rpc.c 2006-05-04 11:26:08.000000000 +0200
-@@ -0,0 +1,443 @@
++++ linux/net/ipv4/netfilter/ipt_rpc.c 2007-08-15 01:40:43.000000000 +0200
+@@ -0,0 +1,448 @@
+/* RPC extension for IP connection matching, Version 2.2
+ * (C) 2000 by Marcelo Barbosa Lima <marcelo.lima at dcc.unicamp.br>
+ * - original rpc tracking module
@@ -1314,9 +1330,8 @@
+#include <linux/list.h>
+#include <linux/udp.h>
+#include <linux/tcp.h>
-+#include <linux/netfilter_ipv4/ip_conntrack.h>
+#include <linux/netfilter_ipv4/ip_tables.h>
-+#include <linux/netfilter_ipv4/ip_conntrack_rpc.h>
++#include <linux/netfilter/nf_conntrack_rpc.h>
+#include <linux/netfilter_ipv4/ipt_rpc.h>
+
+#define MAX_PORTS 8
@@ -1376,8 +1391,6 @@
+} while (0)
+#endif
+
-+#include <linux/netfilter_ipv4/listhelp.h>
-+
+const int IPT_RPC_CHAR_LEN = 11;
+
+static int k_atoi(char *string)
@@ -1425,11 +1438,11 @@
+
+
+static int check_rpc_packet(const u_int32_t *data, const void *matchinfo,
-+ int *hotdrop, int dir, struct ip_conntrack *ct,
++ int *hotdrop, int dir, struct nf_conn *ct,
+ int offset, struct list_head request_p_list)
+{
+ const struct ipt_rpc_info *rpcinfo = matchinfo;
-+ struct request_p *req_p;
++ struct request_p *req_p = NULL, *p;
+ u_int32_t xid;
+
+
@@ -1473,28 +1486,34 @@
<<Diff was trimmed, longer than 597 lines>>
---- CVS-web:
http://cvs.pld-linux.org/SOURCES/kernel-pom-ng-rpc.patch?r1=1.1.2.1&r2=1.1.2.2&f=u
More information about the pld-cvs-commit
mailing list