[NETFILTER]: Rename init functions.
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / net / ipv4 / netfilter / iptable_raw.c
CommitLineData
1da177e4
LT
1/*
2 * 'raw' table, which is the very first hooked in at PRE_ROUTING and LOCAL_OUT .
3 *
4 * Copyright (C) 2003 Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
5 */
6#include <linux/module.h>
7#include <linux/netfilter_ipv4/ip_tables.h>
8
9#define RAW_VALID_HOOKS ((1 << NF_IP_PRE_ROUTING) | (1 << NF_IP_LOCAL_OUT))
10
11static struct
12{
13 struct ipt_replace repl;
14 struct ipt_standard entries[2];
15 struct ipt_error term;
16} initial_table __initdata = {
17 .repl = {
18 .name = "raw",
19 .valid_hooks = RAW_VALID_HOOKS,
20 .num_entries = 3,
21 .size = sizeof(struct ipt_standard) * 2 + sizeof(struct ipt_error),
22 .hook_entry = {
23 [NF_IP_PRE_ROUTING] = 0,
24 [NF_IP_LOCAL_OUT] = sizeof(struct ipt_standard) },
25 .underflow = {
26 [NF_IP_PRE_ROUTING] = 0,
27 [NF_IP_LOCAL_OUT] = sizeof(struct ipt_standard) },
28 },
29 .entries = {
30 /* PRE_ROUTING */
31 {
32 .entry = {
33 .target_offset = sizeof(struct ipt_entry),
34 .next_offset = sizeof(struct ipt_standard),
35 },
36 .target = {
37 .target = {
38 .u = {
39 .target_size = IPT_ALIGN(sizeof(struct ipt_standard_target)),
40 },
41 },
42 .verdict = -NF_ACCEPT - 1,
43 },
44 },
45
46 /* LOCAL_OUT */
47 {
48 .entry = {
49 .target_offset = sizeof(struct ipt_entry),
50 .next_offset = sizeof(struct ipt_standard),
51 },
52 .target = {
53 .target = {
54 .u = {
55 .target_size = IPT_ALIGN(sizeof(struct ipt_standard_target)),
56 },
57 },
58 .verdict = -NF_ACCEPT - 1,
59 },
60 },
61 },
62 /* ERROR */
63 .term = {
64 .entry = {
65 .target_offset = sizeof(struct ipt_entry),
66 .next_offset = sizeof(struct ipt_error),
67 },
68 .target = {
69 .target = {
70 .u = {
71 .user = {
72 .target_size = IPT_ALIGN(sizeof(struct ipt_error_target)),
73 .name = IPT_ERROR_TARGET,
74 },
75 },
76 },
77 .errorname = "ERROR",
78 },
79 }
80};
81
82static struct ipt_table packet_raw = {
83 .name = "raw",
84 .valid_hooks = RAW_VALID_HOOKS,
85 .lock = RW_LOCK_UNLOCKED,
2e4e6a17
HW
86 .me = THIS_MODULE,
87 .af = AF_INET,
1da177e4
LT
88};
89
90/* The work comes in here from netfilter.c. */
91static unsigned int
92ipt_hook(unsigned int hook,
93 struct sk_buff **pskb,
94 const struct net_device *in,
95 const struct net_device *out,
96 int (*okfn)(struct sk_buff *))
97{
98 return ipt_do_table(pskb, hook, in, out, &packet_raw, NULL);
99}
100
101/* 'raw' is the very first table. */
102static struct nf_hook_ops ipt_ops[] = {
103 {
104 .hook = ipt_hook,
105 .pf = PF_INET,
106 .hooknum = NF_IP_PRE_ROUTING,
b4330957
PM
107 .priority = NF_IP_PRI_RAW,
108 .owner = THIS_MODULE,
1da177e4
LT
109 },
110 {
111 .hook = ipt_hook,
112 .pf = PF_INET,
113 .hooknum = NF_IP_LOCAL_OUT,
b4330957
PM
114 .priority = NF_IP_PRI_RAW,
115 .owner = THIS_MODULE,
1da177e4
LT
116 },
117};
118
65b4b4e8 119static int __init iptable_raw_init(void)
1da177e4
LT
120{
121 int ret;
122
123 /* Register table */
124 ret = ipt_register_table(&packet_raw, &initial_table.repl);
125 if (ret < 0)
126 return ret;
127
128 /* Register hooks */
129 ret = nf_register_hook(&ipt_ops[0]);
130 if (ret < 0)
131 goto cleanup_table;
132
133 ret = nf_register_hook(&ipt_ops[1]);
134 if (ret < 0)
135 goto cleanup_hook0;
136
137 return ret;
138
139 cleanup_hook0:
140 nf_unregister_hook(&ipt_ops[0]);
141 cleanup_table:
142 ipt_unregister_table(&packet_raw);
143
144 return ret;
145}
146
65b4b4e8 147static void __exit iptable_raw_fini(void)
1da177e4
LT
148{
149 unsigned int i;
150
151 for (i = 0; i < sizeof(ipt_ops)/sizeof(struct nf_hook_ops); i++)
152 nf_unregister_hook(&ipt_ops[i]);
153
154 ipt_unregister_table(&packet_raw);
155}
156
65b4b4e8
AM
157module_init(iptable_raw_init);
158module_exit(iptable_raw_fini);
1da177e4 159MODULE_LICENSE("GPL");