1 /*
2 * ebtable_filter
3 *
4 * Authors:
5 * Bart De Schuymer <bdschuym@pandora.be>
6 *
7 * April, 2002
8 *
9 */
10
11 #include <linux/netfilter_bridge/ebtables.h>
12 #include <linux/module.h>
13
14 #define FILTER_VALID_HOOKS ((1 << NF_BR_LOCAL_IN) | (1 << NF_BR_FORWARD) | \
15 (1 << NF_BR_LOCAL_OUT))
16
17 static struct ebt_entries initial_chains[] =
18 {
19 {
20 .name = "INPUT",
21 .policy = EBT_ACCEPT,
22 },
23 {
24 .name = "FORWARD",
25 .policy = EBT_ACCEPT,
26 },
27 {
28 .name = "OUTPUT",
29 .policy = EBT_ACCEPT,
30 },
31 };
32
33 static struct ebt_replace_kernel initial_table =
34 {
35 .name = "filter",
36 .valid_hooks = FILTER_VALID_HOOKS,
37 .entries_size = 3 * sizeof(struct ebt_entries),
38 .hook_entry = {
39 [NF_BR_LOCAL_IN] = &initial_chains[0],
40 [NF_BR_FORWARD] = &initial_chains[1],
41 [NF_BR_LOCAL_OUT] = &initial_chains[2],
42 },
43 .entries = (char *)initial_chains,
44 };
45
check(const struct ebt_table_info * info,unsigned int valid_hooks)46 static int check(const struct ebt_table_info *info, unsigned int valid_hooks)
47 {
48 if (valid_hooks & ~FILTER_VALID_HOOKS)
49 return -EINVAL;
50 return 0;
51 }
52
53 static struct ebt_table frame_filter =
54 {
55 .name = "filter",
56 .table = &initial_table,
57 .valid_hooks = FILTER_VALID_HOOKS,
58 .lock = __RW_LOCK_UNLOCKED(frame_filter.lock),
59 .check = check,
60 .me = THIS_MODULE,
61 };
62
63 static unsigned int
ebt_in_hook(unsigned int hook,struct sk_buff * skb,const struct net_device * in,const struct net_device * out,int (* okfn)(struct sk_buff *))64 ebt_in_hook(unsigned int hook, struct sk_buff *skb, const struct net_device *in,
65 const struct net_device *out, int (*okfn)(struct sk_buff *))
66 {
67 return ebt_do_table(hook, skb, in, out, dev_net(in)->xt.frame_filter);
68 }
69
70 static unsigned int
ebt_out_hook(unsigned int hook,struct sk_buff * skb,const struct net_device * in,const struct net_device * out,int (* okfn)(struct sk_buff *))71 ebt_out_hook(unsigned int hook, struct sk_buff *skb, const struct net_device *in,
72 const struct net_device *out, int (*okfn)(struct sk_buff *))
73 {
74 return ebt_do_table(hook, skb, in, out, dev_net(out)->xt.frame_filter);
75 }
76
77 static struct nf_hook_ops ebt_ops_filter[] __read_mostly = {
78 {
79 .hook = ebt_in_hook,
80 .owner = THIS_MODULE,
81 .pf = PF_BRIDGE,
82 .hooknum = NF_BR_LOCAL_IN,
83 .priority = NF_BR_PRI_FILTER_BRIDGED,
84 },
85 {
86 .hook = ebt_in_hook,
87 .owner = THIS_MODULE,
88 .pf = PF_BRIDGE,
89 .hooknum = NF_BR_FORWARD,
90 .priority = NF_BR_PRI_FILTER_BRIDGED,
91 },
92 {
93 .hook = ebt_out_hook,
94 .owner = THIS_MODULE,
95 .pf = PF_BRIDGE,
96 .hooknum = NF_BR_LOCAL_OUT,
97 .priority = NF_BR_PRI_FILTER_OTHER,
98 },
99 };
100
frame_filter_net_init(struct net * net)101 static int __net_init frame_filter_net_init(struct net *net)
102 {
103 net->xt.frame_filter = ebt_register_table(net, &frame_filter);
104 if (IS_ERR(net->xt.frame_filter))
105 return PTR_ERR(net->xt.frame_filter);
106 return 0;
107 }
108
frame_filter_net_exit(struct net * net)109 static void __net_exit frame_filter_net_exit(struct net *net)
110 {
111 ebt_unregister_table(net->xt.frame_filter);
112 }
113
114 static struct pernet_operations frame_filter_net_ops = {
115 .init = frame_filter_net_init,
116 .exit = frame_filter_net_exit,
117 };
118
ebtable_filter_init(void)119 static int __init ebtable_filter_init(void)
120 {
121 int ret;
122
123 ret = register_pernet_subsys(&frame_filter_net_ops);
124 if (ret < 0)
125 return ret;
126 ret = nf_register_hooks(ebt_ops_filter, ARRAY_SIZE(ebt_ops_filter));
127 if (ret < 0)
128 unregister_pernet_subsys(&frame_filter_net_ops);
129 return ret;
130 }
131
ebtable_filter_fini(void)132 static void __exit ebtable_filter_fini(void)
133 {
134 nf_unregister_hooks(ebt_ops_filter, ARRAY_SIZE(ebt_ops_filter));
135 unregister_pernet_subsys(&frame_filter_net_ops);
136 }
137
138 module_init(ebtable_filter_init);
139 module_exit(ebtable_filter_fini);
140 MODULE_LICENSE("GPL");
141