Commit | Line | Data |
---|---|---|
e905a9ed | 1 | /* |
1da177e4 LT |
2 | * 'raw' table, which is the very first hooked in at PRE_ROUTING and LOCAL_OUT . |
3 | * | |
4 | * Copyright (C) 2003 Jozsef Kadlecsik <kadlec@blackhole.kfki.hu> | |
5 | */ | |
6 | #include <linux/module.h> | |
7 | #include <linux/netfilter_ipv4/ip_tables.h> | |
5a0e3ad6 | 8 | #include <linux/slab.h> |
802169a4 | 9 | #include <net/ip.h> |
1da177e4 | 10 | |
6e23ae2a | 11 | #define RAW_VALID_HOOKS ((1 << NF_INET_PRE_ROUTING) | (1 << NF_INET_LOCAL_OUT)) |
1da177e4 | 12 | |
35aad0ff | 13 | static const struct xt_table packet_raw = { |
e905a9ed YH |
14 | .name = "raw", |
15 | .valid_hooks = RAW_VALID_HOOKS, | |
2e4e6a17 | 16 | .me = THIS_MODULE, |
f88e6a8a | 17 | .af = NFPROTO_IPV4, |
2b95efe7 | 18 | .priority = NF_IP_PRI_RAW, |
1da177e4 LT |
19 | }; |
20 | ||
21 | /* The work comes in here from netfilter.c. */ | |
22 | static unsigned int | |
795aa6ef | 23 | iptable_raw_hook(const struct nf_hook_ops *ops, struct sk_buff *skb, |
238e54c9 | 24 | const struct nf_hook_state *state) |
1da177e4 | 25 | { |
2b21e051 | 26 | const struct net *net; |
1da177e4 | 27 | |
795aa6ef | 28 | if (ops->hooknum == NF_INET_LOCAL_OUT && |
2b21e051 JE |
29 | (skb->len < sizeof(struct iphdr) || |
30 | ip_hdrlen(skb) < sizeof(struct iphdr))) | |
31 | /* root is playing with raw sockets. */ | |
802169a4 | 32 | return NF_ACCEPT; |
2b21e051 | 33 | |
238e54c9 DM |
34 | net = dev_net(state->in ? state->in : state->out); |
35 | return ipt_do_table(skb, ops->hooknum, state->in, state->out, | |
36 | net->ipv4.iptable_raw); | |
802169a4 PM |
37 | } |
38 | ||
2b95efe7 | 39 | static struct nf_hook_ops *rawtable_ops __read_mostly; |
1da177e4 | 40 | |
9335f047 AD |
41 | static int __net_init iptable_raw_net_init(struct net *net) |
42 | { | |
e3eaa991 JE |
43 | struct ipt_replace *repl; |
44 | ||
45 | repl = ipt_alloc_initial_table(&packet_raw); | |
46 | if (repl == NULL) | |
47 | return -ENOMEM; | |
9335f047 | 48 | net->ipv4.iptable_raw = |
e3eaa991 JE |
49 | ipt_register_table(net, &packet_raw, repl); |
50 | kfree(repl); | |
8c6ffba0 | 51 | return PTR_ERR_OR_ZERO(net->ipv4.iptable_raw); |
9335f047 AD |
52 | } |
53 | ||
54 | static void __net_exit iptable_raw_net_exit(struct net *net) | |
55 | { | |
f54e9367 | 56 | ipt_unregister_table(net, net->ipv4.iptable_raw); |
9335f047 AD |
57 | } |
58 | ||
59 | static struct pernet_operations iptable_raw_net_ops = { | |
60 | .init = iptable_raw_net_init, | |
61 | .exit = iptable_raw_net_exit, | |
62 | }; | |
63 | ||
65b4b4e8 | 64 | static int __init iptable_raw_init(void) |
1da177e4 LT |
65 | { |
66 | int ret; | |
67 | ||
9335f047 AD |
68 | ret = register_pernet_subsys(&iptable_raw_net_ops); |
69 | if (ret < 0) | |
70 | return ret; | |
1da177e4 LT |
71 | |
72 | /* Register hooks */ | |
2b95efe7 JE |
73 | rawtable_ops = xt_hook_link(&packet_raw, iptable_raw_hook); |
74 | if (IS_ERR(rawtable_ops)) { | |
75 | ret = PTR_ERR(rawtable_ops); | |
90efbed1 | 76 | unregister_pernet_subsys(&iptable_raw_net_ops); |
2b95efe7 | 77 | } |
1da177e4 | 78 | |
1da177e4 | 79 | return ret; |
1da177e4 LT |
80 | } |
81 | ||
65b4b4e8 | 82 | static void __exit iptable_raw_fini(void) |
1da177e4 | 83 | { |
2b95efe7 | 84 | xt_hook_unlink(&packet_raw, rawtable_ops); |
9335f047 | 85 | unregister_pernet_subsys(&iptable_raw_net_ops); |
1da177e4 LT |
86 | } |
87 | ||
65b4b4e8 AM |
88 | module_init(iptable_raw_init); |
89 | module_exit(iptable_raw_fini); | |
1da177e4 | 90 | MODULE_LICENSE("GPL"); |