|
@@ -250,24 +250,12 @@ nf_nat_ipv4_fn(void *priv, struct sk_buff *skb,
|
|
|
{
|
|
|
struct nf_conn *ct;
|
|
|
enum ip_conntrack_info ctinfo;
|
|
|
- struct nf_conn_nat *nat;
|
|
|
- /* maniptype == SRC for postrouting. */
|
|
|
- enum nf_nat_manip_type maniptype = HOOK2MANIP(state->hook);
|
|
|
|
|
|
ct = nf_ct_get(skb, &ctinfo);
|
|
|
- /* Can't track? It's not due to stress, or conntrack would
|
|
|
- * have dropped it. Hence it's the user's responsibilty to
|
|
|
- * packet filter it out, or implement conntrack/NAT for that
|
|
|
- * protocol. 8) --RR
|
|
|
- */
|
|
|
if (!ct)
|
|
|
return NF_ACCEPT;
|
|
|
|
|
|
- nat = nfct_nat(ct);
|
|
|
-
|
|
|
- switch (ctinfo) {
|
|
|
- case IP_CT_RELATED:
|
|
|
- case IP_CT_RELATED_REPLY:
|
|
|
+ if (ctinfo == IP_CT_RELATED || ctinfo == IP_CT_RELATED_REPLY) {
|
|
|
if (ip_hdr(skb)->protocol == IPPROTO_ICMP) {
|
|
|
if (!nf_nat_icmp_reply_translation(skb, ct, ctinfo,
|
|
|
state->hook))
|
|
@@ -275,48 +263,9 @@ nf_nat_ipv4_fn(void *priv, struct sk_buff *skb,
|
|
|
else
|
|
|
return NF_ACCEPT;
|
|
|
}
|
|
|
- /* Only ICMPs can be IP_CT_IS_REPLY: */
|
|
|
- /* fall through */
|
|
|
- case IP_CT_NEW:
|
|
|
- /* Seen it before? This can happen for loopback, retrans,
|
|
|
- * or local packets.
|
|
|
- */
|
|
|
- if (!nf_nat_initialized(ct, maniptype)) {
|
|
|
- unsigned int ret;
|
|
|
-
|
|
|
- ret = do_chain(priv, skb, state);
|
|
|
- if (ret != NF_ACCEPT)
|
|
|
- return ret;
|
|
|
-
|
|
|
- if (nf_nat_initialized(ct, HOOK2MANIP(state->hook)))
|
|
|
- break;
|
|
|
-
|
|
|
- ret = nf_nat_alloc_null_binding(ct, state->hook);
|
|
|
- if (ret != NF_ACCEPT)
|
|
|
- return ret;
|
|
|
- } else {
|
|
|
- pr_debug("Already setup manip %s for ct %p\n",
|
|
|
- maniptype == NF_NAT_MANIP_SRC ? "SRC" : "DST",
|
|
|
- ct);
|
|
|
- if (nf_nat_oif_changed(state->hook, ctinfo, nat,
|
|
|
- state->out))
|
|
|
- goto oif_changed;
|
|
|
- }
|
|
|
- break;
|
|
|
-
|
|
|
- default:
|
|
|
- /* ESTABLISHED */
|
|
|
- WARN_ON(ctinfo != IP_CT_ESTABLISHED &&
|
|
|
- ctinfo != IP_CT_ESTABLISHED_REPLY);
|
|
|
- if (nf_nat_oif_changed(state->hook, ctinfo, nat, state->out))
|
|
|
- goto oif_changed;
|
|
|
}
|
|
|
|
|
|
- return nf_nat_packet(ct, ctinfo, state->hook, skb);
|
|
|
-
|
|
|
-oif_changed:
|
|
|
- nf_ct_kill_acct(ct, ctinfo, skb);
|
|
|
- return NF_DROP;
|
|
|
+ return nf_nat_inet_fn(priv, skb, state, do_chain);
|
|
|
}
|
|
|
EXPORT_SYMBOL_GPL(nf_nat_ipv4_fn);
|
|
|
|