[NETFILTER]: Convert DEBUGP to pr_debug
Convert DEBUGP to pr_debug and fix lots of non-compiling debug statements. Signed-off-by: Patrick McHardy <kaber@trash.net> Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
committed by
David S. Miller
parent
342b7e3c8a
commit
0d53778e81
@@ -30,14 +30,6 @@
|
||||
|
||||
#define CLUSTERIP_VERSION "0.8"
|
||||
|
||||
#define DEBUG_CLUSTERIP
|
||||
|
||||
#ifdef DEBUG_CLUSTERIP
|
||||
#define DEBUGP printk
|
||||
#else
|
||||
#define DEBUGP
|
||||
#endif
|
||||
|
||||
MODULE_LICENSE("GPL");
|
||||
MODULE_AUTHOR("Harald Welte <laforge@netfilter.org>");
|
||||
MODULE_DESCRIPTION("iptables target for CLUSTERIP");
|
||||
@@ -351,15 +343,15 @@ target(struct sk_buff **pskb,
|
||||
break;
|
||||
}
|
||||
|
||||
#ifdef DEBUG_CLUSTERP
|
||||
#ifdef DEBUG
|
||||
DUMP_TUPLE(&ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple);
|
||||
#endif
|
||||
DEBUGP("hash=%u ct_hash=%u ", hash, ct->mark);
|
||||
pr_debug("hash=%u ct_hash=%u ", hash, ct->mark);
|
||||
if (!clusterip_responsible(cipinfo->config, hash)) {
|
||||
DEBUGP("not responsible\n");
|
||||
pr_debug("not responsible\n");
|
||||
return NF_DROP;
|
||||
}
|
||||
DEBUGP("responsible\n");
|
||||
pr_debug("responsible\n");
|
||||
|
||||
/* despite being received via linklayer multicast, this is
|
||||
* actually a unicast IP packet. TCP doesn't like PACKET_MULTICAST */
|
||||
@@ -490,7 +482,7 @@ struct arp_payload {
|
||||
__be32 dst_ip;
|
||||
} __attribute__ ((packed));
|
||||
|
||||
#ifdef CLUSTERIP_DEBUG
|
||||
#ifdef DEBUG
|
||||
static void arp_print(struct arp_payload *payload)
|
||||
{
|
||||
#define HBUFFERLEN 30
|
||||
@@ -546,8 +538,9 @@ arp_mangle(unsigned int hook,
|
||||
* this wouldn't work, since we didn't subscribe the mcast group on
|
||||
* other interfaces */
|
||||
if (c->dev != out) {
|
||||
DEBUGP("CLUSTERIP: not mangling arp reply on different "
|
||||
"interface: cip'%s'-skb'%s'\n", c->dev->name, out->name);
|
||||
pr_debug("CLUSTERIP: not mangling arp reply on different "
|
||||
"interface: cip'%s'-skb'%s'\n",
|
||||
c->dev->name, out->name);
|
||||
clusterip_config_put(c);
|
||||
return NF_ACCEPT;
|
||||
}
|
||||
@@ -555,8 +548,8 @@ arp_mangle(unsigned int hook,
|
||||
/* mangle reply hardware address */
|
||||
memcpy(payload->src_hw, c->clustermac, arp->ar_hln);
|
||||
|
||||
#ifdef CLUSTERIP_DEBUG
|
||||
DEBUGP(KERN_DEBUG "CLUSTERIP mangled arp reply: ");
|
||||
#ifdef DEBUG
|
||||
pr_debug(KERN_DEBUG "CLUSTERIP mangled arp reply: ");
|
||||
arp_print(payload);
|
||||
#endif
|
||||
|
||||
|
@@ -27,12 +27,6 @@ MODULE_LICENSE("GPL");
|
||||
MODULE_AUTHOR("Netfilter Core Team <coreteam@netfilter.org>");
|
||||
MODULE_DESCRIPTION("iptables syslog logging module");
|
||||
|
||||
#if 0
|
||||
#define DEBUGP printk
|
||||
#else
|
||||
#define DEBUGP(format, args...)
|
||||
#endif
|
||||
|
||||
/* Use lock to serialize, so printks don't overlap */
|
||||
static DEFINE_SPINLOCK(log_lock);
|
||||
|
||||
@@ -452,12 +446,12 @@ static bool ipt_log_checkentry(const char *tablename,
|
||||
const struct ipt_log_info *loginfo = targinfo;
|
||||
|
||||
if (loginfo->level >= 8) {
|
||||
DEBUGP("LOG: level %u >= 8\n", loginfo->level);
|
||||
pr_debug("LOG: level %u >= 8\n", loginfo->level);
|
||||
return false;
|
||||
}
|
||||
if (loginfo->prefix[sizeof(loginfo->prefix)-1] != '\0') {
|
||||
DEBUGP("LOG: prefix term %i\n",
|
||||
loginfo->prefix[sizeof(loginfo->prefix)-1]);
|
||||
pr_debug("LOG: prefix term %i\n",
|
||||
loginfo->prefix[sizeof(loginfo->prefix)-1]);
|
||||
return false;
|
||||
}
|
||||
return true;
|
||||
|
@@ -27,12 +27,6 @@ MODULE_LICENSE("GPL");
|
||||
MODULE_AUTHOR("Netfilter Core Team <coreteam@netfilter.org>");
|
||||
MODULE_DESCRIPTION("iptables MASQUERADE target module");
|
||||
|
||||
#if 0
|
||||
#define DEBUGP printk
|
||||
#else
|
||||
#define DEBUGP(format, args...)
|
||||
#endif
|
||||
|
||||
/* Lock protects masq region inside conntrack */
|
||||
static DEFINE_RWLOCK(masq_lock);
|
||||
|
||||
@@ -47,11 +41,11 @@ masquerade_check(const char *tablename,
|
||||
const struct nf_nat_multi_range_compat *mr = targinfo;
|
||||
|
||||
if (mr->range[0].flags & IP_NAT_RANGE_MAP_IPS) {
|
||||
DEBUGP("masquerade_check: bad MAP_IPS.\n");
|
||||
pr_debug("masquerade_check: bad MAP_IPS.\n");
|
||||
return false;
|
||||
}
|
||||
if (mr->rangesize != 1) {
|
||||
DEBUGP("masquerade_check: bad rangesize %u.\n", mr->rangesize);
|
||||
pr_debug("masquerade_check: bad rangesize %u\n", mr->rangesize);
|
||||
return false;
|
||||
}
|
||||
return true;
|
||||
|
@@ -18,17 +18,10 @@
|
||||
#include <linux/netfilter/x_tables.h>
|
||||
#include <net/netfilter/nf_nat_rule.h>
|
||||
|
||||
#define MODULENAME "NETMAP"
|
||||
MODULE_LICENSE("GPL");
|
||||
MODULE_AUTHOR("Svenning Soerensen <svenning@post5.tele.dk>");
|
||||
MODULE_DESCRIPTION("iptables 1:1 NAT mapping of IP networks target");
|
||||
|
||||
#if 0
|
||||
#define DEBUGP printk
|
||||
#else
|
||||
#define DEBUGP(format, args...)
|
||||
#endif
|
||||
|
||||
static bool
|
||||
check(const char *tablename,
|
||||
const void *e,
|
||||
@@ -39,11 +32,11 @@ check(const char *tablename,
|
||||
const struct nf_nat_multi_range_compat *mr = targinfo;
|
||||
|
||||
if (!(mr->range[0].flags & IP_NAT_RANGE_MAP_IPS)) {
|
||||
DEBUGP(MODULENAME":check: bad MAP_IPS.\n");
|
||||
pr_debug("NETMAP:check: bad MAP_IPS.\n");
|
||||
return false;
|
||||
}
|
||||
if (mr->rangesize != 1) {
|
||||
DEBUGP(MODULENAME":check: bad rangesize %u.\n", mr->rangesize);
|
||||
pr_debug("NETMAP:check: bad rangesize %u.\n", mr->rangesize);
|
||||
return false;
|
||||
}
|
||||
return true;
|
||||
@@ -86,7 +79,7 @@ target(struct sk_buff **pskb,
|
||||
}
|
||||
|
||||
static struct xt_target target_module __read_mostly = {
|
||||
.name = MODULENAME,
|
||||
.name = "NETMAP",
|
||||
.family = AF_INET,
|
||||
.target = target,
|
||||
.targetsize = sizeof(struct nf_nat_multi_range_compat),
|
||||
|
@@ -25,12 +25,6 @@ MODULE_LICENSE("GPL");
|
||||
MODULE_AUTHOR("Netfilter Core Team <coreteam@netfilter.org>");
|
||||
MODULE_DESCRIPTION("iptables REDIRECT target module");
|
||||
|
||||
#if 0
|
||||
#define DEBUGP printk
|
||||
#else
|
||||
#define DEBUGP(format, args...)
|
||||
#endif
|
||||
|
||||
/* FIXME: Take multiple ranges --RR */
|
||||
static bool
|
||||
redirect_check(const char *tablename,
|
||||
@@ -42,11 +36,11 @@ redirect_check(const char *tablename,
|
||||
const struct nf_nat_multi_range_compat *mr = targinfo;
|
||||
|
||||
if (mr->range[0].flags & IP_NAT_RANGE_MAP_IPS) {
|
||||
DEBUGP("redirect_check: bad MAP_IPS.\n");
|
||||
pr_debug("redirect_check: bad MAP_IPS.\n");
|
||||
return false;
|
||||
}
|
||||
if (mr->rangesize != 1) {
|
||||
DEBUGP("redirect_check: bad rangesize %u.\n", mr->rangesize);
|
||||
pr_debug("redirect_check: bad rangesize %u.\n", mr->rangesize);
|
||||
return false;
|
||||
}
|
||||
return true;
|
||||
|
@@ -31,12 +31,6 @@ MODULE_LICENSE("GPL");
|
||||
MODULE_AUTHOR("Netfilter Core Team <coreteam@netfilter.org>");
|
||||
MODULE_DESCRIPTION("iptables REJECT target module");
|
||||
|
||||
#if 0
|
||||
#define DEBUGP printk
|
||||
#else
|
||||
#define DEBUGP(format, args...)
|
||||
#endif
|
||||
|
||||
/* Send RST reply */
|
||||
static void send_reset(struct sk_buff *oldskb, int hook)
|
||||
{
|
||||
@@ -227,13 +221,13 @@ static bool check(const char *tablename,
|
||||
const struct ipt_entry *e = e_void;
|
||||
|
||||
if (rejinfo->with == IPT_ICMP_ECHOREPLY) {
|
||||
printk("REJECT: ECHOREPLY no longer supported.\n");
|
||||
printk("ipt_REJECT: ECHOREPLY no longer supported.\n");
|
||||
return false;
|
||||
} else if (rejinfo->with == IPT_TCP_RESET) {
|
||||
/* Must specify that it's a TCP packet */
|
||||
if (e->ip.proto != IPPROTO_TCP
|
||||
|| (e->ip.invflags & XT_INV_PROTO)) {
|
||||
DEBUGP("REJECT: TCP_RESET invalid for non-tcp\n");
|
||||
printk("ipt_REJECT: TCP_RESET invalid for non-tcp\n");
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
@@ -27,12 +27,6 @@ MODULE_LICENSE("GPL");
|
||||
MODULE_AUTHOR("Martin Josefsson <gandalf@wlug.westbo.se>");
|
||||
MODULE_DESCRIPTION("iptables special SNAT module for consistent sourceip");
|
||||
|
||||
#if 0
|
||||
#define DEBUGP printk
|
||||
#else
|
||||
#define DEBUGP(format, args...)
|
||||
#endif
|
||||
|
||||
static bool
|
||||
same_check(const char *tablename,
|
||||
const void *e,
|
||||
@@ -46,54 +40,52 @@ same_check(const char *tablename,
|
||||
mr->ipnum = 0;
|
||||
|
||||
if (mr->rangesize < 1) {
|
||||
DEBUGP("same_check: need at least one dest range.\n");
|
||||
pr_debug("same_check: need at least one dest range.\n");
|
||||
return false;
|
||||
}
|
||||
if (mr->rangesize > IPT_SAME_MAX_RANGE) {
|
||||
DEBUGP("same_check: too many ranges specified, maximum "
|
||||
"is %u ranges\n",
|
||||
IPT_SAME_MAX_RANGE);
|
||||
pr_debug("same_check: too many ranges specified, maximum "
|
||||
"is %u ranges\n", IPT_SAME_MAX_RANGE);
|
||||
return false;
|
||||
}
|
||||
for (count = 0; count < mr->rangesize; count++) {
|
||||
if (ntohl(mr->range[count].min_ip) >
|
||||
ntohl(mr->range[count].max_ip)) {
|
||||
DEBUGP("same_check: min_ip is larger than max_ip in "
|
||||
"range `%u.%u.%u.%u-%u.%u.%u.%u'.\n",
|
||||
NIPQUAD(mr->range[count].min_ip),
|
||||
NIPQUAD(mr->range[count].max_ip));
|
||||
pr_debug("same_check: min_ip is larger than max_ip in "
|
||||
"range `%u.%u.%u.%u-%u.%u.%u.%u'.\n",
|
||||
NIPQUAD(mr->range[count].min_ip),
|
||||
NIPQUAD(mr->range[count].max_ip));
|
||||
return false;
|
||||
}
|
||||
if (!(mr->range[count].flags & IP_NAT_RANGE_MAP_IPS)) {
|
||||
DEBUGP("same_check: bad MAP_IPS.\n");
|
||||
pr_debug("same_check: bad MAP_IPS.\n");
|
||||
return false;
|
||||
}
|
||||
rangeip = (ntohl(mr->range[count].max_ip) -
|
||||
ntohl(mr->range[count].min_ip) + 1);
|
||||
mr->ipnum += rangeip;
|
||||
|
||||
DEBUGP("same_check: range %u, ipnum = %u\n", count, rangeip);
|
||||
pr_debug("same_check: range %u, ipnum = %u\n", count, rangeip);
|
||||
}
|
||||
DEBUGP("same_check: total ipaddresses = %u\n", mr->ipnum);
|
||||
pr_debug("same_check: total ipaddresses = %u\n", mr->ipnum);
|
||||
|
||||
mr->iparray = kmalloc((sizeof(u_int32_t) * mr->ipnum), GFP_KERNEL);
|
||||
if (!mr->iparray) {
|
||||
DEBUGP("same_check: Couldn't allocate %u bytes "
|
||||
"for %u ipaddresses!\n",
|
||||
(sizeof(u_int32_t) * mr->ipnum), mr->ipnum);
|
||||
pr_debug("same_check: Couldn't allocate %Zu bytes "
|
||||
"for %u ipaddresses!\n",
|
||||
(sizeof(u_int32_t) * mr->ipnum), mr->ipnum);
|
||||
return false;
|
||||
}
|
||||
DEBUGP("same_check: Allocated %u bytes for %u ipaddresses.\n",
|
||||
(sizeof(u_int32_t) * mr->ipnum), mr->ipnum);
|
||||
pr_debug("same_check: Allocated %Zu bytes for %u ipaddresses.\n",
|
||||
(sizeof(u_int32_t) * mr->ipnum), mr->ipnum);
|
||||
|
||||
for (count = 0; count < mr->rangesize; count++) {
|
||||
for (countess = ntohl(mr->range[count].min_ip);
|
||||
countess <= ntohl(mr->range[count].max_ip);
|
||||
countess++) {
|
||||
mr->iparray[index] = countess;
|
||||
DEBUGP("same_check: Added ipaddress `%u.%u.%u.%u' "
|
||||
"in index %u.\n",
|
||||
HIPQUAD(countess), index);
|
||||
pr_debug("same_check: Added ipaddress `%u.%u.%u.%u' "
|
||||
"in index %u.\n", HIPQUAD(countess), index);
|
||||
index++;
|
||||
}
|
||||
}
|
||||
@@ -107,8 +99,8 @@ same_destroy(const struct xt_target *target, void *targinfo)
|
||||
|
||||
kfree(mr->iparray);
|
||||
|
||||
DEBUGP("same_destroy: Deallocated %u bytes for %u ipaddresses.\n",
|
||||
(sizeof(u_int32_t) * mr->ipnum), mr->ipnum);
|
||||
pr_debug("same_destroy: Deallocated %Zu bytes for %u ipaddresses.\n",
|
||||
(sizeof(u_int32_t) * mr->ipnum), mr->ipnum);
|
||||
}
|
||||
|
||||
static unsigned int
|
||||
@@ -146,10 +138,9 @@ same_target(struct sk_buff **pskb,
|
||||
|
||||
new_ip = htonl(same->iparray[aindex]);
|
||||
|
||||
DEBUGP("ipt_SAME: src=%u.%u.%u.%u dst=%u.%u.%u.%u, "
|
||||
"new src=%u.%u.%u.%u\n",
|
||||
NIPQUAD(t->src.ip), NIPQUAD(t->dst.ip),
|
||||
NIPQUAD(new_ip));
|
||||
pr_debug("ipt_SAME: src=%u.%u.%u.%u dst=%u.%u.%u.%u, "
|
||||
"new src=%u.%u.%u.%u\n",
|
||||
NIPQUAD(t->src.u3.ip), NIPQUAD(t->dst.u3.ip), NIPQUAD(new_ip));
|
||||
|
||||
/* Transfer from original range. */
|
||||
newrange = ((struct nf_nat_range)
|
||||
|
@@ -55,13 +55,6 @@ MODULE_ALIAS_NET_PF_PROTO(PF_NETLINK, NETLINK_NFLOG);
|
||||
#define ULOG_NL_EVENT 111 /* Harald's favorite number */
|
||||
#define ULOG_MAXNLGROUPS 32 /* numer of nlgroups */
|
||||
|
||||
#if 0
|
||||
#define DEBUGP(format, args...) printk("%s:%s:" format, \
|
||||
__FILE__, __FUNCTION__ , ## args)
|
||||
#else
|
||||
#define DEBUGP(format, args...)
|
||||
#endif
|
||||
|
||||
#define PRINTR(format, args...) do { if (net_ratelimit()) printk(format , ## args); } while (0)
|
||||
|
||||
static unsigned int nlbufsiz = NLMSG_GOODSIZE;
|
||||
@@ -96,12 +89,12 @@ static void ulog_send(unsigned int nlgroupnum)
|
||||
ulog_buff_t *ub = &ulog_buffers[nlgroupnum];
|
||||
|
||||
if (timer_pending(&ub->timer)) {
|
||||
DEBUGP("ipt_ULOG: ulog_send: timer was pending, deleting\n");
|
||||
pr_debug("ipt_ULOG: ulog_send: timer was pending, deleting\n");
|
||||
del_timer(&ub->timer);
|
||||
}
|
||||
|
||||
if (!ub->skb) {
|
||||
DEBUGP("ipt_ULOG: ulog_send: nothing to send\n");
|
||||
pr_debug("ipt_ULOG: ulog_send: nothing to send\n");
|
||||
return;
|
||||
}
|
||||
|
||||
@@ -110,8 +103,8 @@ static void ulog_send(unsigned int nlgroupnum)
|
||||
ub->lastnlh->nlmsg_type = NLMSG_DONE;
|
||||
|
||||
NETLINK_CB(ub->skb).dst_group = nlgroupnum + 1;
|
||||
DEBUGP("ipt_ULOG: throwing %d packets to netlink group %u\n",
|
||||
ub->qlen, nlgroupnum + 1);
|
||||
pr_debug("ipt_ULOG: throwing %d packets to netlink group %u\n",
|
||||
ub->qlen, nlgroupnum + 1);
|
||||
netlink_broadcast(nflognl, ub->skb, 0, nlgroupnum + 1, GFP_ATOMIC);
|
||||
|
||||
ub->qlen = 0;
|
||||
@@ -123,7 +116,7 @@ static void ulog_send(unsigned int nlgroupnum)
|
||||
/* timer function to flush queue in flushtimeout time */
|
||||
static void ulog_timer(unsigned long data)
|
||||
{
|
||||
DEBUGP("ipt_ULOG: timer function called, calling ulog_send\n");
|
||||
pr_debug("ipt_ULOG: timer function called, calling ulog_send\n");
|
||||
|
||||
/* lock to protect against somebody modifying our structure
|
||||
* from ipt_ulog_target at the same time */
|
||||
@@ -204,8 +197,8 @@ static void ipt_ulog_packet(unsigned int hooknum,
|
||||
goto alloc_failure;
|
||||
}
|
||||
|
||||
DEBUGP("ipt_ULOG: qlen %d, qthreshold %d\n", ub->qlen,
|
||||
loginfo->qthreshold);
|
||||
pr_debug("ipt_ULOG: qlen %d, qthreshold %Zu\n", ub->qlen,
|
||||
loginfo->qthreshold);
|
||||
|
||||
/* NLMSG_PUT contains a hidden goto nlmsg_failure !!! */
|
||||
nlh = NLMSG_PUT(ub->skb, 0, ub->qlen, ULOG_NL_EVENT,
|
||||
@@ -334,13 +327,13 @@ static bool ipt_ulog_checkentry(const char *tablename,
|
||||
const struct ipt_ulog_info *loginfo = targinfo;
|
||||
|
||||
if (loginfo->prefix[sizeof(loginfo->prefix) - 1] != '\0') {
|
||||
DEBUGP("ipt_ULOG: prefix term %i\n",
|
||||
loginfo->prefix[sizeof(loginfo->prefix) - 1]);
|
||||
pr_debug("ipt_ULOG: prefix term %i\n",
|
||||
loginfo->prefix[sizeof(loginfo->prefix) - 1]);
|
||||
return false;
|
||||
}
|
||||
if (loginfo->qthreshold > ULOG_MAX_QLEN) {
|
||||
DEBUGP("ipt_ULOG: queue threshold %i > MAX_QLEN\n",
|
||||
loginfo->qthreshold);
|
||||
pr_debug("ipt_ULOG: queue threshold %Zu > MAX_QLEN\n",
|
||||
loginfo->qthreshold);
|
||||
return false;
|
||||
}
|
||||
return true;
|
||||
@@ -405,7 +398,7 @@ static int __init ipt_ulog_init(void)
|
||||
{
|
||||
int ret, i;
|
||||
|
||||
DEBUGP("ipt_ULOG: init module\n");
|
||||
pr_debug("ipt_ULOG: init module\n");
|
||||
|
||||
if (nlbufsiz > 128*1024) {
|
||||
printk("Netlink buffer has to be <= 128kB\n");
|
||||
@@ -437,7 +430,7 @@ static void __exit ipt_ulog_fini(void)
|
||||
ulog_buff_t *ub;
|
||||
int i;
|
||||
|
||||
DEBUGP("ipt_ULOG: cleanup_module\n");
|
||||
pr_debug("ipt_ULOG: cleanup_module\n");
|
||||
|
||||
if (nflog)
|
||||
nf_log_unregister(&ipt_ulog_logger);
|
||||
@@ -448,7 +441,7 @@ static void __exit ipt_ulog_fini(void)
|
||||
for (i = 0; i < ULOG_MAXNLGROUPS; i++) {
|
||||
ub = &ulog_buffers[i];
|
||||
if (timer_pending(&ub->timer)) {
|
||||
DEBUGP("timer was pending, deleting\n");
|
||||
pr_debug("timer was pending, deleting\n");
|
||||
del_timer(&ub->timer);
|
||||
}
|
||||
|
||||
|
@@ -17,12 +17,6 @@ MODULE_LICENSE("GPL");
|
||||
MODULE_AUTHOR("Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>");
|
||||
MODULE_DESCRIPTION("iptables arbitrary IP range match module");
|
||||
|
||||
#if 0
|
||||
#define DEBUGP printk
|
||||
#else
|
||||
#define DEBUGP(format, args...)
|
||||
#endif
|
||||
|
||||
static bool
|
||||
match(const struct sk_buff *skb,
|
||||
const struct net_device *in,
|
||||
@@ -38,12 +32,12 @@ match(const struct sk_buff *skb,
|
||||
if ((ntohl(iph->saddr) < ntohl(info->src.min_ip)
|
||||
|| ntohl(iph->saddr) > ntohl(info->src.max_ip))
|
||||
^ !!(info->flags & IPRANGE_SRC_INV)) {
|
||||
DEBUGP("src IP %u.%u.%u.%u NOT in range %s"
|
||||
"%u.%u.%u.%u-%u.%u.%u.%u\n",
|
||||
NIPQUAD(iph->saddr),
|
||||
info->flags & IPRANGE_SRC_INV ? "(INV) " : "",
|
||||
NIPQUAD(info->src.min_ip),
|
||||
NIPQUAD(info->src.max_ip));
|
||||
pr_debug("src IP %u.%u.%u.%u NOT in range %s"
|
||||
"%u.%u.%u.%u-%u.%u.%u.%u\n",
|
||||
NIPQUAD(iph->saddr),
|
||||
info->flags & IPRANGE_SRC_INV ? "(INV) " : "",
|
||||
NIPQUAD(info->src.min_ip),
|
||||
NIPQUAD(info->src.max_ip));
|
||||
return false;
|
||||
}
|
||||
}
|
||||
@@ -51,12 +45,12 @@ match(const struct sk_buff *skb,
|
||||
if ((ntohl(iph->daddr) < ntohl(info->dst.min_ip)
|
||||
|| ntohl(iph->daddr) > ntohl(info->dst.max_ip))
|
||||
^ !!(info->flags & IPRANGE_DST_INV)) {
|
||||
DEBUGP("dst IP %u.%u.%u.%u NOT in range %s"
|
||||
"%u.%u.%u.%u-%u.%u.%u.%u\n",
|
||||
NIPQUAD(iph->daddr),
|
||||
info->flags & IPRANGE_DST_INV ? "(INV) " : "",
|
||||
NIPQUAD(info->dst.min_ip),
|
||||
NIPQUAD(info->dst.max_ip));
|
||||
pr_debug("dst IP %u.%u.%u.%u NOT in range %s"
|
||||
"%u.%u.%u.%u-%u.%u.%u.%u\n",
|
||||
NIPQUAD(iph->daddr),
|
||||
info->flags & IPRANGE_DST_INV ? "(INV) " : "",
|
||||
NIPQUAD(info->dst.min_ip),
|
||||
NIPQUAD(info->dst.max_ip));
|
||||
return false;
|
||||
}
|
||||
}
|
||||
|
@@ -24,12 +24,6 @@
|
||||
#include <net/netfilter/nf_conntrack_core.h>
|
||||
#include <net/netfilter/ipv4/nf_conntrack_ipv4.h>
|
||||
|
||||
#if 0
|
||||
#define DEBUGP printk
|
||||
#else
|
||||
#define DEBUGP(format, args...)
|
||||
#endif
|
||||
|
||||
static int ipv4_pkt_to_tuple(const struct sk_buff *skb, unsigned int nhoff,
|
||||
struct nf_conntrack_tuple *tuple)
|
||||
{
|
||||
@@ -324,13 +318,13 @@ getorigdst(struct sock *sk, int optval, void __user *user, int *len)
|
||||
|
||||
/* We only do TCP at the moment: is there a better way? */
|
||||
if (strcmp(sk->sk_prot->name, "TCP")) {
|
||||
DEBUGP("SO_ORIGINAL_DST: Not a TCP socket\n");
|
||||
pr_debug("SO_ORIGINAL_DST: Not a TCP socket\n");
|
||||
return -ENOPROTOOPT;
|
||||
}
|
||||
|
||||
if ((unsigned int) *len < sizeof(struct sockaddr_in)) {
|
||||
DEBUGP("SO_ORIGINAL_DST: len %u not %u\n",
|
||||
*len, sizeof(struct sockaddr_in));
|
||||
pr_debug("SO_ORIGINAL_DST: len %d not %Zu\n",
|
||||
*len, sizeof(struct sockaddr_in));
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
@@ -346,17 +340,17 @@ getorigdst(struct sock *sk, int optval, void __user *user, int *len)
|
||||
.tuple.dst.u3.ip;
|
||||
memset(sin.sin_zero, 0, sizeof(sin.sin_zero));
|
||||
|
||||
DEBUGP("SO_ORIGINAL_DST: %u.%u.%u.%u %u\n",
|
||||
NIPQUAD(sin.sin_addr.s_addr), ntohs(sin.sin_port));
|
||||
pr_debug("SO_ORIGINAL_DST: %u.%u.%u.%u %u\n",
|
||||
NIPQUAD(sin.sin_addr.s_addr), ntohs(sin.sin_port));
|
||||
nf_ct_put(ct);
|
||||
if (copy_to_user(user, &sin, sizeof(sin)) != 0)
|
||||
return -EFAULT;
|
||||
else
|
||||
return 0;
|
||||
}
|
||||
DEBUGP("SO_ORIGINAL_DST: Can't find %u.%u.%u.%u/%u-%u.%u.%u.%u/%u.\n",
|
||||
NIPQUAD(tuple.src.u3.ip), ntohs(tuple.src.u.tcp.port),
|
||||
NIPQUAD(tuple.dst.u3.ip), ntohs(tuple.dst.u.tcp.port));
|
||||
pr_debug("SO_ORIGINAL_DST: Can't find %u.%u.%u.%u/%u-%u.%u.%u.%u/%u.\n",
|
||||
NIPQUAD(tuple.src.u3.ip), ntohs(tuple.src.u.tcp.port),
|
||||
NIPQUAD(tuple.dst.u3.ip), ntohs(tuple.dst.u.tcp.port));
|
||||
return -ENOENT;
|
||||
}
|
||||
|
||||
|
@@ -18,12 +18,6 @@
|
||||
#include <net/netfilter/nf_conntrack_l4proto.h>
|
||||
#include <net/netfilter/nf_conntrack_expect.h>
|
||||
|
||||
#if 0
|
||||
#define DEBUGP printk
|
||||
#else
|
||||
#define DEBUGP(format, args...)
|
||||
#endif
|
||||
|
||||
#ifdef CONFIG_NF_CT_ACCT
|
||||
static unsigned int
|
||||
seq_print_counters(struct seq_file *s,
|
||||
|
@@ -21,12 +21,6 @@
|
||||
|
||||
static unsigned long nf_ct_icmp_timeout __read_mostly = 30*HZ;
|
||||
|
||||
#if 0
|
||||
#define DEBUGP printk
|
||||
#else
|
||||
#define DEBUGP(format, args...)
|
||||
#endif
|
||||
|
||||
static int icmp_pkt_to_tuple(const struct sk_buff *skb,
|
||||
unsigned int dataoff,
|
||||
struct nf_conntrack_tuple *tuple)
|
||||
@@ -125,8 +119,8 @@ static int icmp_new(struct nf_conn *conntrack,
|
||||
if (conntrack->tuplehash[0].tuple.dst.u.icmp.type >= sizeof(valid_new)
|
||||
|| !valid_new[conntrack->tuplehash[0].tuple.dst.u.icmp.type]) {
|
||||
/* Can't create a new ICMP `conn' with this. */
|
||||
DEBUGP("icmp: can't create new conn with type %u\n",
|
||||
conntrack->tuplehash[0].tuple.dst.u.icmp.type);
|
||||
pr_debug("icmp: can't create new conn with type %u\n",
|
||||
conntrack->tuplehash[0].tuple.dst.u.icmp.type);
|
||||
NF_CT_DUMP_TUPLE(&conntrack->tuplehash[0].tuple);
|
||||
return 0;
|
||||
}
|
||||
@@ -159,8 +153,8 @@ icmp_error_message(struct sk_buff *skb,
|
||||
|
||||
/* Ignore ICMP's containing fragments (shouldn't happen) */
|
||||
if (inside->ip.frag_off & htons(IP_OFFSET)) {
|
||||
DEBUGP("icmp_error_message: fragment of proto %u\n",
|
||||
inside->ip.protocol);
|
||||
pr_debug("icmp_error_message: fragment of proto %u\n",
|
||||
inside->ip.protocol);
|
||||
return -NF_ACCEPT;
|
||||
}
|
||||
|
||||
@@ -172,8 +166,8 @@ icmp_error_message(struct sk_buff *skb,
|
||||
if (!nf_ct_get_tuple(skb, dataoff, dataoff + inside->ip.ihl*4, PF_INET,
|
||||
inside->ip.protocol, &origtuple,
|
||||
&nf_conntrack_l3proto_ipv4, innerproto)) {
|
||||
DEBUGP("icmp_error_message: ! get_tuple p=%u",
|
||||
inside->ip.protocol);
|
||||
pr_debug("icmp_error_message: ! get_tuple p=%u",
|
||||
inside->ip.protocol);
|
||||
return -NF_ACCEPT;
|
||||
}
|
||||
|
||||
@@ -181,7 +175,7 @@ icmp_error_message(struct sk_buff *skb,
|
||||
been preserved inside the ICMP. */
|
||||
if (!nf_ct_invert_tuple(&innertuple, &origtuple,
|
||||
&nf_conntrack_l3proto_ipv4, innerproto)) {
|
||||
DEBUGP("icmp_error_message: no match\n");
|
||||
pr_debug("icmp_error_message: no match\n");
|
||||
return -NF_ACCEPT;
|
||||
}
|
||||
|
||||
@@ -196,7 +190,7 @@ icmp_error_message(struct sk_buff *skb,
|
||||
h = nf_conntrack_find_get(&origtuple);
|
||||
|
||||
if (!h) {
|
||||
DEBUGP("icmp_error_message: no match\n");
|
||||
pr_debug("icmp_error_message: no match\n");
|
||||
return -NF_ACCEPT;
|
||||
}
|
||||
|
||||
|
@@ -31,12 +31,6 @@
|
||||
#include <net/netfilter/nf_conntrack_l3proto.h>
|
||||
#include <net/netfilter/nf_conntrack_l4proto.h>
|
||||
|
||||
#if 0
|
||||
#define DEBUGP printk
|
||||
#else
|
||||
#define DEBUGP(format, args...)
|
||||
#endif
|
||||
|
||||
static DEFINE_RWLOCK(nf_nat_lock);
|
||||
|
||||
static struct nf_conntrack_l3proto *l3proto = NULL;
|
||||
@@ -242,7 +236,7 @@ get_unique_tuple(struct nf_conntrack_tuple *tuple,
|
||||
manips not an issue. */
|
||||
if (maniptype == IP_NAT_MANIP_SRC) {
|
||||
if (find_appropriate_src(orig_tuple, tuple, range)) {
|
||||
DEBUGP("get_unique_tuple: Found current src map\n");
|
||||
pr_debug("get_unique_tuple: Found current src map\n");
|
||||
if (!(range->flags & IP_NAT_RANGE_PROTO_RANDOM))
|
||||
if (!nf_nat_used_tuple(tuple, ct))
|
||||
return;
|
||||
@@ -293,7 +287,7 @@ nf_nat_setup_info(struct nf_conn *ct,
|
||||
if (!nat) {
|
||||
nat = nf_ct_ext_add(ct, NF_CT_EXT_NAT, GFP_ATOMIC);
|
||||
if (nat == NULL) {
|
||||
DEBUGP("failed to add NAT extension\n");
|
||||
pr_debug("failed to add NAT extension\n");
|
||||
return NF_ACCEPT;
|
||||
}
|
||||
}
|
||||
@@ -462,8 +456,9 @@ int nf_nat_icmp_reply_translation(struct nf_conn *ct,
|
||||
return 0;
|
||||
}
|
||||
|
||||
DEBUGP("icmp_reply_translation: translating error %p manp %u dir %s\n",
|
||||
*pskb, manip, dir == IP_CT_DIR_ORIGINAL ? "ORIG" : "REPLY");
|
||||
pr_debug("icmp_reply_translation: translating error %p manip %u "
|
||||
"dir %s\n", *pskb, manip,
|
||||
dir == IP_CT_DIR_ORIGINAL ? "ORIG" : "REPLY");
|
||||
|
||||
/* rcu_read_lock()ed by nf_hook_slow */
|
||||
l4proto = __nf_ct_l4proto_find(PF_INET, inside->ip.protocol);
|
||||
|
@@ -25,12 +25,6 @@ MODULE_AUTHOR("Rusty Russell <rusty@rustcorp.com.au>");
|
||||
MODULE_DESCRIPTION("ftp NAT helper");
|
||||
MODULE_ALIAS("ip_nat_ftp");
|
||||
|
||||
#if 0
|
||||
#define DEBUGP printk
|
||||
#else
|
||||
#define DEBUGP(format, args...)
|
||||
#endif
|
||||
|
||||
/* FIXME: Time out? --RR */
|
||||
|
||||
static int
|
||||
@@ -47,7 +41,7 @@ mangle_rfc959_packet(struct sk_buff **pskb,
|
||||
sprintf(buffer, "%u,%u,%u,%u,%u,%u",
|
||||
NIPQUAD(newip), port>>8, port&0xFF);
|
||||
|
||||
DEBUGP("calling nf_nat_mangle_tcp_packet\n");
|
||||
pr_debug("calling nf_nat_mangle_tcp_packet\n");
|
||||
|
||||
return nf_nat_mangle_tcp_packet(pskb, ct, ctinfo, matchoff,
|
||||
matchlen, buffer, strlen(buffer));
|
||||
@@ -67,7 +61,7 @@ mangle_eprt_packet(struct sk_buff **pskb,
|
||||
|
||||
sprintf(buffer, "|1|%u.%u.%u.%u|%u|", NIPQUAD(newip), port);
|
||||
|
||||
DEBUGP("calling nf_nat_mangle_tcp_packet\n");
|
||||
pr_debug("calling nf_nat_mangle_tcp_packet\n");
|
||||
|
||||
return nf_nat_mangle_tcp_packet(pskb, ct, ctinfo, matchoff,
|
||||
matchlen, buffer, strlen(buffer));
|
||||
@@ -87,7 +81,7 @@ mangle_epsv_packet(struct sk_buff **pskb,
|
||||
|
||||
sprintf(buffer, "|||%u|", port);
|
||||
|
||||
DEBUGP("calling nf_nat_mangle_tcp_packet\n");
|
||||
pr_debug("calling nf_nat_mangle_tcp_packet\n");
|
||||
|
||||
return nf_nat_mangle_tcp_packet(pskb, ct, ctinfo, matchoff,
|
||||
matchlen, buffer, strlen(buffer));
|
||||
@@ -117,7 +111,7 @@ static unsigned int nf_nat_ftp(struct sk_buff **pskb,
|
||||
int dir = CTINFO2DIR(ctinfo);
|
||||
struct nf_conn *ct = exp->master;
|
||||
|
||||
DEBUGP("FTP_NAT: type %i, off %u len %u\n", type, matchoff, matchlen);
|
||||
pr_debug("FTP_NAT: type %i, off %u len %u\n", type, matchoff, matchlen);
|
||||
|
||||
/* Connection will come from wherever this packet goes, hence !dir */
|
||||
newip = ct->tuplehash[!dir].tuple.dst.u3.ip;
|
||||
|
@@ -21,12 +21,6 @@
|
||||
#include <net/netfilter/nf_conntrack_expect.h>
|
||||
#include <linux/netfilter/nf_conntrack_h323.h>
|
||||
|
||||
#if 0
|
||||
#define DEBUGP printk
|
||||
#else
|
||||
#define DEBUGP(format, args...)
|
||||
#endif
|
||||
|
||||
/****************************************************************************/
|
||||
static int set_addr(struct sk_buff **pskb,
|
||||
unsigned char **data, int dataoff,
|
||||
@@ -126,12 +120,11 @@ static int set_sig_addr(struct sk_buff **pskb, struct nf_conn *ct,
|
||||
(ntohl(addr.ip) & 0xff000000) == 0x7f000000)
|
||||
i = 0;
|
||||
|
||||
DEBUGP
|
||||
("nf_nat_ras: set signal address "
|
||||
"%u.%u.%u.%u:%hu->%u.%u.%u.%u:%hu\n",
|
||||
NIPQUAD(ip), port,
|
||||
NIPQUAD(ct->tuplehash[!dir].tuple.dst.
|
||||
ip), info->sig_port[!dir]);
|
||||
pr_debug("nf_nat_ras: set signal address "
|
||||
"%u.%u.%u.%u:%hu->%u.%u.%u.%u:%hu\n",
|
||||
NIPQUAD(addr.ip), port,
|
||||
NIPQUAD(ct->tuplehash[!dir].tuple.dst.u3.ip),
|
||||
info->sig_port[!dir]);
|
||||
return set_h225_addr(pskb, data, 0, &taddr[i],
|
||||
&ct->tuplehash[!dir].
|
||||
tuple.dst.u3,
|
||||
@@ -139,12 +132,11 @@ static int set_sig_addr(struct sk_buff **pskb, struct nf_conn *ct,
|
||||
} else if (addr.ip == ct->tuplehash[dir].tuple.dst.u3.ip &&
|
||||
port == info->sig_port[dir]) {
|
||||
/* GK->GW */
|
||||
DEBUGP
|
||||
("nf_nat_ras: set signal address "
|
||||
"%u.%u.%u.%u:%hu->%u.%u.%u.%u:%hu\n",
|
||||
NIPQUAD(ip), port,
|
||||
NIPQUAD(ct->tuplehash[!dir].tuple.src.
|
||||
ip), info->sig_port[!dir]);
|
||||
pr_debug("nf_nat_ras: set signal address "
|
||||
"%u.%u.%u.%u:%hu->%u.%u.%u.%u:%hu\n",
|
||||
NIPQUAD(addr.ip), port,
|
||||
NIPQUAD(ct->tuplehash[!dir].tuple.src.u3.ip),
|
||||
info->sig_port[!dir]);
|
||||
return set_h225_addr(pskb, data, 0, &taddr[i],
|
||||
&ct->tuplehash[!dir].
|
||||
tuple.src.u3,
|
||||
@@ -171,12 +163,11 @@ static int set_ras_addr(struct sk_buff **pskb, struct nf_conn *ct,
|
||||
if (get_h225_addr(ct, *data, &taddr[i], &addr, &port) &&
|
||||
addr.ip == ct->tuplehash[dir].tuple.src.u3.ip &&
|
||||
port == ct->tuplehash[dir].tuple.src.u.udp.port) {
|
||||
DEBUGP("nf_nat_ras: set rasAddress "
|
||||
"%u.%u.%u.%u:%hu->%u.%u.%u.%u:%hu\n",
|
||||
NIPQUAD(ip), ntohs(port),
|
||||
NIPQUAD(ct->tuplehash[!dir].tuple.dst.u3.ip),
|
||||
ntohs(ct->tuplehash[!dir].tuple.dst.u.udp.
|
||||
port));
|
||||
pr_debug("nf_nat_ras: set rasAddress "
|
||||
"%u.%u.%u.%u:%hu->%u.%u.%u.%u:%hu\n",
|
||||
NIPQUAD(addr.ip), ntohs(port),
|
||||
NIPQUAD(ct->tuplehash[!dir].tuple.dst.u3.ip),
|
||||
ntohs(ct->tuplehash[!dir].tuple.dst.u.udp.port));
|
||||
return set_h225_addr(pskb, data, 0, &taddr[i],
|
||||
&ct->tuplehash[!dir].tuple.dst.u3,
|
||||
ct->tuplehash[!dir].tuple.
|
||||
@@ -267,16 +258,16 @@ static int nat_rtp_rtcp(struct sk_buff **pskb, struct nf_conn *ct,
|
||||
}
|
||||
|
||||
/* Success */
|
||||
DEBUGP("nf_nat_h323: expect RTP %u.%u.%u.%u:%hu->%u.%u.%u.%u:%hu\n",
|
||||
NIPQUAD(rtp_exp->tuple.src.ip),
|
||||
ntohs(rtp_exp->tuple.src.u.udp.port),
|
||||
NIPQUAD(rtp_exp->tuple.dst.ip),
|
||||
ntohs(rtp_exp->tuple.dst.u.udp.port));
|
||||
DEBUGP("nf_nat_h323: expect RTCP %u.%u.%u.%u:%hu->%u.%u.%u.%u:%hu\n",
|
||||
NIPQUAD(rtcp_exp->tuple.src.ip),
|
||||
ntohs(rtcp_exp->tuple.src.u.udp.port),
|
||||
NIPQUAD(rtcp_exp->tuple.dst.ip),
|
||||
ntohs(rtcp_exp->tuple.dst.u.udp.port));
|
||||
pr_debug("nf_nat_h323: expect RTP %u.%u.%u.%u:%hu->%u.%u.%u.%u:%hu\n",
|
||||
NIPQUAD(rtp_exp->tuple.src.u3.ip),
|
||||
ntohs(rtp_exp->tuple.src.u.udp.port),
|
||||
NIPQUAD(rtp_exp->tuple.dst.u3.ip),
|
||||
ntohs(rtp_exp->tuple.dst.u.udp.port));
|
||||
pr_debug("nf_nat_h323: expect RTCP %u.%u.%u.%u:%hu->%u.%u.%u.%u:%hu\n",
|
||||
NIPQUAD(rtcp_exp->tuple.src.u3.ip),
|
||||
ntohs(rtcp_exp->tuple.src.u.udp.port),
|
||||
NIPQUAD(rtcp_exp->tuple.dst.u3.ip),
|
||||
ntohs(rtcp_exp->tuple.dst.u.udp.port));
|
||||
|
||||
return 0;
|
||||
}
|
||||
@@ -317,9 +308,11 @@ static int nat_t120(struct sk_buff **pskb, struct nf_conn *ct,
|
||||
return -1;
|
||||
}
|
||||
|
||||
DEBUGP("nf_nat_h323: expect T.120 %u.%u.%u.%u:%hu->%u.%u.%u.%u:%hu\n",
|
||||
NIPQUAD(exp->tuple.src.ip), ntohs(exp->tuple.src.u.tcp.port),
|
||||
NIPQUAD(exp->tuple.dst.ip), ntohs(exp->tuple.dst.u.tcp.port));
|
||||
pr_debug("nf_nat_h323: expect T.120 %u.%u.%u.%u:%hu->%u.%u.%u.%u:%hu\n",
|
||||
NIPQUAD(exp->tuple.src.u3.ip),
|
||||
ntohs(exp->tuple.src.u.tcp.port),
|
||||
NIPQUAD(exp->tuple.dst.u3.ip),
|
||||
ntohs(exp->tuple.dst.u.tcp.port));
|
||||
|
||||
return 0;
|
||||
}
|
||||
@@ -369,9 +362,11 @@ static int nat_h245(struct sk_buff **pskb, struct nf_conn *ct,
|
||||
return -1;
|
||||
}
|
||||
|
||||
DEBUGP("nf_nat_q931: expect H.245 %u.%u.%u.%u:%hu->%u.%u.%u.%u:%hu\n",
|
||||
NIPQUAD(exp->tuple.src.ip), ntohs(exp->tuple.src.u.tcp.port),
|
||||
NIPQUAD(exp->tuple.dst.ip), ntohs(exp->tuple.dst.u.tcp.port));
|
||||
pr_debug("nf_nat_q931: expect H.245 %u.%u.%u.%u:%hu->%u.%u.%u.%u:%hu\n",
|
||||
NIPQUAD(exp->tuple.src.u3.ip),
|
||||
ntohs(exp->tuple.src.u.tcp.port),
|
||||
NIPQUAD(exp->tuple.dst.u3.ip),
|
||||
ntohs(exp->tuple.dst.u.tcp.port));
|
||||
|
||||
return 0;
|
||||
}
|
||||
@@ -465,9 +460,11 @@ static int nat_q931(struct sk_buff **pskb, struct nf_conn *ct,
|
||||
}
|
||||
|
||||
/* Success */
|
||||
DEBUGP("nf_nat_ras: expect Q.931 %u.%u.%u.%u:%hu->%u.%u.%u.%u:%hu\n",
|
||||
NIPQUAD(exp->tuple.src.ip), ntohs(exp->tuple.src.u.tcp.port),
|
||||
NIPQUAD(exp->tuple.dst.ip), ntohs(exp->tuple.dst.u.tcp.port));
|
||||
pr_debug("nf_nat_ras: expect Q.931 %u.%u.%u.%u:%hu->%u.%u.%u.%u:%hu\n",
|
||||
NIPQUAD(exp->tuple.src.u3.ip),
|
||||
ntohs(exp->tuple.src.u.tcp.port),
|
||||
NIPQUAD(exp->tuple.dst.u3.ip),
|
||||
ntohs(exp->tuple.dst.u.tcp.port));
|
||||
|
||||
return 0;
|
||||
}
|
||||
@@ -536,10 +533,12 @@ static int nat_callforwarding(struct sk_buff **pskb, struct nf_conn *ct,
|
||||
}
|
||||
|
||||
/* Success */
|
||||
DEBUGP("nf_nat_q931: expect Call Forwarding "
|
||||
"%u.%u.%u.%u:%hu->%u.%u.%u.%u:%hu\n",
|
||||
NIPQUAD(exp->tuple.src.ip), ntohs(exp->tuple.src.u.tcp.port),
|
||||
NIPQUAD(exp->tuple.dst.ip), ntohs(exp->tuple.dst.u.tcp.port));
|
||||
pr_debug("nf_nat_q931: expect Call Forwarding "
|
||||
"%u.%u.%u.%u:%hu->%u.%u.%u.%u:%hu\n",
|
||||
NIPQUAD(exp->tuple.src.u3.ip),
|
||||
ntohs(exp->tuple.src.u.tcp.port),
|
||||
NIPQUAD(exp->tuple.dst.u3.ip),
|
||||
ntohs(exp->tuple.dst.u.tcp.port));
|
||||
|
||||
return 0;
|
||||
}
|
||||
@@ -566,8 +565,6 @@ static int __init init(void)
|
||||
rcu_assign_pointer(nat_h245_hook, nat_h245);
|
||||
rcu_assign_pointer(nat_callforwarding_hook, nat_callforwarding);
|
||||
rcu_assign_pointer(nat_q931_hook, nat_q931);
|
||||
|
||||
DEBUGP("nf_nat_h323: init success\n");
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
@@ -26,13 +26,9 @@
|
||||
#include <net/netfilter/nf_nat_core.h>
|
||||
#include <net/netfilter/nf_nat_helper.h>
|
||||
|
||||
#if 0
|
||||
#define DEBUGP printk
|
||||
#define DUMP_OFFSET(x) printk("offset_before=%d, offset_after=%d, correction_pos=%u\n", x->offset_before, x->offset_after, x->correction_pos);
|
||||
#else
|
||||
#define DEBUGP(format, args...)
|
||||
#define DUMP_OFFSET(x)
|
||||
#endif
|
||||
#define DUMP_OFFSET(x) \
|
||||
pr_debug("offset_before=%d, offset_after=%d, correction_pos=%u\n", \
|
||||
x->offset_before, x->offset_after, x->correction_pos);
|
||||
|
||||
static DEFINE_SPINLOCK(nf_nat_seqofs_lock);
|
||||
|
||||
@@ -47,15 +43,15 @@ adjust_tcp_sequence(u32 seq,
|
||||
struct nf_nat_seq *this_way, *other_way;
|
||||
struct nf_conn_nat *nat = nfct_nat(ct);
|
||||
|
||||
DEBUGP("nf_nat_resize_packet: old_size = %u, new_size = %u\n",
|
||||
(*skb)->len, new_size);
|
||||
pr_debug("adjust_tcp_sequence: seq = %u, sizediff = %d\n",
|
||||
ntohl(seq), seq);
|
||||
|
||||
dir = CTINFO2DIR(ctinfo);
|
||||
|
||||
this_way = &nat->seq[dir];
|
||||
other_way = &nat->seq[!dir];
|
||||
|
||||
DEBUGP("nf_nat_resize_packet: Seq_offset before: ");
|
||||
pr_debug("nf_nat_resize_packet: Seq_offset before: ");
|
||||
DUMP_OFFSET(this_way);
|
||||
|
||||
spin_lock_bh(&nf_nat_seqofs_lock);
|
||||
@@ -72,7 +68,7 @@ adjust_tcp_sequence(u32 seq,
|
||||
}
|
||||
spin_unlock_bh(&nf_nat_seqofs_lock);
|
||||
|
||||
DEBUGP("nf_nat_resize_packet: Seq_offset after: ");
|
||||
pr_debug("nf_nat_resize_packet: Seq_offset after: ");
|
||||
DUMP_OFFSET(this_way);
|
||||
}
|
||||
|
||||
@@ -100,14 +96,12 @@ static void mangle_contents(struct sk_buff *skb,
|
||||
|
||||
/* update skb info */
|
||||
if (rep_len > match_len) {
|
||||
DEBUGP("nf_nat_mangle_packet: Extending packet by "
|
||||
"%u from %u bytes\n", rep_len - match_len,
|
||||
skb->len);
|
||||
pr_debug("nf_nat_mangle_packet: Extending packet by "
|
||||
"%u from %u bytes\n", rep_len - match_len, skb->len);
|
||||
skb_put(skb, rep_len - match_len);
|
||||
} else {
|
||||
DEBUGP("nf_nat_mangle_packet: Shrinking packet from "
|
||||
"%u from %u bytes\n", match_len - rep_len,
|
||||
skb->len);
|
||||
pr_debug("nf_nat_mangle_packet: Shrinking packet from "
|
||||
"%u from %u bytes\n", match_len - rep_len, skb->len);
|
||||
__skb_trim(skb, skb->len + rep_len - match_len);
|
||||
}
|
||||
|
||||
@@ -320,9 +314,9 @@ sack_adjust(struct sk_buff *skb,
|
||||
new_end_seq = htonl(ntohl(sack->end_seq)
|
||||
- natseq->offset_before);
|
||||
|
||||
DEBUGP("sack_adjust: start_seq: %d->%d, end_seq: %d->%d\n",
|
||||
ntohl(sack->start_seq), new_start_seq,
|
||||
ntohl(sack->end_seq), new_end_seq);
|
||||
pr_debug("sack_adjust: start_seq: %d->%d, end_seq: %d->%d\n",
|
||||
ntohl(sack->start_seq), new_start_seq,
|
||||
ntohl(sack->end_seq), new_end_seq);
|
||||
|
||||
nf_proto_csum_replace4(&tcph->check, skb,
|
||||
sack->start_seq, new_start_seq, 0);
|
||||
@@ -414,9 +408,9 @@ nf_nat_seq_adjust(struct sk_buff **pskb,
|
||||
nf_proto_csum_replace4(&tcph->check, *pskb, tcph->seq, newseq, 0);
|
||||
nf_proto_csum_replace4(&tcph->check, *pskb, tcph->ack_seq, newack, 0);
|
||||
|
||||
DEBUGP("Adjusting sequence number from %u->%u, ack from %u->%u\n",
|
||||
ntohl(tcph->seq), ntohl(newseq), ntohl(tcph->ack_seq),
|
||||
ntohl(newack));
|
||||
pr_debug("Adjusting sequence number from %u->%u, ack from %u->%u\n",
|
||||
ntohl(tcph->seq), ntohl(newseq), ntohl(tcph->ack_seq),
|
||||
ntohl(newack));
|
||||
|
||||
tcph->seq = newseq;
|
||||
tcph->ack_seq = newack;
|
||||
|
@@ -22,12 +22,6 @@
|
||||
#include <net/netfilter/nf_conntrack_expect.h>
|
||||
#include <linux/netfilter/nf_conntrack_irc.h>
|
||||
|
||||
#if 0
|
||||
#define DEBUGP printk
|
||||
#else
|
||||
#define DEBUGP(format, args...)
|
||||
#endif
|
||||
|
||||
MODULE_AUTHOR("Harald Welte <laforge@gnumonks.org>");
|
||||
MODULE_DESCRIPTION("IRC (DCC) NAT helper");
|
||||
MODULE_LICENSE("GPL");
|
||||
@@ -44,9 +38,6 @@ static unsigned int help(struct sk_buff **pskb,
|
||||
u_int16_t port;
|
||||
unsigned int ret;
|
||||
|
||||
DEBUGP("IRC_NAT: info (seq %u + %u) in %u\n",
|
||||
expect->seq, exp_irc_info->len, ntohl(tcph->seq));
|
||||
|
||||
/* Reply comes from server. */
|
||||
exp->saved_proto.tcp.port = exp->tuple.dst.u.tcp.port;
|
||||
exp->dir = IP_CT_DIR_REPLY;
|
||||
@@ -64,8 +55,8 @@ static unsigned int help(struct sk_buff **pskb,
|
||||
|
||||
ip = ntohl(exp->master->tuplehash[IP_CT_DIR_REPLY].tuple.dst.u3.ip);
|
||||
sprintf(buffer, "%u %u", ip, port);
|
||||
DEBUGP("nf_nat_irc: inserting '%s' == %u.%u.%u.%u, port %u\n",
|
||||
buffer, NIPQUAD(ip), port);
|
||||
pr_debug("nf_nat_irc: inserting '%s' == %u.%u.%u.%u, port %u\n",
|
||||
buffer, NIPQUAD(ip), port);
|
||||
|
||||
ret = nf_nat_mangle_tcp_packet(pskb, exp->master, ctinfo,
|
||||
matchoff, matchlen, buffer,
|
||||
|
@@ -37,14 +37,6 @@ MODULE_AUTHOR("Harald Welte <laforge@gnumonks.org>");
|
||||
MODULE_DESCRIPTION("Netfilter NAT helper module for PPTP");
|
||||
MODULE_ALIAS("ip_nat_pptp");
|
||||
|
||||
#if 0
|
||||
extern const char *pptp_msg_name[];
|
||||
#define DEBUGP(format, args...) printk(KERN_DEBUG "%s:%s: " format, __FILE__, \
|
||||
__FUNCTION__, ## args)
|
||||
#else
|
||||
#define DEBUGP(format, args...)
|
||||
#endif
|
||||
|
||||
static void pptp_nat_expected(struct nf_conn *ct,
|
||||
struct nf_conntrack_expect *exp)
|
||||
{
|
||||
@@ -60,7 +52,7 @@ static void pptp_nat_expected(struct nf_conn *ct,
|
||||
|
||||
/* And here goes the grand finale of corrosion... */
|
||||
if (exp->dir == IP_CT_DIR_ORIGINAL) {
|
||||
DEBUGP("we are PNS->PAC\n");
|
||||
pr_debug("we are PNS->PAC\n");
|
||||
/* therefore, build tuple for PAC->PNS */
|
||||
t.src.l3num = AF_INET;
|
||||
t.src.u3.ip = master->tuplehash[!exp->dir].tuple.src.u3.ip;
|
||||
@@ -69,7 +61,7 @@ static void pptp_nat_expected(struct nf_conn *ct,
|
||||
t.dst.u.gre.key = ct_pptp_info->pns_call_id;
|
||||
t.dst.protonum = IPPROTO_GRE;
|
||||
} else {
|
||||
DEBUGP("we are PAC->PNS\n");
|
||||
pr_debug("we are PAC->PNS\n");
|
||||
/* build tuple for PNS->PAC */
|
||||
t.src.l3num = AF_INET;
|
||||
t.src.u3.ip = master->tuplehash[!exp->dir].tuple.src.u3.ip;
|
||||
@@ -79,15 +71,15 @@ static void pptp_nat_expected(struct nf_conn *ct,
|
||||
t.dst.protonum = IPPROTO_GRE;
|
||||
}
|
||||
|
||||
DEBUGP("trying to unexpect other dir: ");
|
||||
pr_debug("trying to unexpect other dir: ");
|
||||
NF_CT_DUMP_TUPLE(&t);
|
||||
other_exp = nf_ct_expect_find_get(&t);
|
||||
if (other_exp) {
|
||||
nf_ct_unexpect_related(other_exp);
|
||||
nf_ct_expect_put(other_exp);
|
||||
DEBUGP("success\n");
|
||||
pr_debug("success\n");
|
||||
} else {
|
||||
DEBUGP("not found!\n");
|
||||
pr_debug("not found!\n");
|
||||
}
|
||||
|
||||
/* This must be a fresh one. */
|
||||
@@ -161,9 +153,9 @@ pptp_outbound_pkt(struct sk_buff **pskb,
|
||||
cid_off = offsetof(union pptp_ctrl_union, clrreq.callID);
|
||||
break;
|
||||
default:
|
||||
DEBUGP("unknown outbound packet 0x%04x:%s\n", msg,
|
||||
(msg <= PPTP_MSG_MAX)?
|
||||
pptp_msg_name[msg]:pptp_msg_name[0]);
|
||||
pr_debug("unknown outbound packet 0x%04x:%s\n", msg,
|
||||
msg <= PPTP_MSG_MAX ? pptp_msg_name[msg] :
|
||||
pptp_msg_name[0]);
|
||||
/* fall through */
|
||||
case PPTP_SET_LINK_INFO:
|
||||
/* only need to NAT in case PAC is behind NAT box */
|
||||
@@ -179,8 +171,8 @@ pptp_outbound_pkt(struct sk_buff **pskb,
|
||||
|
||||
/* only OUT_CALL_REQUEST, IN_CALL_REPLY, CALL_CLEAR_REQUEST pass
|
||||
* down to here */
|
||||
DEBUGP("altering call id from 0x%04x to 0x%04x\n",
|
||||
ntohs(REQ_CID(pptpReq, cid_off)), ntohs(new_callid));
|
||||
pr_debug("altering call id from 0x%04x to 0x%04x\n",
|
||||
ntohs(REQ_CID(pptpReq, cid_off)), ntohs(new_callid));
|
||||
|
||||
/* mangle packet */
|
||||
if (nf_nat_mangle_tcp_packet(pskb, ct, ctinfo,
|
||||
@@ -255,8 +247,9 @@ pptp_inbound_pkt(struct sk_buff **pskb,
|
||||
pcid_off = offsetof(union pptp_ctrl_union, setlink.peersCallID);
|
||||
break;
|
||||
default:
|
||||
DEBUGP("unknown inbound packet %s\n", (msg <= PPTP_MSG_MAX)?
|
||||
pptp_msg_name[msg]:pptp_msg_name[0]);
|
||||
pr_debug("unknown inbound packet %s\n",
|
||||
msg <= PPTP_MSG_MAX ? pptp_msg_name[msg] :
|
||||
pptp_msg_name[0]);
|
||||
/* fall through */
|
||||
case PPTP_START_SESSION_REQUEST:
|
||||
case PPTP_START_SESSION_REPLY:
|
||||
@@ -272,8 +265,8 @@ pptp_inbound_pkt(struct sk_buff **pskb,
|
||||
* WAN_ERROR_NOTIFY, CALL_DISCONNECT_NOTIFY pass down here */
|
||||
|
||||
/* mangle packet */
|
||||
DEBUGP("altering peer call id from 0x%04x to 0x%04x\n",
|
||||
ntohs(REQ_CID(pptpReq, pcid_off)), ntohs(new_pcid));
|
||||
pr_debug("altering peer call id from 0x%04x to 0x%04x\n",
|
||||
ntohs(REQ_CID(pptpReq, pcid_off)), ntohs(new_pcid));
|
||||
|
||||
if (nf_nat_mangle_tcp_packet(pskb, ct, ctinfo,
|
||||
pcid_off + sizeof(struct pptp_pkt_hdr) +
|
||||
|
@@ -36,13 +36,6 @@ MODULE_LICENSE("GPL");
|
||||
MODULE_AUTHOR("Harald Welte <laforge@gnumonks.org>");
|
||||
MODULE_DESCRIPTION("Netfilter NAT protocol helper module for GRE");
|
||||
|
||||
#if 0
|
||||
#define DEBUGP(format, args...) printk(KERN_DEBUG "%s:%s: " format, __FILE__, \
|
||||
__FUNCTION__, ## args)
|
||||
#else
|
||||
#define DEBUGP(x, args...)
|
||||
#endif
|
||||
|
||||
/* is key in given range between min and max */
|
||||
static int
|
||||
gre_in_range(const struct nf_conntrack_tuple *tuple,
|
||||
@@ -83,7 +76,7 @@ gre_unique_tuple(struct nf_conntrack_tuple *tuple,
|
||||
keyptr = &tuple->dst.u.gre.key;
|
||||
|
||||
if (!(range->flags & IP_NAT_RANGE_PROTO_SPECIFIED)) {
|
||||
DEBUGP("%p: NATing GRE PPTP\n", conntrack);
|
||||
pr_debug("%p: NATing GRE PPTP\n", conntrack);
|
||||
min = 1;
|
||||
range_size = 0xffff;
|
||||
} else {
|
||||
@@ -91,7 +84,7 @@ gre_unique_tuple(struct nf_conntrack_tuple *tuple,
|
||||
range_size = ntohs(range->max.gre.key) - min + 1;
|
||||
}
|
||||
|
||||
DEBUGP("min = %u, range_size = %u\n", min, range_size);
|
||||
pr_debug("min = %u, range_size = %u\n", min, range_size);
|
||||
|
||||
for (i = 0; i < range_size; i++, key++) {
|
||||
*keyptr = htons(min + key % range_size);
|
||||
@@ -99,7 +92,7 @@ gre_unique_tuple(struct nf_conntrack_tuple *tuple,
|
||||
return 1;
|
||||
}
|
||||
|
||||
DEBUGP("%p: no NAT mapping\n", conntrack);
|
||||
pr_debug("%p: no NAT mapping\n", conntrack);
|
||||
return 0;
|
||||
}
|
||||
|
||||
@@ -132,11 +125,11 @@ gre_manip_pkt(struct sk_buff **pskb, unsigned int iphdroff,
|
||||
* Try to behave like "nf_nat_proto_unknown" */
|
||||
break;
|
||||
case GRE_VERSION_PPTP:
|
||||
DEBUGP("call_id -> 0x%04x\n", ntohs(tuple->dst.u.gre.key));
|
||||
pr_debug("call_id -> 0x%04x\n", ntohs(tuple->dst.u.gre.key));
|
||||
pgreh->call_id = tuple->dst.u.gre.key;
|
||||
break;
|
||||
default:
|
||||
DEBUGP("can't nat unknown GRE version\n");
|
||||
pr_debug("can't nat unknown GRE version\n");
|
||||
return 0;
|
||||
}
|
||||
return 1;
|
||||
|
@@ -24,12 +24,6 @@
|
||||
#include <net/netfilter/nf_nat_core.h>
|
||||
#include <net/netfilter/nf_nat_rule.h>
|
||||
|
||||
#if 0
|
||||
#define DEBUGP printk
|
||||
#else
|
||||
#define DEBUGP(format, args...)
|
||||
#endif
|
||||
|
||||
#define NAT_VALID_HOOKS ((1<<NF_IP_PRE_ROUTING) | (1<<NF_IP_POST_ROUTING) | (1<<NF_IP_LOCAL_OUT))
|
||||
|
||||
static struct
|
||||
@@ -186,8 +180,8 @@ alloc_null_binding(struct nf_conn *ct, unsigned int hooknum)
|
||||
struct nf_nat_range range
|
||||
= { IP_NAT_RANGE_MAP_IPS, ip, ip, { 0 }, { 0 } };
|
||||
|
||||
DEBUGP("Allocating NULL binding for %p (%u.%u.%u.%u)\n",
|
||||
ct, NIPQUAD(ip));
|
||||
pr_debug("Allocating NULL binding for %p (%u.%u.%u.%u)\n",
|
||||
ct, NIPQUAD(ip));
|
||||
return nf_nat_setup_info(ct, &range, hooknum);
|
||||
}
|
||||
|
||||
@@ -205,8 +199,8 @@ alloc_null_binding_confirmed(struct nf_conn *ct, unsigned int hooknum)
|
||||
struct nf_nat_range range
|
||||
= { IP_NAT_RANGE_MAP_IPS, ip, ip, { all }, { all } };
|
||||
|
||||
DEBUGP("Allocating NULL binding for confirmed %p (%u.%u.%u.%u)\n",
|
||||
ct, NIPQUAD(ip));
|
||||
pr_debug("Allocating NULL binding for confirmed %p (%u.%u.%u.%u)\n",
|
||||
ct, NIPQUAD(ip));
|
||||
return nf_nat_setup_info(ct, &range, hooknum);
|
||||
}
|
||||
|
||||
|
@@ -26,12 +26,6 @@ MODULE_AUTHOR("Christian Hentschel <chentschel@arnet.com.ar>");
|
||||
MODULE_DESCRIPTION("SIP NAT helper");
|
||||
MODULE_ALIAS("ip_nat_sip");
|
||||
|
||||
#if 0
|
||||
#define DEBUGP printk
|
||||
#else
|
||||
#define DEBUGP(format, args...)
|
||||
#endif
|
||||
|
||||
struct addr_map {
|
||||
struct {
|
||||
char src[sizeof("nnn.nnn.nnn.nnn:nnnnn")];
|
||||
@@ -257,8 +251,6 @@ static unsigned int ip_nat_sdp(struct sk_buff **pskb,
|
||||
__be32 newip;
|
||||
u_int16_t port;
|
||||
|
||||
DEBUGP("ip_nat_sdp():\n");
|
||||
|
||||
/* Connection will come from reply */
|
||||
if (ct->tuplehash[dir].tuple.src.u3.ip ==
|
||||
ct->tuplehash[!dir].tuple.dst.u3.ip)
|
||||
|
@@ -27,12 +27,6 @@
|
||||
#include <net/netfilter/nf_nat_helper.h>
|
||||
#include <linux/netfilter_ipv4/ip_tables.h>
|
||||
|
||||
#if 0
|
||||
#define DEBUGP printk
|
||||
#else
|
||||
#define DEBUGP(format, args...)
|
||||
#endif
|
||||
|
||||
#ifdef CONFIG_XFRM
|
||||
static void nat_decode_session(struct sk_buff *skb, struct flowi *fl)
|
||||
{
|
||||
@@ -117,7 +111,7 @@ nf_nat_fn(unsigned int hooknum,
|
||||
if (!nat) {
|
||||
nat = nf_ct_ext_add(ct, NF_CT_EXT_NAT, GFP_ATOMIC);
|
||||
if (nat == NULL) {
|
||||
DEBUGP("failed to add NAT extension\n");
|
||||
pr_debug("failed to add NAT extension\n");
|
||||
return NF_ACCEPT;
|
||||
}
|
||||
}
|
||||
@@ -154,9 +148,9 @@ nf_nat_fn(unsigned int hooknum,
|
||||
return ret;
|
||||
}
|
||||
} else
|
||||
DEBUGP("Already setup manip %s for ct %p\n",
|
||||
maniptype == IP_NAT_MANIP_SRC ? "SRC" : "DST",
|
||||
ct);
|
||||
pr_debug("Already setup manip %s for ct %p\n",
|
||||
maniptype == IP_NAT_MANIP_SRC ? "SRC" : "DST",
|
||||
ct);
|
||||
break;
|
||||
|
||||
default:
|
||||
@@ -270,7 +264,7 @@ nf_nat_adjust(unsigned int hooknum,
|
||||
|
||||
ct = nf_ct_get(*pskb, &ctinfo);
|
||||
if (ct && test_bit(IPS_SEQ_ADJUST_BIT, &ct->status)) {
|
||||
DEBUGP("nf_nat_standalone: adjusting sequence number\n");
|
||||
pr_debug("nf_nat_standalone: adjusting sequence number\n");
|
||||
if (!nf_nat_seq_adjust(pskb, ct, ctinfo))
|
||||
return NF_DROP;
|
||||
}
|
||||
|
Reference in New Issue
Block a user