Commit 2a37d755 authored by Patrick McHardy's avatar Patrick McHardy Committed by Pablo Neira Ayuso

netfilter: nf_tables: constify chain type definitions and pointers

Signed-off-by: default avatarPatrick McHardy <kaber@trash.net>
Signed-off-by: default avatarPablo Neira Ayuso <pablo@netfilter.org>
parent 93b0806f
...@@ -436,7 +436,7 @@ struct nft_stats { ...@@ -436,7 +436,7 @@ struct nft_stats {
*/ */
struct nft_base_chain { struct nft_base_chain {
struct nf_hook_ops ops[NFT_HOOK_OPS_MAX]; struct nf_hook_ops ops[NFT_HOOK_OPS_MAX];
struct nf_chain_type *type; const struct nf_chain_type *type;
u8 policy; u8 policy;
struct nft_stats __percpu *stats; struct nft_stats __percpu *stats;
struct nft_chain chain; struct nft_chain chain;
...@@ -507,8 +507,8 @@ struct nf_chain_type { ...@@ -507,8 +507,8 @@ struct nf_chain_type {
int family; int family;
}; };
int nft_register_chain_type(struct nf_chain_type *); int nft_register_chain_type(const struct nf_chain_type *);
void nft_unregister_chain_type(struct nf_chain_type *); void nft_unregister_chain_type(const struct nf_chain_type *);
int nft_register_expr(struct nft_expr_type *); int nft_register_expr(struct nft_expr_type *);
void nft_unregister_expr(struct nft_expr_type *); void nft_unregister_expr(struct nft_expr_type *);
......
...@@ -68,7 +68,7 @@ static struct pernet_operations nf_tables_bridge_net_ops = { ...@@ -68,7 +68,7 @@ static struct pernet_operations nf_tables_bridge_net_ops = {
.exit = nf_tables_bridge_exit_net, .exit = nf_tables_bridge_exit_net,
}; };
static struct nf_chain_type filter_bridge = { static const struct nf_chain_type filter_bridge = {
.family = NFPROTO_BRIDGE, .family = NFPROTO_BRIDGE,
.name = "filter", .name = "filter",
.type = NFT_CHAIN_T_DEFAULT, .type = NFT_CHAIN_T_DEFAULT,
......
...@@ -68,7 +68,7 @@ static struct pernet_operations nf_tables_arp_net_ops = { ...@@ -68,7 +68,7 @@ static struct pernet_operations nf_tables_arp_net_ops = {
.exit = nf_tables_arp_exit_net, .exit = nf_tables_arp_exit_net,
}; };
static struct nf_chain_type filter_arp = { static const struct nf_chain_type filter_arp = {
.family = NFPROTO_ARP, .family = NFPROTO_ARP,
.name = "filter", .name = "filter",
.type = NFT_CHAIN_T_DEFAULT, .type = NFT_CHAIN_T_DEFAULT,
......
...@@ -91,7 +91,7 @@ static struct pernet_operations nf_tables_ipv4_net_ops = { ...@@ -91,7 +91,7 @@ static struct pernet_operations nf_tables_ipv4_net_ops = {
.exit = nf_tables_ipv4_exit_net, .exit = nf_tables_ipv4_exit_net,
}; };
static struct nf_chain_type filter_ipv4 = { static const struct nf_chain_type filter_ipv4 = {
.family = NFPROTO_IPV4, .family = NFPROTO_IPV4,
.name = "filter", .name = "filter",
.type = NFT_CHAIN_T_DEFAULT, .type = NFT_CHAIN_T_DEFAULT,
......
...@@ -164,7 +164,7 @@ static unsigned int nf_nat_output(const struct nf_hook_ops *ops, ...@@ -164,7 +164,7 @@ static unsigned int nf_nat_output(const struct nf_hook_ops *ops,
return ret; return ret;
} }
static struct nf_chain_type nft_chain_nat_ipv4 = { static const struct nf_chain_type nft_chain_nat_ipv4 = {
.family = NFPROTO_IPV4, .family = NFPROTO_IPV4,
.name = "nat", .name = "nat",
.type = NFT_CHAIN_T_NAT, .type = NFT_CHAIN_T_NAT,
......
...@@ -61,7 +61,7 @@ static unsigned int nf_route_table_hook(const struct nf_hook_ops *ops, ...@@ -61,7 +61,7 @@ static unsigned int nf_route_table_hook(const struct nf_hook_ops *ops,
return ret; return ret;
} }
static struct nf_chain_type nft_chain_route_ipv4 = { static const struct nf_chain_type nft_chain_route_ipv4 = {
.family = NFPROTO_IPV4, .family = NFPROTO_IPV4,
.name = "route", .name = "route",
.type = NFT_CHAIN_T_ROUTE, .type = NFT_CHAIN_T_ROUTE,
......
...@@ -90,7 +90,7 @@ static struct pernet_operations nf_tables_ipv6_net_ops = { ...@@ -90,7 +90,7 @@ static struct pernet_operations nf_tables_ipv6_net_ops = {
.exit = nf_tables_ipv6_exit_net, .exit = nf_tables_ipv6_exit_net,
}; };
static struct nf_chain_type filter_ipv6 = { static const struct nf_chain_type filter_ipv6 = {
.family = NFPROTO_IPV6, .family = NFPROTO_IPV6,
.name = "filter", .name = "filter",
.type = NFT_CHAIN_T_DEFAULT, .type = NFT_CHAIN_T_DEFAULT,
......
...@@ -170,7 +170,7 @@ static unsigned int nf_nat_ipv6_output(const struct nf_hook_ops *ops, ...@@ -170,7 +170,7 @@ static unsigned int nf_nat_ipv6_output(const struct nf_hook_ops *ops,
return ret; return ret;
} }
static struct nf_chain_type nft_chain_nat_ipv6 = { static const struct nf_chain_type nft_chain_nat_ipv6 = {
.family = NFPROTO_IPV6, .family = NFPROTO_IPV6,
.name = "nat", .name = "nat",
.type = NFT_CHAIN_T_NAT, .type = NFT_CHAIN_T_NAT,
......
...@@ -59,7 +59,7 @@ static unsigned int nf_route_table_hook(const struct nf_hook_ops *ops, ...@@ -59,7 +59,7 @@ static unsigned int nf_route_table_hook(const struct nf_hook_ops *ops,
return ret; return ret;
} }
static struct nf_chain_type nft_chain_route_ipv6 = { static const struct nf_chain_type nft_chain_route_ipv6 = {
.family = NFPROTO_IPV6, .family = NFPROTO_IPV6,
.name = "route", .name = "route",
.type = NFT_CHAIN_T_ROUTE, .type = NFT_CHAIN_T_ROUTE,
......
...@@ -124,9 +124,9 @@ static inline u64 nf_tables_alloc_handle(struct nft_table *table) ...@@ -124,9 +124,9 @@ static inline u64 nf_tables_alloc_handle(struct nft_table *table)
return ++table->hgenerator; return ++table->hgenerator;
} }
static struct nf_chain_type *chain_type[AF_MAX][NFT_CHAIN_T_MAX]; static const struct nf_chain_type *chain_type[AF_MAX][NFT_CHAIN_T_MAX];
static struct nf_chain_type * static const struct nf_chain_type *
__nf_tables_chain_type_lookup(int family, const struct nlattr *nla) __nf_tables_chain_type_lookup(int family, const struct nlattr *nla)
{ {
int i; int i;
...@@ -139,12 +139,12 @@ __nf_tables_chain_type_lookup(int family, const struct nlattr *nla) ...@@ -139,12 +139,12 @@ __nf_tables_chain_type_lookup(int family, const struct nlattr *nla)
return NULL; return NULL;
} }
static struct nf_chain_type * static const struct nf_chain_type *
nf_tables_chain_type_lookup(const struct nft_af_info *afi, nf_tables_chain_type_lookup(const struct nft_af_info *afi,
const struct nlattr *nla, const struct nlattr *nla,
bool autoload) bool autoload)
{ {
struct nf_chain_type *type; const struct nf_chain_type *type;
type = __nf_tables_chain_type_lookup(afi->family, nla); type = __nf_tables_chain_type_lookup(afi->family, nla);
if (type != NULL) if (type != NULL)
...@@ -475,7 +475,7 @@ static int nf_tables_deltable(struct sock *nlsk, struct sk_buff *skb, ...@@ -475,7 +475,7 @@ static int nf_tables_deltable(struct sock *nlsk, struct sk_buff *skb,
return 0; return 0;
} }
int nft_register_chain_type(struct nf_chain_type *ctype) int nft_register_chain_type(const struct nf_chain_type *ctype)
{ {
int err = 0; int err = 0;
...@@ -491,7 +491,7 @@ int nft_register_chain_type(struct nf_chain_type *ctype) ...@@ -491,7 +491,7 @@ int nft_register_chain_type(struct nf_chain_type *ctype)
} }
EXPORT_SYMBOL_GPL(nft_register_chain_type); EXPORT_SYMBOL_GPL(nft_register_chain_type);
void nft_unregister_chain_type(struct nf_chain_type *ctype) void nft_unregister_chain_type(const struct nf_chain_type *ctype)
{ {
nfnl_lock(NFNL_SUBSYS_NFTABLES); nfnl_lock(NFNL_SUBSYS_NFTABLES);
chain_type[ctype->family][ctype->type] = NULL; chain_type[ctype->family][ctype->type] = NULL;
...@@ -900,7 +900,7 @@ static int nf_tables_newchain(struct sock *nlsk, struct sk_buff *skb, ...@@ -900,7 +900,7 @@ static int nf_tables_newchain(struct sock *nlsk, struct sk_buff *skb,
return -EOVERFLOW; return -EOVERFLOW;
if (nla[NFTA_CHAIN_HOOK]) { if (nla[NFTA_CHAIN_HOOK]) {
struct nf_chain_type *type; const struct nf_chain_type *type;
struct nf_hook_ops *ops; struct nf_hook_ops *ops;
nf_hookfn *hookfn; nf_hookfn *hookfn;
u32 hooknum, priority; u32 hooknum, priority;
......
...@@ -66,7 +66,7 @@ static struct pernet_operations nf_tables_inet_net_ops = { ...@@ -66,7 +66,7 @@ static struct pernet_operations nf_tables_inet_net_ops = {
.exit = nf_tables_inet_exit_net, .exit = nf_tables_inet_exit_net,
}; };
static struct nf_chain_type filter_inet = { static const struct nf_chain_type filter_inet = {
.family = NFPROTO_INET, .family = NFPROTO_INET,
.name = "filter", .name = "filter",
.type = NFT_CHAIN_T_DEFAULT, .type = NFT_CHAIN_T_DEFAULT,
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment