mirror of
https://github.com/team-infusion-developers/android_kernel_samsung_msm8976.git
synced 2024-10-19 09:59:04 +00:00
601e68e100
Signed-off-by: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org> Signed-off-by: Patrick McHardy <kaber@trash.net> Signed-off-by: David S. Miller <davem@davemloft.net>
65 lines
1.5 KiB
C
65 lines
1.5 KiB
C
/* This is a module which is used for setting up fake conntracks
|
|
* on packets so that they are not seen by the conntrack/NAT code.
|
|
*/
|
|
#include <linux/module.h>
|
|
#include <linux/skbuff.h>
|
|
|
|
#include <linux/netfilter/x_tables.h>
|
|
#include <net/netfilter/nf_conntrack_compat.h>
|
|
|
|
MODULE_LICENSE("GPL");
|
|
MODULE_ALIAS("ipt_NOTRACK");
|
|
|
|
static unsigned int
|
|
target(struct sk_buff **pskb,
|
|
const struct net_device *in,
|
|
const struct net_device *out,
|
|
unsigned int hooknum,
|
|
const struct xt_target *target,
|
|
const void *targinfo)
|
|
{
|
|
/* Previously seen (loopback)? Ignore. */
|
|
if ((*pskb)->nfct != NULL)
|
|
return XT_CONTINUE;
|
|
|
|
/* Attach fake conntrack entry.
|
|
If there is a real ct entry correspondig to this packet,
|
|
it'll hang aroun till timing out. We don't deal with it
|
|
for performance reasons. JK */
|
|
nf_ct_untrack(*pskb);
|
|
(*pskb)->nfctinfo = IP_CT_NEW;
|
|
nf_conntrack_get((*pskb)->nfct);
|
|
|
|
return XT_CONTINUE;
|
|
}
|
|
|
|
static struct xt_target xt_notrack_target[] = {
|
|
{
|
|
.name = "NOTRACK",
|
|
.family = AF_INET,
|
|
.target = target,
|
|
.table = "raw",
|
|
.me = THIS_MODULE,
|
|
},
|
|
{
|
|
.name = "NOTRACK",
|
|
.family = AF_INET6,
|
|
.target = target,
|
|
.table = "raw",
|
|
.me = THIS_MODULE,
|
|
},
|
|
};
|
|
|
|
static int __init xt_notrack_init(void)
|
|
{
|
|
return xt_register_targets(xt_notrack_target,
|
|
ARRAY_SIZE(xt_notrack_target));
|
|
}
|
|
|
|
static void __exit xt_notrack_fini(void)
|
|
{
|
|
xt_unregister_targets(xt_notrack_target, ARRAY_SIZE(xt_notrack_target));
|
|
}
|
|
|
|
module_init(xt_notrack_init);
|
|
module_exit(xt_notrack_fini);
|