diff options
author | Jan Engelhardt <jengelh@medozas.de> | 2008-10-08 05:35:17 -0400 |
---|---|---|
committer | Patrick McHardy <kaber@trash.net> | 2008-10-08 05:35:17 -0400 |
commit | aba0d34800d7f56493b4d5548cc06498a4d69124 (patch) | |
tree | 1ee6e0cf91cca286ea0601dcedfd5febc1461742 /net | |
parent | 20f3c56f4d7c76bcb66050f3364aa8da110f5bbd (diff) |
netfilter: xtables: sort extensions alphabetically in Kconfig
Signed-off-by: Jan Engelhardt <jengelh@medozas.de>
Signed-off-by: Patrick McHardy <kaber@trash.net>
Diffstat (limited to 'net')
-rw-r--r-- | net/ipv4/netfilter/Kconfig | 78 | ||||
-rw-r--r-- | net/ipv6/netfilter/Kconfig | 44 | ||||
-rw-r--r-- | net/netfilter/Kconfig | 100 |
3 files changed, 111 insertions, 111 deletions
diff --git a/net/ipv4/netfilter/Kconfig b/net/ipv4/netfilter/Kconfig index 07757ac8d5d8..087b82906848 100644 --- a/net/ipv4/netfilter/Kconfig +++ b/net/ipv4/netfilter/Kconfig | |||
@@ -62,15 +62,16 @@ config IP_NF_IPTABLES | |||
62 | To compile it as a module, choose M here. If unsure, say N. | 62 | To compile it as a module, choose M here. If unsure, say N. |
63 | 63 | ||
64 | # The matches. | 64 | # The matches. |
65 | config IP_NF_MATCH_ECN | 65 | config IP_NF_MATCH_ADDRTYPE |
66 | tristate '"ecn" match support' | 66 | tristate '"addrtype" address type match support' |
67 | depends on IP_NF_IPTABLES | 67 | depends on IP_NF_IPTABLES |
68 | depends on NETFILTER_ADVANCED | 68 | depends on NETFILTER_ADVANCED |
69 | help | 69 | help |
70 | This option adds a `ECN' match, which allows you to match against | 70 | This option allows you to match what routing thinks of an address, |
71 | the IPv4 and TCP header ECN fields. | 71 | eg. UNICAST, LOCAL, BROADCAST, ... |
72 | 72 | ||
73 | To compile it as a module, choose M here. If unsure, say N. | 73 | If you want to compile it as a module, say M here and read |
74 | <file:Documentation/kbuild/modules.txt>. If unsure, say `N'. | ||
74 | 75 | ||
75 | config IP_NF_MATCH_AH | 76 | config IP_NF_MATCH_AH |
76 | tristate '"ah" match support' | 77 | tristate '"ah" match support' |
@@ -82,26 +83,25 @@ config IP_NF_MATCH_AH | |||
82 | 83 | ||
83 | To compile it as a module, choose M here. If unsure, say N. | 84 | To compile it as a module, choose M here. If unsure, say N. |
84 | 85 | ||
85 | config IP_NF_MATCH_TTL | 86 | config IP_NF_MATCH_ECN |
86 | tristate '"ttl" match support' | 87 | tristate '"ecn" match support' |
87 | depends on IP_NF_IPTABLES | 88 | depends on IP_NF_IPTABLES |
88 | depends on NETFILTER_ADVANCED | 89 | depends on NETFILTER_ADVANCED |
89 | help | 90 | help |
90 | This adds CONFIG_IP_NF_MATCH_TTL option, which enabled the user | 91 | This option adds a `ECN' match, which allows you to match against |
91 | to match packets by their TTL value. | 92 | the IPv4 and TCP header ECN fields. |
92 | 93 | ||
93 | To compile it as a module, choose M here. If unsure, say N. | 94 | To compile it as a module, choose M here. If unsure, say N. |
94 | 95 | ||
95 | config IP_NF_MATCH_ADDRTYPE | 96 | config IP_NF_MATCH_TTL |
96 | tristate '"addrtype" address type match support' | 97 | tristate '"ttl" match support' |
97 | depends on IP_NF_IPTABLES | 98 | depends on IP_NF_IPTABLES |
98 | depends on NETFILTER_ADVANCED | 99 | depends on NETFILTER_ADVANCED |
99 | help | 100 | help |
100 | This option allows you to match what routing thinks of an address, | 101 | This adds CONFIG_IP_NF_MATCH_TTL option, which enabled the user |
101 | eg. UNICAST, LOCAL, BROADCAST, ... | 102 | to match packets by their TTL value. |
102 | 103 | ||
103 | If you want to compile it as a module, say M here and read | 104 | To compile it as a module, choose M here. If unsure, say N. |
104 | <file:Documentation/kbuild/modules.txt>. If unsure, say `N'. | ||
105 | 105 | ||
106 | # `filter', generic and specific targets | 106 | # `filter', generic and specific targets |
107 | config IP_NF_FILTER | 107 | config IP_NF_FILTER |
@@ -186,26 +186,26 @@ config IP_NF_TARGET_MASQUERADE | |||
186 | 186 | ||
187 | To compile it as a module, choose M here. If unsure, say N. | 187 | To compile it as a module, choose M here. If unsure, say N. |
188 | 188 | ||
189 | config IP_NF_TARGET_REDIRECT | 189 | config IP_NF_TARGET_NETMAP |
190 | tristate "REDIRECT target support" | 190 | tristate "NETMAP target support" |
191 | depends on NF_NAT | 191 | depends on NF_NAT |
192 | depends on NETFILTER_ADVANCED | 192 | depends on NETFILTER_ADVANCED |
193 | help | 193 | help |
194 | REDIRECT is a special case of NAT: all incoming connections are | 194 | NETMAP is an implementation of static 1:1 NAT mapping of network |
195 | mapped onto the incoming interface's address, causing the packets to | 195 | addresses. It maps the network address part, while keeping the host |
196 | come to the local machine instead of passing through. This is | 196 | address part intact. |
197 | useful for transparent proxies. | ||
198 | 197 | ||
199 | To compile it as a module, choose M here. If unsure, say N. | 198 | To compile it as a module, choose M here. If unsure, say N. |
200 | 199 | ||
201 | config IP_NF_TARGET_NETMAP | 200 | config IP_NF_TARGET_REDIRECT |
202 | tristate "NETMAP target support" | 201 | tristate "REDIRECT target support" |
203 | depends on NF_NAT | 202 | depends on NF_NAT |
204 | depends on NETFILTER_ADVANCED | 203 | depends on NETFILTER_ADVANCED |
205 | help | 204 | help |
206 | NETMAP is an implementation of static 1:1 NAT mapping of network | 205 | REDIRECT is a special case of NAT: all incoming connections are |
207 | addresses. It maps the network address part, while keeping the host | 206 | mapped onto the incoming interface's address, causing the packets to |
208 | address part intact. | 207 | come to the local machine instead of passing through. This is |
208 | useful for transparent proxies. | ||
209 | 209 | ||
210 | To compile it as a module, choose M here. If unsure, say N. | 210 | To compile it as a module, choose M here. If unsure, say N. |
211 | 211 | ||
@@ -300,6 +300,19 @@ config IP_NF_MANGLE | |||
300 | 300 | ||
301 | To compile it as a module, choose M here. If unsure, say N. | 301 | To compile it as a module, choose M here. If unsure, say N. |
302 | 302 | ||
303 | config IP_NF_TARGET_CLUSTERIP | ||
304 | tristate "CLUSTERIP target support (EXPERIMENTAL)" | ||
305 | depends on IP_NF_MANGLE && EXPERIMENTAL | ||
306 | depends on NF_CONNTRACK_IPV4 | ||
307 | depends on NETFILTER_ADVANCED | ||
308 | select NF_CONNTRACK_MARK | ||
309 | help | ||
310 | The CLUSTERIP target allows you to build load-balancing clusters of | ||
311 | network servers without having a dedicated load-balancing | ||
312 | router/server/switch. | ||
313 | |||
314 | To compile it as a module, choose M here. If unsure, say N. | ||
315 | |||
303 | config IP_NF_TARGET_ECN | 316 | config IP_NF_TARGET_ECN |
304 | tristate "ECN target support" | 317 | tristate "ECN target support" |
305 | depends on IP_NF_MANGLE | 318 | depends on IP_NF_MANGLE |
@@ -330,19 +343,6 @@ config IP_NF_TARGET_TTL | |||
330 | 343 | ||
331 | To compile it as a module, choose M here. If unsure, say N. | 344 | To compile it as a module, choose M here. If unsure, say N. |
332 | 345 | ||
333 | config IP_NF_TARGET_CLUSTERIP | ||
334 | tristate "CLUSTERIP target support (EXPERIMENTAL)" | ||
335 | depends on IP_NF_MANGLE && EXPERIMENTAL | ||
336 | depends on NF_CONNTRACK_IPV4 | ||
337 | depends on NETFILTER_ADVANCED | ||
338 | select NF_CONNTRACK_MARK | ||
339 | help | ||
340 | The CLUSTERIP target allows you to build load-balancing clusters of | ||
341 | network servers without having a dedicated load-balancing | ||
342 | router/server/switch. | ||
343 | |||
344 | To compile it as a module, choose M here. If unsure, say N. | ||
345 | |||
346 | # raw + specific targets | 346 | # raw + specific targets |
347 | config IP_NF_RAW | 347 | config IP_NF_RAW |
348 | tristate 'raw table support (required for NOTRACK/TRACE)' | 348 | tristate 'raw table support (required for NOTRACK/TRACE)' |
diff --git a/net/ipv6/netfilter/Kconfig b/net/ipv6/netfilter/Kconfig index fee881bd31ff..91ffba08c29f 100644 --- a/net/ipv6/netfilter/Kconfig +++ b/net/ipv6/netfilter/Kconfig | |||
@@ -56,23 +56,23 @@ config IP6_NF_IPTABLES | |||
56 | To compile it as a module, choose M here. If unsure, say N. | 56 | To compile it as a module, choose M here. If unsure, say N. |
57 | 57 | ||
58 | # The simple matches. | 58 | # The simple matches. |
59 | config IP6_NF_MATCH_RT | 59 | config IP6_NF_MATCH_AH |
60 | tristate '"rt" Routing header match support' | 60 | tristate '"ah" match support' |
61 | depends on IP6_NF_IPTABLES | 61 | depends on IP6_NF_IPTABLES |
62 | depends on NETFILTER_ADVANCED | 62 | depends on NETFILTER_ADVANCED |
63 | help | 63 | help |
64 | rt matching allows you to match packets based on the routing | 64 | This module allows one to match AH packets. |
65 | header of the packet. | ||
66 | 65 | ||
67 | To compile it as a module, choose M here. If unsure, say N. | 66 | To compile it as a module, choose M here. If unsure, say N. |
68 | 67 | ||
69 | config IP6_NF_MATCH_OPTS | 68 | config IP6_NF_MATCH_EUI64 |
70 | tristate '"hbh" hop-by-hop and "dst" opts header match support' | 69 | tristate '"eui64" address check' |
71 | depends on IP6_NF_IPTABLES | 70 | depends on IP6_NF_IPTABLES |
72 | depends on NETFILTER_ADVANCED | 71 | depends on NETFILTER_ADVANCED |
73 | help | 72 | help |
74 | This allows one to match packets based on the hop-by-hop | 73 | This module performs checking on the IPv6 source address |
75 | and destination options headers of a packet. | 74 | Compares the last 64 bits with the EUI64 (delivered |
75 | from the MAC address) address | ||
76 | 76 | ||
77 | To compile it as a module, choose M here. If unsure, say N. | 77 | To compile it as a module, choose M here. If unsure, say N. |
78 | 78 | ||
@@ -86,6 +86,16 @@ config IP6_NF_MATCH_FRAG | |||
86 | 86 | ||
87 | To compile it as a module, choose M here. If unsure, say N. | 87 | To compile it as a module, choose M here. If unsure, say N. |
88 | 88 | ||
89 | config IP6_NF_MATCH_OPTS | ||
90 | tristate '"hbh" hop-by-hop and "dst" opts header match support' | ||
91 | depends on IP6_NF_IPTABLES | ||
92 | depends on NETFILTER_ADVANCED | ||
93 | help | ||
94 | This allows one to match packets based on the hop-by-hop | ||
95 | and destination options headers of a packet. | ||
96 | |||
97 | To compile it as a module, choose M here. If unsure, say N. | ||
98 | |||
89 | config IP6_NF_MATCH_HL | 99 | config IP6_NF_MATCH_HL |
90 | tristate '"hl" match support' | 100 | tristate '"hl" match support' |
91 | depends on IP6_NF_IPTABLES | 101 | depends on IP6_NF_IPTABLES |
@@ -106,15 +116,6 @@ config IP6_NF_MATCH_IPV6HEADER | |||
106 | 116 | ||
107 | To compile it as a module, choose M here. If unsure, say N. | 117 | To compile it as a module, choose M here. If unsure, say N. |
108 | 118 | ||
109 | config IP6_NF_MATCH_AH | ||
110 | tristate '"ah" match support' | ||
111 | depends on IP6_NF_IPTABLES | ||
112 | depends on NETFILTER_ADVANCED | ||
113 | help | ||
114 | This module allows one to match AH packets. | ||
115 | |||
116 | To compile it as a module, choose M here. If unsure, say N. | ||
117 | |||
118 | config IP6_NF_MATCH_MH | 119 | config IP6_NF_MATCH_MH |
119 | tristate '"mh" match support' | 120 | tristate '"mh" match support' |
120 | depends on IP6_NF_IPTABLES | 121 | depends on IP6_NF_IPTABLES |
@@ -124,14 +125,13 @@ config IP6_NF_MATCH_MH | |||
124 | 125 | ||
125 | To compile it as a module, choose M here. If unsure, say N. | 126 | To compile it as a module, choose M here. If unsure, say N. |
126 | 127 | ||
127 | config IP6_NF_MATCH_EUI64 | 128 | config IP6_NF_MATCH_RT |
128 | tristate '"eui64" address check' | 129 | tristate '"rt" Routing header match support' |
129 | depends on IP6_NF_IPTABLES | 130 | depends on IP6_NF_IPTABLES |
130 | depends on NETFILTER_ADVANCED | 131 | depends on NETFILTER_ADVANCED |
131 | help | 132 | help |
132 | This module performs checking on the IPv6 source address | 133 | rt matching allows you to match packets based on the routing |
133 | Compares the last 64 bits with the EUI64 (delivered | 134 | header of the packet. |
134 | from the MAC address) address | ||
135 | 135 | ||
136 | To compile it as a module, choose M here. If unsure, say N. | 136 | To compile it as a module, choose M here. If unsure, say N. |
137 | 137 | ||
diff --git a/net/netfilter/Kconfig b/net/netfilter/Kconfig index de18bba619f2..9ad74e8bc5bd 100644 --- a/net/netfilter/Kconfig +++ b/net/netfilter/Kconfig | |||
@@ -340,6 +340,18 @@ config NETFILTER_XT_TARGET_CONNMARK | |||
340 | <file:Documentation/kbuild/modules.txt>. The module will be called | 340 | <file:Documentation/kbuild/modules.txt>. The module will be called |
341 | ipt_CONNMARK.ko. If unsure, say `N'. | 341 | ipt_CONNMARK.ko. If unsure, say `N'. |
342 | 342 | ||
343 | config NETFILTER_XT_TARGET_CONNSECMARK | ||
344 | tristate '"CONNSECMARK" target support' | ||
345 | depends on NETFILTER_XTABLES && NF_CONNTRACK && NF_CONNTRACK_SECMARK | ||
346 | default m if NETFILTER_ADVANCED=n | ||
347 | help | ||
348 | The CONNSECMARK target copies security markings from packets | ||
349 | to connections, and restores security markings from connections | ||
350 | to packets (if the packets are not already marked). This would | ||
351 | normally be used in conjunction with the SECMARK target. | ||
352 | |||
353 | To compile it as a module, choose M here. If unsure, say N. | ||
354 | |||
343 | config NETFILTER_XT_TARGET_DSCP | 355 | config NETFILTER_XT_TARGET_DSCP |
344 | tristate '"DSCP" and "TOS" target support' | 356 | tristate '"DSCP" and "TOS" target support' |
345 | depends on NETFILTER_XTABLES | 357 | depends on NETFILTER_XTABLES |
@@ -371,18 +383,6 @@ config NETFILTER_XT_TARGET_MARK | |||
371 | 383 | ||
372 | To compile it as a module, choose M here. If unsure, say N. | 384 | To compile it as a module, choose M here. If unsure, say N. |
373 | 385 | ||
374 | config NETFILTER_XT_TARGET_NFQUEUE | ||
375 | tristate '"NFQUEUE" target Support' | ||
376 | depends on NETFILTER_XTABLES | ||
377 | depends on NETFILTER_ADVANCED | ||
378 | help | ||
379 | This target replaced the old obsolete QUEUE target. | ||
380 | |||
381 | As opposed to QUEUE, it supports 65535 different queues, | ||
382 | not just one. | ||
383 | |||
384 | To compile it as a module, choose M here. If unsure, say N. | ||
385 | |||
386 | config NETFILTER_XT_TARGET_NFLOG | 386 | config NETFILTER_XT_TARGET_NFLOG |
387 | tristate '"NFLOG" target support' | 387 | tristate '"NFLOG" target support' |
388 | depends on NETFILTER_XTABLES | 388 | depends on NETFILTER_XTABLES |
@@ -395,6 +395,18 @@ config NETFILTER_XT_TARGET_NFLOG | |||
395 | 395 | ||
396 | To compile it as a module, choose M here. If unsure, say N. | 396 | To compile it as a module, choose M here. If unsure, say N. |
397 | 397 | ||
398 | config NETFILTER_XT_TARGET_NFQUEUE | ||
399 | tristate '"NFQUEUE" target Support' | ||
400 | depends on NETFILTER_XTABLES | ||
401 | depends on NETFILTER_ADVANCED | ||
402 | help | ||
403 | This target replaced the old obsolete QUEUE target. | ||
404 | |||
405 | As opposed to QUEUE, it supports 65535 different queues, | ||
406 | not just one. | ||
407 | |||
408 | To compile it as a module, choose M here. If unsure, say N. | ||
409 | |||
398 | config NETFILTER_XT_TARGET_NOTRACK | 410 | config NETFILTER_XT_TARGET_NOTRACK |
399 | tristate '"NOTRACK" target support' | 411 | tristate '"NOTRACK" target support' |
400 | depends on NETFILTER_XTABLES | 412 | depends on NETFILTER_XTABLES |
@@ -459,18 +471,6 @@ config NETFILTER_XT_TARGET_SECMARK | |||
459 | 471 | ||
460 | To compile it as a module, choose M here. If unsure, say N. | 472 | To compile it as a module, choose M here. If unsure, say N. |
461 | 473 | ||
462 | config NETFILTER_XT_TARGET_CONNSECMARK | ||
463 | tristate '"CONNSECMARK" target support' | ||
464 | depends on NETFILTER_XTABLES && NF_CONNTRACK && NF_CONNTRACK_SECMARK | ||
465 | default m if NETFILTER_ADVANCED=n | ||
466 | help | ||
467 | The CONNSECMARK target copies security markings from packets | ||
468 | to connections, and restores security markings from connections | ||
469 | to packets (if the packets are not already marked). This would | ||
470 | normally be used in conjunction with the SECMARK target. | ||
471 | |||
472 | To compile it as a module, choose M here. If unsure, say N. | ||
473 | |||
474 | config NETFILTER_XT_TARGET_TCPMSS | 474 | config NETFILTER_XT_TARGET_TCPMSS |
475 | tristate '"TCPMSS" target support' | 475 | tristate '"TCPMSS" target support' |
476 | depends on NETFILTER_XTABLES && (IPV6 || IPV6=n) | 476 | depends on NETFILTER_XTABLES && (IPV6 || IPV6=n) |
@@ -607,6 +607,21 @@ config NETFILTER_XT_MATCH_ESP | |||
607 | 607 | ||
608 | To compile it as a module, choose M here. If unsure, say N. | 608 | To compile it as a module, choose M here. If unsure, say N. |
609 | 609 | ||
610 | config NETFILTER_XT_MATCH_HASHLIMIT | ||
611 | tristate '"hashlimit" match support' | ||
612 | depends on NETFILTER_XTABLES && (IP6_NF_IPTABLES || IP6_NF_IPTABLES=n) | ||
613 | depends on NETFILTER_ADVANCED | ||
614 | help | ||
615 | This option adds a `hashlimit' match. | ||
616 | |||
617 | As opposed to `limit', this match dynamically creates a hash table | ||
618 | of limit buckets, based on your selection of source/destination | ||
619 | addresses and/or ports. | ||
620 | |||
621 | It enables you to express policies like `10kpps for any given | ||
622 | destination address' or `500pps from any given source address' | ||
623 | with a single rule. | ||
624 | |||
610 | config NETFILTER_XT_MATCH_HELPER | 625 | config NETFILTER_XT_MATCH_HELPER |
611 | tristate '"helper" match support' | 626 | tristate '"helper" match support' |
612 | depends on NETFILTER_XTABLES | 627 | depends on NETFILTER_XTABLES |
@@ -671,6 +686,17 @@ config NETFILTER_XT_MATCH_MARK | |||
671 | 686 | ||
672 | To compile it as a module, choose M here. If unsure, say N. | 687 | To compile it as a module, choose M here. If unsure, say N. |
673 | 688 | ||
689 | config NETFILTER_XT_MATCH_MULTIPORT | ||
690 | tristate '"multiport" Multiple port match support' | ||
691 | depends on NETFILTER_XTABLES | ||
692 | depends on NETFILTER_ADVANCED | ||
693 | help | ||
694 | Multiport matching allows you to match TCP or UDP packets based on | ||
695 | a series of source or destination ports: normally a rule can only | ||
696 | match a single range of ports. | ||
697 | |||
698 | To compile it as a module, choose M here. If unsure, say N. | ||
699 | |||
674 | config NETFILTER_XT_MATCH_OWNER | 700 | config NETFILTER_XT_MATCH_OWNER |
675 | tristate '"owner" match support' | 701 | tristate '"owner" match support' |
676 | depends on NETFILTER_XTABLES | 702 | depends on NETFILTER_XTABLES |
@@ -691,17 +717,6 @@ config NETFILTER_XT_MATCH_POLICY | |||
691 | 717 | ||
692 | To compile it as a module, choose M here. If unsure, say N. | 718 | To compile it as a module, choose M here. If unsure, say N. |
693 | 719 | ||
694 | config NETFILTER_XT_MATCH_MULTIPORT | ||
695 | tristate '"multiport" Multiple port match support' | ||
696 | depends on NETFILTER_XTABLES | ||
697 | depends on NETFILTER_ADVANCED | ||
698 | help | ||
699 | Multiport matching allows you to match TCP or UDP packets based on | ||
700 | a series of source or destination ports: normally a rule can only | ||
701 | match a single range of ports. | ||
702 | |||
703 | To compile it as a module, choose M here. If unsure, say N. | ||
704 | |||
705 | config NETFILTER_XT_MATCH_PHYSDEV | 720 | config NETFILTER_XT_MATCH_PHYSDEV |
706 | tristate '"physdev" match support' | 721 | tristate '"physdev" match support' |
707 | depends on NETFILTER_XTABLES && BRIDGE && BRIDGE_NETFILTER | 722 | depends on NETFILTER_XTABLES && BRIDGE && BRIDGE_NETFILTER |
@@ -884,20 +899,5 @@ config NETFILTER_XT_MATCH_U32 | |||
884 | 899 | ||
885 | Details and examples are in the kernel module source. | 900 | Details and examples are in the kernel module source. |
886 | 901 | ||
887 | config NETFILTER_XT_MATCH_HASHLIMIT | ||
888 | tristate '"hashlimit" match support' | ||
889 | depends on NETFILTER_XTABLES && (IP6_NF_IPTABLES || IP6_NF_IPTABLES=n) | ||
890 | depends on NETFILTER_ADVANCED | ||
891 | help | ||
892 | This option adds a `hashlimit' match. | ||
893 | |||
894 | As opposed to `limit', this match dynamically creates a hash table | ||
895 | of limit buckets, based on your selection of source/destination | ||
896 | addresses and/or ports. | ||
897 | |||
898 | It enables you to express policies like `10kpps for any given | ||
899 | destination address' or `500pps from any given source address' | ||
900 | with a single rule. | ||
901 | |||
902 | endmenu | 902 | endmenu |
903 | 903 | ||