summaryrefslogblamecommitdiffstats
path: root/net/netfilter/xt_NOTRACK.c
blob: 24d477afa9398b2e92d1cf3c29e79960bef7ebbd (plain) (tree)
1
2
3
4
5
6
7
8
9





                                                                  
                                     
                                              
 


                            









                                                 
                                   




                                                                    
                             


                                        
                           



                                 
                             

















                                                                                                               
                                        


                                 






                                         



                            




                                                        
 




                                                            



                             

                                                      



                  
/* This is a module which is used for setting up fake conntracks
 * on packets so that they are not seen by the conntrack/NAT code.
 */
#include <linux/module.h>
#include <linux/skbuff.h>

#include <linux/netfilter/x_tables.h>
#include <net/netfilter/nf_conntrack_compat.h>

MODULE_LICENSE("GPL");
MODULE_ALIAS("ipt_NOTRACK");

static unsigned int
target(struct sk_buff **pskb,
       const struct net_device *in,
       const struct net_device *out,
       unsigned int hooknum,
       const void *targinfo,
       void *userinfo)
{
	/* Previously seen (loopback)? Ignore. */
	if ((*pskb)->nfct != NULL)
		return XT_CONTINUE;

	/* Attach fake conntrack entry. 
	   If there is a real ct entry correspondig to this packet, 
	   it'll hang aroun till timing out. We don't deal with it
	   for performance reasons. JK */
	nf_ct_untrack(*pskb);
	(*pskb)->nfctinfo = IP_CT_NEW;
	nf_conntrack_get((*pskb)->nfct);

	return XT_CONTINUE;
}

static int
checkentry(const char *tablename,
	   const void *entry,
           void *targinfo,
           unsigned int targinfosize,
           unsigned int hook_mask)
{
	if (targinfosize != 0) {
		printk(KERN_WARNING "NOTRACK: targinfosize %u != 0\n",
		       targinfosize);
		return 0;
	}

	if (strcmp(tablename, "raw") != 0) {
		printk(KERN_WARNING "NOTRACK: can only be called from \"raw\" table, not \"%s\"\n", tablename);
		return 0;
	}

	return 1;
}

static struct xt_target notrack_reg = { 
	.name = "NOTRACK", 
	.target = target, 
	.checkentry = checkentry,
	.me = THIS_MODULE,
};
static struct xt_target notrack6_reg = { 
	.name = "NOTRACK", 
	.target = target, 
	.checkentry = checkentry,
	.me = THIS_MODULE,
};

static int __init init(void)
{
	int ret;

	ret = xt_register_target(AF_INET, &notrack_reg);
	if (ret)
		return ret;

	ret = xt_register_target(AF_INET6, &notrack6_reg);
	if (ret)
		xt_unregister_target(AF_INET, &notrack_reg);

	return ret;
}

static void __exit fini(void)
{
	xt_unregister_target(AF_INET6, &notrack6_reg);
	xt_unregister_target(AF_INET, &notrack_reg);
}

module_init(init);
module_exit(fini);