diff options
Diffstat (limited to 'package/iptables/patches')
7 files changed, 22 insertions, 951 deletions
| diff --git a/package/iptables/patches/1.3.8/002-layer7_2.17.patch b/package/iptables/patches/1.3.8/002-layer7_2.17.patch deleted file mode 100644 index 68da741e0..000000000 --- a/package/iptables/patches/1.3.8/002-layer7_2.17.patch +++ /dev/null @@ -1,425 +0,0 @@ -Index: iptables-1.3.8/extensions/.layer7-test -=================================================================== ---- /dev/null -+++ iptables-1.3.8/extensions/.layer7-test -@@ -0,0 +1,2 @@ -+#! /bin/sh -+[ -f $KERNEL_DIR/include/linux/netfilter_ipv4/ipt_layer7.h ] && echo layer7 -Index: iptables-1.3.8/extensions/libipt_layer7.c -=================================================================== ---- /dev/null -+++ iptables-1.3.8/extensions/libipt_layer7.c -@@ -0,0 +1,394 @@ -+/*  -+   Shared library add-on to iptables to add layer 7 matching support.  -+   -+   By Matthew Strait <quadong@users.sf.net>, Oct 2003. -+ -+   http://l7-filter.sf.net  -+ -+   This program is free software; you can redistribute it and/or -+   modify it under the terms of the GNU General Public License -+   as published by the Free Software Foundation; either version -+   2 of the License, or (at your option) any later version. -+   http://www.gnu.org/licenses/gpl.txt -+ -+   Based on libipt_string.c (C) 2000 Emmanuel Roger <winfield@freegates.be> -+*/ -+ -+#define _GNU_SOURCE -+#include <stdio.h> -+#include <netdb.h> -+#include <string.h> -+#include <stdlib.h> -+#include <getopt.h> -+#include <ctype.h> -+#include <dirent.h> -+ -+#include <iptables.h> -+#include <linux/netfilter_ipv4/ipt_layer7.h> -+ -+#define MAX_FN_LEN 256 -+ -+static char l7dir[MAX_FN_LEN] = "\0"; -+ -+/* Function which prints out usage message. */ -+static void help(void) -+{ -+	printf( -+	"LAYER7 match v%s options:\n" -+	"--l7dir <directory>  : Look for patterns here instead of /etc/l7-protocols/\n" -+	"                       (--l7dir must be specified before --l7proto if used!)\n" -+	"--l7proto [!] <name> : Match the protocol defined in /etc/l7-protocols/name.pat\n", -+	IPTABLES_VERSION); -+	fputc('\n', stdout); -+} -+ -+static struct option opts[] = { -+	{ .name = "l7proto", .has_arg = 1, .flag = 0, .val = '1' }, -+	{ .name = "l7dir",   .has_arg = 1, .flag = 0, .val = '2' }, -+	{ .name = 0 } -+}; -+ -+/* reads filename, puts protocol info into layer7_protocol_info, number of protocols to numprotos */ -+int parse_protocol_file(char * filename, const unsigned char * protoname, struct ipt_layer7_info *info) -+{ -+	FILE * f; -+	char * line = NULL; -+	size_t len = 0; -+ -+	enum { protocol, pattern, done } datatype = protocol; -+ -+	f = fopen(filename, "r"); -+ -+	if(!f) -+		return 0; -+ -+	while(getline(&line, &len, f) != -1) -+	{ -+		if(strlen(line) < 2 || line[0] == '#') -+			continue; -+ -+		/* strip the pesky newline... */ -+		if(line[strlen(line) - 1] == '\n') -+			line[strlen(line) - 1] = '\0'; -+ -+		if(datatype == protocol) -+		{ -+			/* Ignore everything on the line beginning with the  -+			first space or tab . For instance, this allows the  -+			protocol line in http.pat to be "http " (or  -+			"http I am so cool") instead of just "http". */ -+			if(strchr(line, ' ')){ -+				char * space = strchr(line, ' '); -+				space[0] = '\0'; -+			} -+			if(strchr(line, '\t')){ -+				char * space = strchr(line, '\t'); -+				space[0] = '\0'; -+			} -+ -+			/* sanity check.  First non-comment non-blank  -+			line must be the same as the file name. */ -+			if(strcmp(line, protoname)) -+				exit_error(OTHER_PROBLEM,  -+					"Protocol name (%s) doesn't match file name (%s).  Bailing out\n", -+					line, filename); -+ -+			if(strlen(line) >= MAX_PROTOCOL_LEN) -+				 exit_error(PARAMETER_PROBLEM,  -+					"Protocol name in %s too long!", filename); -+			strncpy(info->protocol, line, MAX_PROTOCOL_LEN); -+ -+			datatype = pattern;  -+		} -+		else if(datatype == pattern) -+		{ -+			if(strlen(line) >= MAX_PATTERN_LEN) -+				 exit_error(PARAMETER_PROBLEM, "Pattern in %s too long!", filename); -+			strncpy(info->pattern, line, MAX_PATTERN_LEN); -+			 -+			datatype = done;			 -+			break; -+		} -+		else -+			exit_error(OTHER_PROBLEM, "Internal error"); -+	} -+ -+	if(datatype != done) -+		exit_error(OTHER_PROBLEM, "Failed to get all needed data from %s", filename); -+ -+	if(line) free(line); -+	fclose(f); -+ -+	return 1; -+ -+/* -+	fprintf(stderr, "protocol: %s\npattern: %s\n\n",  -+			info->protocol, -+			info->pattern); -+*/ -+} -+ -+static int hex2dec(char c) -+{ -+        switch (c) -+        { -+                case '0' ... '9': -+                        return c - '0'; -+                case 'a' ... 'f': -+                        return c - 'a' + 10; -+                case 'A' ... 'F': -+                        return c - 'A' + 10; -+                default: -+                        exit_error(OTHER_PROBLEM, "hex2dec: bad value!\n"); -+                        return 0; -+        } -+} -+ -+/* takes a string with \xHH escapes and returns one with the characters  -+they stand for */ -+static char * pre_process(char * s) -+{ -+	char * result = malloc(strlen(s) + 1); -+	int sindex = 0, rindex = 0; -+        while( sindex < strlen(s) ) -+        { -+            if( sindex + 3 < strlen(s) && -+                s[sindex] == '\\' && s[sindex+1] == 'x' &&  -+                isxdigit(s[sindex + 2]) && isxdigit(s[sindex + 3]) )  -+                { -+                        /* carefully remember to call tolower here... */ -+                        result[rindex] = tolower( hex2dec(s[sindex + 2])*16 + -+                                                  hex2dec(s[sindex + 3] ) ); -+ -+			switch ( result[rindex] ) -+			{ -+			case 0x24: -+			case 0x28: -+			case 0x29: -+			case 0x2a: -+			case 0x2b: -+			case 0x2e: -+			case 0x3f: -+			case 0x5b: -+			case 0x5c: -+			case 0x5d: -+			case 0x5e: -+			case 0x7c: -+				fprintf(stderr,  -+					"Warning: layer7 regexp contains a control character, %c, in hex (\\x%c%c).\n" -+					"I recommend that you write this as %c or \\%c, depending on what you meant.\n", -+					result[rindex], s[sindex + 2], s[sindex + 3], result[rindex], result[rindex]); -+				break; -+			case 0x00: -+				fprintf(stderr,  -+					"Warning: null (\\x00) in layer7 regexp.  A null terminates the regexp string!\n"); -+				break; -+			default: -+				break; -+			} -+ -+ -+                        sindex += 3; /* 4 total */ -+                } -+                else -+                        result[rindex] = tolower(s[sindex]); -+ -+		sindex++;  -+		rindex++; -+        } -+	result[rindex] = '\0'; -+ -+	return result; -+} -+ -+#define MAX_SUBDIRS 128 -+char ** readl7dir(char * dirname) -+{ -+        DIR             * scratchdir; -+        struct dirent   ** namelist; -+	char ** subdirs = malloc(MAX_SUBDIRS * sizeof(char *)); -+ -+        int n, d = 1; -+	subdirs[0] = ""; -+ -+        n = scandir(dirname, &namelist, 0, alphasort); -+ -+	if (n < 0) -+	{ -+            perror("scandir"); -+	    exit_error(OTHER_PROBLEM, "Couldn't open %s\n", dirname); -+	} -+        else  -+	{ -+            	while(n--)  -+		{ -+			char fulldirname[MAX_FN_LEN]; -+ -+			snprintf(fulldirname, MAX_FN_LEN, "%s/%s", dirname, namelist[n]->d_name); -+ -+                	if((scratchdir = opendir(fulldirname)) != NULL) -+			{ -+				closedir(scratchdir); -+ -+				if(!strcmp(namelist[n]->d_name, ".") ||  -+				   !strcmp(namelist[n]->d_name, "..")) -+					/* do nothing */ ; -+				else -+				{ -+					subdirs[d] = malloc(strlen(namelist[n]->d_name) + 1); -+					strcpy(subdirs[d], namelist[n]->d_name); -+					d++; -+					if(d >= MAX_SUBDIRS - 1) -+					{ -+						fprintf(stderr,  -+						  "Too many subdirectories, skipping the rest!\n"); -+						break; -+					} -+				} -+			} -+                	free(namelist[n]); -+            	} -+            	free(namelist); -+        } -+	 -+	subdirs[d] = NULL; -+ -+	return subdirs; -+} -+ -+static void -+parse_layer7_protocol(const unsigned char *s, struct ipt_layer7_info *info) -+{ -+	char filename[MAX_FN_LEN]; -+	char * dir = NULL; -+	char ** subdirs; -+	int n = 0, done = 0; -+ -+	if(strlen(l7dir) > 0) -+		dir = l7dir; -+	else -+		dir = "/etc/l7-protocols"; -+ -+	subdirs = readl7dir(dir); -+ -+	while(subdirs[n] != NULL) -+	{ -+		int c = snprintf(filename, MAX_FN_LEN, "%s/%s/%s.pat", dir, subdirs[n], s); -+ -+		//fprintf(stderr, "Trying to find pattern in %s ... ", filename); -+ -+		if(c > MAX_FN_LEN) -+		{ -+			exit_error(OTHER_PROBLEM,  -+				"Filename beginning with %s is too long!\n", filename); -+		} -+ -+		/* read in the pattern from the file */ -+		if(parse_protocol_file(filename, s, info)) -+		{ -+			//fprintf(stderr, "found\n"); -+			done = 1; -+			break; -+		} -+		 -+		//fprintf(stderr, "not found\n"); -+ -+		n++; -+	} -+ -+	if(!done) -+		exit_error(OTHER_PROBLEM,  -+			"Couldn't find a pattern definition file for %s.\n", s); -+ -+	/* process \xHH escapes and tolower everything. (our regex lib has no -+	case insensitivity option.) */ -+	strncpy(info->pattern, pre_process(info->pattern), MAX_PATTERN_LEN); -+} -+ -+/* Function which parses command options; returns true if it ate an option */ -+static int parse(int c, char **argv, int invert, unsigned int *flags, -+      const struct ipt_entry *entry, unsigned int *nfcache, -+      struct ipt_entry_match **match) -+{ -+	struct ipt_layer7_info *layer7info =  -+		(struct ipt_layer7_info *)(*match)->data; -+ -+	switch (c) { -+	case '1': -+		check_inverse(optarg, &invert, &optind, 0); -+		parse_layer7_protocol(argv[optind-1], layer7info); -+		if (invert) -+			layer7info->invert = 1; -+		*flags = 1; -+		break; -+ -+	case '2': -+		/* not going to use this, but maybe we need to strip a ! anyway (?) */ -+		check_inverse(optarg, &invert, &optind, 0); -+ -+		if(strlen(argv[optind-1]) >= MAX_FN_LEN) -+			exit_error(PARAMETER_PROBLEM, "directory name too long\n"); -+ -+		strncpy(l7dir, argv[optind-1], MAX_FN_LEN); -+ -+		*flags = 1; -+		break; -+ -+	default: -+		return 0; -+	} -+ -+	return 1; -+} -+ -+/* Final check; must have specified --l7proto */ -+static void final_check(unsigned int flags) -+{ -+	if (!flags) -+		exit_error(PARAMETER_PROBLEM, -+			   "LAYER7 match: You must specify `--l7proto'"); -+} -+ -+static void print_protocol(char s[], int invert, int numeric) -+{ -+	fputs("l7proto ", stdout); -+	if (invert) fputc('!', stdout); -+	printf("%s ", s); -+} -+ -+/* Prints out the matchinfo. */ -+static void print(const struct ipt_ip *ip, -+      const struct ipt_entry_match *match, -+      int numeric) -+{ -+	printf("LAYER7 "); -+ -+	print_protocol(((struct ipt_layer7_info *)match->data)->protocol, -+		  ((struct ipt_layer7_info *)match->data)->invert, numeric); -+} -+/* Saves the union ipt_matchinfo in parsable form to stdout. */ -+static void save(const struct ipt_ip *ip, const struct ipt_entry_match *match) -+{ -+        const struct ipt_layer7_info *info = -+            (const struct ipt_layer7_info*) match->data; -+ -+        printf("--l7proto %s%s ", (info->invert)   ? "! ": "", info->protocol); -+} -+ -+static struct iptables_match layer7 = {  -+    .name          = "layer7", -+    .version       = IPTABLES_VERSION, -+    .size          = IPT_ALIGN(sizeof(struct ipt_layer7_info)), -+    .userspacesize = IPT_ALIGN(sizeof(struct ipt_layer7_info)), -+    .help          = &help, -+    .parse         = &parse, -+    .final_check   = &final_check, -+    .print         = &print, -+    .save          = &save, -+    .extra_opts    = opts -+}; -+ -+void _init(void) -+{ -+	register_match(&layer7); -+} -Index: iptables-1.3.8/extensions/libipt_layer7.man -=================================================================== ---- /dev/null -+++ iptables-1.3.8/extensions/libipt_layer7.man -@@ -0,0 +1,14 @@ -+This module matches packets based on the application layer data of  -+their connections.  It uses regular expression matching to compare  -+the application layer data to regular expressions found it the layer7  -+configuration files.  This is an experimental module which can be found at  -+http://l7-filter.sf.net.  It takes two options. -+.TP -+.BI "--l7proto " "\fIprotocol\fP" -+Match the specified protocol.  The protocol name must match a file  -+name in /etc/l7-protocols/ or one of its first-level child directories. -+.TP -+.BI "--l7dir " "\fIdirectory\fP" -+Use \fIdirectory\fP instead of /etc/l7-protocols/.  This option must be  -+specified before --l7proto. -+ diff --git a/package/iptables/patches/1.3.8/003-layer7_2.17_pktmatch.patch b/package/iptables/patches/1.3.8/003-layer7_2.17_pktmatch.patch deleted file mode 100644 index c88f75963..000000000 --- a/package/iptables/patches/1.3.8/003-layer7_2.17_pktmatch.patch +++ /dev/null @@ -1,42 +0,0 @@ -Index: iptables-1.3.8/extensions/libipt_layer7.c -=================================================================== ---- iptables-1.3.8.orig/extensions/libipt_layer7.c -+++ iptables-1.3.8/extensions/libipt_layer7.c -@@ -37,7 +37,8 @@ static void help(void) - 	"LAYER7 match v%s options:\n" - 	"--l7dir <directory>  : Look for patterns here instead of /etc/l7-protocols/\n" - 	"                       (--l7dir must be specified before --l7proto if used!)\n" --	"--l7proto [!] <name> : Match the protocol defined in /etc/l7-protocols/name.pat\n", -+	"--l7proto [!] <name> : Match the protocol defined in /etc/l7-protocols/name.pat\n" -+	"--l7pkt              : Skip connection tracking and match individual packets\n", - 	IPTABLES_VERSION); - 	fputc('\n', stdout); - } -@@ -45,6 +46,7 @@ static void help(void) - static struct option opts[] = { - 	{ .name = "l7proto", .has_arg = 1, .flag = 0, .val = '1' }, - 	{ .name = "l7dir",   .has_arg = 1, .flag = 0, .val = '2' }, -+	{ .name = "l7pkt",   .has_arg = 0, .flag = 0, .val = '3' }, - 	{ .name = 0 } - }; -  -@@ -333,6 +335,9 @@ static int parse(int c, char **argv, int -  - 		*flags = 1; - 		break; -+	case '3': -+		layer7info->pkt = 1; -+		break; -  - 	default: - 		return 0; -@@ -365,6 +370,9 @@ static void print(const struct ipt_ip *i -  - 	print_protocol(((struct ipt_layer7_info *)match->data)->protocol, - 		  ((struct ipt_layer7_info *)match->data)->invert, numeric); -+ -+	if (((struct ipt_layer7_info *)match->data)->pkt) -+		printf("l7pkt "); - } - /* Saves the union ipt_matchinfo in parsable form to stdout. */ - static void save(const struct ipt_ip *ip, const struct ipt_entry_match *match) diff --git a/package/iptables/patches/1.3.8/004-drop_multiport_v0_support.patch b/package/iptables/patches/1.3.8/004-drop_multiport_v0_support.patch deleted file mode 100644 index e5cbeb6f3..000000000 --- a/package/iptables/patches/1.3.8/004-drop_multiport_v0_support.patch +++ /dev/null @@ -1,222 +0,0 @@ -Index: iptables-1.3.8/extensions/libipt_multiport.c -=================================================================== ---- iptables-1.3.8.orig/extensions/libipt_multiport.c -+++ iptables-1.3.8/extensions/libipt_multiport.c -@@ -8,24 +8,6 @@ - /* To ensure that iptables compiles with an old kernel */ - #include "../include/linux/netfilter_ipv4/ipt_multiport.h" -  --/* Function which prints out usage message. */ --static void --help(void) --{ --	printf( --"multiport v%s options:\n" --" --source-ports port[,port,port...]\n" --" --sports ...\n" --"				match source port(s)\n" --" --destination-ports port[,port,port...]\n" --" --dports ...\n" --"				match destination port(s)\n" --" --ports port[,port,port]\n" --"				match both source and destination port(s)\n" --" NOTE: this kernel does not support port ranges in multiport.\n", --IPTABLES_VERSION); --} -- - static void - help_v1(void) - { -@@ -70,26 +52,6 @@ proto_to_name(u_int8_t proto) - 	} - } -  --static unsigned int --parse_multi_ports(const char *portstring, u_int16_t *ports, const char *proto) --{ --	char *buffer, *cp, *next; --	unsigned int i; -- --	buffer = strdup(portstring); --	if (!buffer) exit_error(OTHER_PROBLEM, "strdup failed"); -- --	for (cp=buffer, i=0; cp && i<IPT_MULTI_PORTS; cp=next,i++) --	{ --		next=strchr(cp, ','); --		if (next) *next++='\0'; --		ports[i] = parse_port(cp, proto); --	} --	if (cp) exit_error(PARAMETER_PROBLEM, "too many ports specified"); --	free(buffer); --	return i; --} -- - static void - parse_multi_ports_v1(const char *portstring,  - 		     struct ipt_multiport_v1 *multiinfo, -@@ -156,58 +118,6 @@ check_proto(const struct ipt_entry *entr - 			   "multiport only works with TCP, UDP, UDPLITE, SCTP and DCCP"); - } -  --/* Function which parses command options; returns true if it --   ate an option */ --static int --parse(int c, char **argv, int invert, unsigned int *flags, --      const struct ipt_entry *entry, --      unsigned int *nfcache, --      struct ipt_entry_match **match) --{ --	const char *proto; --	struct ipt_multiport *multiinfo --		= (struct ipt_multiport *)(*match)->data; -- --	switch (c) { --	case '1': --		check_inverse(argv[optind-1], &invert, &optind, 0); --		proto = check_proto(entry); --		multiinfo->count = parse_multi_ports(argv[optind-1], --						     multiinfo->ports, proto); --		multiinfo->flags = IPT_MULTIPORT_SOURCE; --		break; -- --	case '2': --		check_inverse(argv[optind-1], &invert, &optind, 0); --		proto = check_proto(entry); --		multiinfo->count = parse_multi_ports(argv[optind-1], --						     multiinfo->ports, proto); --		multiinfo->flags = IPT_MULTIPORT_DESTINATION; --		break; -- --	case '3': --		check_inverse(argv[optind-1], &invert, &optind, 0); --		proto = check_proto(entry); --		multiinfo->count = parse_multi_ports(argv[optind-1], --						     multiinfo->ports, proto); --		multiinfo->flags = IPT_MULTIPORT_EITHER; --		break; -- --	default: --		return 0; --	} -- --	if (invert) --		exit_error(PARAMETER_PROBLEM, --			   "multiport does not support invert"); -- --	if (*flags) --		exit_error(PARAMETER_PROBLEM, --			   "multiport can only have one option"); --	*flags = 1; --	return 1; --} -- - static int - parse_v1(int c, char **argv, int invert, unsigned int *flags, - 	 const struct ipt_entry *entry, -@@ -284,43 +194,6 @@ print_port(u_int16_t port, u_int8_t prot - 		printf("%s", service); - } -  --/* Prints out the matchinfo. */ --static void --print(const struct ipt_ip *ip, --      const struct ipt_entry_match *match, --      int numeric) --{ --	const struct ipt_multiport *multiinfo --		= (const struct ipt_multiport *)match->data; --	unsigned int i; -- --	printf("multiport "); -- --	switch (multiinfo->flags) { --	case IPT_MULTIPORT_SOURCE: --		printf("sports "); --		break; -- --	case IPT_MULTIPORT_DESTINATION: --		printf("dports "); --		break; -- --	case IPT_MULTIPORT_EITHER: --		printf("ports "); --		break; -- --	default: --		printf("ERROR "); --		break; --	} -- --	for (i=0; i < multiinfo->count; i++) { --		printf("%s", i ? "," : ""); --		print_port(multiinfo->ports[i], ip->proto, numeric); --	} --	printf(" "); --} -- - static void - print_v1(const struct ipt_ip *ip, - 	 const struct ipt_entry_match *match, -@@ -364,34 +237,6 @@ print_v1(const struct ipt_ip *ip, - 	printf(" "); - } -  --/* Saves the union ipt_matchinfo in parsable form to stdout. */ --static void save(const struct ipt_ip *ip, const struct ipt_entry_match *match) --{ --	const struct ipt_multiport *multiinfo --		= (const struct ipt_multiport *)match->data; --	unsigned int i; -- --	switch (multiinfo->flags) { --	case IPT_MULTIPORT_SOURCE: --		printf("--sports "); --		break; -- --	case IPT_MULTIPORT_DESTINATION: --		printf("--dports "); --		break; -- --	case IPT_MULTIPORT_EITHER: --		printf("--ports "); --		break; --	} -- --	for (i=0; i < multiinfo->count; i++) { --		printf("%s", i ? "," : ""); --		print_port(multiinfo->ports[i], ip->proto, 1); --	} --	printf(" "); --} -- - static void save_v1(const struct ipt_ip *ip,  - 		    const struct ipt_entry_match *match) - { -@@ -427,19 +272,20 @@ static void save_v1(const struct ipt_ip  - 	printf(" "); - } -  -+ - static struct iptables_match multiport = {  - 	.next		= NULL, - 	.name		= "multiport", --	.revision	= 0, - 	.version	= IPTABLES_VERSION, --	.size		= IPT_ALIGN(sizeof(struct ipt_multiport)), --	.userspacesize	= IPT_ALIGN(sizeof(struct ipt_multiport)), --	.help		= &help, -+	.revision	= 0, -+	.size		= IPT_ALIGN(sizeof(struct ipt_multiport_v1)), -+	.userspacesize	= IPT_ALIGN(sizeof(struct ipt_multiport_v1)), -+	.help		= &help_v1, - 	.init		= &init, --	.parse		= &parse, -+	.parse		= &parse_v1, - 	.final_check	= &final_check, --	.print		= &print, --	.save		= &save, -+	.print		= &print_v1, -+	.save		= &save_v1, - 	.extra_opts	= opts - }; -  diff --git a/package/iptables/patches/1.3.8/005-imq1.patch b/package/iptables/patches/1.3.8/005-imq1.patch deleted file mode 100644 index f17ddeafd..000000000 --- a/package/iptables/patches/1.3.8/005-imq1.patch +++ /dev/null @@ -1,228 +0,0 @@ -Index: iptables-1.3.8/extensions/.IMQ-test6 -=================================================================== ---- /dev/null -+++ iptables-1.3.8/extensions/.IMQ-test6 -@@ -0,0 +1,3 @@ -+#!/bin/sh -+# True if IMQ target patch is applied. -+[ -f $KERNEL_DIR/net/ipv6/netfilter/ip6t_IMQ.c ] && echo IMQ -Index: iptables-1.3.8/extensions/libip6t_IMQ.c -=================================================================== ---- /dev/null -+++ iptables-1.3.8/extensions/libip6t_IMQ.c -@@ -0,0 +1,101 @@ -+/* Shared library add-on to iptables to add IMQ target support. */ -+#include <stdio.h> -+#include <string.h> -+#include <stdlib.h> -+#include <getopt.h> -+ -+#include <ip6tables.h> -+#include <linux/netfilter_ipv6/ip6_tables.h> -+#include <linux/netfilter_ipv6/ip6t_IMQ.h> -+ -+/* Function which prints out usage message. */ -+static void -+help(void) -+{ -+	printf( -+"IMQ target v%s options:\n" -+"  --todev <N>		enqueue to imq<N>, defaults to 0\n",  -+IPTABLES_VERSION); -+} -+ -+static struct option opts[] = { -+	{ "todev", 1, 0, '1' }, -+	{ 0 } -+}; -+ -+/* Initialize the target. */ -+static void -+init(struct ip6t_entry_target *t, unsigned int *nfcache) -+{ -+	struct ip6t_imq_info *mr = (struct ip6t_imq_info*)t->data; -+ -+	mr->todev = 0; -+	*nfcache |= NFC_UNKNOWN; -+} -+ -+/* Function which parses command options; returns true if it -+   ate an option */ -+static int -+parse(int c, char **argv, int invert, unsigned int *flags, -+      const struct ip6t_entry *entry, -+      struct ip6t_entry_target **target) -+{ -+	struct ip6t_imq_info *mr = (struct ip6t_imq_info*)(*target)->data; -+	 -+	switch(c) { -+	case '1': -+		if (check_inverse(optarg, &invert, NULL, 0)) -+			exit_error(PARAMETER_PROBLEM, -+				   "Unexpected `!' after --todev"); -+		mr->todev=atoi(optarg); -+		break; -+	default: -+		return 0; -+	} -+	return 1; -+} -+ -+static void -+final_check(unsigned int flags) -+{ -+} -+ -+/* Prints out the targinfo. */ -+static void -+print(const struct ip6t_ip6 *ip, -+      const struct ip6t_entry_target *target, -+      int numeric) -+{ -+	struct ip6t_imq_info *mr = (struct ip6t_imq_info*)target->data; -+ -+	printf("IMQ: todev %u ", mr->todev); -+} -+ -+/* Saves the union ipt_targinfo in parsable form to stdout. */ -+static void -+save(const struct ip6t_ip6 *ip, const struct ip6t_entry_target *target) -+{ -+	struct ip6t_imq_info *mr = (struct ip6t_imq_info*)target->data; -+ -+	printf("--todev %u", mr->todev); -+} -+ -+static struct ip6tables_target imq = { -+	.next		= NULL, -+	.name		= "IMQ", -+	.version	= IPTABLES_VERSION, -+	.size		= IP6T_ALIGN(sizeof(struct ip6t_imq_info)), -+	.userspacesize	= IP6T_ALIGN(sizeof(struct ip6t_imq_info)), -+	.help		= &help, -+	.init		= &init, -+	.parse		= &parse, -+	.final_check	= &final_check, -+	.print		= &print, -+	.save		= &save, -+	.extra_opts	= opts -+}; -+ -+static __attribute__((constructor)) void _init(void) -+{ -+	register_target6(&imq); -+} -Index: iptables-1.3.8/extensions/.IMQ-test -=================================================================== ---- /dev/null -+++ iptables-1.3.8/extensions/.IMQ-test -@@ -0,0 +1,3 @@ -+#!/bin/sh -+# True if IMQ target patch is applied. -+[ -f $KERNEL_DIR/net/ipv4/netfilter/ipt_IMQ.c ] && echo IMQ -Index: iptables-1.3.8/extensions/libipt_IMQ.c -=================================================================== ---- /dev/null -+++ iptables-1.3.8/extensions/libipt_IMQ.c -@@ -0,0 +1,101 @@ -+/* Shared library add-on to iptables to add IMQ target support. */ -+#include <stdio.h> -+#include <string.h> -+#include <stdlib.h> -+#include <getopt.h> -+ -+#include <iptables.h> -+#include <linux/netfilter_ipv4/ip_tables.h> -+#include <linux/netfilter_ipv4/ipt_IMQ.h> -+ -+/* Function which prints out usage message. */ -+static void -+help(void) -+{ -+	printf( -+"IMQ target v%s options:\n" -+"  --todev <N>		enqueue to imq<N>, defaults to 0\n",  -+IPTABLES_VERSION); -+} -+ -+static struct option opts[] = { -+	{ "todev", 1, 0, '1' }, -+	{ 0 } -+}; -+ -+/* Initialize the target. */ -+static void -+init(struct ipt_entry_target *t, unsigned int *nfcache) -+{ -+	struct ipt_imq_info *mr = (struct ipt_imq_info*)t->data; -+ -+	mr->todev = 0; -+	*nfcache |= NFC_UNKNOWN; -+} -+ -+/* Function which parses command options; returns true if it -+   ate an option */ -+static int -+parse(int c, char **argv, int invert, unsigned int *flags, -+      const struct ipt_entry *entry, -+      struct ipt_entry_target **target) -+{ -+	struct ipt_imq_info *mr = (struct ipt_imq_info*)(*target)->data; -+	 -+	switch(c) { -+	case '1': -+		if (check_inverse(optarg, &invert, NULL, 0)) -+			exit_error(PARAMETER_PROBLEM, -+				   "Unexpected `!' after --todev"); -+		mr->todev=atoi(optarg); -+		break; -+	default: -+		return 0; -+	} -+	return 1; -+} -+ -+static void -+final_check(unsigned int flags) -+{ -+} -+ -+/* Prints out the targinfo. */ -+static void -+print(const struct ipt_ip *ip, -+      const struct ipt_entry_target *target, -+      int numeric) -+{ -+	struct ipt_imq_info *mr = (struct ipt_imq_info*)target->data; -+ -+	printf("IMQ: todev %u ", mr->todev); -+} -+ -+/* Saves the union ipt_targinfo in parsable form to stdout. */ -+static void -+save(const struct ipt_ip *ip, const struct ipt_entry_target *target) -+{ -+	struct ipt_imq_info *mr = (struct ipt_imq_info*)target->data; -+ -+	printf("--todev %u", mr->todev); -+} -+ -+static struct iptables_target imq = { -+	.next		= NULL, -+	.name		= "IMQ", -+	.version	= IPTABLES_VERSION, -+	.size		= IPT_ALIGN(sizeof(struct ipt_imq_info)), -+	.userspacesize	= IPT_ALIGN(sizeof(struct ipt_imq_info)), -+	.help		= &help, -+	.init		= &init, -+	.parse		= &parse, -+	.final_check	= &final_check, -+	.print		= &print, -+	.save		= &save, -+	.extra_opts	= opts -+}; -+ -+static __attribute__((constructor)) void _init(void) -+{ -+	register_target(&imq); -+} diff --git a/package/iptables/patches/1.3.8/006-ipt_conntrack.patch b/package/iptables/patches/1.3.8/006-ipt_conntrack.patch deleted file mode 100644 index 65ea074e9..000000000 --- a/package/iptables/patches/1.3.8/006-ipt_conntrack.patch +++ /dev/null @@ -1,11 +0,0 @@ ---- ./include/linux/netfilter_ipv4/ipt_conntrack.h.orig	2008-09-27 10:26:49.000000000 -0400 -+++ ./include/linux/netfilter_ipv4/ipt_conntrack.h	2008-09-27 01:15:57.000000000 -0400 -@@ -52,7 +52,7 @@ - 	struct { - 		u_int32_t ip; - 		union { --			u_int16_t all; -+			u_int32_t all; - 		} u; -  - 		/* The protocol. */ diff --git a/package/iptables/patches/1.4.3.2/002-layer7_2.17.patch b/package/iptables/patches/1.4.3.2/002-layer7_2.17.patch index ac6b1a484..3c5f54c9a 100644 --- a/package/iptables/patches/1.4.3.2/002-layer7_2.17.patch +++ b/package/iptables/patches/1.4.3.2/002-layer7_2.17.patch @@ -1,6 +1,6 @@ -diff -Nur iptables.old/extensions/libxt_layer7.c iptables.new/extensions/libxt_layer7.c ---- iptables.old/extensions/libxt_layer7.c	1970-01-01 01:00:00.000000000 +0100 -+++ iptables.new/extensions/libxt_layer7.c	2008-08-22 16:00:52.000000000 +0200 +diff -Nur a/libxt_layer7.c b/libxt_layer7.c +--- a/libxt_layer7.c	1970-01-01 01:00:00.000000000 +0100 ++++ b/libxt_layer7.c	2008-08-22 16:00:52.000000000 +0200  @@ -0,0 +1,368 @@  +/*   +   Shared library add-on to iptables for layer 7 matching support.  @@ -370,9 +370,9 @@ diff -Nur iptables.old/extensions/libxt_layer7.c iptables.new/extensions/libxt_l  +{  +	xtables_register_match(&layer7);  +} -diff -Nur iptables.old/extensions/libxt_layer7.man iptables.new/extensions/libxt_layer7.man ---- iptables.old/extensions/libxt_layer7.man	1970-01-01 01:00:00.000000000 +0100 -+++ iptables.new/extensions/libxt_layer7.man	2008-08-22 16:00:52.000000000 +0200 +diff -Nur a/libxt_layer7.man b/libxt_layer7.man +--- a/libxt_layer7.man	1970-01-01 01:00:00.000000000 +0100 ++++ b/libxt_layer7.man	2008-08-22 16:00:52.000000000 +0200  @@ -0,0 +1,14 @@  +This module matches packets based on the application layer data of   +their connections.  It uses regular expression matching to compare  diff --git a/package/iptables/patches/1.4.3.2/005-imq1.patch b/package/iptables/patches/1.4.3.2/005-imq1.patch index 3c96a3bc3..4e7afe813 100644 --- a/package/iptables/patches/1.4.3.2/005-imq1.patch +++ b/package/iptables/patches/1.4.3.2/005-imq1.patch @@ -1,26 +1,25 @@ ---- iptables-1.4.1-rc3.orig/extensions/.IMQ-test	1970-01-01 10:00:00.000000000 +1000 -+++ iptables-1.4.1-rc3/extensions/.IMQ-test	2008-06-08 22:41:49.000000000 +1000 +--- /dev/null ++++ b/extensions/.IMQ-test  @@ -0,0 +1,3 @@  +#!/bin/sh  +# True if IMQ target patch is applied.  +[ -f $KERNEL_DIR/include/linux/netfilter_ipv4/ipt_IMQ.h ] && echo IMQ -diff -pruN iptables-1.4.1-rc3.orig/extensions/.IMQ-test6 iptables-1.4.1-rc3/extensions/.IMQ-test6 ---- iptables-1.4.1-rc3.orig/extensions/.IMQ-test6	1970-01-01 10:00:00.000000000 +1000 -+++ iptables-1.4.1-rc3/extensions/.IMQ-test6	2008-06-08 22:41:49.000000000 +1000 +--- /dev/null ++++ b/extensions/.IMQ-test6  @@ -0,0 +1,3 @@  +#!/bin/sh  +# True if IMQ target patch is applied.  +[ -f $KERNEL_DIR/include/linux/netfilter_ipv6/ip6t_IMQ.h ] && echo IMQ -diff -pruN iptables-1.4.1-rc3.orig/extensions/libip6t_IMQ.c iptables-1.4.1-rc3/extensions/libip6t_IMQ.c ---- iptables-1.4.1-rc3.orig/extensions/libip6t_IMQ.c	1970-01-01 10:00:00.000000000 +1000 -+++ iptables-1.4.1-rc3/extensions/libip6t_IMQ.c	2008-06-08 22:46:57.000000000 +1000 -@@ -0,0 +1,89 @@ +--- /dev/null ++++ b/extensions/libip6t_IMQ.c +@@ -0,0 +1,90 @@  +/* Shared library add-on to iptables to add IMQ target support. */  +#include <stdio.h>  +#include <string.h>  +#include <stdlib.h>  +#include <getopt.h>  + ++#include <xtables.h>  +#include <ip6tables.h>  +#include <linux/netfilter_ipv6/ip6_tables.h>  +#include <linux/netfilter_ipv6/ip6t_IMQ.h> @@ -57,8 +56,8 @@ diff -pruN iptables-1.4.1-rc3.orig/extensions/libip6t_IMQ.c iptables-1.4.1-rc3/e  +	  +	switch(c) {  +	case '1': -+		if (check_inverse(optarg, &invert, NULL, 0)) -+			exit_error(PARAMETER_PROBLEM, ++		if (xtables_check_inverse(optarg, &invert, NULL, 0)) ++			xtables_error(PARAMETER_PROBLEM,  +				   "Unexpected `!' after --todev");  +		mr->todev=atoi(optarg);  +		break; @@ -104,16 +103,16 @@ diff -pruN iptables-1.4.1-rc3.orig/extensions/libip6t_IMQ.c iptables-1.4.1-rc3/e  +{  +	xtables_register_target(&imq);  +} -diff -pruN iptables-1.4.1-rc3.orig/extensions/libipt_IMQ.c iptables-1.4.1-rc3/extensions/libipt_IMQ.c ---- iptables-1.4.1-rc3.orig/extensions/libipt_IMQ.c	1970-01-01 10:00:00.000000000 +1000 -+++ iptables-1.4.1-rc3/extensions/libipt_IMQ.c	2008-06-08 22:46:25.000000000 +1000 -@@ -0,0 +1,88 @@ +--- /dev/null ++++ b/extensions/libipt_IMQ.c +@@ -0,0 +1,89 @@  +/* Shared library add-on to iptables to add IMQ target support. */  +#include <stdio.h>  +#include <string.h>  +#include <stdlib.h>  +#include <getopt.h>  + ++#include <xtables.h>  +#include <iptables.h>  +#include <linux/netfilter_ipv4/ip_tables.h>  +#include <linux/netfilter_ipv4/ipt_IMQ.h> @@ -149,8 +148,8 @@ diff -pruN iptables-1.4.1-rc3.orig/extensions/libipt_IMQ.c iptables-1.4.1-rc3/ex  +	  +	switch(c) {  +	case '1': -+		if (check_inverse(optarg, &invert, NULL, 0)) -+			exit_error(PARAMETER_PROBLEM, ++		if (xtables_check_inverse(optarg, &invert, NULL, 0)) ++			xtables_error(PARAMETER_PROBLEM,  +				   "Unexpected `!' after --todev");  +		mr->todev=atoi(optarg);  +		break; | 
