亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? ipfwadm_core.c

?? 優龍2410linux2.6.8內核源代碼
?? C
?? 第 1 頁 / 共 3 頁
字號:
		 *	This is a bit simpler as we don't have to walk		 *	an interface chain as you do in BSD - same logic		 *	however.		 */		/*		 *	Match can become 0x01 (a "normal" match was found),		 *	0x02 (a reverse match was found), and 0x03 (the		 *	IP addresses match in both directions).		 *	Now we know in which direction(s) we should look		 *	for a match for the TCP/UDP ports.  Both directions		 *	might match (e.g., when both addresses are on the		 *	same network for which an address/mask is given), but		 *	the ports might only match in one direction.		 *	This was obviously wrong in the original BSD code.		 */		match = 0x00;		if ((src & f->fw_smsk.s_addr) == f->fw_src.s_addr &&		    (dst & f->fw_dmsk.s_addr) == f->fw_dst.s_addr)			/* normal direction */			match |= 0x01;		if ((f->fw_flg & IP_FW_F_BIDIR) &&		    (dst & f->fw_smsk.s_addr) == f->fw_src.s_addr &&		    (src & f->fw_dmsk.s_addr) == f->fw_dst.s_addr)			/* reverse direction */			match |= 0x02;		if (!match)			continue;		/*		 *	Look for a VIA device match		 */		if (f->fw_viadev) {			if (rif != f->fw_viadev)				continue;	/* Mismatch */		}		/* This looks stupid, because we scan almost static		   list, searching for static key. However, this way seems		   to be only reasonable way of handling fw_via rules		   (btw bsd makes the same thing).		   It will not affect performance if you will follow		   the following simple rules:		   - if interface is aliased, ALWAYS specify fw_viadev,		     so that previous check will guarantee, that we will		     not waste time when packet arrive on another interface.		   - avoid using fw_via.s_addr if fw_via.s_addr is owned		     by an aliased interface.		                                                       --ANK		 */		if (f->fw_via.s_addr && rif) {			struct in_ifaddr *ifa;			if (rif->ip_ptr == NULL)				continue;	/* Mismatch */			for (ifa = ((struct in_device*)(rif->ip_ptr))->ifa_list;			     ifa; ifa = ifa->ifa_next) {				if (ifa->ifa_local == f->fw_via.s_addr)					goto ifa_ok;			}			continue;	/* Mismatch */		ifa_ok:;		}		/*		 *	Ok the chain addresses match.		 */#ifdef CONFIG_IP_ACCT		/*		 *	See if we're in accounting mode and only want to		 *	count incoming or outgoing packets.		 */		if (mode & (IP_FW_MODE_ACCT_IN|IP_FW_MODE_ACCT_OUT) &&		   ((mode == IP_FW_MODE_ACCT_IN && f->fw_flg&IP_FW_F_ACCTOUT) ||		    (mode == IP_FW_MODE_ACCT_OUT && f->fw_flg&IP_FW_F_ACCTIN)))			continue;#endif		/*		 * For all non-TCP packets and/or non-first fragments,		 * notcpsyn and notcpack will always be FALSE,		 * so the IP_FW_F_TCPSYN and IP_FW_F_TCPACK flags		 * are actually ignored for these packets.		 */		if((f->fw_flg&IP_FW_F_TCPSYN) && notcpsyn)		 	continue;		if((f->fw_flg&IP_FW_F_TCPACK) && notcpack)		 	continue;		f_prt=f->fw_flg&IP_FW_F_KIND;		if (f_prt != IP_FW_F_ALL) {			/*			 *	Specific firewall - packet's protocol			 *	must match firewall's.			 */			if (prt != f_prt)				continue;			if((prt==IP_FW_F_ICMP &&				! port_match(&f->fw_pts[0], f->fw_nsp,					icmp_type,f->fw_flg&IP_FW_F_SRNG)) ||			    !(prt==IP_FW_F_ICMP || ((match & 0x01) &&				port_match(&f->fw_pts[0], f->fw_nsp, src_port,					f->fw_flg&IP_FW_F_SRNG) &&				port_match(&f->fw_pts[f->fw_nsp], f->fw_ndp, dst_port,					f->fw_flg&IP_FW_F_DRNG)) || ((match & 0x02) &&				port_match(&f->fw_pts[0], f->fw_nsp, dst_port,					f->fw_flg&IP_FW_F_SRNG) &&				port_match(&f->fw_pts[f->fw_nsp], f->fw_ndp, src_port,					f->fw_flg&IP_FW_F_DRNG))))			{				continue;			}		}#ifdef CONFIG_IP_FIREWALL_VERBOSE		if (f->fw_flg & IP_FW_F_PRN)		{			char buf[16];			print_packet(pskb, src_port, dst_port, icmp_type,				     chain_name(chain, mode),				     rule_name(f, mode, buf),				     rif ? rif->name : "-");		}#endif		if (mode != IP_FW_MODE_CHK) {			f->fw_bcnt += ntohs((*pskb)->nh.iph->tot_len);			f->fw_pcnt++;		}		if (!(mode & (IP_FW_MODE_ACCT_IN|IP_FW_MODE_ACCT_OUT)))			break;	} /* Loop */	if (!(mode & (IP_FW_MODE_ACCT_IN|IP_FW_MODE_ACCT_OUT))) {		/*		 * We rely on policy defined in the rejecting entry or, if no match		 * was found, we rely on the general policy variable for this type		 * of firewall.		 */		if (f != NULL) {			policy = f->fw_flg;			tosand = f->fw_tosand;			tosxor = f->fw_tosxor;		} else {			tosand = 0xFF;			tosxor = 0x00;		}		if (policy & IP_FW_F_ACCEPT) {			/* Adjust priority and recompute checksum */			__u8 tos = (*pskb)->nh.iph->tos;			if (((tos & tosand) ^ tosxor) != tos) {				if (!skb_ip_make_writable(pskb,					  offsetof(struct iphdr, tos)+1))					goto drop_it;				(*pskb)->nh.iph->tos = (tos & tosand) ^ tosxor;		 		ip_send_check((*pskb)->nh.iph);			}#ifdef CONFIG_IP_TRANSPARENT_PROXY			if (policy & IP_FW_F_REDIR) {				if (redirport)					if ((*redirport = htons(f->fw_pts[f->fw_nsp+f->fw_ndp])) == 0) {						/* Wildcard redirection.						 * Note that redirport will become						 * 0xFFFF for non-TCP/UDP packets.						 */						*redirport = htons(dst_port);					}				answer = FW_REDIRECT;			} else#endif#ifdef CONFIG_IP_MASQUERADE			if (policy & IP_FW_F_MASQ)				answer = FW_MASQUERADE;			else#endif				answer = FW_ACCEPT;		} else if (policy & IP_FW_F_ICMPRPL)			answer = FW_REJECT;		else {		drop_it:			answer = FW_BLOCK;		}#ifdef CONFIG_IP_FIREWALL_NETLINK		if ((policy & IP_FW_F_PRN) && (answer == FW_REJECT || answer == FW_BLOCK))		{			struct sk_buff *skb = alloc_skb(128,					(mode == IP_FW_MODE_CHK) ?					GFP_KERNEL : GFP_ATOMIC);			if (skb) {				int len = min_t(unsigned int,					128,					ntohs((*pskb)->nh.iph->tot_len));				skb_put(skb, len);				skb_copy_bits(*pskb,					((char *)(*pskb)->nh.iph -					 (char *)(*pskb)->data),					skb->data, len);				if (netlink_post(NETLINK_FIREWALL, skb))					kfree_skb(skb);			}		}#endif	} else		/* we're doing accounting, always ok */		answer = 0;		if (mode == IP_FW_MODE_CHK)		READ_UNLOCK(&ip_fw_lock);	else		WRITE_UNLOCK(&ip_fw_lock);	return answer;}static void zero_fw_chain(struct ip_fw *chainptr){	struct ip_fw *ctmp=chainptr;		WRITE_LOCK(&ip_fw_lock);	while(ctmp)	{		ctmp->fw_pcnt=0L;		ctmp->fw_bcnt=0L;		ctmp=ctmp->fw_next;	}	WRITE_UNLOCK(&ip_fw_lock);}static void free_fw_chain(struct ip_fw *volatile* chainptr){	WRITE_LOCK(&ip_fw_lock);	while ( *chainptr != NULL )	{		struct ip_fw *ftmp;		ftmp = *chainptr;		*chainptr = ftmp->fw_next;		if (ftmp->fw_viadev		    && ftmp->fw_viadev != (struct net_device *)-1)			dev_put(ftmp->fw_viadev);		kfree(ftmp);		/* We will block in cleanup's unregister sockopt if unloaded,		   so this is safe. */		module_put(THIS_MODULE);	}	WRITE_UNLOCK(&ip_fw_lock);}/* Volatiles to keep some of the compiler versions amused */static int insert_in_chain(struct ip_fw *volatile* chainptr, struct ip_fw *frwl,int len){	struct ip_fw *ftmp;	/* Are we unloading now?  We will block on nf_unregister_sockopt */	if (!try_module_get(THIS_MODULE))		return ENOPROTOOPT;	ftmp = kmalloc( sizeof(struct ip_fw), GFP_KERNEL );	if ( ftmp == NULL )	{#ifdef DEBUG_IP_FIREWALL		printk("ip_fw_ctl:  malloc said no\n");#endif		return( ENOMEM );	}	memcpy(ftmp, frwl, len);	/*	 *	Allow the more recent "minimise cost" flag to be	 *	set. [Rob van Nieuwkerk]	 */	ftmp->fw_tosand |= 0x01;	ftmp->fw_tosxor &= 0xFE;	ftmp->fw_pcnt=0L;	ftmp->fw_bcnt=0L;	WRITE_LOCK(&ip_fw_lock);	if ((ftmp->fw_vianame)[0]) {		if (!(ftmp->fw_viadev = dev_get_by_name(ftmp->fw_vianame)))			ftmp->fw_viadev = (struct net_device *) -1;	} else		ftmp->fw_viadev = NULL;	ftmp->fw_next = *chainptr;       	*chainptr=ftmp;	WRITE_UNLOCK(&ip_fw_lock);	return(0);}static int append_to_chain(struct ip_fw *volatile* chainptr, struct ip_fw *frwl,int len){	struct ip_fw *ftmp;	struct ip_fw *chtmp=NULL;	struct ip_fw *volatile chtmp_prev=NULL;	/* Are we unloading now?  We will block on nf_unregister_sockopt */	if (!try_module_get(THIS_MODULE))		return ENOPROTOOPT;	ftmp = kmalloc( sizeof(struct ip_fw), GFP_KERNEL );	if ( ftmp == NULL )	{#ifdef DEBUG_IP_FIREWALL		printk("ip_fw_ctl:  malloc said no\n");#endif		return( ENOMEM );	}	memcpy(ftmp, frwl, len);	/*	 *	Allow the more recent "minimise cost" flag to be	 *	set. [Rob van Nieuwkerk]	 */	ftmp->fw_tosand |= 0x01;	ftmp->fw_tosxor &= 0xFE;	ftmp->fw_pcnt=0L;	ftmp->fw_bcnt=0L;	ftmp->fw_next = NULL;	WRITE_LOCK(&ip_fw_lock);	if ((ftmp->fw_vianame)[0]) {		if (!(ftmp->fw_viadev = dev_get_by_name(ftmp->fw_vianame)))			ftmp->fw_viadev = (struct net_device *) -1;	} else		ftmp->fw_viadev = NULL;	chtmp_prev=NULL;	for (chtmp=*chainptr;chtmp!=NULL;chtmp=chtmp->fw_next)		chtmp_prev=chtmp;	if (chtmp_prev)		chtmp_prev->fw_next=ftmp;	else        	*chainptr=ftmp;	WRITE_UNLOCK(&ip_fw_lock);	return(0);}static int del_from_chain(struct ip_fw *volatile*chainptr, struct ip_fw *frwl){	struct ip_fw 	*ftmp,*ltmp;	unsigned short	tport1,tport2,tmpnum;	char		matches,was_found;	WRITE_LOCK(&ip_fw_lock);	ftmp=*chainptr;	if ( ftmp == NULL )	{#ifdef DEBUG_IP_FIREWALL		printk("ip_fw_ctl:  chain is empty\n");#endif		WRITE_UNLOCK(&ip_fw_lock);		return( EINVAL );	}	ltmp=NULL;	was_found=0;	while( !was_found && ftmp != NULL )	{		matches=1;		if (ftmp->fw_src.s_addr!=frwl->fw_src.s_addr		     ||  ftmp->fw_dst.s_addr!=frwl->fw_dst.s_addr		     ||  ftmp->fw_smsk.s_addr!=frwl->fw_smsk.s_addr		     ||  ftmp->fw_dmsk.s_addr!=frwl->fw_dmsk.s_addr		     ||  ftmp->fw_via.s_addr!=frwl->fw_via.s_addr		     ||  ftmp->fw_flg!=frwl->fw_flg)        		matches=0;		tport1=ftmp->fw_nsp+ftmp->fw_ndp;		tport2=frwl->fw_nsp+frwl->fw_ndp;		if (tport1!=tport2)		        matches=0;		else if (tport1!=0)		{			for (tmpnum=0;tmpnum < tport1 && tmpnum < IP_FW_MAX_PORTS;tmpnum++)        		if (ftmp->fw_pts[tmpnum]!=frwl->fw_pts[tmpnum])				matches=0;		}		if (strncmp(ftmp->fw_vianame, frwl->fw_vianame, IFNAMSIZ))		        matches=0;		if(matches)		{			was_found=1;			if (ftmp->fw_viadev			    && ftmp->fw_viadev != (struct net_device *)-1)				dev_put(ftmp->fw_viadev);			if (ltmp)			{				ltmp->fw_next=ftmp->fw_next;				kfree(ftmp);				ftmp=ltmp->fw_next;        		}      			else      			{      				*chainptr=ftmp->fw_next;	 			kfree(ftmp);				ftmp=*chainptr;			}		}		else		{			ltmp = ftmp;			ftmp = ftmp->fw_next;		 }	}	WRITE_UNLOCK(&ip_fw_lock);	if (was_found) {		/* We will block in cleanup's unregister sockopt if unloaded,		   so this is safe. */		module_put(THIS_MODULE);		return 0;	} else		return(EINVAL);}#endif  /* CONFIG_IP_ACCT || CONFIG_IP_FIREWALL */struct ip_fw *check_ipfw_struct(struct ip_fw *frwl, int len){	if ( len != sizeof(struct ip_fw) )	{#ifdef DEBUG_IP_FIREWALL		printk("ip_fw_ctl: len=%d, want %d\n",len, sizeof(struct ip_fw));#endif		return(NULL);	}	if ( (frwl->fw_flg & ~IP_FW_F_MASK) != 0 )	{#ifdef DEBUG_IP_FIREWALL		printk("ip_fw_ctl: undefined flag bits set (flags=%x)\n",			frwl->fw_flg);#endif		return(NULL);	}#ifndef CONFIG_IP_TRANSPARENT_PROXY	if (frwl->fw_flg & IP_FW_F_REDIR) {#ifdef DEBUG_IP_FIREWALL		printk("ip_fw_ctl: unsupported flag IP_FW_F_REDIR\n");#endif		return(NULL);	}#endif#ifndef CONFIG_IP_MASQUERADE	if (frwl->fw_flg & IP_FW_F_MASQ) {#ifdef DEBUG_IP_FIREWALL		printk("ip_fw_ctl: unsupported flag IP_FW_F_MASQ\n");#endif		return(NULL);	}#endif	if ( (frwl->fw_flg & IP_FW_F_SRNG) && frwl->fw_nsp < 2 )

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产精品一二三| 五月天丁香久久| 国产精品一区三区| 久久久欧美精品sm网站| 精品一区二区影视| 久久亚洲捆绑美女| 高清免费成人av| 亚洲视频免费观看| 在线一区二区三区做爰视频网站| 一区二区三区在线观看视频| 欧美三级视频在线播放| 日本欧美久久久久免费播放网| 91精品国产福利| 狠狠色丁香久久婷婷综合丁香| 国产欧美一区二区三区鸳鸯浴| k8久久久一区二区三区| 亚洲综合激情小说| 欧美一区二区观看视频| 久久福利视频一区二区| 久久久久国产一区二区三区四区| 日韩毛片精品高清免费| 国产成人在线看| 欧美激情资源网| 欧美一区二区久久久| 一本到三区不卡视频| 日韩国产成人精品| 国产午夜精品一区二区| 久久美女艺术照精彩视频福利播放| 亚洲欧美一区二区三区国产精品 | 久久99精品久久久久久国产越南| 91麻豆精品国产91久久久久久| 亚洲午夜国产一区99re久久| 日韩一区二区三区免费看 | 一区二区三区欧美在线观看| 国内成人自拍视频| 免费观看30秒视频久久| 欧美剧情片在线观看| 国产成人精品影院| 亚洲mv大片欧洲mv大片精品| 久久女同互慰一区二区三区| 91在线精品一区二区三区| 亚洲综合色视频| 亚洲精品免费在线观看| 色伊人久久综合中文字幕| caoporn国产精品| 日韩影视精彩在线| 久久99国内精品| 午夜欧美视频在线观看 | 国产99精品视频| 久久精品日产第一区二区三区高清版 | 成人性色生活片| 精品国产91乱码一区二区三区 | 欧美videossexotv100| 精品中文字幕一区二区| 久久精品亚洲乱码伦伦中文 | 国产在线播放一区二区三区| 久久久电影一区二区三区| www.日韩av| 亚洲国产你懂的| 欧美www视频| proumb性欧美在线观看| 亚洲va欧美va人人爽午夜| 欧美α欧美αv大片| 成人黄色小视频| 亚洲综合久久久久| 日韩免费高清视频| 不卡的av在线| 首页亚洲欧美制服丝腿| 国产亚洲精品精华液| 色悠悠亚洲一区二区| 喷水一区二区三区| 中文字幕在线观看不卡| 日韩一区二区在线免费观看| 国产成人免费视频一区| 夜色激情一区二区| 欧美精品一区二区三区蜜桃 | 色偷偷久久人人79超碰人人澡| 视频在线在亚洲| 欧美激情在线观看视频免费| 欧美视频日韩视频| 国产成人在线观看免费网站| 午夜电影网亚洲视频| 久久久国产精品麻豆| 6080午夜不卡| 91搞黄在线观看| 国产成人啪午夜精品网站男同| 亚洲成人一区二区| ●精品国产综合乱码久久久久| 精品999在线播放| 欧美群妇大交群中文字幕| www.久久精品| 国产一区二区女| 青青草成人在线观看| 亚洲成在线观看| 亚洲男女毛片无遮挡| 中文在线资源观看网站视频免费不卡| 欧美一区在线视频| 欧美日韩国产小视频在线观看| 色婷婷综合视频在线观看| 成人综合日日夜夜| 国产一区二区三区在线观看免费视频 | 国产精品夫妻自拍| 91精品欧美综合在线观看最新| 国产.欧美.日韩| 国内精品视频一区二区三区八戒| 亚洲综合精品久久| 17c精品麻豆一区二区免费| 久久色中文字幕| 欧美精品日日鲁夜夜添| 久久精品国产精品亚洲精品| 亚洲一区二区欧美| 国产精品三级av| 久久九九影视网| 精品国产一区二区亚洲人成毛片 | 久久99国产精品免费| 三级久久三级久久| 亚洲男人的天堂一区二区| 欧美激情中文不卡| 久久影院视频免费| 精品国产一区二区亚洲人成毛片| 日韩精品在线网站| 日韩视频中午一区| 91精品欧美一区二区三区综合在| 色爱区综合激月婷婷| 99精品视频中文字幕| 成人丝袜18视频在线观看| 老司机精品视频导航| 免费观看日韩电影| 蜜桃av噜噜一区| 麻豆国产91在线播放| 麻豆精品一区二区av白丝在线| 国产精品久久久久一区二区三区| 中文字幕一区二区三区不卡| 中日韩免费视频中文字幕| 中文字幕av一区二区三区免费看| 欧美激情一区二区三区蜜桃视频 | 免费人成网站在线观看欧美高清| 亚洲国产精品久久不卡毛片| 亚洲线精品一区二区三区八戒| 国产精品欧美一区喷水| 洋洋成人永久网站入口| 五月天激情小说综合| 青青草91视频| 国产精品一级在线| 成人国产精品免费| 国产91精品一区二区| 91香蕉视频在线| 99re8在线精品视频免费播放| 在线亚洲高清视频| 在线91免费看| 精品女同一区二区| 亚洲天堂免费看| 亚洲高清不卡在线观看| 午夜精品久久一牛影视| 日韩黄色在线观看| 韩国女主播成人在线| 成人美女视频在线看| 欧洲一区在线电影| 日韩精品一区二区在线| 国产日韩精品一区二区三区在线| 中文字幕一区三区| 亚洲欧美视频在线观看| 九一久久久久久| 不卡的看片网站| 欧美情侣在线播放| 久久久精品国产99久久精品芒果| 亚洲色图一区二区| 国产自产v一区二区三区c| 99精品偷自拍| 日韩午夜在线影院| 亚洲视频一二三| 日本不卡视频在线观看| 色婷婷综合久久久久中文 | 久久久噜噜噜久久中文字幕色伊伊| 国产精品久久久久久久久久久免费看 | 国产成人小视频| 欧美日本一道本在线视频| 国产午夜精品一区二区三区视频| 午夜天堂影视香蕉久久| 国产成人在线视频网站| 欧美精品v国产精品v日韩精品| 国产性色一区二区| 日本系列欧美系列| 国产精品一二三四区| 69成人精品免费视频| 亚洲丝袜美腿综合| 国产乱码精品一区二区三区av| 精品视频在线视频| 亚洲精品国久久99热| 国产精品一品视频| 日韩欧美一卡二卡| 亚洲国产综合91精品麻豆| 国内精品视频666| 欧美zozozo| 青青草一区二区三区| 欧美三片在线视频观看| 亚洲色图清纯唯美| 色天使色偷偷av一区二区| 国产精品美女久久久久久久网站| 老司机免费视频一区二区|