亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? ip_conntrack_standalone.c

?? 優龍2410linux2.6.8內核源代碼
?? C
?? 第 1 頁 / 共 2 頁
字號:
/* This file contains all the functions required for the standalone   ip_conntrack module.   These are not required by the compatibility layer.*//* (C) 1999-2001 Paul `Rusty' Russell * (C) 2002-2004 Netfilter Core Team <coreteam@netfilter.org> * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License version 2 as * published by the Free Software Foundation. */#include <linux/config.h>#include <linux/types.h>#include <linux/ip.h>#include <linux/netfilter.h>#include <linux/netfilter_ipv4.h>#include <linux/module.h>#include <linux/skbuff.h>#include <linux/proc_fs.h>#ifdef CONFIG_SYSCTL#include <linux/sysctl.h>#endif#include <net/checksum.h>#include <net/ip.h>#define ASSERT_READ_LOCK(x) MUST_BE_READ_LOCKED(&ip_conntrack_lock)#define ASSERT_WRITE_LOCK(x) MUST_BE_WRITE_LOCKED(&ip_conntrack_lock)#include <linux/netfilter_ipv4/ip_conntrack.h>#include <linux/netfilter_ipv4/ip_conntrack_protocol.h>#include <linux/netfilter_ipv4/ip_conntrack_core.h>#include <linux/netfilter_ipv4/ip_conntrack_helper.h>#include <linux/netfilter_ipv4/listhelp.h>#if 0#define DEBUGP printk#else#define DEBUGP(format, args...)#endifMODULE_LICENSE("GPL");static int kill_proto(const struct ip_conntrack *i, void *data){	return (i->tuplehash[IP_CT_DIR_ORIGINAL].tuple.dst.protonum == 			*((u_int8_t *) data));}static unsigned intprint_tuple(char *buffer, const struct ip_conntrack_tuple *tuple,	    struct ip_conntrack_protocol *proto){	int len;	len = sprintf(buffer, "src=%u.%u.%u.%u dst=%u.%u.%u.%u ",		      NIPQUAD(tuple->src.ip), NIPQUAD(tuple->dst.ip));	len += proto->print_tuple(buffer + len, tuple);	return len;}/* FIXME: Don't print source proto part. --RR */static unsigned intprint_expect(char *buffer, const struct ip_conntrack_expect *expect){	unsigned int len;	if (expect->expectant->helper->timeout)		len = sprintf(buffer, "EXPECTING: %lu ",			      timer_pending(&expect->timeout)			      ? (expect->timeout.expires - jiffies)/HZ : 0);	else		len = sprintf(buffer, "EXPECTING: - ");	len += sprintf(buffer + len, "use=%u proto=%u ",		      atomic_read(&expect->use), expect->tuple.dst.protonum);	len += print_tuple(buffer + len, &expect->tuple,			   __ip_ct_find_proto(expect->tuple.dst.protonum));	len += sprintf(buffer + len, "\n");	return len;}static unsigned intprint_conntrack(char *buffer, struct ip_conntrack *conntrack){	unsigned int len;	struct ip_conntrack_protocol *proto		= __ip_ct_find_proto(conntrack->tuplehash[IP_CT_DIR_ORIGINAL]			       .tuple.dst.protonum);	len = sprintf(buffer, "%-8s %u %lu ",		      proto->name,		      conntrack->tuplehash[IP_CT_DIR_ORIGINAL]		      .tuple.dst.protonum,		      timer_pending(&conntrack->timeout)		      ? (conntrack->timeout.expires - jiffies)/HZ : 0);	len += proto->print_conntrack(buffer + len, conntrack);	len += print_tuple(buffer + len,			   &conntrack->tuplehash[IP_CT_DIR_ORIGINAL].tuple,			   proto);	if (!(test_bit(IPS_SEEN_REPLY_BIT, &conntrack->status)))		len += sprintf(buffer + len, "[UNREPLIED] ");	len += print_tuple(buffer + len,			   &conntrack->tuplehash[IP_CT_DIR_REPLY].tuple,			   proto);	if (test_bit(IPS_ASSURED_BIT, &conntrack->status))		len += sprintf(buffer + len, "[ASSURED] ");	len += sprintf(buffer + len, "use=%u ",		       atomic_read(&conntrack->ct_general.use));	len += sprintf(buffer + len, "\n");	return len;}/* Returns true when finished. */static inline intconntrack_iterate(const struct ip_conntrack_tuple_hash *hash,		  char *buffer, off_t offset, off_t *upto,		  unsigned int *len, unsigned int maxlen){	unsigned int newlen;	IP_NF_ASSERT(hash->ctrack);	MUST_BE_READ_LOCKED(&ip_conntrack_lock);	/* Only count originals */	if (DIRECTION(hash))		return 0;	if ((*upto)++ < offset)		return 0;	newlen = print_conntrack(buffer + *len, hash->ctrack);	if (*len + newlen > maxlen)		return 1;	else *len += newlen;	return 0;}static intlist_conntracks(char *buffer, char **start, off_t offset, int length){	unsigned int i;	unsigned int len = 0;	off_t upto = 0;	struct list_head *e;	READ_LOCK(&ip_conntrack_lock);	/* Traverse hash; print originals then reply. */	for (i = 0; i < ip_conntrack_htable_size; i++) {		if (LIST_FIND(&ip_conntrack_hash[i], conntrack_iterate,			      struct ip_conntrack_tuple_hash *,			      buffer, offset, &upto, &len, length))			goto finished;	}	/* Now iterate through expecteds. */	READ_LOCK(&ip_conntrack_expect_tuple_lock);	list_for_each(e, &ip_conntrack_expect_list) {		unsigned int last_len;		struct ip_conntrack_expect *expect			= (struct ip_conntrack_expect *)e;		if (upto++ < offset) continue;		last_len = len;		len += print_expect(buffer + len, expect);		if (len > length) {			len = last_len;			goto finished_expects;		}	} finished_expects:	READ_UNLOCK(&ip_conntrack_expect_tuple_lock); finished:	READ_UNLOCK(&ip_conntrack_lock);	/* `start' hack - see fs/proc/generic.c line ~165 */	*start = (char *)((unsigned int)upto - offset);	return len;}static unsigned int ip_confirm(unsigned int hooknum,			       struct sk_buff **pskb,			       const struct net_device *in,			       const struct net_device *out,			       int (*okfn)(struct sk_buff *)){	/* We've seen it coming out the other side: confirm it */	return ip_conntrack_confirm(*pskb);}static unsigned int ip_conntrack_defrag(unsigned int hooknum,				        struct sk_buff **pskb,				        const struct net_device *in,				        const struct net_device *out,				        int (*okfn)(struct sk_buff *)){	/* Previously seen (loopback)?  Ignore.  Do this before           fragment check. */	if ((*pskb)->nfct)		return NF_ACCEPT;	/* Gather fragments. */	if ((*pskb)->nh.iph->frag_off & htons(IP_MF|IP_OFFSET)) {		*pskb = ip_ct_gather_frags(*pskb);		if (!*pskb)			return NF_STOLEN;	}	return NF_ACCEPT;}static unsigned int ip_refrag(unsigned int hooknum,			      struct sk_buff **pskb,			      const struct net_device *in,			      const struct net_device *out,			      int (*okfn)(struct sk_buff *)){	struct rtable *rt = (struct rtable *)(*pskb)->dst;	/* We've seen it coming out the other side: confirm */	if (ip_confirm(hooknum, pskb, in, out, okfn) != NF_ACCEPT)		return NF_DROP;	/* Local packets are never produced too large for their	   interface.  We degfragment them at LOCAL_OUT, however,	   so we have to refragment them here. */	if ((*pskb)->len > dst_pmtu(&rt->u.dst) &&	    !skb_shinfo(*pskb)->tso_size) {		/* No hook can be after us, so this should be OK. */		ip_fragment(*pskb, okfn);		return NF_STOLEN;	}	return NF_ACCEPT;}static unsigned int ip_conntrack_local(unsigned int hooknum,				       struct sk_buff **pskb,				       const struct net_device *in,				       const struct net_device *out,				       int (*okfn)(struct sk_buff *)){	/* root is playing with raw sockets. */	if ((*pskb)->len < sizeof(struct iphdr)	    || (*pskb)->nh.iph->ihl * 4 < sizeof(struct iphdr)) {		if (net_ratelimit())			printk("ipt_hook: happy cracking.\n");		return NF_ACCEPT;	}	return ip_conntrack_in(hooknum, pskb, in, out, okfn);}/* Connection tracking may drop packets, but never alters them, so   make it the first hook. */static struct nf_hook_ops ip_conntrack_defrag_ops = {	.hook		= ip_conntrack_defrag,	.owner		= THIS_MODULE,	.pf		= PF_INET,	.hooknum	= NF_IP_PRE_ROUTING,	.priority	= NF_IP_PRI_CONNTRACK_DEFRAG,};static struct nf_hook_ops ip_conntrack_in_ops = {	.hook		= ip_conntrack_in,	.owner		= THIS_MODULE,	.pf		= PF_INET,	.hooknum	= NF_IP_PRE_ROUTING,	.priority	= NF_IP_PRI_CONNTRACK,};static struct nf_hook_ops ip_conntrack_defrag_local_out_ops = {	.hook		= ip_conntrack_defrag,	.owner		= THIS_MODULE,	.pf		= PF_INET,	.hooknum	= NF_IP_LOCAL_OUT,	.priority	= NF_IP_PRI_CONNTRACK_DEFRAG,};static struct nf_hook_ops ip_conntrack_local_out_ops = {	.hook		= ip_conntrack_local,	.owner		= THIS_MODULE,	.pf		= PF_INET,	.hooknum	= NF_IP_LOCAL_OUT,	.priority	= NF_IP_PRI_CONNTRACK,};/* Refragmenter; last chance. */static struct nf_hook_ops ip_conntrack_out_ops = {	.hook		= ip_refrag,	.owner		= THIS_MODULE,	.pf		= PF_INET,	.hooknum	= NF_IP_POST_ROUTING,	.priority	= NF_IP_PRI_LAST,};static struct nf_hook_ops ip_conntrack_local_in_ops = {	.hook		= ip_confirm,	.owner		= THIS_MODULE,	.pf		= PF_INET,	.hooknum	= NF_IP_LOCAL_IN,	.priority	= NF_IP_PRI_LAST-1,};/* Sysctl support */#ifdef CONFIG_SYSCTL/* From ip_conntrack_core.c */extern int ip_conntrack_max;extern unsigned int ip_conntrack_htable_size;/* From ip_conntrack_proto_tcp.c */extern unsigned long ip_ct_tcp_timeout_syn_sent;extern unsigned long ip_ct_tcp_timeout_syn_recv;extern unsigned long ip_ct_tcp_timeout_established;extern unsigned long ip_ct_tcp_timeout_fin_wait;extern unsigned long ip_ct_tcp_timeout_close_wait;extern unsigned long ip_ct_tcp_timeout_last_ack;extern unsigned long ip_ct_tcp_timeout_time_wait;extern unsigned long ip_ct_tcp_timeout_close;/* From ip_conntrack_proto_udp.c */extern unsigned long ip_ct_udp_timeout;extern unsigned long ip_ct_udp_timeout_stream;

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美电影免费观看高清完整版在 | 国产高清不卡二三区| 成人免费视频播放| 欧美日韩的一区二区| 国产精品理论片| 蜜臀精品一区二区三区在线观看| 99免费精品视频| 国产欧美精品在线观看| 三级亚洲高清视频| 在线观看免费视频综合| 国产精品丝袜黑色高跟| 久久精品国产第一区二区三区| 欧美伊人久久久久久久久影院| 国产欧美精品一区二区色综合朱莉 | 日韩国产精品大片| 日本高清成人免费播放| 国产精品拍天天在线| 韩国欧美一区二区| 日韩欧美一二三四区| 天天综合网天天综合色| 91高清视频在线| 亚洲女厕所小便bbb| 成人激情动漫在线观看| 久久美女高清视频| 狠狠色丁香久久婷婷综合_中| 91精品免费在线| 日日骚欧美日韩| 欧美三级中文字| 亚洲一二三四在线观看| 91啪亚洲精品| 亚洲乱码国产乱码精品精可以看| 国产黄色91视频| 日本一区二区三区在线不卡| 国产九色精品成人porny| 久久先锋资源网| 国产精品一二三区在线| 欧美极品xxx| 成人av网站在线观看免费| 国产精品成人一区二区艾草| 99久久精品国产毛片| 亚洲女人小视频在线观看| 色就色 综合激情| 午夜精品久久久久久久99樱桃| 欧美日本在线观看| 日本三级韩国三级欧美三级| 精品免费视频.| 国产精一区二区三区| 亚洲欧洲精品一区二区精品久久久| 国产aⅴ综合色| 亚洲另类在线制服丝袜| 欧美日韩成人在线一区| 蜜臀av一区二区在线观看| 久久先锋资源网| 成人黄色777网| 亚洲福利电影网| 精品国产亚洲在线| 丁香婷婷综合激情五月色| 自拍偷在线精品自拍偷无码专区| 色偷偷久久人人79超碰人人澡| 婷婷六月综合网| 久久女同性恋中文字幕| 91在线你懂得| 青青草原综合久久大伊人精品| 欧美精品一区二区三区蜜桃| 北条麻妃一区二区三区| 午夜精品成人在线视频| 国产色产综合产在线视频| 色欧美88888久久久久久影院| 午夜精品久久久久| 国产免费久久精品| 欧美日韩色综合| 成人黄色777网| 青青草国产精品97视觉盛宴| 中文子幕无线码一区tr| 欧美日韩精品免费观看视频| 国产成人精品一区二| 午夜精品久久久久久| 国产精品天天看| 日韩一区二区在线观看| 一本在线高清不卡dvd| 国产一区二区三区四区五区美女| 一区二区三区电影在线播| 国产视频一区二区三区在线观看| 欧美日韩久久一区二区| 成人高清av在线| 国产一区二区电影| 日韩av一级片| 一区二区三区欧美亚洲| 国产亚洲综合av| 欧美一级二级三级乱码| 欧美优质美女网站| 国产成人8x视频一区二区| 麻豆国产欧美日韩综合精品二区| 亚洲欧美日韩一区二区 | 欧美日韩免费电影| av一区二区三区在线| 国产精品自拍毛片| 久久99久久久久久久久久久| 亚洲国产一区二区三区青草影视| 国产欧美日韩视频在线观看| 欧美精品一区二区在线观看| 欧美一区二区三区在线视频| 欧美午夜片在线观看| 一本色道久久综合亚洲精品按摩 | 蜜臀久久久久久久| 爽好久久久欧美精品| 亚洲韩国精品一区| 夜夜精品浪潮av一区二区三区| 国产精品国产成人国产三级 | 久久综合久色欧美综合狠狠| 日韩亚洲欧美综合| 日韩一区二区三区在线| 欧美老肥妇做.爰bbww视频| 在线精品国精品国产尤物884a| 99国产精品国产精品久久| 成人夜色视频网站在线观看| 国产成人h网站| 国产成人久久精品77777最新版本| 久久99热这里只有精品| 国产精品一区二区无线| 国产精品自拍一区| 国产精品一区二区在线播放| 风间由美一区二区av101| 国产成人免费视频一区| 成人蜜臀av电影| 色综合婷婷久久| 在线观看免费一区| 欧美精品久久久久久久多人混战 | 色婷婷久久久亚洲一区二区三区| 91麻豆精品视频| 欧美中文字幕一二三区视频| 欧美三级视频在线观看| 欧美一区二区久久| 久久久亚洲高清| 国产精品激情偷乱一区二区∴| 国产精品国产三级国产专播品爱网 | 久久女同性恋中文字幕| 中文字幕国产一区二区| 亚洲欧美日韩国产综合在线| 亚洲国产欧美在线人成| 精品影视av免费| 风间由美中文字幕在线看视频国产欧美 | 欧美亚洲国产bt| 欧美电影免费观看高清完整版在 | 91久久一区二区| 制服.丝袜.亚洲.中文.综合 | 在线91免费看| 精品国产3级a| 亚洲欧美国产毛片在线| 精品在线播放免费| 色综合中文字幕| 91精品国产综合久久精品app| 久久综合久久综合九色| 亚洲男同性视频| 加勒比av一区二区| 在线观看日韩av先锋影音电影院| 欧美大胆人体bbbb| 亚洲美女一区二区三区| 狠狠色狠狠色综合日日91app| 波多野结衣亚洲一区| 制服丝袜一区二区三区| 亚洲欧洲精品成人久久奇米网| 亚洲成av人片| 99久久夜色精品国产网站| 91精品国产91久久综合桃花| 国产精品不卡在线| 美女诱惑一区二区| 在线免费观看一区| 中文字幕欧美区| 麻豆免费精品视频| 欧美亚洲国产bt| 国产精品久久久久精k8| 国内久久婷婷综合| 欧美一级搡bbbb搡bbbb| 亚洲综合激情另类小说区| 成人亚洲一区二区一| 亚洲精品在线观看网站| 丝袜美腿亚洲色图| 91成人在线精品| 国产精品久久福利| 国产成人综合在线观看| 欧美一区二区三区思思人| 一区二区三区不卡视频| 99久久久久久| 国产精品久久久久aaaa| 粉嫩欧美一区二区三区高清影视 | 精品一区二区三区蜜桃| 在线免费精品视频| 亚洲精选一二三| 99精品一区二区| 国产精品久久久久久妇女6080| 国产精品资源在线| 久久综合色播五月| 国产剧情一区二区三区| 久久一区二区三区国产精品| 激情综合色综合久久| xnxx国产精品| 国产成人亚洲综合a∨猫咪| 久久色.com| 国产一区二区三区四|