diff options
Diffstat (limited to 'net/netfilter/xt_NOTRACK.c')
| -rw-r--r-- | net/netfilter/xt_NOTRACK.c | 53 | 
1 files changed, 0 insertions, 53 deletions
diff --git a/net/netfilter/xt_NOTRACK.c b/net/netfilter/xt_NOTRACK.c deleted file mode 100644 index 9d782181b6c..00000000000 --- a/net/netfilter/xt_NOTRACK.c +++ /dev/null @@ -1,53 +0,0 @@ -/* This is a module which is used for setting up fake conntracks - * on packets so that they are not seen by the conntrack/NAT code. - */ -#include <linux/module.h> -#include <linux/skbuff.h> - -#include <linux/netfilter/x_tables.h> -#include <net/netfilter/nf_conntrack.h> - -MODULE_DESCRIPTION("Xtables: Disabling connection tracking for packets"); -MODULE_LICENSE("GPL"); -MODULE_ALIAS("ipt_NOTRACK"); -MODULE_ALIAS("ip6t_NOTRACK"); - -static unsigned int -notrack_tg(struct sk_buff *skb, const struct xt_action_param *par) -{ -	/* Previously seen (loopback)? Ignore. */ -	if (skb->nfct != NULL) -		return XT_CONTINUE; - -	/* Attach fake conntrack entry. -	   If there is a real ct entry correspondig to this packet, -	   it'll hang aroun till timing out. We don't deal with it -	   for performance reasons. JK */ -	skb->nfct = &nf_ct_untracked_get()->ct_general; -	skb->nfctinfo = IP_CT_NEW; -	nf_conntrack_get(skb->nfct); - -	return XT_CONTINUE; -} - -static struct xt_target notrack_tg_reg __read_mostly = { -	.name     = "NOTRACK", -	.revision = 0, -	.family   = NFPROTO_UNSPEC, -	.target   = notrack_tg, -	.table    = "raw", -	.me       = THIS_MODULE, -}; - -static int __init notrack_tg_init(void) -{ -	return xt_register_target(¬rack_tg_reg); -} - -static void __exit notrack_tg_exit(void) -{ -	xt_unregister_target(¬rack_tg_reg); -} - -module_init(notrack_tg_init); -module_exit(notrack_tg_exit);  | 
