netfilter: Make nf_hookfn use nf_hook_state.
[deliverable/linux.git] / net / bridge / netfilter / ebtable_filter.c
CommitLineData
1da177e4
LT
1/*
2 * ebtable_filter
3 *
4 * Authors:
5 * Bart De Schuymer <bdschuym@pandora.be>
6 *
7 * April, 2002
8 *
9 */
10
11#include <linux/netfilter_bridge/ebtables.h>
12#include <linux/module.h>
13
14#define FILTER_VALID_HOOKS ((1 << NF_BR_LOCAL_IN) | (1 << NF_BR_FORWARD) | \
15 (1 << NF_BR_LOCAL_OUT))
16
97ad8b53 17static struct ebt_entries initial_chains[] = {
1da177e4
LT
18 {
19 .name = "INPUT",
20 .policy = EBT_ACCEPT,
21 },
22 {
23 .name = "FORWARD",
24 .policy = EBT_ACCEPT,
25 },
26 {
27 .name = "OUTPUT",
28 .policy = EBT_ACCEPT,
29 },
30};
31
97ad8b53 32static struct ebt_replace_kernel initial_table = {
1da177e4
LT
33 .name = "filter",
34 .valid_hooks = FILTER_VALID_HOOKS,
35 .entries_size = 3 * sizeof(struct ebt_entries),
36 .hook_entry = {
37 [NF_BR_LOCAL_IN] = &initial_chains[0],
38 [NF_BR_FORWARD] = &initial_chains[1],
39 [NF_BR_LOCAL_OUT] = &initial_chains[2],
40 },
41 .entries = (char *)initial_chains,
42};
43
44static int check(const struct ebt_table_info *info, unsigned int valid_hooks)
45{
46 if (valid_hooks & ~FILTER_VALID_HOOKS)
47 return -EINVAL;
48 return 0;
49}
50
97ad8b53 51static const struct ebt_table frame_filter = {
1da177e4
LT
52 .name = "filter",
53 .table = &initial_table,
9d6f229f 54 .valid_hooks = FILTER_VALID_HOOKS,
1da177e4
LT
55 .check = check,
56 .me = THIS_MODULE,
57};
58
59static unsigned int
795aa6ef 60ebt_in_hook(const struct nf_hook_ops *ops, struct sk_buff *skb,
238e54c9 61 const struct nf_hook_state *state)
1da177e4 62{
238e54c9
DM
63 return ebt_do_table(ops->hooknum, skb, state->in, state->out,
64 dev_net(state->in)->xt.frame_filter);
4aad1093
AD
65}
66
67static unsigned int
795aa6ef 68ebt_out_hook(const struct nf_hook_ops *ops, struct sk_buff *skb,
238e54c9 69 const struct nf_hook_state *state)
4aad1093 70{
238e54c9
DM
71 return ebt_do_table(ops->hooknum, skb, state->in, state->out,
72 dev_net(state->out)->xt.frame_filter);
1da177e4
LT
73}
74
1999414a 75static struct nf_hook_ops ebt_ops_filter[] __read_mostly = {
1da177e4 76 {
4aad1093 77 .hook = ebt_in_hook,
1da177e4 78 .owner = THIS_MODULE,
24c232d8 79 .pf = NFPROTO_BRIDGE,
1da177e4
LT
80 .hooknum = NF_BR_LOCAL_IN,
81 .priority = NF_BR_PRI_FILTER_BRIDGED,
82 },
83 {
4aad1093 84 .hook = ebt_in_hook,
1da177e4 85 .owner = THIS_MODULE,
24c232d8 86 .pf = NFPROTO_BRIDGE,
1da177e4
LT
87 .hooknum = NF_BR_FORWARD,
88 .priority = NF_BR_PRI_FILTER_BRIDGED,
89 },
90 {
4aad1093 91 .hook = ebt_out_hook,
1da177e4 92 .owner = THIS_MODULE,
24c232d8 93 .pf = NFPROTO_BRIDGE,
1da177e4
LT
94 .hooknum = NF_BR_LOCAL_OUT,
95 .priority = NF_BR_PRI_FILTER_OTHER,
96 },
97};
98
4aad1093
AD
99static int __net_init frame_filter_net_init(struct net *net)
100{
101 net->xt.frame_filter = ebt_register_table(net, &frame_filter);
8c6ffba0 102 return PTR_ERR_OR_ZERO(net->xt.frame_filter);
4aad1093
AD
103}
104
105static void __net_exit frame_filter_net_exit(struct net *net)
106{
f54e9367 107 ebt_unregister_table(net, net->xt.frame_filter);
4aad1093
AD
108}
109
110static struct pernet_operations frame_filter_net_ops = {
111 .init = frame_filter_net_init,
112 .exit = frame_filter_net_exit,
113};
114
65b4b4e8 115static int __init ebtable_filter_init(void)
1da177e4 116{
e40f51a3 117 int ret;
1da177e4 118
4aad1093
AD
119 ret = register_pernet_subsys(&frame_filter_net_ops);
120 if (ret < 0)
121 return ret;
e40f51a3
AD
122 ret = nf_register_hooks(ebt_ops_filter, ARRAY_SIZE(ebt_ops_filter));
123 if (ret < 0)
4aad1093 124 unregister_pernet_subsys(&frame_filter_net_ops);
1da177e4
LT
125 return ret;
126}
127
65b4b4e8 128static void __exit ebtable_filter_fini(void)
1da177e4 129{
e40f51a3 130 nf_unregister_hooks(ebt_ops_filter, ARRAY_SIZE(ebt_ops_filter));
4aad1093 131 unregister_pernet_subsys(&frame_filter_net_ops);
1da177e4
LT
132}
133
65b4b4e8
AM
134module_init(ebtable_filter_init);
135module_exit(ebtable_filter_fini);
1da177e4 136MODULE_LICENSE("GPL");
This page took 0.690946 seconds and 5 git commands to generate.