vserver 2.0 rc7
[linux-2.6.git] / net / ipv4 / netfilter / iptable_raw.c
1 /* 
2  * 'raw' table, which is the very first hooked in at PRE_ROUTING and LOCAL_OUT .
3  *
4  * Copyright (C) 2003 Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
5  */
6 #include <linux/module.h>
7 #include <linux/netfilter_ipv4/ip_tables.h>
8
9 #define RAW_VALID_HOOKS ((1 << NF_IP_PRE_ROUTING) | (1 << NF_IP_LOCAL_OUT))
10
11 static struct
12 {
13         struct ipt_replace repl;
14         struct ipt_standard entries[2];
15         struct ipt_error term;
16 } initial_table __initdata = {
17         .repl = {
18                 .name = "raw", 
19                 .valid_hooks = RAW_VALID_HOOKS, 
20                 .num_entries = 3,
21                 .size = sizeof(struct ipt_standard) * 2 + sizeof(struct ipt_error),
22                 .hook_entry = { 
23                         [NF_IP_PRE_ROUTING] = 0,
24                         [NF_IP_LOCAL_OUT] = sizeof(struct ipt_standard) },
25                 .underflow = { 
26                         [NF_IP_PRE_ROUTING] = 0,
27                         [NF_IP_LOCAL_OUT]  = sizeof(struct ipt_standard) },
28         },
29         .entries = {
30              /* PRE_ROUTING */
31              { 
32                      .entry = { 
33                              .target_offset = sizeof(struct ipt_entry),
34                              .next_offset = sizeof(struct ipt_standard),
35                      },
36                      .target = { 
37                           .target = { 
38                                   .u = {
39                                           .target_size = IPT_ALIGN(sizeof(struct ipt_standard_target)),
40                                   },
41                           },
42                           .verdict = -NF_ACCEPT - 1,
43                      },
44              },
45
46              /* LOCAL_OUT */
47              {
48                      .entry = {
49                              .target_offset = sizeof(struct ipt_entry),
50                              .next_offset = sizeof(struct ipt_standard),
51                      },
52                      .target = {
53                              .target = {
54                                      .u = {
55                                              .target_size = IPT_ALIGN(sizeof(struct ipt_standard_target)),
56                                      },
57                              },
58                              .verdict = -NF_ACCEPT - 1,
59                      },
60              },
61         },
62         /* ERROR */
63         .term = {
64                 .entry = {
65                         .target_offset = sizeof(struct ipt_entry),
66                         .next_offset = sizeof(struct ipt_error),
67                 },
68                 .target = {
69                         .target = {
70                                 .u = {
71                                         .user = {
72                                                 .target_size = IPT_ALIGN(sizeof(struct ipt_error_target)), 
73                                                 .name = IPT_ERROR_TARGET,
74                                         },
75                                 },
76                         },
77                         .errorname = "ERROR",
78                 },
79         }
80 };
81
82 static struct ipt_table packet_raw = { 
83         .name = "raw", 
84         .valid_hooks =  RAW_VALID_HOOKS, 
85         .lock = RW_LOCK_UNLOCKED, 
86         .me = THIS_MODULE
87 };
88
89 /* The work comes in here from netfilter.c. */
90 static unsigned int
91 ipt_hook(unsigned int hook,
92          struct sk_buff **pskb,
93          const struct net_device *in,
94          const struct net_device *out,
95          int (*okfn)(struct sk_buff *))
96 {
97         return ipt_do_table(pskb, hook, in, out, &packet_raw, NULL);
98 }
99
100 /* 'raw' is the very first table. */
101 static struct nf_hook_ops ipt_ops[] = {
102         {
103           .hook = ipt_hook, 
104           .pf = PF_INET, 
105           .hooknum = NF_IP_PRE_ROUTING, 
106           .priority = NF_IP_PRI_RAW,
107           .owner = THIS_MODULE,
108         },
109         {
110           .hook = ipt_hook, 
111           .pf = PF_INET, 
112           .hooknum = NF_IP_LOCAL_OUT, 
113           .priority = NF_IP_PRI_RAW,
114           .owner = THIS_MODULE,
115         },
116 };
117
118 static int __init init(void)
119 {
120         int ret;
121
122         /* Register table */
123         ret = ipt_register_table(&packet_raw, &initial_table.repl);
124         if (ret < 0)
125                 return ret;
126
127         /* Register hooks */
128         ret = nf_register_hook(&ipt_ops[0]);
129         if (ret < 0)
130                 goto cleanup_table;
131
132         ret = nf_register_hook(&ipt_ops[1]);
133         if (ret < 0)
134                 goto cleanup_hook0;
135
136         return ret;
137
138  cleanup_hook0:
139         nf_unregister_hook(&ipt_ops[0]);
140  cleanup_table:
141         ipt_unregister_table(&packet_raw);
142
143         return ret;
144 }
145
146 static void __exit fini(void)
147 {
148         unsigned int i;
149
150         for (i = 0; i < sizeof(ipt_ops)/sizeof(struct nf_hook_ops); i++)
151                 nf_unregister_hook(&ipt_ops[i]);
152
153         ipt_unregister_table(&packet_raw);
154 }
155
156 module_init(init);
157 module_exit(fini);
158 MODULE_LICENSE("GPL");