diff options
author | Jozsef Kadlecsik <kadlec@blackhole.kfki.hu> | 2010-12-21 20:47:08 +0100 |
---|---|---|
committer | Jozsef Kadlecsik <kadlec@blackhole.kfki.hu> | 2010-12-21 20:47:08 +0100 |
commit | cffe9a53f6bacb0c72d83efa19b1a9764d44dc72 (patch) | |
tree | 802a84802d43556554b826af9d1c13f77f0eb34d /kernel/xt_set.c | |
parent | 57d871ad46bfaed44e556cb872f4bfab1004d9e1 (diff) |
Kernel version compatibility: support from 2.6.34
The basic kernel compatibility issues are verified back to 2.6.24.
The minimal supported kernel version had to be bumped from 2.6.31 to 2.6.34.
Diffstat (limited to 'kernel/xt_set.c')
-rw-r--r-- | kernel/xt_set.c | 16 |
1 files changed, 11 insertions, 5 deletions
diff --git a/kernel/xt_set.c b/kernel/xt_set.c index 7484919..e95cae0 100644 --- a/kernel/xt_set.c +++ b/kernel/xt_set.c @@ -38,14 +38,20 @@ match_set(ip_set_id_t index, const struct sk_buff *skb, /* Revision 0 interface: backward compatible with netfilter/iptables */ -/* Backward compatibility constrains: +/* Backward compatibility constrains (incomplete): * 2.6.24: [NETLINK]: Introduce nested and byteorder flag to netlink attribute + * 2.6.25: is_vmalloc_addr(): Check if an address is within the vmalloc + * boundaries + * 2.6.27: rcu: split list.h and move rcu-protected lists into rculist.h + * 2.6.28: netfilter: ctnetlink: remove bogus module dependency between + * ctnetlink and nf_nat (nfnl_lock/nfnl_unlock) + * 2.6.29: generic swap(): introduce global macro swap(a, b) * 2.6.31: netfilter: passive OS fingerprint xtables match + * 2.6.34: rcu: Add lockdep-enabled variants of rcu_dereference() */ - -#if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 31) -#error "Linux kernel version too old: must be >= 2.6.31" +#if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 35) +#error "Linux kernel version too old: must be >= 2.6.35" #endif #if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 35) @@ -120,7 +126,7 @@ set_match_v0_checkentry(const struct xt_mtchk_param *par) static void set_match_v0_destroy(const struct xt_mtdtor_param *par) { - struct xt_set_info_match *info = par->matchinfo; + struct xt_set_info_match_v0 *info = par->matchinfo; ip_set_nfnl_put(info->match_set.index); } |