blob: 42e6bd0945745f99ae2cb718b55efed2410f704b [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * ebtable_filter
3 *
4 * Authors:
5 * Bart De Schuymer <bdschuym@pandora.be>
6 *
7 * April, 2002
8 *
9 */
10
11#include <linux/netfilter_bridge/ebtables.h>
12#include <linux/module.h>
13
14#define FILTER_VALID_HOOKS ((1 << NF_BR_LOCAL_IN) | (1 << NF_BR_FORWARD) | \
15 (1 << NF_BR_LOCAL_OUT))
16
17static struct ebt_entries initial_chains[] =
18{
19 {
20 .name = "INPUT",
21 .policy = EBT_ACCEPT,
22 },
23 {
24 .name = "FORWARD",
25 .policy = EBT_ACCEPT,
26 },
27 {
28 .name = "OUTPUT",
29 .policy = EBT_ACCEPT,
30 },
31};
32
Al Viro1e419cd2006-11-30 19:28:48 -080033static struct ebt_replace_kernel initial_table =
Linus Torvalds1da177e2005-04-16 15:20:36 -070034{
35 .name = "filter",
36 .valid_hooks = FILTER_VALID_HOOKS,
37 .entries_size = 3 * sizeof(struct ebt_entries),
38 .hook_entry = {
39 [NF_BR_LOCAL_IN] = &initial_chains[0],
40 [NF_BR_FORWARD] = &initial_chains[1],
41 [NF_BR_LOCAL_OUT] = &initial_chains[2],
42 },
43 .entries = (char *)initial_chains,
44};
45
46static int check(const struct ebt_table_info *info, unsigned int valid_hooks)
47{
48 if (valid_hooks & ~FILTER_VALID_HOOKS)
49 return -EINVAL;
50 return 0;
51}
52
Jan Engelhardt35aad0f2009-08-24 14:56:30 +020053static const struct ebt_table frame_filter =
YOSHIFUJI Hideaki9d6f2292007-02-09 23:24:35 +090054{
Linus Torvalds1da177e2005-04-16 15:20:36 -070055 .name = "filter",
56 .table = &initial_table,
YOSHIFUJI Hideaki9d6f2292007-02-09 23:24:35 +090057 .valid_hooks = FILTER_VALID_HOOKS,
Linus Torvalds1da177e2005-04-16 15:20:36 -070058 .check = check,
59 .me = THIS_MODULE,
60};
61
62static unsigned int
Alexey Dobriyan4aad1092008-11-04 14:29:58 +010063ebt_in_hook(unsigned int hook, struct sk_buff *skb, const struct net_device *in,
Linus Torvalds1da177e2005-04-16 15:20:36 -070064 const struct net_device *out, int (*okfn)(struct sk_buff *))
65{
Alexey Dobriyan4aad1092008-11-04 14:29:58 +010066 return ebt_do_table(hook, skb, in, out, dev_net(in)->xt.frame_filter);
67}
68
69static unsigned int
70ebt_out_hook(unsigned int hook, struct sk_buff *skb, const struct net_device *in,
71 const struct net_device *out, int (*okfn)(struct sk_buff *))
72{
73 return ebt_do_table(hook, skb, in, out, dev_net(out)->xt.frame_filter);
Linus Torvalds1da177e2005-04-16 15:20:36 -070074}
75
Patrick McHardy19994142007-12-05 01:23:00 -080076static struct nf_hook_ops ebt_ops_filter[] __read_mostly = {
Linus Torvalds1da177e2005-04-16 15:20:36 -070077 {
Alexey Dobriyan4aad1092008-11-04 14:29:58 +010078 .hook = ebt_in_hook,
Linus Torvalds1da177e2005-04-16 15:20:36 -070079 .owner = THIS_MODULE,
Jan Engelhardt24c232d2009-06-13 06:20:29 +020080 .pf = NFPROTO_BRIDGE,
Linus Torvalds1da177e2005-04-16 15:20:36 -070081 .hooknum = NF_BR_LOCAL_IN,
82 .priority = NF_BR_PRI_FILTER_BRIDGED,
83 },
84 {
Alexey Dobriyan4aad1092008-11-04 14:29:58 +010085 .hook = ebt_in_hook,
Linus Torvalds1da177e2005-04-16 15:20:36 -070086 .owner = THIS_MODULE,
Jan Engelhardt24c232d2009-06-13 06:20:29 +020087 .pf = NFPROTO_BRIDGE,
Linus Torvalds1da177e2005-04-16 15:20:36 -070088 .hooknum = NF_BR_FORWARD,
89 .priority = NF_BR_PRI_FILTER_BRIDGED,
90 },
91 {
Alexey Dobriyan4aad1092008-11-04 14:29:58 +010092 .hook = ebt_out_hook,
Linus Torvalds1da177e2005-04-16 15:20:36 -070093 .owner = THIS_MODULE,
Jan Engelhardt24c232d2009-06-13 06:20:29 +020094 .pf = NFPROTO_BRIDGE,
Linus Torvalds1da177e2005-04-16 15:20:36 -070095 .hooknum = NF_BR_LOCAL_OUT,
96 .priority = NF_BR_PRI_FILTER_OTHER,
97 },
98};
99
Alexey Dobriyan4aad1092008-11-04 14:29:58 +0100100static int __net_init frame_filter_net_init(struct net *net)
101{
102 net->xt.frame_filter = ebt_register_table(net, &frame_filter);
103 if (IS_ERR(net->xt.frame_filter))
104 return PTR_ERR(net->xt.frame_filter);
105 return 0;
106}
107
108static void __net_exit frame_filter_net_exit(struct net *net)
109{
Alexey Dobriyanf54e9362010-01-18 08:25:47 +0100110 ebt_unregister_table(net, net->xt.frame_filter);
Alexey Dobriyan4aad1092008-11-04 14:29:58 +0100111}
112
113static struct pernet_operations frame_filter_net_ops = {
114 .init = frame_filter_net_init,
115 .exit = frame_filter_net_exit,
116};
117
Andrew Morton65b4b4e2006-03-28 16:37:06 -0800118static int __init ebtable_filter_init(void)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700119{
Alexey Dobriyane40f51a2008-07-26 17:47:53 -0700120 int ret;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700121
Alexey Dobriyan4aad1092008-11-04 14:29:58 +0100122 ret = register_pernet_subsys(&frame_filter_net_ops);
123 if (ret < 0)
124 return ret;
Alexey Dobriyane40f51a2008-07-26 17:47:53 -0700125 ret = nf_register_hooks(ebt_ops_filter, ARRAY_SIZE(ebt_ops_filter));
126 if (ret < 0)
Alexey Dobriyan4aad1092008-11-04 14:29:58 +0100127 unregister_pernet_subsys(&frame_filter_net_ops);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700128 return ret;
129}
130
Andrew Morton65b4b4e2006-03-28 16:37:06 -0800131static void __exit ebtable_filter_fini(void)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700132{
Alexey Dobriyane40f51a2008-07-26 17:47:53 -0700133 nf_unregister_hooks(ebt_ops_filter, ARRAY_SIZE(ebt_ops_filter));
Alexey Dobriyan4aad1092008-11-04 14:29:58 +0100134 unregister_pernet_subsys(&frame_filter_net_ops);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700135}
136
Andrew Morton65b4b4e2006-03-28 16:37:06 -0800137module_init(ebtable_filter_init);
138module_exit(ebtable_filter_fini);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700139MODULE_LICENSE("GPL");