[netfilter-cvslog] r4096 -
trunk/patch-o-matic-ng/patchlets/pptp-conntrack-nat
laforge at netfilter.org
laforge at netfilter.org
Mon Jul 4 20:52:57 CEST 2005
Author: laforge at netfilter.org
Date: 2005-07-04 20:52:57 +0200 (Mon, 04 Jul 2005)
New Revision: 4096
Modified:
trunk/patch-o-matic-ng/patchlets/pptp-conntrack-nat/linux-2.6.11.patch
Log:
update patch to reflect required changes for 2.6.11+
Modified: trunk/patch-o-matic-ng/patchlets/pptp-conntrack-nat/linux-2.6.11.patch
===================================================================
--- trunk/patch-o-matic-ng/patchlets/pptp-conntrack-nat/linux-2.6.11.patch 2005-07-04 18:50:36 UTC (rev 4095)
+++ trunk/patch-o-matic-ng/patchlets/pptp-conntrack-nat/linux-2.6.11.patch 2005-07-04 18:52:57 UTC (rev 4096)
@@ -1,6 +1,7 @@
-diff -Nru --exclude .depend --exclude '*.o' --exclude '*.ko' --exclude '*.ver' --exclude '.*.flags' --exclude '*.orig' --exclude '*.rej' --exclude '*.cmd' --exclude '*.mod.c' --exclude '*~' linux-2.6.9-connmark-clusterip-hashlimit/include/linux/netfilter_ipv4/ip_conntrack_tuple.h linux-2.6.9-connmark-clusterip-hashlimit-pptp/include/linux/netfilter_ipv4/ip_conntrack_tuple.h
---- linux-2.6.9-connmark-clusterip-hashlimit/include/linux/netfilter_ipv4/ip_conntrack_tuple.h 2004-10-18 23:54:40.000000000 +0200
-+++ linux-2.6.9-connmark-clusterip-hashlimit-pptp/include/linux/netfilter_ipv4/ip_conntrack_tuple.h 2004-10-22 17:35:11.135192085 +0200
+Index: linux-2.6.12.1-wrap/include/linux/netfilter_ipv4/ip_conntrack_tuple.h
+===================================================================
+--- linux-2.6.12.1-wrap.orig/include/linux/netfilter_ipv4/ip_conntrack_tuple.h 2005-06-17 21:48:29.000000000 +0200
++++ linux-2.6.12.1-wrap/include/linux/netfilter_ipv4/ip_conntrack_tuple.h 2005-06-26 17:06:13.000000000 +0200
@@ -28,6 +28,9 @@
struct {
u_int16_t port;
@@ -21,24 +22,68 @@
} u;
/* The protocol. */
-diff -Naur linux-2.6.8.1/net/ipv4/netfilter/ip_conntrack_core.c linux-2.6.8.1-1mdk/net/ipv4/netfilter/ip_conntrack_core.c
---- linux-2.6.8.1/net/ipv4/netfilter/ip_conntrack_core.c 2004-08-14 12:54:46.000000000 +0200
-+++ linux-2.6.8.1-1mdk/net/ipv4/netfilter/ip_conntrack_core.c 2004-08-16 13:54:12.000000000 +0200
-@@ -143,6 +143,7 @@
- tuple->src.ip = iph->saddr;
- tuple->dst.ip = iph->daddr;
- tuple->dst.protonum = iph->protocol;
-+ tuple->src.u.all = tuple->dst.u.all = 0;
+Index: linux-2.6.12.1-wrap/net/ipv4/netfilter/ip_conntrack_core.c
+===================================================================
+--- linux-2.6.12.1-wrap.orig/net/ipv4/netfilter/ip_conntrack_core.c 2005-06-17 21:48:29.000000000 +0200
++++ linux-2.6.12.1-wrap/net/ipv4/netfilter/ip_conntrack_core.c 2005-07-04 10:37:01.000000000 +0200
+@@ -165,8 +168,8 @@
- return protocol->pkt_to_tuple(skb, dataoff, tuple);
+ /* If an expectation for this connection is found, it gets delete from
+ * global list then returned. */
+-static struct ip_conntrack_expect *
+-find_expectation(const struct ip_conntrack_tuple *tuple)
++struct ip_conntrack_expect *
++__ip_conntrack_exp_find(const struct ip_conntrack_tuple *tuple)
+ {
+ struct ip_conntrack_expect *i;
+
+@@ -287,7 +289,7 @@
+ && ip_ct_tuple_equal(tuple, &i->tuple);
}
-@@ -156,6 +157,8 @@
- inverse->dst.ip = orig->src.ip;
- inverse->dst.protonum = orig->dst.protonum;
-+ inverse->src.u.all = inverse->dst.u.all = 0;
+-static struct ip_conntrack_tuple_hash *
++struct ip_conntrack_tuple_hash *
+ __ip_conntrack_find(const struct ip_conntrack_tuple *tuple,
+ const struct ip_conntrack *ignored_conntrack)
+ {
+@@ -509,7 +511,7 @@
+ conntrack->timeout.function = death_by_timeout;
+
+ WRITE_LOCK(&ip_conntrack_lock);
+- exp = find_expectation(tuple);
++ exp = __ip_conntrack_exp_find(tuple);
+
+ if (exp) {
+ DEBUGP("conntrack: expectation arrives ct=%p exp=%p\n",
+Index: linux-2.6.12.1-wrap/include/linux/netfilter_ipv4/ip_conntrack_core.h
+===================================================================
+--- linux-2.6.12.1-wrap.orig/include/linux/netfilter_ipv4/ip_conntrack_core.h 2005-06-17 21:48:29.000000000 +0200
++++ linux-2.6.12.1-wrap/include/linux/netfilter_ipv4/ip_conntrack_core.h 2005-07-03 21:06:08.000000000 +0200
+@@ -34,6 +34,13 @@
+ ip_conntrack_find_get(const struct ip_conntrack_tuple *tuple,
+ const struct ip_conntrack *ignored_conntrack);
+
++struct ip_conntrack_tuple_hash *
++__ip_conntrack_find(const struct ip_conntrack_tuple *tuple,
++ const struct ip_conntrack *ignored_conntrack);
+
- return protocol->invert_tuple(inverse, orig);
- }
++struct ip_conntrack_expect *
++__ip_conntrack_exp_find(const struct ip_conntrack_tuple *tuple);
++
+ extern int __ip_conntrack_confirm(struct sk_buff **pskb);
+ /* Confirm a connection: returns NF_DROP if packet must be dropped. */
+Index: linux-2.6.12.1-wrap/net/ipv4/netfilter/ip_conntrack_standalone.c
+===================================================================
+--- linux-2.6.12.1-wrap.orig/net/ipv4/netfilter/ip_conntrack_standalone.c 2005-06-17 21:48:29.000000000 +0200
++++ linux-2.6.12.1-wrap/net/ipv4/netfilter/ip_conntrack_standalone.c 2005-07-03 21:04:40.000000000 +0200
+@@ -988,6 +988,8 @@
+ EXPORT_SYMBOL(ip_conntrack_hash);
+ EXPORT_SYMBOL(ip_conntrack_untracked);
+ EXPORT_SYMBOL_GPL(ip_conntrack_find_get);
++EXPORT_SYMBOL_GPL(__ip_conntrack_find);
++EXPORT_SYMBOL_GPL(__ip_conntrack_exp_find);
+ EXPORT_SYMBOL_GPL(ip_conntrack_put);
+ #ifdef CONFIG_IP_NF_NAT_NEEDED
+ EXPORT_SYMBOL(ip_conntrack_tcp_update);
More information about the netfilter-cvslog
mailing list