2005-04-16 22:20:36 +00:00
|
|
|
/*
|
|
|
|
* 'raw' table, which is the very first hooked in at PRE_ROUTING and LOCAL_OUT .
|
|
|
|
*
|
|
|
|
* Copyright (C) 2003 Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
|
|
|
|
*/
|
|
|
|
#include <linux/module.h>
|
|
|
|
#include <linux/netfilter_ipv4/ip_tables.h>
|
|
|
|
|
|
|
|
#define RAW_VALID_HOOKS ((1 << NF_IP_PRE_ROUTING) | (1 << NF_IP_LOCAL_OUT))
|
|
|
|
|
|
|
|
static struct
|
|
|
|
{
|
|
|
|
struct ipt_replace repl;
|
|
|
|
struct ipt_standard entries[2];
|
|
|
|
struct ipt_error term;
|
|
|
|
} initial_table __initdata = {
|
|
|
|
.repl = {
|
|
|
|
.name = "raw",
|
|
|
|
.valid_hooks = RAW_VALID_HOOKS,
|
|
|
|
.num_entries = 3,
|
|
|
|
.size = sizeof(struct ipt_standard) * 2 + sizeof(struct ipt_error),
|
|
|
|
.hook_entry = {
|
|
|
|
[NF_IP_PRE_ROUTING] = 0,
|
|
|
|
[NF_IP_LOCAL_OUT] = sizeof(struct ipt_standard) },
|
|
|
|
.underflow = {
|
|
|
|
[NF_IP_PRE_ROUTING] = 0,
|
|
|
|
[NF_IP_LOCAL_OUT] = sizeof(struct ipt_standard) },
|
|
|
|
},
|
|
|
|
.entries = {
|
|
|
|
/* PRE_ROUTING */
|
|
|
|
{
|
|
|
|
.entry = {
|
|
|
|
.target_offset = sizeof(struct ipt_entry),
|
|
|
|
.next_offset = sizeof(struct ipt_standard),
|
|
|
|
},
|
|
|
|
.target = {
|
|
|
|
.target = {
|
|
|
|
.u = {
|
|
|
|
.target_size = IPT_ALIGN(sizeof(struct ipt_standard_target)),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
.verdict = -NF_ACCEPT - 1,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
|
|
|
|
/* LOCAL_OUT */
|
|
|
|
{
|
|
|
|
.entry = {
|
|
|
|
.target_offset = sizeof(struct ipt_entry),
|
|
|
|
.next_offset = sizeof(struct ipt_standard),
|
|
|
|
},
|
|
|
|
.target = {
|
|
|
|
.target = {
|
|
|
|
.u = {
|
|
|
|
.target_size = IPT_ALIGN(sizeof(struct ipt_standard_target)),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
.verdict = -NF_ACCEPT - 1,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
/* ERROR */
|
|
|
|
.term = {
|
|
|
|
.entry = {
|
|
|
|
.target_offset = sizeof(struct ipt_entry),
|
|
|
|
.next_offset = sizeof(struct ipt_error),
|
|
|
|
},
|
|
|
|
.target = {
|
|
|
|
.target = {
|
|
|
|
.u = {
|
|
|
|
.user = {
|
|
|
|
.target_size = IPT_ALIGN(sizeof(struct ipt_error_target)),
|
|
|
|
.name = IPT_ERROR_TARGET,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
.errorname = "ERROR",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
static struct ipt_table packet_raw = {
|
|
|
|
.name = "raw",
|
|
|
|
.valid_hooks = RAW_VALID_HOOKS,
|
|
|
|
.lock = RW_LOCK_UNLOCKED,
|
[NETFILTER] x_tables: Abstraction layer for {ip,ip6,arp}_tables
This monster-patch tries to do the best job for unifying the data
structures and backend interfaces for the three evil clones ip_tables,
ip6_tables and arp_tables. In an ideal world we would never have
allowed this kind of copy+paste programming... but well, our world
isn't (yet?) ideal.
o introduce a new x_tables module
o {ip,arp,ip6}_tables depend on this x_tables module
o registration functions for tables, matches and targets are only
wrappers around x_tables provided functions
o all matches/targets that are used from ip_tables and ip6_tables
are now implemented as xt_FOOBAR.c files and provide module aliases
to ipt_FOOBAR and ip6t_FOOBAR
o header files for xt_matches are in include/linux/netfilter/,
include/linux/netfilter_{ipv4,ipv6} contains compatibility wrappers
around the xt_FOOBAR.h headers
Based on this patchset we're going to further unify the code,
gradually getting rid of all the layer 3 specific assumptions.
Signed-off-by: Harald Welte <laforge@netfilter.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2006-01-12 21:30:04 +00:00
|
|
|
.me = THIS_MODULE,
|
|
|
|
.af = AF_INET,
|
2005-04-16 22:20:36 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
/* The work comes in here from netfilter.c. */
|
|
|
|
static unsigned int
|
|
|
|
ipt_hook(unsigned int hook,
|
|
|
|
struct sk_buff **pskb,
|
|
|
|
const struct net_device *in,
|
|
|
|
const struct net_device *out,
|
|
|
|
int (*okfn)(struct sk_buff *))
|
|
|
|
{
|
|
|
|
return ipt_do_table(pskb, hook, in, out, &packet_raw, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* 'raw' is the very first table. */
|
|
|
|
static struct nf_hook_ops ipt_ops[] = {
|
|
|
|
{
|
|
|
|
.hook = ipt_hook,
|
|
|
|
.pf = PF_INET,
|
|
|
|
.hooknum = NF_IP_PRE_ROUTING,
|
2005-05-03 21:23:13 +00:00
|
|
|
.priority = NF_IP_PRI_RAW,
|
|
|
|
.owner = THIS_MODULE,
|
2005-04-16 22:20:36 +00:00
|
|
|
},
|
|
|
|
{
|
|
|
|
.hook = ipt_hook,
|
|
|
|
.pf = PF_INET,
|
|
|
|
.hooknum = NF_IP_LOCAL_OUT,
|
2005-05-03 21:23:13 +00:00
|
|
|
.priority = NF_IP_PRI_RAW,
|
|
|
|
.owner = THIS_MODULE,
|
2005-04-16 22:20:36 +00:00
|
|
|
},
|
|
|
|
};
|
|
|
|
|
|
|
|
static int __init init(void)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
/* Register table */
|
|
|
|
ret = ipt_register_table(&packet_raw, &initial_table.repl);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
/* Register hooks */
|
|
|
|
ret = nf_register_hook(&ipt_ops[0]);
|
|
|
|
if (ret < 0)
|
|
|
|
goto cleanup_table;
|
|
|
|
|
|
|
|
ret = nf_register_hook(&ipt_ops[1]);
|
|
|
|
if (ret < 0)
|
|
|
|
goto cleanup_hook0;
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
cleanup_hook0:
|
|
|
|
nf_unregister_hook(&ipt_ops[0]);
|
|
|
|
cleanup_table:
|
|
|
|
ipt_unregister_table(&packet_raw);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void __exit fini(void)
|
|
|
|
{
|
|
|
|
unsigned int i;
|
|
|
|
|
|
|
|
for (i = 0; i < sizeof(ipt_ops)/sizeof(struct nf_hook_ops); i++)
|
|
|
|
nf_unregister_hook(&ipt_ops[i]);
|
|
|
|
|
|
|
|
ipt_unregister_table(&packet_raw);
|
|
|
|
}
|
|
|
|
|
|
|
|
module_init(init);
|
|
|
|
module_exit(fini);
|
|
|
|
MODULE_LICENSE("GPL");
|