Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1 | /* Kernel module to match connection tracking information. |
| 2 | * Superset of Rusty's minimalistic state match. |
| 3 | * |
| 4 | * (C) 2001 Marc Boucher (marc@mbsi.ca). |
| 5 | * |
| 6 | * This program is free software; you can redistribute it and/or modify |
| 7 | * it under the terms of the GNU General Public License version 2 as |
| 8 | * published by the Free Software Foundation. |
| 9 | */ |
| 10 | |
| 11 | #include <linux/module.h> |
| 12 | #include <linux/skbuff.h> |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 13 | |
| 14 | #if defined(CONFIG_IP_NF_CONNTRACK) || defined(CONFIG_IP_NF_CONNTRACK_MODULE) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 15 | #include <linux/netfilter_ipv4/ip_conntrack.h> |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 16 | #include <linux/netfilter_ipv4/ip_conntrack_tuple.h> |
| 17 | #else |
| 18 | #include <net/netfilter/nf_conntrack.h> |
| 19 | #endif |
| 20 | |
Harald Welte | 2e4e6a1 | 2006-01-12 13:30:04 -0800 | [diff] [blame] | 21 | #include <linux/netfilter/x_tables.h> |
| 22 | #include <linux/netfilter/xt_conntrack.h> |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 23 | |
| 24 | MODULE_LICENSE("GPL"); |
| 25 | MODULE_AUTHOR("Marc Boucher <marc@mbsi.ca>"); |
| 26 | MODULE_DESCRIPTION("iptables connection tracking match module"); |
Harald Welte | 2e4e6a1 | 2006-01-12 13:30:04 -0800 | [diff] [blame] | 27 | MODULE_ALIAS("ipt_conntrack"); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 28 | |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 29 | #if defined(CONFIG_IP_NF_CONNTRACK) || defined(CONFIG_IP_NF_CONNTRACK_MODULE) |
| 30 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 31 | static int |
| 32 | match(const struct sk_buff *skb, |
| 33 | const struct net_device *in, |
| 34 | const struct net_device *out, |
Patrick McHardy | c498673 | 2006-03-20 18:02:56 -0800 | [diff] [blame] | 35 | const struct xt_match *match, |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 36 | const void *matchinfo, |
| 37 | int offset, |
Harald Welte | 2e4e6a1 | 2006-01-12 13:30:04 -0800 | [diff] [blame] | 38 | unsigned int protoff, |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 39 | int *hotdrop) |
| 40 | { |
Harald Welte | 2e4e6a1 | 2006-01-12 13:30:04 -0800 | [diff] [blame] | 41 | const struct xt_conntrack_info *sinfo = matchinfo; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 42 | struct ip_conntrack *ct; |
| 43 | enum ip_conntrack_info ctinfo; |
| 44 | unsigned int statebit; |
| 45 | |
| 46 | ct = ip_conntrack_get((struct sk_buff *)skb, &ctinfo); |
| 47 | |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 48 | #define FWINV(bool, invflg) ((bool) ^ !!(sinfo->invflags & invflg)) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 49 | |
| 50 | if (ct == &ip_conntrack_untracked) |
Harald Welte | 2e4e6a1 | 2006-01-12 13:30:04 -0800 | [diff] [blame] | 51 | statebit = XT_CONNTRACK_STATE_UNTRACKED; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 52 | else if (ct) |
Harald Welte | 2e4e6a1 | 2006-01-12 13:30:04 -0800 | [diff] [blame] | 53 | statebit = XT_CONNTRACK_STATE_BIT(ctinfo); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 54 | else |
Harald Welte | 2e4e6a1 | 2006-01-12 13:30:04 -0800 | [diff] [blame] | 55 | statebit = XT_CONNTRACK_STATE_INVALID; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 56 | |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 57 | if (sinfo->flags & XT_CONNTRACK_STATE) { |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 58 | if (ct) { |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 59 | if (test_bit(IPS_SRC_NAT_BIT, &ct->status)) |
Harald Welte | 2e4e6a1 | 2006-01-12 13:30:04 -0800 | [diff] [blame] | 60 | statebit |= XT_CONNTRACK_STATE_SNAT; |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 61 | if (test_bit(IPS_DST_NAT_BIT, &ct->status)) |
Harald Welte | 2e4e6a1 | 2006-01-12 13:30:04 -0800 | [diff] [blame] | 62 | statebit |= XT_CONNTRACK_STATE_DNAT; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 63 | } |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 64 | if (FWINV((statebit & sinfo->statemask) == 0, |
| 65 | XT_CONNTRACK_STATE)) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 66 | return 0; |
| 67 | } |
| 68 | |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 69 | if (ct == NULL) { |
| 70 | if (sinfo->flags & ~XT_CONNTRACK_STATE) |
| 71 | return 0; |
| 72 | return 1; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 73 | } |
| 74 | |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 75 | if (sinfo->flags & XT_CONNTRACK_PROTO && |
| 76 | FWINV(ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.dst.protonum != |
| 77 | sinfo->tuple[IP_CT_DIR_ORIGINAL].dst.protonum, |
| 78 | XT_CONNTRACK_PROTO)) |
| 79 | return 0; |
| 80 | |
| 81 | if (sinfo->flags & XT_CONNTRACK_ORIGSRC && |
| 82 | FWINV((ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.src.ip & |
| 83 | sinfo->sipmsk[IP_CT_DIR_ORIGINAL].s_addr) != |
| 84 | sinfo->tuple[IP_CT_DIR_ORIGINAL].src.ip, |
| 85 | XT_CONNTRACK_ORIGSRC)) |
| 86 | return 0; |
| 87 | |
| 88 | if (sinfo->flags & XT_CONNTRACK_ORIGDST && |
| 89 | FWINV((ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.dst.ip & |
| 90 | sinfo->dipmsk[IP_CT_DIR_ORIGINAL].s_addr) != |
| 91 | sinfo->tuple[IP_CT_DIR_ORIGINAL].dst.ip, |
| 92 | XT_CONNTRACK_ORIGDST)) |
| 93 | return 0; |
| 94 | |
| 95 | if (sinfo->flags & XT_CONNTRACK_REPLSRC && |
| 96 | FWINV((ct->tuplehash[IP_CT_DIR_REPLY].tuple.src.ip & |
| 97 | sinfo->sipmsk[IP_CT_DIR_REPLY].s_addr) != |
| 98 | sinfo->tuple[IP_CT_DIR_REPLY].src.ip, |
| 99 | XT_CONNTRACK_REPLSRC)) |
| 100 | return 0; |
| 101 | |
| 102 | if (sinfo->flags & XT_CONNTRACK_REPLDST && |
| 103 | FWINV((ct->tuplehash[IP_CT_DIR_REPLY].tuple.dst.ip & |
| 104 | sinfo->dipmsk[IP_CT_DIR_REPLY].s_addr) != |
| 105 | sinfo->tuple[IP_CT_DIR_REPLY].dst.ip, |
| 106 | XT_CONNTRACK_REPLDST)) |
| 107 | return 0; |
| 108 | |
| 109 | if (sinfo->flags & XT_CONNTRACK_STATUS && |
| 110 | FWINV((ct->status & sinfo->statusmask) == 0, |
| 111 | XT_CONNTRACK_STATUS)) |
| 112 | return 0; |
| 113 | |
| 114 | if (sinfo->flags & XT_CONNTRACK_EXPIRES) { |
| 115 | unsigned long expires = timer_pending(&ct->timeout) ? |
| 116 | (ct->timeout.expires - jiffies)/HZ : 0; |
| 117 | |
| 118 | if (FWINV(!(expires >= sinfo->expires_min && |
| 119 | expires <= sinfo->expires_max), |
| 120 | XT_CONNTRACK_EXPIRES)) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 121 | return 0; |
| 122 | } |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 123 | return 1; |
| 124 | } |
| 125 | |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 126 | #else /* CONFIG_IP_NF_CONNTRACK */ |
| 127 | static int |
| 128 | match(const struct sk_buff *skb, |
| 129 | const struct net_device *in, |
| 130 | const struct net_device *out, |
Patrick McHardy | c498673 | 2006-03-20 18:02:56 -0800 | [diff] [blame] | 131 | const struct xt_match *match, |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 132 | const void *matchinfo, |
| 133 | int offset, |
Harald Welte | 2e4e6a1 | 2006-01-12 13:30:04 -0800 | [diff] [blame] | 134 | unsigned int protoff, |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 135 | int *hotdrop) |
| 136 | { |
Harald Welte | 2e4e6a1 | 2006-01-12 13:30:04 -0800 | [diff] [blame] | 137 | const struct xt_conntrack_info *sinfo = matchinfo; |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 138 | struct nf_conn *ct; |
| 139 | enum ip_conntrack_info ctinfo; |
| 140 | unsigned int statebit; |
| 141 | |
| 142 | ct = nf_ct_get((struct sk_buff *)skb, &ctinfo); |
| 143 | |
| 144 | #define FWINV(bool,invflg) ((bool) ^ !!(sinfo->invflags & invflg)) |
| 145 | |
| 146 | if (ct == &nf_conntrack_untracked) |
Harald Welte | 2e4e6a1 | 2006-01-12 13:30:04 -0800 | [diff] [blame] | 147 | statebit = XT_CONNTRACK_STATE_UNTRACKED; |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 148 | else if (ct) |
Harald Welte | 2e4e6a1 | 2006-01-12 13:30:04 -0800 | [diff] [blame] | 149 | statebit = XT_CONNTRACK_STATE_BIT(ctinfo); |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 150 | else |
Harald Welte | 2e4e6a1 | 2006-01-12 13:30:04 -0800 | [diff] [blame] | 151 | statebit = XT_CONNTRACK_STATE_INVALID; |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 152 | |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 153 | if (sinfo->flags & XT_CONNTRACK_STATE) { |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 154 | if (ct) { |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 155 | if (test_bit(IPS_SRC_NAT_BIT, &ct->status)) |
Harald Welte | 2e4e6a1 | 2006-01-12 13:30:04 -0800 | [diff] [blame] | 156 | statebit |= XT_CONNTRACK_STATE_SNAT; |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 157 | if (test_bit(IPS_DST_NAT_BIT, &ct->status)) |
Harald Welte | 2e4e6a1 | 2006-01-12 13:30:04 -0800 | [diff] [blame] | 158 | statebit |= XT_CONNTRACK_STATE_DNAT; |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 159 | } |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 160 | if (FWINV((statebit & sinfo->statemask) == 0, |
| 161 | XT_CONNTRACK_STATE)) |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 162 | return 0; |
| 163 | } |
| 164 | |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 165 | if (ct == NULL) { |
| 166 | if (sinfo->flags & ~XT_CONNTRACK_STATE) |
| 167 | return 0; |
| 168 | return 1; |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 169 | } |
| 170 | |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 171 | if (sinfo->flags & XT_CONNTRACK_PROTO && |
| 172 | FWINV(ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.dst.protonum != |
| 173 | sinfo->tuple[IP_CT_DIR_ORIGINAL].dst.protonum, |
| 174 | XT_CONNTRACK_PROTO)) |
| 175 | return 0; |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 176 | |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 177 | if (sinfo->flags & XT_CONNTRACK_ORIGSRC && |
| 178 | FWINV((ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.src.u3.ip & |
| 179 | sinfo->sipmsk[IP_CT_DIR_ORIGINAL].s_addr) != |
| 180 | sinfo->tuple[IP_CT_DIR_ORIGINAL].src.ip, |
| 181 | XT_CONNTRACK_ORIGSRC)) |
| 182 | return 0; |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 183 | |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 184 | if (sinfo->flags & XT_CONNTRACK_ORIGDST && |
| 185 | FWINV((ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.dst.u3.ip & |
| 186 | sinfo->dipmsk[IP_CT_DIR_ORIGINAL].s_addr) != |
| 187 | sinfo->tuple[IP_CT_DIR_ORIGINAL].dst.ip, |
| 188 | XT_CONNTRACK_ORIGDST)) |
| 189 | return 0; |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 190 | |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 191 | if (sinfo->flags & XT_CONNTRACK_REPLSRC && |
| 192 | FWINV((ct->tuplehash[IP_CT_DIR_REPLY].tuple.src.u3.ip & |
| 193 | sinfo->sipmsk[IP_CT_DIR_REPLY].s_addr) != |
| 194 | sinfo->tuple[IP_CT_DIR_REPLY].src.ip, |
| 195 | XT_CONNTRACK_REPLSRC)) |
| 196 | return 0; |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 197 | |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 198 | if (sinfo->flags & XT_CONNTRACK_REPLDST && |
| 199 | FWINV((ct->tuplehash[IP_CT_DIR_REPLY].tuple.dst.u3.ip & |
| 200 | sinfo->dipmsk[IP_CT_DIR_REPLY].s_addr) != |
| 201 | sinfo->tuple[IP_CT_DIR_REPLY].dst.ip, |
| 202 | XT_CONNTRACK_REPLDST)) |
| 203 | return 0; |
| 204 | |
| 205 | if (sinfo->flags & XT_CONNTRACK_STATUS && |
| 206 | FWINV((ct->status & sinfo->statusmask) == 0, |
| 207 | XT_CONNTRACK_STATUS)) |
| 208 | return 0; |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 209 | |
Harald Welte | 2e4e6a1 | 2006-01-12 13:30:04 -0800 | [diff] [blame] | 210 | if(sinfo->flags & XT_CONNTRACK_EXPIRES) { |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 211 | unsigned long expires = timer_pending(&ct->timeout) ? |
| 212 | (ct->timeout.expires - jiffies)/HZ : 0; |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 213 | |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 214 | if (FWINV(!(expires >= sinfo->expires_min && |
| 215 | expires <= sinfo->expires_max), |
| 216 | XT_CONNTRACK_EXPIRES)) |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 217 | return 0; |
| 218 | } |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 219 | return 1; |
| 220 | } |
| 221 | |
| 222 | #endif /* CONFIG_NF_IP_CONNTRACK */ |
| 223 | |
Pablo Neira Ayuso | b9f78f9 | 2006-03-22 13:56:08 -0800 | [diff] [blame] | 224 | static int |
| 225 | checkentry(const char *tablename, |
| 226 | const void *ip, |
| 227 | const struct xt_match *match, |
| 228 | void *matchinfo, |
Pablo Neira Ayuso | b9f78f9 | 2006-03-22 13:56:08 -0800 | [diff] [blame] | 229 | unsigned int hook_mask) |
| 230 | { |
| 231 | #if defined(CONFIG_NF_CONNTRACK) || defined(CONFIG_NF_CONNTRACK_MODULE) |
| 232 | if (nf_ct_l3proto_try_module_get(match->family) < 0) { |
| 233 | printk(KERN_WARNING "can't load nf_conntrack support for " |
| 234 | "proto=%d\n", match->family); |
| 235 | return 0; |
| 236 | } |
| 237 | #endif |
| 238 | return 1; |
| 239 | } |
| 240 | |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 241 | static void destroy(const struct xt_match *match, void *matchinfo) |
Pablo Neira Ayuso | b9f78f9 | 2006-03-22 13:56:08 -0800 | [diff] [blame] | 242 | { |
| 243 | #if defined(CONFIG_NF_CONNTRACK) || defined(CONFIG_NF_CONNTRACK_MODULE) |
| 244 | nf_ct_l3proto_module_put(match->family); |
| 245 | #endif |
| 246 | } |
| 247 | |
Harald Welte | 2e4e6a1 | 2006-01-12 13:30:04 -0800 | [diff] [blame] | 248 | static struct xt_match conntrack_match = { |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 249 | .name = "conntrack", |
Patrick McHardy | 5d04bff | 2006-03-20 18:01:58 -0800 | [diff] [blame] | 250 | .match = match, |
Pablo Neira Ayuso | b9f78f9 | 2006-03-22 13:56:08 -0800 | [diff] [blame] | 251 | .checkentry = checkentry, |
| 252 | .destroy = destroy, |
Patrick McHardy | 5d04bff | 2006-03-20 18:01:58 -0800 | [diff] [blame] | 253 | .matchsize = sizeof(struct xt_conntrack_info), |
Pablo Neira Ayuso | a45049c | 2006-03-22 13:55:40 -0800 | [diff] [blame] | 254 | .family = AF_INET, |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 255 | .me = THIS_MODULE, |
| 256 | }; |
| 257 | |
Andrew Morton | 65b4b4e | 2006-03-28 16:37:06 -0800 | [diff] [blame] | 258 | static int __init xt_conntrack_init(void) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 259 | { |
Harald Welte | 2e4e6a1 | 2006-01-12 13:30:04 -0800 | [diff] [blame] | 260 | need_conntrack(); |
Patrick McHardy | 4470bbc | 2006-08-22 00:34:04 -0700 | [diff] [blame] | 261 | return xt_register_match(&conntrack_match); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 262 | } |
| 263 | |
Andrew Morton | 65b4b4e | 2006-03-28 16:37:06 -0800 | [diff] [blame] | 264 | static void __exit xt_conntrack_fini(void) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 265 | { |
Pablo Neira Ayuso | a45049c | 2006-03-22 13:55:40 -0800 | [diff] [blame] | 266 | xt_unregister_match(&conntrack_match); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 267 | } |
| 268 | |
Andrew Morton | 65b4b4e | 2006-03-28 16:37:06 -0800 | [diff] [blame] | 269 | module_init(xt_conntrack_init); |
| 270 | module_exit(xt_conntrack_fini); |