]> bbs.cooldavid.org Git - net-next-2.6.git/blame - net/bridge/netfilter/ebtable_filter.c
netfilter: xtables: mark initial tables constant
[net-next-2.6.git] / net / bridge / netfilter / ebtable_filter.c
CommitLineData
1da177e4
LT
1/*
2 * ebtable_filter
3 *
4 * Authors:
5 * Bart De Schuymer <bdschuym@pandora.be>
6 *
7 * April, 2002
8 *
9 */
10
11#include <linux/netfilter_bridge/ebtables.h>
12#include <linux/module.h>
13
14#define FILTER_VALID_HOOKS ((1 << NF_BR_LOCAL_IN) | (1 << NF_BR_FORWARD) | \
15 (1 << NF_BR_LOCAL_OUT))
16
17static struct ebt_entries initial_chains[] =
18{
19 {
20 .name = "INPUT",
21 .policy = EBT_ACCEPT,
22 },
23 {
24 .name = "FORWARD",
25 .policy = EBT_ACCEPT,
26 },
27 {
28 .name = "OUTPUT",
29 .policy = EBT_ACCEPT,
30 },
31};
32
1e419cd9 33static struct ebt_replace_kernel initial_table =
1da177e4
LT
34{
35 .name = "filter",
36 .valid_hooks = FILTER_VALID_HOOKS,
37 .entries_size = 3 * sizeof(struct ebt_entries),
38 .hook_entry = {
39 [NF_BR_LOCAL_IN] = &initial_chains[0],
40 [NF_BR_FORWARD] = &initial_chains[1],
41 [NF_BR_LOCAL_OUT] = &initial_chains[2],
42 },
43 .entries = (char *)initial_chains,
44};
45
46static int check(const struct ebt_table_info *info, unsigned int valid_hooks)
47{
48 if (valid_hooks & ~FILTER_VALID_HOOKS)
49 return -EINVAL;
50 return 0;
51}
52
35aad0ff 53static const struct ebt_table frame_filter =
9d6f229f 54{
1da177e4
LT
55 .name = "filter",
56 .table = &initial_table,
9d6f229f 57 .valid_hooks = FILTER_VALID_HOOKS,
1da177e4
LT
58 .check = check,
59 .me = THIS_MODULE,
60};
61
62static unsigned int
4aad1093 63ebt_in_hook(unsigned int hook, struct sk_buff *skb, const struct net_device *in,
1da177e4
LT
64 const struct net_device *out, int (*okfn)(struct sk_buff *))
65{
4aad1093
AD
66 return ebt_do_table(hook, skb, in, out, dev_net(in)->xt.frame_filter);
67}
68
69static unsigned int
70ebt_out_hook(unsigned int hook, struct sk_buff *skb, const struct net_device *in,
71 const struct net_device *out, int (*okfn)(struct sk_buff *))
72{
73 return ebt_do_table(hook, skb, in, out, dev_net(out)->xt.frame_filter);
1da177e4
LT
74}
75
1999414a 76static struct nf_hook_ops ebt_ops_filter[] __read_mostly = {
1da177e4 77 {
4aad1093 78 .hook = ebt_in_hook,
1da177e4 79 .owner = THIS_MODULE,
24c232d8 80 .pf = NFPROTO_BRIDGE,
1da177e4
LT
81 .hooknum = NF_BR_LOCAL_IN,
82 .priority = NF_BR_PRI_FILTER_BRIDGED,
83 },
84 {
4aad1093 85 .hook = ebt_in_hook,
1da177e4 86 .owner = THIS_MODULE,
24c232d8 87 .pf = NFPROTO_BRIDGE,
1da177e4
LT
88 .hooknum = NF_BR_FORWARD,
89 .priority = NF_BR_PRI_FILTER_BRIDGED,
90 },
91 {
4aad1093 92 .hook = ebt_out_hook,
1da177e4 93 .owner = THIS_MODULE,
24c232d8 94 .pf = NFPROTO_BRIDGE,
1da177e4
LT
95 .hooknum = NF_BR_LOCAL_OUT,
96 .priority = NF_BR_PRI_FILTER_OTHER,
97 },
98};
99
4aad1093
AD
100static int __net_init frame_filter_net_init(struct net *net)
101{
102 net->xt.frame_filter = ebt_register_table(net, &frame_filter);
103 if (IS_ERR(net->xt.frame_filter))
104 return PTR_ERR(net->xt.frame_filter);
105 return 0;
106}
107
108static void __net_exit frame_filter_net_exit(struct net *net)
109{
110 ebt_unregister_table(net->xt.frame_filter);
111}
112
113static struct pernet_operations frame_filter_net_ops = {
114 .init = frame_filter_net_init,
115 .exit = frame_filter_net_exit,
116};
117
65b4b4e8 118static int __init ebtable_filter_init(void)
1da177e4 119{
e40f51a3 120 int ret;
1da177e4 121
4aad1093
AD
122 ret = register_pernet_subsys(&frame_filter_net_ops);
123 if (ret < 0)
124 return ret;
e40f51a3
AD
125 ret = nf_register_hooks(ebt_ops_filter, ARRAY_SIZE(ebt_ops_filter));
126 if (ret < 0)
4aad1093 127 unregister_pernet_subsys(&frame_filter_net_ops);
1da177e4
LT
128 return ret;
129}
130
65b4b4e8 131static void __exit ebtable_filter_fini(void)
1da177e4 132{
e40f51a3 133 nf_unregister_hooks(ebt_ops_filter, ARRAY_SIZE(ebt_ops_filter));
4aad1093 134 unregister_pernet_subsys(&frame_filter_net_ops);
1da177e4
LT
135}
136
65b4b4e8
AM
137module_init(ebtable_filter_init);
138module_exit(ebtable_filter_fini);
1da177e4 139MODULE_LICENSE("GPL");