亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? ipchains_core.c

?? 優龍2410linux2.6.8內核源代碼
?? C
?? 第 1 頁 / 共 4 頁
字號:
		if (rule->branch) rule->branch->refcount++;		goto append_successful;	}	/* Find the rule before the end of the chain */	for (i = chainptr->chain; i->next; i = i->next);	i->next = rule;	if (rule->branch) rule->branch->refcount++;append_successful:	return 0;}/* This function inserts a rule at the position of position in the * chain refenced by chainptr.  If position is 1 then this rule will * become the new rule one. */static int insert_in_chain(struct ip_chain *chainptr,			   struct ip_fwkernel *frwl,			   __u32 position){	struct ip_fwkernel *f = chainptr->chain;	FWC_HAVE_LOCK(fwc_wlocks);	/* Are we unloading now?  We will block on nf_unregister_sockopt */	if (!try_module_get(THIS_MODULE))		return ENOPROTOOPT;	/* special case if the position is number 1 */	if (position == 1) {		frwl->next = chainptr->chain;		if (frwl->branch) frwl->branch->refcount++;		chainptr->chain = frwl;		goto insert_successful;	}	position--;	while (--position && f != NULL) f = f->next;	if (f == NULL)		return EINVAL;	if (frwl->branch) frwl->branch->refcount++;	frwl->next = f->next;	f->next = frwl;insert_successful:	return 0;}/* This function deletes the a rule from a given rulenum and chain. * With rulenum = 1 is the first rule is deleted. */static int del_num_from_chain(struct ip_chain *chainptr, __u32 rulenum){	struct ip_fwkernel *i=chainptr->chain,*tmp;	FWC_HAVE_LOCK(fwc_wlocks);	if (!chainptr->chain)		return ENOENT;	/* Need a special case for the first rule */	if (rulenum == 1) {		/* store temp to allow for freeing up of memory */		tmp = chainptr->chain;	        if (chainptr->chain->branch) chainptr->chain->branch->refcount--;		chainptr->chain = chainptr->chain->next;		kfree(tmp); /* free memory that is now unused */	} else {		rulenum--;		while (--rulenum && i->next ) i = i->next;		if (!i->next)			return ENOENT;		tmp = i->next;		if (i->next->branch)			i->next->branch->refcount--;		i->next = i->next->next;		kfree(tmp);	}	/* We will block in cleanup's unregister sockopt if unloaded,	   so this is safe. */	module_put(THIS_MODULE);	return 0;}/* This function deletes the a rule from a given rule and chain. * The rule that is deleted is the first occursance of that rule. */static int del_rule_from_chain(struct ip_chain *chainptr,			       struct ip_fwkernel *frwl){	struct ip_fwkernel *ltmp,*ftmp = chainptr->chain ;	int was_found;	FWC_HAVE_LOCK(fwc_wlocks);	/* Sure, we should compare marks, but since the `ipfwadm'	 * script uses it for an unholy hack... well, life is easier	 * this way.  We also mask it out of the flags word. --PR */	for (ltmp=NULL, was_found=0;	     !was_found && ftmp != NULL;	     ltmp = ftmp,ftmp = ftmp->next) {		if (ftmp->ipfw.fw_src.s_addr!=frwl->ipfw.fw_src.s_addr		    || ftmp->ipfw.fw_dst.s_addr!=frwl->ipfw.fw_dst.s_addr		    || ftmp->ipfw.fw_smsk.s_addr!=frwl->ipfw.fw_smsk.s_addr		    || ftmp->ipfw.fw_dmsk.s_addr!=frwl->ipfw.fw_dmsk.s_addr#if 0		    || ftmp->ipfw.fw_flg!=frwl->ipfw.fw_flg#else		    || ((ftmp->ipfw.fw_flg & ~IP_FW_F_MARKABS)			!= (frwl->ipfw.fw_flg & ~IP_FW_F_MARKABS))#endif		    || ftmp->ipfw.fw_invflg!=frwl->ipfw.fw_invflg		    || ftmp->ipfw.fw_proto!=frwl->ipfw.fw_proto#if 0		    || ftmp->ipfw.fw_mark!=frwl->ipfw.fw_mark#endif		    || ftmp->ipfw.fw_redirpt!=frwl->ipfw.fw_redirpt		    || ftmp->ipfw.fw_spts[0]!=frwl->ipfw.fw_spts[0]		    || ftmp->ipfw.fw_spts[1]!=frwl->ipfw.fw_spts[1]		    || ftmp->ipfw.fw_dpts[0]!=frwl->ipfw.fw_dpts[0]		    || ftmp->ipfw.fw_dpts[1]!=frwl->ipfw.fw_dpts[1]		    || ftmp->ipfw.fw_outputsize!=frwl->ipfw.fw_outputsize) {			duprintf("del_rule_from_chain: mismatch:"				 "src:%u/%u dst:%u/%u smsk:%u/%u dmsk:%u/%u "				 "flg:%hX/%hX invflg:%hX/%hX proto:%u/%u "				 "mark:%u/%u "				 "ports:%hu-%hu/%hu-%hu %hu-%hu/%hu-%hu "				 "outputsize:%hu-%hu\n",				 ftmp->ipfw.fw_src.s_addr,				 frwl->ipfw.fw_src.s_addr,				 ftmp->ipfw.fw_dst.s_addr,				 frwl->ipfw.fw_dst.s_addr,				 ftmp->ipfw.fw_smsk.s_addr,				 frwl->ipfw.fw_smsk.s_addr,				 ftmp->ipfw.fw_dmsk.s_addr,				 frwl->ipfw.fw_dmsk.s_addr,				 ftmp->ipfw.fw_flg,				 frwl->ipfw.fw_flg,				 ftmp->ipfw.fw_invflg,				 frwl->ipfw.fw_invflg,				 ftmp->ipfw.fw_proto,				 frwl->ipfw.fw_proto,				 ftmp->ipfw.fw_mark,				 frwl->ipfw.fw_mark,				 ftmp->ipfw.fw_spts[0],				 frwl->ipfw.fw_spts[0],				 ftmp->ipfw.fw_spts[1],				 frwl->ipfw.fw_spts[1],				 ftmp->ipfw.fw_dpts[0],				 frwl->ipfw.fw_dpts[0],				 ftmp->ipfw.fw_dpts[1],				 frwl->ipfw.fw_dpts[1],				 ftmp->ipfw.fw_outputsize,				 frwl->ipfw.fw_outputsize);			continue;		}		if (strncmp(ftmp->ipfw.fw_vianame,			    frwl->ipfw.fw_vianame,			    IFNAMSIZ)) {			duprintf("del_rule_from_chain: if mismatch: %s/%s\n",				 ftmp->ipfw.fw_vianame,				 frwl->ipfw.fw_vianame);		        continue;		}		if (ftmp->branch != frwl->branch) {			duprintf("del_rule_from_chain: branch mismatch: "				 "%s/%s\n",				 ftmp->branch?ftmp->branch->label:"(null)",				 frwl->branch?frwl->branch->label:"(null)");			continue;		}		if (ftmp->branch == NULL		    && ftmp->simplebranch != frwl->simplebranch) {			duprintf("del_rule_from_chain: simplebranch mismatch: "				 "%i/%i\n",				 ftmp->simplebranch, frwl->simplebranch);			continue;		}		was_found = 1;		if (ftmp->branch)			ftmp->branch->refcount--;		if (ltmp)			ltmp->next = ftmp->next;		else			chainptr->chain = ftmp->next;		kfree(ftmp);		/* We will block in cleanup's unregister sockopt if unloaded,		   so this is safe. */		module_put(THIS_MODULE);		break;	}	if (was_found)		return 0;	else {		duprintf("del_rule_from_chain: no matching rule found\n");		return EINVAL;	}}/* This function takes the label of a chain and deletes the first * chain with that name.  No special cases required for the built in * chains as they have their refcount initilised to 1 so that they are * never deleted.  */static int del_chain(ip_chainlabel label){	struct ip_chain *tmp,*tmp2;	FWC_HAVE_LOCK(fwc_wlocks);	/* Corner case: return EBUSY not ENOENT for first elem ("input") */	if (strcmp(label, ip_fw_chains->label) == 0)		return EBUSY;	for (tmp = ip_fw_chains; tmp->next; tmp = tmp->next)		if(strcmp(tmp->next->label,label) == 0)			break;	tmp2 = tmp->next;	if (!tmp2)		return ENOENT;	if (tmp2->refcount)		return EBUSY;	if (tmp2->chain)		return ENOTEMPTY;	tmp->next = tmp2->next;	kfree(tmp2);	/* We will block in cleanup's unregister sockopt if unloaded,	   so this is safe. */	module_put(THIS_MODULE);	return 0;}/* This is a function to initilise a chain.  Built in rules start with * refcount = 1 so that they cannot be deleted.  User defined rules * start with refcount = 0 so they can be deleted. */static struct ip_chain *ip_init_chain(ip_chainlabel name,				      __u32 ref,				      int policy){	unsigned int i;	struct ip_chain *label		= kmalloc(SIZEOF_STRUCT_IP_CHAIN, GFP_KERNEL);	if (label == NULL)		panic("Can't kmalloc for firewall chains.\n");	strcpy(label->label,name);	label->next = NULL;	label->chain = NULL;	label->refcount = ref;	label->policy = policy;	for (i = 0; i < NUM_SLOTS; i++) {		label->reent[i].counters.pcnt = label->reent[i].counters.bcnt			= 0;		label->reent[i].prevchain = NULL;		label->reent[i].prevrule = NULL;	}	return label;}/* This is a function for reating a new chain.  The chains is not * created if a chain of the same name already exists */static int create_chain(ip_chainlabel label){	struct ip_chain *tmp;	if (!check_label(label))		return EINVAL;	FWC_HAVE_LOCK(fwc_wlocks);	for (tmp = ip_fw_chains; tmp->next; tmp = tmp->next)		if (strcmp(tmp->label,label) == 0)			return EEXIST;	if (strcmp(tmp->label,label) == 0)		return EEXIST;	/* Are we unloading now?  We will block on nf_unregister_sockopt */	if (!try_module_get(THIS_MODULE))		return ENOPROTOOPT;	tmp->next = ip_init_chain(label, 0, FW_SKIP); /* refcount is					      * zero since this is a					      * user defined chain *					      * and therefore can be					      * deleted */	return 0;}/* This function simply changes the policy on one of the built in * chains.  checking must be done before this is call to ensure that * chainptr is pointing to one of the three possible chains */static int change_policy(struct ip_chain *chainptr, int policy){	FWC_HAVE_LOCK(fwc_wlocks);	chainptr->policy = policy;	return 0;}/* This function takes an ip_fwuser and converts it to a ip_fwkernel.  It also * performs some checks in the structure. */static struct ip_fwkernel *convert_ipfw(struct ip_fwuser *fwuser, int *errno){	struct ip_fwkernel *fwkern;	if ( (fwuser->ipfw.fw_flg & ~IP_FW_F_MASK) != 0 ) {		duprintf("convert_ipfw: undefined flag bits set (flags=%x)\n",			 fwuser->ipfw.fw_flg);		*errno = EINVAL;		return NULL;	}#ifdef DEBUG_IP_FIREWALL_USER	/* These are sanity checks that don't really matter.	 * We can get rid of these once testing is complete.	 */	if ((fwuser->ipfw.fw_flg & IP_FW_F_TCPSYN)	    && ((fwuser->ipfw.fw_invflg & IP_FW_INV_PROTO)		|| fwuser->ipfw.fw_proto != IPPROTO_TCP)) {		duprintf("convert_ipfw: TCP SYN flag set but proto != TCP!\n");		*errno = EINVAL;		return NULL;	}	if (strcmp(fwuser->label, IP_FW_LABEL_REDIRECT) != 0	    && fwuser->ipfw.fw_redirpt != 0) {		duprintf("convert_ipfw: Target not REDIR but redirpt != 0!\n");		*errno = EINVAL;		return NULL;	}	if ((!(fwuser->ipfw.fw_flg & IP_FW_F_FRAG)	     && (fwuser->ipfw.fw_invflg & IP_FW_INV_FRAG))	    || (!(fwuser->ipfw.fw_flg & IP_FW_F_TCPSYN)		&& (fwuser->ipfw.fw_invflg & IP_FW_INV_SYN))) {		duprintf("convert_ipfw: Can't have INV flag if flag unset!\n");		*errno = EINVAL;		return NULL;	}	if (((fwuser->ipfw.fw_invflg & IP_FW_INV_SRCPT)	     && fwuser->ipfw.fw_spts[0] == 0	     && fwuser->ipfw.fw_spts[1] == 0xFFFF)	    || ((fwuser->ipfw.fw_invflg & IP_FW_INV_DSTPT)		&& fwuser->ipfw.fw_dpts[0] == 0		&& fwuser->ipfw.fw_dpts[1] == 0xFFFF)	    || ((fwuser->ipfw.fw_invflg & IP_FW_INV_VIA)		&& (fwuser->ipfw.fw_vianame)[0] == '\0')	    || ((fwuser->ipfw.fw_invflg & IP_FW_INV_SRCIP)		&& fwuser->ipfw.fw_smsk.s_addr == 0)	    || ((fwuser->ipfw.fw_invflg & IP_FW_INV_DSTIP)		&& fwuser->ipfw.fw_dmsk.s_addr == 0)) {		duprintf("convert_ipfw: INV flag makes rule unmatchable!\n");		*errno = EINVAL;		return NULL;	}	if ((fwuser->ipfw.fw_flg & IP_FW_F_FRAG)	    && !(fwuser->ipfw.fw_invflg & IP_FW_INV_FRAG)	    && (fwuser->ipfw.fw_spts[0] != 0		|| fwuser->ipfw.fw_spts[1] != 0xFFFF		|| fwuser->ipfw.fw_dpts[0] != 0		|| fwuser->ipfw.fw_dpts[1] != 0xFFFF		|| (fwuser->ipfw.fw_flg & IP_FW_F_TCPSYN))) {		duprintf("convert_ipfw: Can't test ports or SYN with frag!\n");		*errno = EINVAL;		return NULL;	}#endif	if ((fwuser->ipfw.fw_spts[0] != 0	     || fwuser->ipfw.fw_spts[1] != 0xFFFF	     || fwuser->ipfw.fw_dpts[0] != 0	     || fwuser->ipfw.fw_dpts[1] != 0xFFFF)	    && ((fwuser->ipfw.fw_invflg & IP_FW_INV_PROTO)		|| (fwuser->ipfw.fw_proto != IPPROTO_TCP		    && fwuser->ipfw.fw_proto != IPPROTO_UDP		    && fwuser->ipfw.fw_proto != IPPROTO_ICMP))) {		duprintf("convert_ipfw: Can only test ports for TCP/UDP/ICMP!\n");		*errno = EINVAL;		return NULL;	}	fwkern = kmalloc(SIZEOF_STRUCT_IP_FW_KERNEL, GFP_ATOMIC);	if (!fwkern) {		duprintf("convert_ipfw: kmalloc failed!\n");		*errno = ENOMEM;		return NULL;	}	memcpy(&fwkern->ipfw,&fwuser->ipfw,sizeof(struct ip_fw));	if (!find_special(fwuser->label, &fwkern->simplebranch)) {		fwkern->branch = find_label(fwuser->label);		if (!fwkern->branch) {			duprintf("convert_ipfw: chain doesn't exist `%s'.\n",				 fwuser->label);			kfree(fwkern);			*errno = ENOENT;			return NULL;		} else if (fwkern->branch == IP_FW_INPUT_CHAIN			   || fwkern->branch == IP_FW_FORWARD_CHAIN			   || fwkern->branch == IP_FW_OUTPUT_CHAIN) {			duprintf("convert_ipfw: Can't branch to builtin chain `%s'.\n",				 fwuser->label);			kfree(fwkern);			*errno = ENOENT;			return NULL;		}	} else		fwkern->branch = NULL;	memset(fwkern->counters, 0, sizeof(struct ip_counters)*NUM_SLOTS);	/* Handle empty vianame by making it a wildcard */	if ((fwkern->ipfw.fw_vianame)[0] == '\0')	    fwkern->ipfw.fw_flg |= IP_FW_F_WILDIF;	fwkern->next = NULL;	return fwkern;}int ip_fw_ctl(int cmd, void *m, int len){	int ret;	struct ip_chain *chain;	unsigned long flags;	FWC_WRITE_LOCK_IRQ(&ip_fw_lock, flags);	switch (cmd) {	case IP_FW_FLUSH:		if (len != sizeof(ip_chainlabel) || !check_label(m))			ret = EINVAL;		else if ((chain = find_label(m)) == NULL)			ret = ENOENT;		else ret = clear_fw_chain(chain);		break;	case IP_FW_ZERO:		if (len != sizeof(ip_chainlabel) || !check_label(m))			ret = EINVAL;		else if ((chain = find_label(m)) == NULL)			ret = ENOENT;		else ret = zero_fw_chain(chain);		break;	case IP_FW_CHECK: {		struct ip_fwtest *new = m;		struct iphdr *ip;		/* Don't need write lock. */		FWC_WRITE_UNLOCK_IRQ(&ip_fw_lock, flags);		if (len != sizeof(struct ip_fwtest) || !check_label(m))			return EINVAL;		/* Need readlock to do find_label */		FWC_READ_LOCK(&ip_fw_lock);

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产成人在线免费观看| 欧美精品1区2区3区| 欧美亚洲禁片免费| 久久精品视频一区| 天天综合日日夜夜精品| 成人免费毛片片v| 精品国产凹凸成av人导航| 一区二区三区成人| av电影一区二区| 久久精品在这里| 调教+趴+乳夹+国产+精品| 一本色道久久综合亚洲aⅴ蜜桃 | 亚洲日本在线天堂| 国产乱码精品一区二区三区av| 97久久精品人人做人人爽| 精品国产在天天线2019| 日本不卡免费在线视频| 欧美在线观看一区| 亚洲激情综合网| 97精品久久久午夜一区二区三区| 久久久久综合网| 国内精品久久久久影院色| 日韩你懂的电影在线观看| 亚洲一二三四区| 色婷婷综合久久| 中文字幕在线一区二区三区| 国产成人综合在线播放| 国产欧美一区二区三区在线老狼| 久久99久久久久久久久久久| 欧美一区二区三区在| 日韩av一区二区在线影视| 欧美日本韩国一区二区三区视频| 亚洲国产精品一区二区www| 在线欧美日韩精品| 亚洲综合一区二区精品导航| 色就色 综合激情| 一区二区三区免费观看| 欧美影片第一页| 婷婷综合五月天| 欧美高清性hdvideosex| 天天影视涩香欲综合网| 日韩欧美色综合网站| 韩国中文字幕2020精品| 久久久久久综合| 成人黄页毛片网站| 亚洲女与黑人做爰| 欧美四级电影网| 久草精品在线观看| 国产精品色婷婷久久58| 日本久久一区二区| 日本午夜一区二区| 国产亚洲精品超碰| 色婷婷亚洲精品| 日韩成人av影视| 国产日产欧美一区| 欧美日韩在线播放三区四区| 日本伊人精品一区二区三区观看方式| 精品国产一区二区精华| 波多野结衣在线一区| 午夜免费欧美电影| 久久久久久久国产精品影院| 不卡av在线网| 男男gaygay亚洲| 亚洲欧美自拍偷拍| 欧美丰满嫩嫩电影| 国产精品亚洲一区二区三区妖精| 亚洲啪啪综合av一区二区三区| 欧美男人的天堂一二区| 国产福利91精品一区二区三区| 一区二区三区在线免费观看| 精品三级在线看| 在线观看视频91| 国产v综合v亚洲欧| 五月婷婷激情综合| 国产精品久久久久久久久免费樱桃| 在线视频国内自拍亚洲视频| 极品美女销魂一区二区三区| 玉足女爽爽91| 国产欧美一区在线| 精品国产一二三| 91激情五月电影| 国产在线精品国自产拍免费| 亚洲一区国产视频| 国产精品国产自产拍在线| 欧美一级夜夜爽| 色婷婷综合久久久中文一区二区| 国产麻豆精品视频| 免费精品视频最新在线| 亚洲综合无码一区二区| 国产欧美日韩激情| 精品美女在线观看| 欧美一区二区福利视频| 99精品偷自拍| 国产成人av资源| 国产精品一区一区| 久久精工是国产品牌吗| 亚洲不卡av一区二区三区| 亚洲免费av在线| 中文字幕一区不卡| 中文字幕国产一区二区| 久久久久99精品国产片| 日韩欧美激情四射| 欧美一区二区三区免费视频 | 成人黄色免费短视频| 精品一区二区免费| 免费不卡在线观看| 日本不卡一二三| 免费成人小视频| 久久99热狠狠色一区二区| 日韩精品五月天| 日本va欧美va精品| 免费成人在线观看视频| 水野朝阳av一区二区三区| 亚洲一区二区三区四区五区中文| 国产精品水嫩水嫩| 久久久99精品久久| 国产精品久久夜| 亚洲激情网站免费观看| 亚洲永久免费视频| 亚洲成a人在线观看| 免费亚洲电影在线| 国产高清不卡一区二区| 精品亚洲成av人在线观看| 国产麻豆成人精品| 成人aa视频在线观看| 91美女片黄在线| 欧美日韩高清一区| 日韩精品一区二区三区视频| 精品国产乱码久久久久久闺蜜 | 7777精品伊人久久久大香线蕉完整版 | 激情久久五月天| 国产精品1区2区3区在线观看| 国产成人在线免费观看| 成a人片国产精品| 91美女蜜桃在线| 91精品在线观看入口| 久久精品一区二区三区不卡| 国产精品丝袜91| 五月天网站亚洲| 国产风韵犹存在线视精品| 91在线观看下载| 欧美日免费三级在线| 欧美mv和日韩mv的网站| 国产精品污www在线观看| 亚洲精品中文字幕在线观看| 奇米色一区二区三区四区| 国产精品自拍三区| 色成年激情久久综合| 日韩一区二区三区精品视频 | 亚洲国产综合人成综合网站| 人禽交欧美网站| 91在线高清观看| 欧美一区二区三区在| 国产欧美一区二区精品性色| 亚洲一二三四区| 国产一区二区精品久久| 欧美日韩精品欧美日韩精品一| 日韩精品一区二区三区蜜臀| 亚洲色图制服诱惑| 麻豆成人在线观看| 色综合天天综合狠狠| 亚洲精品一线二线三线| 亚洲一区二区在线免费观看视频| 国产一区不卡视频| 91精品欧美久久久久久动漫| 国产精品国产三级国产三级人妇| 欧美aaaaaa午夜精品| 在线观看欧美黄色| 中文字幕一区二区三| 国产米奇在线777精品观看| 欧美精品777| 亚洲综合一区二区三区| youjizz久久| 精品久久免费看| 天天综合天天综合色| 欧美在线视频你懂得| 国产精品网站在线观看| 国产一区二区三区高清播放| 欧美精品亚洲二区| 亚洲伊人色欲综合网| 99精品偷自拍| 日韩理论片中文av| 国产不卡一区视频| 精品国产精品网麻豆系列| 蜜桃在线一区二区三区| 欧美一区二区三区四区视频| 亚洲午夜av在线| 欧美在线视频你懂得| 一区二区高清在线| 在线免费亚洲电影| 一级中文字幕一区二区| 91丝袜呻吟高潮美腿白嫩在线观看| 国产三级三级三级精品8ⅰ区| 久久99精品国产麻豆婷婷洗澡| 欧美巨大另类极品videosbest | 欧美aaaaa成人免费观看视频| 欧美人牲a欧美精品| 日日夜夜免费精品| 日韩一区二区三区电影在线观看 | 成人欧美一区二区三区视频网页 |