x86: nmi_watchdog - use nmi_watchdog variable for printing
[linux-2.6/zen-sources.git] / net / netfilter / xt_NOTRACK.c
blob6c9de611eb8d8c006de8ebfbd188a4d378ab6123
1 /* This is a module which is used for setting up fake conntracks
2 * on packets so that they are not seen by the conntrack/NAT code.
3 */
4 #include <linux/module.h>
5 #include <linux/skbuff.h>
7 #include <linux/netfilter/x_tables.h>
8 #include <net/netfilter/nf_conntrack.h>
10 MODULE_DESCRIPTION("Xtables: Disabling connection tracking for packets");
11 MODULE_LICENSE("GPL");
12 MODULE_ALIAS("ipt_NOTRACK");
13 MODULE_ALIAS("ip6t_NOTRACK");
15 static unsigned int
16 notrack_tg(struct sk_buff *skb, const struct net_device *in,
17 const struct net_device *out, unsigned int hooknum,
18 const struct xt_target *target, const void *targinfo)
20 /* Previously seen (loopback)? Ignore. */
21 if (skb->nfct != NULL)
22 return XT_CONTINUE;
24 /* Attach fake conntrack entry.
25 If there is a real ct entry correspondig to this packet,
26 it'll hang aroun till timing out. We don't deal with it
27 for performance reasons. JK */
28 skb->nfct = &nf_conntrack_untracked.ct_general;
29 skb->nfctinfo = IP_CT_NEW;
30 nf_conntrack_get(skb->nfct);
32 return XT_CONTINUE;
35 static struct xt_target notrack_tg_reg[] __read_mostly = {
37 .name = "NOTRACK",
38 .family = AF_INET,
39 .target = notrack_tg,
40 .table = "raw",
41 .me = THIS_MODULE,
44 .name = "NOTRACK",
45 .family = AF_INET6,
46 .target = notrack_tg,
47 .table = "raw",
48 .me = THIS_MODULE,
52 static int __init notrack_tg_init(void)
54 return xt_register_targets(notrack_tg_reg, ARRAY_SIZE(notrack_tg_reg));
57 static void __exit notrack_tg_exit(void)
59 xt_unregister_targets(notrack_tg_reg, ARRAY_SIZE(notrack_tg_reg));
62 module_init(notrack_tg_init);
63 module_exit(notrack_tg_exit);