[JFFS2] Use a single config option for write buffer support
[linux-2.6.git] / net / ipv4 / netfilter / iptable_raw.c
blob47449ba83eb9410280a8463b477501d839ff32bb
1 /*
2 * 'raw' table, which is the very first hooked in at PRE_ROUTING and LOCAL_OUT .
4 * Copyright (C) 2003 Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
5 */
6 #include <linux/module.h>
7 #include <linux/netfilter_ipv4/ip_tables.h>
9 #define RAW_VALID_HOOKS ((1 << NF_IP_PRE_ROUTING) | (1 << NF_IP_LOCAL_OUT))
11 static struct
13 struct ipt_replace repl;
14 struct ipt_standard entries[2];
15 struct ipt_error term;
16 } initial_table __initdata = {
17 .repl = {
18 .name = "raw",
19 .valid_hooks = RAW_VALID_HOOKS,
20 .num_entries = 3,
21 .size = sizeof(struct ipt_standard) * 2 + sizeof(struct ipt_error),
22 .hook_entry = {
23 [NF_IP_PRE_ROUTING] = 0,
24 [NF_IP_LOCAL_OUT] = sizeof(struct ipt_standard) },
25 .underflow = {
26 [NF_IP_PRE_ROUTING] = 0,
27 [NF_IP_LOCAL_OUT] = sizeof(struct ipt_standard) },
29 .entries = {
30 /* PRE_ROUTING */
32 .entry = {
33 .target_offset = sizeof(struct ipt_entry),
34 .next_offset = sizeof(struct ipt_standard),
36 .target = {
37 .target = {
38 .u = {
39 .target_size = IPT_ALIGN(sizeof(struct ipt_standard_target)),
42 .verdict = -NF_ACCEPT - 1,
46 /* LOCAL_OUT */
48 .entry = {
49 .target_offset = sizeof(struct ipt_entry),
50 .next_offset = sizeof(struct ipt_standard),
52 .target = {
53 .target = {
54 .u = {
55 .target_size = IPT_ALIGN(sizeof(struct ipt_standard_target)),
58 .verdict = -NF_ACCEPT - 1,
62 /* ERROR */
63 .term = {
64 .entry = {
65 .target_offset = sizeof(struct ipt_entry),
66 .next_offset = sizeof(struct ipt_error),
68 .target = {
69 .target = {
70 .u = {
71 .user = {
72 .target_size = IPT_ALIGN(sizeof(struct ipt_error_target)),
73 .name = IPT_ERROR_TARGET,
77 .errorname = "ERROR",
82 static struct ipt_table packet_raw = {
83 .name = "raw",
84 .valid_hooks = RAW_VALID_HOOKS,
85 .lock = RW_LOCK_UNLOCKED,
86 .me = THIS_MODULE
89 /* The work comes in here from netfilter.c. */
90 static unsigned int
91 ipt_hook(unsigned int hook,
92 struct sk_buff **pskb,
93 const struct net_device *in,
94 const struct net_device *out,
95 int (*okfn)(struct sk_buff *))
97 return ipt_do_table(pskb, hook, in, out, &packet_raw, NULL);
100 /* 'raw' is the very first table. */
101 static struct nf_hook_ops ipt_ops[] = {
103 .hook = ipt_hook,
104 .pf = PF_INET,
105 .hooknum = NF_IP_PRE_ROUTING,
106 .priority = NF_IP_PRI_RAW,
107 .owner = THIS_MODULE,
110 .hook = ipt_hook,
111 .pf = PF_INET,
112 .hooknum = NF_IP_LOCAL_OUT,
113 .priority = NF_IP_PRI_RAW,
114 .owner = THIS_MODULE,
118 static int __init init(void)
120 int ret;
122 /* Register table */
123 ret = ipt_register_table(&packet_raw, &initial_table.repl);
124 if (ret < 0)
125 return ret;
127 /* Register hooks */
128 ret = nf_register_hook(&ipt_ops[0]);
129 if (ret < 0)
130 goto cleanup_table;
132 ret = nf_register_hook(&ipt_ops[1]);
133 if (ret < 0)
134 goto cleanup_hook0;
136 return ret;
138 cleanup_hook0:
139 nf_unregister_hook(&ipt_ops[0]);
140 cleanup_table:
141 ipt_unregister_table(&packet_raw);
143 return ret;
146 static void __exit fini(void)
148 unsigned int i;
150 for (i = 0; i < sizeof(ipt_ops)/sizeof(struct nf_hook_ops); i++)
151 nf_unregister_hook(&ipt_ops[i]);
153 ipt_unregister_table(&packet_raw);
156 module_init(init);
157 module_exit(fini);
158 MODULE_LICENSE("GPL");