[NETFILTER]: Mark hooks __read_mostly
authorPatrick McHardy <kaber@trash.net>
Wed, 5 Dec 2007 09:23:00 +0000 (01:23 -0800)
committerDavid S. Miller <davem@davemloft.net>
Mon, 28 Jan 2008 22:56:07 +0000 (14:56 -0800)
Signed-off-by: Patrick McHardy <kaber@trash.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
17 files changed:
net/bridge/br_netfilter.c
net/bridge/netfilter/ebtable_filter.c
net/bridge/netfilter/ebtable_nat.c
net/decnet/netfilter/dn_rtmsg.c
net/ipv4/ipvs/ip_vs_core.c
net/ipv4/netfilter/arptable_filter.c
net/ipv4/netfilter/ipt_CLUSTERIP.c
net/ipv4/netfilter/iptable_filter.c
net/ipv4/netfilter/iptable_mangle.c
net/ipv4/netfilter/iptable_raw.c
net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c
net/ipv4/netfilter/nf_nat_standalone.c
net/ipv6/netfilter/ip6table_filter.c
net/ipv6/netfilter/ip6table_mangle.c
net/ipv6/netfilter/ip6table_raw.c
net/ipv6/netfilter/nf_conntrack_l3proto_ipv6.c
net/sched/sch_ingress.c

index f9ef3e58b4cb31d5164e4ddb0c74b3e4aeed1097..859fe4d866985511af52a65890362bae5b11cf27 100644 (file)
@@ -871,7 +871,7 @@ static unsigned int ip_sabotage_in(unsigned int hook, struct sk_buff *skb,
  * PF_BRIDGE/NF_BR_LOCAL_OUT functions don't get bridged traffic as input.
  * For br_nf_post_routing, we need (prio = NF_BR_PRI_LAST), because
  * ip_refrag() can return NF_STOLEN. */
-static struct nf_hook_ops br_nf_ops[] = {
+static struct nf_hook_ops br_nf_ops[] __read_mostly = {
        { .hook = br_nf_pre_routing,
          .owner = THIS_MODULE,
          .pf = PF_BRIDGE,
index 210493f99bc48f09e4c1c90bbb8bc63426465e81..fb810908732f6b420de1ada658915fa80463ae8e 100644 (file)
@@ -67,7 +67,7 @@ ebt_hook(unsigned int hook, struct sk_buff *skb, const struct net_device *in,
        return ebt_do_table(hook, skb, in, out, &frame_filter);
 }
 
-static struct nf_hook_ops ebt_ops_filter[] = {
+static struct nf_hook_ops ebt_ops_filter[] __read_mostly = {
        {
                .hook           = ebt_hook,
                .owner          = THIS_MODULE,
index 3e58c2e5ee213c02881dc9b5cea498464a5c7b98..bc712730c54a96925bbe1558ce5b261d69f6f473 100644 (file)
@@ -74,7 +74,7 @@ ebt_nat_src(unsigned int hook, struct sk_buff *skb, const struct net_device *in
        return ebt_do_table(hook, skb, in, out, &frame_nat);
 }
 
-static struct nf_hook_ops ebt_ops_nat[] = {
+static struct nf_hook_ops ebt_ops_nat[] __read_mostly = {
        {
                .hook           = ebt_nat_dst,
                .owner          = THIS_MODULE,
index 43fcd29046d1f30b14a60569284ef0ab4afa69d3..96375f2e64ff912818f185615d992c3dc73a8d1a 100644 (file)
@@ -115,7 +115,7 @@ static inline void dnrmg_receive_user_skb(struct sk_buff *skb)
        RCV_SKB_FAIL(-EINVAL);
 }
 
-static struct nf_hook_ops dnrmg_ops = {
+static struct nf_hook_ops dnrmg_ops __read_mostly = {
        .hook           = dnrmg_hook,
        .pf             = PF_DECnet,
        .hooknum        = NF_DN_ROUTE,
index f5ba606f05491a7cd80a419f92e6a65ebfc7a6b0..041f5120808a9062b67c8bb4ba8699d6326b079d 100644 (file)
@@ -1025,7 +1025,7 @@ ip_vs_forward_icmp(unsigned int hooknum, struct sk_buff *skb,
 }
 
 
-static struct nf_hook_ops ip_vs_ops[]  = {
+static struct nf_hook_ops ip_vs_ops[] __read_mostly = {
        /* After packet filtering, forward packet through VS/DR, VS/TUN,
         * or VS/NAT(change destination), so that filtering rules can be
         * applied to IPVS. */
index 302d3da5f696ea6f57f4c09fc403fb8f43c3df6c..7201511d54d2dbc0da216b4ae8ff04d0483dd733 100644 (file)
@@ -64,7 +64,7 @@ static unsigned int arpt_hook(unsigned int hook,
        return arpt_do_table(skb, hook, in, out, &packet_filter);
 }
 
-static struct nf_hook_ops arpt_ops[] = {
+static struct nf_hook_ops arpt_ops[] __read_mostly = {
        {
                .hook           = arpt_hook,
                .owner          = THIS_MODULE,
index b5de6bd3e43a4354adf196aae482568f82ee75d3..dc1e7b4188310d8d6c21091574817ed9bad8c4c6 100644 (file)
@@ -551,7 +551,7 @@ arp_mangle(unsigned int hook,
        return NF_ACCEPT;
 }
 
-static struct nf_hook_ops cip_arp_ops = {
+static struct nf_hook_ops cip_arp_ops __read_mostly = {
        .hook = arp_mangle,
        .pf = NF_ARP,
        .hooknum = NF_ARP_OUT,
index 06ab64e30e88673d77b1a0fdf7c6fc5419d48e41..29bb4f9fbda0f7f7d4fcc5cce744e557907f0e86 100644 (file)
@@ -91,7 +91,7 @@ ipt_local_out_hook(unsigned int hook,
        return ipt_do_table(skb, hook, in, out, &packet_filter);
 }
 
-static struct nf_hook_ops ipt_ops[] = {
+static struct nf_hook_ops ipt_ops[] __read_mostly = {
        {
                .hook           = ipt_hook,
                .owner          = THIS_MODULE,
index 0335827d3e4d2a103437439cd50b690134a400ad..5c4be202430c8b7dbcabea9306ae8989b8d29f1d 100644 (file)
@@ -128,7 +128,7 @@ ipt_local_hook(unsigned int hook,
        return ret;
 }
 
-static struct nf_hook_ops ipt_ops[] = {
+static struct nf_hook_ops ipt_ops[] __read_mostly = {
        {
                .hook           = ipt_route_hook,
                .owner          = THIS_MODULE,
index 66be23295594bcead7b784f8a1e11021afbc80ea..dc34aa274533b8d5893fd6d4bd3642a003c19e28 100644 (file)
@@ -74,7 +74,7 @@ ipt_local_hook(unsigned int hook,
 }
 
 /* 'raw' is the very first table. */
-static struct nf_hook_ops ipt_ops[] = {
+static struct nf_hook_ops ipt_ops[] __read_mostly = {
        {
                .hook = ipt_hook,
                .pf = PF_INET,
index c91725a85789e480256a4b6ffcf5b89ef1038e37..cd2d8451ddadd78e72a3bd435901a682e8b8a56f 100644 (file)
@@ -185,7 +185,7 @@ static unsigned int ipv4_conntrack_local(unsigned int hooknum,
 
 /* Connection tracking may drop packets, but never alters them, so
    make it the first hook. */
-static struct nf_hook_ops ipv4_conntrack_ops[] = {
+static struct nf_hook_ops ipv4_conntrack_ops[] __read_mostly = {
        {
                .hook           = ipv4_conntrack_defrag,
                .owner          = THIS_MODULE,
index 84172e9dcb162167f264339f765f64a7589d35fc..a2b02f01cc5c6bf312ff2422e9dd0e9f5c3e335e 100644 (file)
@@ -273,7 +273,7 @@ nf_nat_adjust(unsigned int hooknum,
 
 /* We must be after connection tracking and before packet filtering. */
 
-static struct nf_hook_ops nf_nat_ops[] = {
+static struct nf_hook_ops nf_nat_ops[] __read_mostly = {
        /* Before packet filtering, change destination */
        {
                .hook           = nf_nat_in,
index 0ae072dd6924b78a2046f3b73cd025cf4c4de725..87d38d08aad090e92f7f2dc022d203a7fb5ad54e 100644 (file)
@@ -90,7 +90,7 @@ ip6t_local_out_hook(unsigned int hook,
        return ip6t_do_table(skb, hook, in, out, &packet_filter);
 }
 
-static struct nf_hook_ops ip6t_ops[] = {
+static struct nf_hook_ops ip6t_ops[] __read_mostly = {
        {
                .hook           = ip6t_hook,
                .owner          = THIS_MODULE,
index 8e62b231682987bf615f156ace81b84535123b6f..d6082600bc5db6d260183e0da010252e6413a157 100644 (file)
@@ -120,7 +120,7 @@ ip6t_local_hook(unsigned int hook,
        return ret;
 }
 
-static struct nf_hook_ops ip6t_ops[] = {
+static struct nf_hook_ops ip6t_ops[] __read_mostly = {
        {
                .hook           = ip6t_route_hook,
                .owner          = THIS_MODULE,
index 4fecd8de8cc24cb7d4bfa2cd31f77752ce05b470..eccbaaa104af264a3308208178abce7c30a0c64b 100644 (file)
@@ -54,7 +54,7 @@ ip6t_hook(unsigned int hook,
        return ip6t_do_table(skb, hook, in, out, &packet_raw);
 }
 
-static struct nf_hook_ops ip6t_ops[] = {
+static struct nf_hook_ops ip6t_ops[] __read_mostly = {
        {
          .hook = ip6t_hook,
          .pf = PF_INET6,
index 50f46787fda4f2c96c7e887ca73a5060ec795748..97a553036dde88f74e738b84cd8fd6de4ecf2a6b 100644 (file)
@@ -258,7 +258,7 @@ static unsigned int ipv6_conntrack_local(unsigned int hooknum,
        return ipv6_conntrack_in(hooknum, skb, in, out, okfn);
 }
 
-static struct nf_hook_ops ipv6_conntrack_ops[] = {
+static struct nf_hook_ops ipv6_conntrack_ops[] __read_mostly = {
        {
                .hook           = ipv6_defrag,
                .owner          = THIS_MODULE,
index f4af9b604f3f09899e4789f10a6cc6d033b6309c..89c32a9bcc5e01be4bde3434b31beca93fbd8e92 100644 (file)
@@ -231,7 +231,7 @@ ing_hook(unsigned int hook, struct sk_buff *skb,
 }
 
 /* after ipt_filter */
-static struct nf_hook_ops ing_ops[] = {
+static struct nf_hook_ops ing_ops[] __read_mostly = {
        {
                .hook           = ing_hook,
                .owner          = THIS_MODULE,