11da177e4SLinus Torvalds /* 21da177e4SLinus Torvalds * This is the 1999 rewrite of IP Firewalling, aiming for kernel 2.3.x. 31da177e4SLinus Torvalds * 41da177e4SLinus Torvalds * Copyright (C) 1999 Paul `Rusty' Russell & Michael J. Neuling 51da177e4SLinus Torvalds * Copyright (C) 2000-2004 Netfilter Core Team <coreteam@netfilter.org> 61da177e4SLinus Torvalds * 71da177e4SLinus Torvalds * This program is free software; you can redistribute it and/or modify 81da177e4SLinus Torvalds * it under the terms of the GNU General Public License version 2 as 91da177e4SLinus Torvalds * published by the Free Software Foundation. 101da177e4SLinus Torvalds */ 111da177e4SLinus Torvalds 121da177e4SLinus Torvalds #include <linux/module.h> 131da177e4SLinus Torvalds #include <linux/moduleparam.h> 141da177e4SLinus Torvalds #include <linux/netfilter_ipv6/ip6_tables.h> 151da177e4SLinus Torvalds 161da177e4SLinus Torvalds MODULE_LICENSE("GPL"); 171da177e4SLinus Torvalds MODULE_AUTHOR("Netfilter Core Team <coreteam@netfilter.org>"); 181da177e4SLinus Torvalds MODULE_DESCRIPTION("ip6tables filter table"); 191da177e4SLinus Torvalds 201da177e4SLinus Torvalds #define FILTER_VALID_HOOKS ((1 << NF_IP6_LOCAL_IN) | (1 << NF_IP6_FORWARD) | (1 << NF_IP6_LOCAL_OUT)) 211da177e4SLinus Torvalds 221da177e4SLinus Torvalds static struct 231da177e4SLinus Torvalds { 241da177e4SLinus Torvalds struct ip6t_replace repl; 251da177e4SLinus Torvalds struct ip6t_standard entries[3]; 261da177e4SLinus Torvalds struct ip6t_error term; 273c2ad469SPatrick McHardy } initial_table __initdata = { 283c2ad469SPatrick McHardy .repl = { 293c2ad469SPatrick McHardy .name = "filter", 303c2ad469SPatrick McHardy .valid_hooks = FILTER_VALID_HOOKS, 313c2ad469SPatrick McHardy .num_entries = 4, 323c2ad469SPatrick McHardy .size = sizeof(struct ip6t_standard) * 3 + sizeof(struct ip6t_error), 333c2ad469SPatrick McHardy .hook_entry = { 343c2ad469SPatrick McHardy [NF_IP6_LOCAL_IN] = 0, 351da177e4SLinus Torvalds [NF_IP6_FORWARD] = sizeof(struct ip6t_standard), 363c2ad469SPatrick McHardy [NF_IP6_LOCAL_OUT] = sizeof(struct ip6t_standard) * 2 371da177e4SLinus Torvalds }, 383c2ad469SPatrick McHardy .underflow = { 393c2ad469SPatrick McHardy [NF_IP6_LOCAL_IN] = 0, 403c2ad469SPatrick McHardy [NF_IP6_FORWARD] = sizeof(struct ip6t_standard), 413c2ad469SPatrick McHardy [NF_IP6_LOCAL_OUT] = sizeof(struct ip6t_standard) * 2 423c2ad469SPatrick McHardy }, 433c2ad469SPatrick McHardy }, 443c2ad469SPatrick McHardy .entries = { 453c2ad469SPatrick McHardy IP6T_STANDARD_INIT(NF_ACCEPT), /* LOCAL_IN */ 463c2ad469SPatrick McHardy IP6T_STANDARD_INIT(NF_ACCEPT), /* FORWARD */ 473c2ad469SPatrick McHardy IP6T_STANDARD_INIT(NF_ACCEPT), /* LOCAL_OUT */ 483c2ad469SPatrick McHardy }, 493c2ad469SPatrick McHardy .term = IP6T_ERROR_INIT, /* ERROR */ 501da177e4SLinus Torvalds }; 511da177e4SLinus Torvalds 52e60a13e0SJan Engelhardt static struct xt_table packet_filter = { 531da177e4SLinus Torvalds .name = "filter", 541da177e4SLinus Torvalds .valid_hooks = FILTER_VALID_HOOKS, 551da177e4SLinus Torvalds .lock = RW_LOCK_UNLOCKED, 561da177e4SLinus Torvalds .me = THIS_MODULE, 572e4e6a17SHarald Welte .af = AF_INET6, 581da177e4SLinus Torvalds }; 591da177e4SLinus Torvalds 601da177e4SLinus Torvalds /* The work comes in here from netfilter.c. */ 611da177e4SLinus Torvalds static unsigned int 621da177e4SLinus Torvalds ip6t_hook(unsigned int hook, 633db05feaSHerbert Xu struct sk_buff *skb, 641da177e4SLinus Torvalds const struct net_device *in, 651da177e4SLinus Torvalds const struct net_device *out, 661da177e4SLinus Torvalds int (*okfn)(struct sk_buff *)) 671da177e4SLinus Torvalds { 683db05feaSHerbert Xu return ip6t_do_table(skb, hook, in, out, &packet_filter); 691da177e4SLinus Torvalds } 701da177e4SLinus Torvalds 711da177e4SLinus Torvalds static unsigned int 721da177e4SLinus Torvalds ip6t_local_out_hook(unsigned int hook, 733db05feaSHerbert Xu struct sk_buff *skb, 741da177e4SLinus Torvalds const struct net_device *in, 751da177e4SLinus Torvalds const struct net_device *out, 761da177e4SLinus Torvalds int (*okfn)(struct sk_buff *)) 771da177e4SLinus Torvalds { 781da177e4SLinus Torvalds #if 0 791da177e4SLinus Torvalds /* root is playing with raw sockets. */ 803db05feaSHerbert Xu if (skb->len < sizeof(struct iphdr) 813db05feaSHerbert Xu || ip_hdrlen(skb) < sizeof(struct iphdr)) { 821da177e4SLinus Torvalds if (net_ratelimit()) 831da177e4SLinus Torvalds printk("ip6t_hook: happy cracking.\n"); 841da177e4SLinus Torvalds return NF_ACCEPT; 851da177e4SLinus Torvalds } 861da177e4SLinus Torvalds #endif 871da177e4SLinus Torvalds 883db05feaSHerbert Xu return ip6t_do_table(skb, hook, in, out, &packet_filter); 891da177e4SLinus Torvalds } 901da177e4SLinus Torvalds 911da177e4SLinus Torvalds static struct nf_hook_ops ip6t_ops[] = { 921da177e4SLinus Torvalds { 931da177e4SLinus Torvalds .hook = ip6t_hook, 941da177e4SLinus Torvalds .owner = THIS_MODULE, 951da177e4SLinus Torvalds .pf = PF_INET6, 961da177e4SLinus Torvalds .hooknum = NF_IP6_LOCAL_IN, 971da177e4SLinus Torvalds .priority = NF_IP6_PRI_FILTER, 981da177e4SLinus Torvalds }, 991da177e4SLinus Torvalds { 1001da177e4SLinus Torvalds .hook = ip6t_hook, 1011da177e4SLinus Torvalds .owner = THIS_MODULE, 1021da177e4SLinus Torvalds .pf = PF_INET6, 1031da177e4SLinus Torvalds .hooknum = NF_IP6_FORWARD, 1041da177e4SLinus Torvalds .priority = NF_IP6_PRI_FILTER, 1051da177e4SLinus Torvalds }, 1061da177e4SLinus Torvalds { 1071da177e4SLinus Torvalds .hook = ip6t_local_out_hook, 1081da177e4SLinus Torvalds .owner = THIS_MODULE, 1091da177e4SLinus Torvalds .pf = PF_INET6, 1101da177e4SLinus Torvalds .hooknum = NF_IP6_LOCAL_OUT, 1111da177e4SLinus Torvalds .priority = NF_IP6_PRI_FILTER, 1121da177e4SLinus Torvalds }, 1131da177e4SLinus Torvalds }; 1141da177e4SLinus Torvalds 1151da177e4SLinus Torvalds /* Default to forward because I got too much mail already. */ 1161da177e4SLinus Torvalds static int forward = NF_ACCEPT; 1171da177e4SLinus Torvalds module_param(forward, bool, 0000); 1181da177e4SLinus Torvalds 11965b4b4e8SAndrew Morton static int __init ip6table_filter_init(void) 1201da177e4SLinus Torvalds { 1211da177e4SLinus Torvalds int ret; 1221da177e4SLinus Torvalds 1231da177e4SLinus Torvalds if (forward < 0 || forward > NF_MAX_VERDICT) { 1241da177e4SLinus Torvalds printk("iptables forward must be 0 or 1\n"); 1251da177e4SLinus Torvalds return -EINVAL; 1261da177e4SLinus Torvalds } 1271da177e4SLinus Torvalds 1281da177e4SLinus Torvalds /* Entry 1 is the FORWARD hook */ 1291da177e4SLinus Torvalds initial_table.entries[1].target.verdict = -forward - 1; 1301da177e4SLinus Torvalds 1311da177e4SLinus Torvalds /* Register table */ 1321da177e4SLinus Torvalds ret = ip6t_register_table(&packet_filter, &initial_table.repl); 1331da177e4SLinus Torvalds if (ret < 0) 1341da177e4SLinus Torvalds return ret; 1351da177e4SLinus Torvalds 1361da177e4SLinus Torvalds /* Register hooks */ 137964ddaa1SPatrick McHardy ret = nf_register_hooks(ip6t_ops, ARRAY_SIZE(ip6t_ops)); 1381da177e4SLinus Torvalds if (ret < 0) 1391da177e4SLinus Torvalds goto cleanup_table; 1401da177e4SLinus Torvalds 1411da177e4SLinus Torvalds return ret; 1421da177e4SLinus Torvalds 1431da177e4SLinus Torvalds cleanup_table: 1441da177e4SLinus Torvalds ip6t_unregister_table(&packet_filter); 1451da177e4SLinus Torvalds return ret; 1461da177e4SLinus Torvalds } 1471da177e4SLinus Torvalds 14865b4b4e8SAndrew Morton static void __exit ip6table_filter_fini(void) 1491da177e4SLinus Torvalds { 150964ddaa1SPatrick McHardy nf_unregister_hooks(ip6t_ops, ARRAY_SIZE(ip6t_ops)); 1511da177e4SLinus Torvalds ip6t_unregister_table(&packet_filter); 1521da177e4SLinus Torvalds } 1531da177e4SLinus Torvalds 15465b4b4e8SAndrew Morton module_init(ip6table_filter_init); 15565b4b4e8SAndrew Morton module_exit(ip6table_filter_fini); 156