Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /* |
2 | * Filtering ARP tables module. | |
3 | * | |
4 | * Copyright (C) 2002 David S. Miller (davem@redhat.com) | |
5 | * | |
6 | */ | |
7 | ||
8 | #include <linux/module.h> | |
e3eaa991 | 9 | #include <linux/netfilter/x_tables.h> |
1da177e4 | 10 | #include <linux/netfilter_arp/arp_tables.h> |
5a0e3ad6 | 11 | #include <linux/slab.h> |
1da177e4 LT |
12 | |
13 | MODULE_LICENSE("GPL"); | |
14 | MODULE_AUTHOR("David S. Miller <davem@redhat.com>"); | |
15 | MODULE_DESCRIPTION("arptables filter table"); | |
16 | ||
17 | #define FILTER_VALID_HOOKS ((1 << NF_ARP_IN) | (1 << NF_ARP_OUT) | \ | |
18 | (1 << NF_ARP_FORWARD)) | |
19 | ||
b9e69e12 FW |
20 | static int __net_init arptable_filter_table_init(struct net *net); |
21 | ||
35aad0ff | 22 | static const struct xt_table packet_filter = { |
1da177e4 LT |
23 | .name = "filter", |
24 | .valid_hooks = FILTER_VALID_HOOKS, | |
1da177e4 | 25 | .me = THIS_MODULE, |
ee999d8b | 26 | .af = NFPROTO_ARP, |
2b95efe7 | 27 | .priority = NF_IP_PRI_FILTER, |
b9e69e12 | 28 | .table_init = arptable_filter_table_init, |
1da177e4 LT |
29 | }; |
30 | ||
31 | /* The work comes in here from netfilter.c */ | |
737535c5 | 32 | static unsigned int |
06198b34 | 33 | arptable_filter_hook(void *priv, struct sk_buff *skb, |
238e54c9 | 34 | const struct nf_hook_state *state) |
1da177e4 | 35 | { |
6cb8ff3f | 36 | return arpt_do_table(skb, state, state->net->ipv4.arptable_filter); |
3918fed5 AD |
37 | } |
38 | ||
2b95efe7 | 39 | static struct nf_hook_ops *arpfilter_ops __read_mostly; |
1da177e4 | 40 | |
b9e69e12 | 41 | static int __net_init arptable_filter_table_init(struct net *net) |
9ea0cb26 | 42 | { |
e3eaa991 | 43 | struct arpt_replace *repl; |
a67dd266 FW |
44 | int err; |
45 | ||
b9e69e12 FW |
46 | if (net->ipv4.arptable_filter) |
47 | return 0; | |
48 | ||
e3eaa991 JE |
49 | repl = arpt_alloc_initial_table(&packet_filter); |
50 | if (repl == NULL) | |
51 | return -ENOMEM; | |
a67dd266 FW |
52 | err = arpt_register_table(net, &packet_filter, repl, arpfilter_ops, |
53 | &net->ipv4.arptable_filter); | |
e3eaa991 | 54 | kfree(repl); |
a67dd266 | 55 | return err; |
9ea0cb26 AD |
56 | } |
57 | ||
58 | static void __net_exit arptable_filter_net_exit(struct net *net) | |
59 | { | |
b9e69e12 FW |
60 | if (!net->ipv4.arptable_filter) |
61 | return; | |
a67dd266 | 62 | arpt_unregister_table(net, net->ipv4.arptable_filter, arpfilter_ops); |
b9e69e12 | 63 | net->ipv4.arptable_filter = NULL; |
9ea0cb26 AD |
64 | } |
65 | ||
66 | static struct pernet_operations arptable_filter_net_ops = { | |
9ea0cb26 AD |
67 | .exit = arptable_filter_net_exit, |
68 | }; | |
69 | ||
65b4b4e8 | 70 | static int __init arptable_filter_init(void) |
1da177e4 | 71 | { |
964ddaa1 | 72 | int ret; |
1da177e4 | 73 | |
b9e69e12 FW |
74 | arpfilter_ops = xt_hook_ops_alloc(&packet_filter, arptable_filter_hook); |
75 | if (IS_ERR(arpfilter_ops)) | |
76 | return PTR_ERR(arpfilter_ops); | |
77 | ||
9ea0cb26 | 78 | ret = register_pernet_subsys(&arptable_filter_net_ops); |
b9e69e12 FW |
79 | if (ret < 0) { |
80 | kfree(arpfilter_ops); | |
9ea0cb26 | 81 | return ret; |
2b95efe7 | 82 | } |
1da177e4 | 83 | |
ff76def3 FW |
84 | ret = arptable_filter_table_init(&init_net); |
85 | if (ret) { | |
86 | unregister_pernet_subsys(&arptable_filter_net_ops); | |
87 | kfree(arpfilter_ops); | |
88 | } | |
89 | ||
1da177e4 LT |
90 | return ret; |
91 | } | |
92 | ||
65b4b4e8 | 93 | static void __exit arptable_filter_fini(void) |
1da177e4 | 94 | { |
9ea0cb26 | 95 | unregister_pernet_subsys(&arptable_filter_net_ops); |
b9e69e12 | 96 | kfree(arpfilter_ops); |
1da177e4 LT |
97 | } |
98 | ||
65b4b4e8 AM |
99 | module_init(arptable_filter_init); |
100 | module_exit(arptable_filter_fini); |