亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? ip_nat_standalone.c

?? 優龍2410linux2.6.8內核源代碼
?? C
字號:
/* This file contains all the functions required for the standalone   ip_nat module.   These are not required by the compatibility layer.*//* (C) 1999-2001 Paul `Rusty' Russell * (C) 2002-2004 Netfilter Core Team <coreteam@netfilter.org> * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License version 2 as * published by the Free Software Foundation. *//* * 23 Apr 2001: Harald Welte <laforge@gnumonks.org> * 	- new API and handling of conntrack/nat helpers * 	- now capable of multiple expectations for one master * */#include <linux/config.h>#include <linux/types.h>#include <linux/icmp.h>#include <linux/ip.h>#include <linux/netfilter.h>#include <linux/netfilter_ipv4.h>#include <linux/module.h>#include <linux/skbuff.h>#include <linux/proc_fs.h>#include <net/ip.h>#include <net/checksum.h>#include <linux/spinlock.h>#define ASSERT_READ_LOCK(x) MUST_BE_READ_LOCKED(&ip_nat_lock)#define ASSERT_WRITE_LOCK(x) MUST_BE_WRITE_LOCKED(&ip_nat_lock)#include <linux/netfilter_ipv4/ip_nat.h>#include <linux/netfilter_ipv4/ip_nat_rule.h>#include <linux/netfilter_ipv4/ip_nat_protocol.h>#include <linux/netfilter_ipv4/ip_nat_core.h>#include <linux/netfilter_ipv4/ip_nat_helper.h>#include <linux/netfilter_ipv4/ip_tables.h>#include <linux/netfilter_ipv4/ip_conntrack_core.h>#include <linux/netfilter_ipv4/listhelp.h>#if 0#define DEBUGP printk#else#define DEBUGP(format, args...)#endif#define HOOKNAME(hooknum) ((hooknum) == NF_IP_POST_ROUTING ? "POST_ROUTING"  \			   : ((hooknum) == NF_IP_PRE_ROUTING ? "PRE_ROUTING" \			      : ((hooknum) == NF_IP_LOCAL_OUT ? "LOCAL_OUT"  \			         : ((hooknum) == NF_IP_LOCAL_IN ? "LOCAL_IN"  \				    : "*ERROR*")))static inline int call_expect(struct ip_conntrack *master,			      struct sk_buff **pskb,			      unsigned int hooknum,			      struct ip_conntrack *ct,			      struct ip_nat_info *info){	return master->nat.info.helper->expect(pskb, hooknum, ct, info);}static unsigned intip_nat_fn(unsigned int hooknum,	  struct sk_buff **pskb,	  const struct net_device *in,	  const struct net_device *out,	  int (*okfn)(struct sk_buff *)){	struct ip_conntrack *ct;	enum ip_conntrack_info ctinfo;	struct ip_nat_info *info;	/* maniptype == SRC for postrouting. */	enum ip_nat_manip_type maniptype = HOOK2MANIP(hooknum);	/* We never see fragments: conntrack defrags on pre-routing	   and local-out, and ip_nat_out protects post-routing. */	IP_NF_ASSERT(!((*pskb)->nh.iph->frag_off		       & htons(IP_MF|IP_OFFSET)));	(*pskb)->nfcache |= NFC_UNKNOWN;	/* If we had a hardware checksum before, it's now invalid */	if ((*pskb)->ip_summed == CHECKSUM_HW)		if (skb_checksum_help(pskb, (out == NULL)))			return NF_DROP;	ct = ip_conntrack_get(*pskb, &ctinfo);	/* Can't track?  It's not due to stress, or conntrack would	   have dropped it.  Hence it's the user's responsibilty to	   packet filter it out, or implement conntrack/NAT for that	   protocol. 8) --RR */	if (!ct) {		/* Exception: ICMP redirect to new connection (not in                   hash table yet).  We must not let this through, in                   case we're doing NAT to the same network. */		if ((*pskb)->nh.iph->protocol == IPPROTO_ICMP) {			struct icmphdr hdr;			if (skb_copy_bits(*pskb, (*pskb)->nh.iph->ihl*4,					  &hdr, sizeof(hdr)) == 0			    && hdr.type == ICMP_REDIRECT)				return NF_DROP;		}		return NF_ACCEPT;	}	switch (ctinfo) {	case IP_CT_RELATED:	case IP_CT_RELATED+IP_CT_IS_REPLY:		if ((*pskb)->nh.iph->protocol == IPPROTO_ICMP) {			if (!icmp_reply_translation(pskb, ct, hooknum,						    CTINFO2DIR(ctinfo)))				return NF_DROP;			else				return NF_ACCEPT;		}		/* Fall thru... (Only ICMPs can be IP_CT_IS_REPLY) */	case IP_CT_NEW:		info = &ct->nat.info;		WRITE_LOCK(&ip_nat_lock);		/* Seen it before?  This can happen for loopback, retrans,		   or local packets.. */		if (!(info->initialized & (1 << maniptype))#ifndef CONFIG_IP_NF_NAT_LOCAL		    /* If this session has already been confirmed we must not		     * touch it again even if there is no mapping set up.		     * Can only happen on local->local traffic with		     * CONFIG_IP_NF_NAT_LOCAL disabled.		     */		    && !(ct->status & IPS_CONFIRMED)#endif		    ) {			unsigned int ret;			if (ct->master			    && master_ct(ct)->nat.info.helper			    && master_ct(ct)->nat.info.helper->expect) {				ret = call_expect(master_ct(ct), pskb, 						  hooknum, ct, info);			} else {#ifdef CONFIG_IP_NF_NAT_LOCAL				/* LOCAL_IN hook doesn't have a chain!  */				if (hooknum == NF_IP_LOCAL_IN)					ret = alloc_null_binding(ct, info,								 hooknum);				else#endif				ret = ip_nat_rule_find(pskb, hooknum, in, out,						       ct, info);			}			if (ret != NF_ACCEPT) {				WRITE_UNLOCK(&ip_nat_lock);				return ret;			}		} else			DEBUGP("Already setup manip %s for ct %p\n",			       maniptype == IP_NAT_MANIP_SRC ? "SRC" : "DST",			       ct);		WRITE_UNLOCK(&ip_nat_lock);		break;	default:		/* ESTABLISHED */		IP_NF_ASSERT(ctinfo == IP_CT_ESTABLISHED			     || ctinfo == (IP_CT_ESTABLISHED+IP_CT_IS_REPLY));		info = &ct->nat.info;	}	IP_NF_ASSERT(info);	return do_bindings(ct, ctinfo, info, hooknum, pskb);}static unsigned intip_nat_out(unsigned int hooknum,	   struct sk_buff **pskb,	   const struct net_device *in,	   const struct net_device *out,	   int (*okfn)(struct sk_buff *)){	/* root is playing with raw sockets. */	if ((*pskb)->len < sizeof(struct iphdr)	    || (*pskb)->nh.iph->ihl * 4 < sizeof(struct iphdr))		return NF_ACCEPT;	/* We can hit fragment here; forwarded packets get	   defragmented by connection tracking coming in, then	   fragmented (grr) by the forward code.	   In future: If we have nfct != NULL, AND we have NAT	   initialized, AND there is no helper, then we can do full	   NAPT on the head, and IP-address-only NAT on the rest.	   I'm starting to have nightmares about fragments.  */	if ((*pskb)->nh.iph->frag_off & htons(IP_MF|IP_OFFSET)) {		*pskb = ip_ct_gather_frags(*pskb);		if (!*pskb)			return NF_STOLEN;	}	return ip_nat_fn(hooknum, pskb, in, out, okfn);}#ifdef CONFIG_IP_NF_NAT_LOCALstatic unsigned intip_nat_local_fn(unsigned int hooknum,		struct sk_buff **pskb,		const struct net_device *in,		const struct net_device *out,		int (*okfn)(struct sk_buff *)){	u_int32_t saddr, daddr;	unsigned int ret;	/* root is playing with raw sockets. */	if ((*pskb)->len < sizeof(struct iphdr)	    || (*pskb)->nh.iph->ihl * 4 < sizeof(struct iphdr))		return NF_ACCEPT;	saddr = (*pskb)->nh.iph->saddr;	daddr = (*pskb)->nh.iph->daddr;	ret = ip_nat_fn(hooknum, pskb, in, out, okfn);	if (ret != NF_DROP && ret != NF_STOLEN	    && ((*pskb)->nh.iph->saddr != saddr		|| (*pskb)->nh.iph->daddr != daddr))		return ip_route_me_harder(pskb) == 0 ? ret : NF_DROP;	return ret;}#endif/* We must be after connection tracking and before packet filtering. *//* Before packet filtering, change destination */static struct nf_hook_ops ip_nat_in_ops = {	.hook		= ip_nat_fn,	.owner		= THIS_MODULE,	.pf		= PF_INET,	.hooknum	= NF_IP_PRE_ROUTING,	.priority	= NF_IP_PRI_NAT_DST,};/* After packet filtering, change source */static struct nf_hook_ops ip_nat_out_ops = {	.hook		= ip_nat_out,	.owner		= THIS_MODULE,	.pf		= PF_INET,	.hooknum	= NF_IP_POST_ROUTING,	.priority	= NF_IP_PRI_NAT_SRC,};#ifdef CONFIG_IP_NF_NAT_LOCAL/* Before packet filtering, change destination */static struct nf_hook_ops ip_nat_local_out_ops = {	.hook		= ip_nat_local_fn,	.owner		= THIS_MODULE,	.pf		= PF_INET,	.hooknum	= NF_IP_LOCAL_OUT,	.priority	= NF_IP_PRI_NAT_DST,};/* After packet filtering, change source for reply packets of LOCAL_OUT DNAT */static struct nf_hook_ops ip_nat_local_in_ops = {	.hook		= ip_nat_fn,	.owner		= THIS_MODULE,	.pf		= PF_INET,	.hooknum	= NF_IP_LOCAL_IN,	.priority	= NF_IP_PRI_NAT_SRC,};#endif/* Protocol registration. */int ip_nat_protocol_register(struct ip_nat_protocol *proto){	int ret = 0;	struct list_head *i;	WRITE_LOCK(&ip_nat_lock);	list_for_each(i, &protos) {		if (((struct ip_nat_protocol *)i)->protonum		    == proto->protonum) {			ret = -EBUSY;			goto out;		}	}	list_prepend(&protos, proto); out:	WRITE_UNLOCK(&ip_nat_lock);	return ret;}/* Noone stores the protocol anywhere; simply delete it. */void ip_nat_protocol_unregister(struct ip_nat_protocol *proto){	WRITE_LOCK(&ip_nat_lock);	LIST_DELETE(&protos, proto);	WRITE_UNLOCK(&ip_nat_lock);	/* Someone could be still looking at the proto in a bh. */	synchronize_net();}static int init_or_cleanup(int init){	int ret = 0;	need_ip_conntrack();	if (!init) goto cleanup;	ret = ip_nat_rule_init();	if (ret < 0) {		printk("ip_nat_init: can't setup rules.\n");		goto cleanup_nothing;	}	ret = ip_nat_init();	if (ret < 0) {		printk("ip_nat_init: can't setup rules.\n");		goto cleanup_rule_init;	}	ret = nf_register_hook(&ip_nat_in_ops);	if (ret < 0) {		printk("ip_nat_init: can't register in hook.\n");		goto cleanup_nat;	}	ret = nf_register_hook(&ip_nat_out_ops);	if (ret < 0) {		printk("ip_nat_init: can't register out hook.\n");		goto cleanup_inops;	}#ifdef CONFIG_IP_NF_NAT_LOCAL	ret = nf_register_hook(&ip_nat_local_out_ops);	if (ret < 0) {		printk("ip_nat_init: can't register local out hook.\n");		goto cleanup_outops;	}	ret = nf_register_hook(&ip_nat_local_in_ops);	if (ret < 0) {		printk("ip_nat_init: can't register local in hook.\n");		goto cleanup_localoutops;	}#endif	return ret; cleanup:#ifdef CONFIG_IP_NF_NAT_LOCAL	nf_unregister_hook(&ip_nat_local_in_ops); cleanup_localoutops:	nf_unregister_hook(&ip_nat_local_out_ops); cleanup_outops:#endif	nf_unregister_hook(&ip_nat_out_ops); cleanup_inops:	nf_unregister_hook(&ip_nat_in_ops); cleanup_nat:	ip_nat_cleanup(); cleanup_rule_init:	ip_nat_rule_cleanup(); cleanup_nothing:	MUST_BE_READ_WRITE_UNLOCKED(&ip_nat_lock);	return ret;}static int __init init(void){	return init_or_cleanup(1);}static void __exit fini(void){	init_or_cleanup(0);}module_init(init);module_exit(fini);EXPORT_SYMBOL(ip_nat_setup_info);EXPORT_SYMBOL(ip_nat_protocol_register);EXPORT_SYMBOL(ip_nat_protocol_unregister);EXPORT_SYMBOL(ip_nat_helper_register);EXPORT_SYMBOL(ip_nat_helper_unregister);EXPORT_SYMBOL(ip_nat_cheat_check);EXPORT_SYMBOL(ip_nat_mangle_tcp_packet);EXPORT_SYMBOL(ip_nat_mangle_udp_packet);EXPORT_SYMBOL(ip_nat_used_tuple);MODULE_LICENSE("GPL");

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
91精品国产综合久久婷婷香蕉| 蜜臀av一区二区在线观看| 国产乱子伦视频一区二区三区| 欧美久久婷婷综合色| 亚洲成人动漫精品| 日韩欧美在线影院| 国产中文字幕一区| 国产精品无人区| 91丨九色丨蝌蚪富婆spa| 一卡二卡三卡日韩欧美| 欧美精品久久久久久久多人混战 | 久久综合精品国产一区二区三区| 老司机午夜精品99久久| 久久久久国产精品厨房| 色综合天天狠狠| 天天操天天干天天综合网| 日韩一区二区不卡| 成人av网址在线| 亚瑟在线精品视频| 国产日韩一级二级三级| 色综合久久中文字幕综合网| 午夜精品福利在线| 日本一区二区成人| 欧美日韩成人在线一区| 国产麻豆91精品| 亚洲自拍偷拍图区| 久久女同性恋中文字幕| 色综合久久综合| 久久99精品视频| 亚洲乱码国产乱码精品精可以看| 欧美一级免费观看| 99久久精品99国产精品| 精品一区二区三区免费| 亚洲黄色小视频| 久久精品一区八戒影视| 欧美丝袜丝交足nylons| 国产成人亚洲综合a∨婷婷| 亚洲一区二区三区四区在线观看| 2023国产精华国产精品| 欧美亚洲精品一区| 粉嫩av一区二区三区| 蜜臀精品一区二区三区在线观看| 国产精品区一区二区三| 日韩一区和二区| 色综合av在线| 成人黄色软件下载| 韩日欧美一区二区三区| 亚洲一区欧美一区| 18欧美亚洲精品| 国产视频一区在线观看| 欧美刺激午夜性久久久久久久| 色综合天天综合在线视频| 成人综合在线观看| 麻豆成人av在线| 午夜av电影一区| 亚洲欧美日韩人成在线播放| 久久久91精品国产一区二区精品| 日韩西西人体444www| 91久久精品一区二区二区| 粉嫩av一区二区三区粉嫩| 国产麻豆精品久久一二三| 免费高清在线一区| 日韩成人av影视| 亚洲r级在线视频| 免费观看在线综合| 一级日本不卡的影视| **网站欧美大片在线观看| 中文字幕精品一区二区精品绿巨人| 26uuu色噜噜精品一区| 欧美大度的电影原声| 91超碰这里只有精品国产| 欧美精品乱人伦久久久久久| 欧美体内she精高潮| 91九色最新地址| 色爱区综合激月婷婷| 色成人在线视频| 欧美人体做爰大胆视频| 欧洲精品视频在线观看| 欧美日韩视频在线第一区| 欧美日韩三级一区二区| 欧美群妇大交群中文字幕| 91.成人天堂一区| 制服视频三区第一页精品| 欧美精品久久一区二区三区| 日韩一级片在线观看| 欧美成人精品高清在线播放| 欧美精品一区二区三区在线播放 | av午夜一区麻豆| 91日韩在线专区| 在线观看www91| 91精品麻豆日日躁夜夜躁| 精品蜜桃在线看| 久久久久国产精品麻豆ai换脸| 国产视频视频一区| 亚洲视频一二三| 亚洲一区中文在线| 麻豆91精品视频| 成人免费视频国产在线观看| 91在线国产福利| 欧美日韩一区二区三区四区 | 国内精品在线播放| 成人激情图片网| 色婷婷av一区二区三区大白胸| 欧美色精品天天在线观看视频| 亚洲欧美一区二区不卡| 亚洲国产欧美在线| 久久精品国产精品亚洲综合| 国产xxx精品视频大全| 在线观看日韩高清av| 日韩一级成人av| 国产精品乱码久久久久久| 亚洲一区二区欧美| 国产麻豆9l精品三级站| 色视频一区二区| 久久这里只有精品视频网| 亚洲三级在线免费| 裸体歌舞表演一区二区| 不卡一区在线观看| 91精品国产日韩91久久久久久| 国产人成亚洲第一网站在线播放| 亚洲综合激情另类小说区| 国内成人自拍视频| 欧美日韩在线不卡| 国产欧美一区二区三区网站| 亚洲在线免费播放| 成人性生交大片免费| 91麻豆精品91久久久久久清纯| 国产精品视频第一区| 男男视频亚洲欧美| 色婷婷国产精品| 中文字幕免费在线观看视频一区| 午夜视频在线观看一区二区| 国产.欧美.日韩| 日韩欧美综合一区| 亚洲国产一区二区a毛片| 成人午夜精品一区二区三区| 欧美一区二区国产| 亚洲一级片在线观看| 国产白丝精品91爽爽久久| 日韩免费成人网| 日韩**一区毛片| 欧美在线三级电影| 自拍av一区二区三区| 国产精品18久久久久久久网站| 777a∨成人精品桃花网| 一区二区三区四区av| 成人毛片视频在线观看| 久久看人人爽人人| 精品一区二区三区视频| 欧美一区二区免费| 日本麻豆一区二区三区视频| 欧美性videosxxxxx| 艳妇臀荡乳欲伦亚洲一区| 成人动漫在线一区| 久久九九久精品国产免费直播| 精品一区二区日韩| 精品国产一区二区三区av性色 | 精品精品国产高清a毛片牛牛| 亚洲国产精品久久久久婷婷884 | 国产伦精品一区二区三区视频青涩| 欧美日韩不卡视频| 午夜久久久久久久久久一区二区| 色综合中文字幕国产 | 欧美v国产在线一区二区三区| 午夜视频在线观看一区二区| 欧美日韩一级大片网址| 亚洲一区国产视频| 欧美欧美午夜aⅴ在线观看| 午夜精品影院在线观看| 欧美色偷偷大香| 丝瓜av网站精品一区二区| 91精品国产入口| 久久99久久99| 久久精品日产第一区二区三区高清版| 精品制服美女丁香| 精品国产乱子伦一区| 国产一区二区三区在线观看精品 | 国产黑丝在线一区二区三区| 国产日韩欧美不卡在线| 国产成+人+日韩+欧美+亚洲| 国产亚洲制服色| 99久久免费视频.com| 亚洲午夜久久久久中文字幕久| 欧美色精品在线视频| 免费视频最近日韩| 欧美韩国一区二区| 91免费版在线看| 日韩电影免费在线观看网站| 欧美一级xxx| 国产成人免费在线| 亚洲乱码一区二区三区在线观看| 欧美色图免费看| 韩国午夜理伦三级不卡影院| 中文一区在线播放| 欧美亚洲一区二区在线| 久久福利资源站| 综合网在线视频| 91精品国产入口在线| 成人免费看片app下载| 亚洲va天堂va国产va久|