Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /* |
2 | * Filtering ARP tables module. | |
3 | * | |
4 | * Copyright (C) 2002 David S. Miller (davem@redhat.com) | |
5 | * | |
6 | */ | |
7 | ||
8 | #include <linux/module.h> | |
9 | #include <linux/netfilter_arp/arp_tables.h> | |
10 | ||
11 | MODULE_LICENSE("GPL"); | |
12 | MODULE_AUTHOR("David S. Miller <davem@redhat.com>"); | |
13 | MODULE_DESCRIPTION("arptables filter table"); | |
14 | ||
15 | #define FILTER_VALID_HOOKS ((1 << NF_ARP_IN) | (1 << NF_ARP_OUT) | \ | |
16 | (1 << NF_ARP_FORWARD)) | |
17 | ||
1da177e4 LT |
18 | static struct |
19 | { | |
20 | struct arpt_replace repl; | |
21 | struct arpt_standard entries[3]; | |
22 | struct arpt_error term; | |
9ea0cb26 | 23 | } initial_table __net_initdata = { |
3c2ad469 PM |
24 | .repl = { |
25 | .name = "filter", | |
26 | .valid_hooks = FILTER_VALID_HOOKS, | |
27 | .num_entries = 4, | |
28 | .size = sizeof(struct arpt_standard) * 3 + sizeof(struct arpt_error), | |
29 | .hook_entry = { | |
30 | [NF_ARP_IN] = 0, | |
31 | [NF_ARP_OUT] = sizeof(struct arpt_standard), | |
32 | [NF_ARP_FORWARD] = 2 * sizeof(struct arpt_standard), | |
33 | }, | |
34 | .underflow = { | |
35 | [NF_ARP_IN] = 0, | |
36 | [NF_ARP_OUT] = sizeof(struct arpt_standard), | |
37 | [NF_ARP_FORWARD] = 2 * sizeof(struct arpt_standard), | |
38 | }, | |
39 | }, | |
40 | .entries = { | |
41 | ARPT_STANDARD_INIT(NF_ACCEPT), /* ARP_IN */ | |
42 | ARPT_STANDARD_INIT(NF_ACCEPT), /* ARP_OUT */ | |
43 | ARPT_STANDARD_INIT(NF_ACCEPT), /* ARP_FORWARD */ | |
44 | }, | |
45 | .term = ARPT_ERROR_INIT, | |
1da177e4 LT |
46 | }; |
47 | ||
4abff077 | 48 | static struct xt_table packet_filter = { |
1da177e4 LT |
49 | .name = "filter", |
50 | .valid_hooks = FILTER_VALID_HOOKS, | |
fdccecd0 | 51 | .lock = __RW_LOCK_UNLOCKED(packet_filter.lock), |
1da177e4 LT |
52 | .private = NULL, |
53 | .me = THIS_MODULE, | |
2e4e6a17 | 54 | .af = NF_ARP, |
1da177e4 LT |
55 | }; |
56 | ||
57 | /* The work comes in here from netfilter.c */ | |
58 | static unsigned int arpt_hook(unsigned int hook, | |
3db05fea | 59 | struct sk_buff *skb, |
1da177e4 LT |
60 | const struct net_device *in, |
61 | const struct net_device *out, | |
62 | int (*okfn)(struct sk_buff *)) | |
63 | { | |
9ea0cb26 | 64 | return arpt_do_table(skb, hook, in, out, init_net.ipv4.arptable_filter); |
1da177e4 LT |
65 | } |
66 | ||
1999414a | 67 | static struct nf_hook_ops arpt_ops[] __read_mostly = { |
1da177e4 LT |
68 | { |
69 | .hook = arpt_hook, | |
70 | .owner = THIS_MODULE, | |
71 | .pf = NF_ARP, | |
72 | .hooknum = NF_ARP_IN, | |
c2f9c683 | 73 | .priority = NF_IP_PRI_FILTER, |
1da177e4 LT |
74 | }, |
75 | { | |
76 | .hook = arpt_hook, | |
77 | .owner = THIS_MODULE, | |
78 | .pf = NF_ARP, | |
79 | .hooknum = NF_ARP_OUT, | |
c2f9c683 | 80 | .priority = NF_IP_PRI_FILTER, |
1da177e4 LT |
81 | }, |
82 | { | |
83 | .hook = arpt_hook, | |
84 | .owner = THIS_MODULE, | |
85 | .pf = NF_ARP, | |
86 | .hooknum = NF_ARP_FORWARD, | |
c2f9c683 | 87 | .priority = NF_IP_PRI_FILTER, |
1da177e4 LT |
88 | }, |
89 | }; | |
90 | ||
9ea0cb26 AD |
91 | static int __net_init arptable_filter_net_init(struct net *net) |
92 | { | |
93 | /* Register table */ | |
94 | net->ipv4.arptable_filter = | |
95 | arpt_register_table(net, &packet_filter, &initial_table.repl); | |
96 | if (IS_ERR(net->ipv4.arptable_filter)) | |
97 | return PTR_ERR(net->ipv4.arptable_filter); | |
98 | return 0; | |
99 | } | |
100 | ||
101 | static void __net_exit arptable_filter_net_exit(struct net *net) | |
102 | { | |
103 | arpt_unregister_table(net->ipv4.arptable_filter); | |
104 | } | |
105 | ||
106 | static struct pernet_operations arptable_filter_net_ops = { | |
107 | .init = arptable_filter_net_init, | |
108 | .exit = arptable_filter_net_exit, | |
109 | }; | |
110 | ||
65b4b4e8 | 111 | static int __init arptable_filter_init(void) |
1da177e4 | 112 | { |
964ddaa1 | 113 | int ret; |
1da177e4 | 114 | |
9ea0cb26 AD |
115 | ret = register_pernet_subsys(&arptable_filter_net_ops); |
116 | if (ret < 0) | |
117 | return ret; | |
1da177e4 | 118 | |
964ddaa1 PM |
119 | ret = nf_register_hooks(arpt_ops, ARRAY_SIZE(arpt_ops)); |
120 | if (ret < 0) | |
121 | goto cleanup_table; | |
1da177e4 LT |
122 | return ret; |
123 | ||
964ddaa1 | 124 | cleanup_table: |
9ea0cb26 | 125 | unregister_pernet_subsys(&arptable_filter_net_ops); |
1da177e4 LT |
126 | return ret; |
127 | } | |
128 | ||
65b4b4e8 | 129 | static void __exit arptable_filter_fini(void) |
1da177e4 | 130 | { |
964ddaa1 | 131 | nf_unregister_hooks(arpt_ops, ARRAY_SIZE(arpt_ops)); |
9ea0cb26 | 132 | unregister_pernet_subsys(&arptable_filter_net_ops); |
1da177e4 LT |
133 | } |
134 | ||
65b4b4e8 AM |
135 | module_init(arptable_filter_init); |
136 | module_exit(arptable_filter_fini); |