11da177e4SLinus Torvalds /* 21da177e4SLinus Torvalds * This is the 1999 rewrite of IP Firewalling, aiming for kernel 2.3.x. 31da177e4SLinus Torvalds * 41da177e4SLinus Torvalds * Copyright (C) 1999 Paul `Rusty' Russell & Michael J. Neuling 51da177e4SLinus Torvalds * Copyright (C) 2000-2004 Netfilter Core Team <coreteam@netfilter.org> 61da177e4SLinus Torvalds * 71da177e4SLinus Torvalds * This program is free software; you can redistribute it and/or modify 81da177e4SLinus Torvalds * it under the terms of the GNU General Public License version 2 as 91da177e4SLinus Torvalds * published by the Free Software Foundation. 101da177e4SLinus Torvalds */ 111da177e4SLinus Torvalds 121da177e4SLinus Torvalds #include <linux/module.h> 131da177e4SLinus Torvalds #include <linux/moduleparam.h> 141da177e4SLinus Torvalds #include <linux/netfilter_ipv6/ip6_tables.h> 151da177e4SLinus Torvalds 161da177e4SLinus Torvalds MODULE_LICENSE("GPL"); 171da177e4SLinus Torvalds MODULE_AUTHOR("Netfilter Core Team <coreteam@netfilter.org>"); 181da177e4SLinus Torvalds MODULE_DESCRIPTION("ip6tables filter table"); 191da177e4SLinus Torvalds 206e23ae2aSPatrick McHardy #define FILTER_VALID_HOOKS ((1 << NF_INET_LOCAL_IN) | \ 216e23ae2aSPatrick McHardy (1 << NF_INET_FORWARD) | \ 226e23ae2aSPatrick McHardy (1 << NF_INET_LOCAL_OUT)) 231da177e4SLinus Torvalds 241da177e4SLinus Torvalds static struct 251da177e4SLinus Torvalds { 261da177e4SLinus Torvalds struct ip6t_replace repl; 271da177e4SLinus Torvalds struct ip6t_standard entries[3]; 281da177e4SLinus Torvalds struct ip6t_error term; 298280aa61SAlexey Dobriyan } initial_table __net_initdata = { 303c2ad469SPatrick McHardy .repl = { 313c2ad469SPatrick McHardy .name = "filter", 323c2ad469SPatrick McHardy .valid_hooks = FILTER_VALID_HOOKS, 333c2ad469SPatrick McHardy .num_entries = 4, 343c2ad469SPatrick McHardy .size = sizeof(struct ip6t_standard) * 3 + sizeof(struct ip6t_error), 353c2ad469SPatrick McHardy .hook_entry = { 366e23ae2aSPatrick McHardy [NF_INET_LOCAL_IN] = 0, 376e23ae2aSPatrick McHardy [NF_INET_FORWARD] = sizeof(struct ip6t_standard), 386e23ae2aSPatrick McHardy [NF_INET_LOCAL_OUT] = sizeof(struct ip6t_standard) * 2 391da177e4SLinus Torvalds }, 403c2ad469SPatrick McHardy .underflow = { 416e23ae2aSPatrick McHardy [NF_INET_LOCAL_IN] = 0, 426e23ae2aSPatrick McHardy [NF_INET_FORWARD] = sizeof(struct ip6t_standard), 436e23ae2aSPatrick McHardy [NF_INET_LOCAL_OUT] = sizeof(struct ip6t_standard) * 2 443c2ad469SPatrick McHardy }, 453c2ad469SPatrick McHardy }, 463c2ad469SPatrick McHardy .entries = { 473c2ad469SPatrick McHardy IP6T_STANDARD_INIT(NF_ACCEPT), /* LOCAL_IN */ 483c2ad469SPatrick McHardy IP6T_STANDARD_INIT(NF_ACCEPT), /* FORWARD */ 493c2ad469SPatrick McHardy IP6T_STANDARD_INIT(NF_ACCEPT), /* LOCAL_OUT */ 503c2ad469SPatrick McHardy }, 513c2ad469SPatrick McHardy .term = IP6T_ERROR_INIT, /* ERROR */ 521da177e4SLinus Torvalds }; 531da177e4SLinus Torvalds 548280aa61SAlexey Dobriyan static struct xt_table packet_filter = { 551da177e4SLinus Torvalds .name = "filter", 561da177e4SLinus Torvalds .valid_hooks = FILTER_VALID_HOOKS, 57fdccecd0SRobert P. J. Day .lock = __RW_LOCK_UNLOCKED(packet_filter.lock), 581da177e4SLinus Torvalds .me = THIS_MODULE, 592e4e6a17SHarald Welte .af = AF_INET6, 601da177e4SLinus Torvalds }; 611da177e4SLinus Torvalds 621da177e4SLinus Torvalds /* The work comes in here from netfilter.c. */ 631da177e4SLinus Torvalds static unsigned int 6461d30158SAlexey Dobriyan ip6t_in_hook(unsigned int hook, 6543de9dfeSAlexey Dobriyan struct sk_buff *skb, 6643de9dfeSAlexey Dobriyan const struct net_device *in, 6743de9dfeSAlexey Dobriyan const struct net_device *out, 6843de9dfeSAlexey Dobriyan int (*okfn)(struct sk_buff *)) 6943de9dfeSAlexey Dobriyan { 7043de9dfeSAlexey Dobriyan return ip6t_do_table(skb, hook, in, out, 7148dc7865SAlexey Dobriyan dev_net(in)->ipv6.ip6table_filter); 721da177e4SLinus Torvalds } 731da177e4SLinus Torvalds 741da177e4SLinus Torvalds static unsigned int 751da177e4SLinus Torvalds ip6t_local_out_hook(unsigned int hook, 763db05feaSHerbert Xu struct sk_buff *skb, 771da177e4SLinus Torvalds const struct net_device *in, 781da177e4SLinus Torvalds const struct net_device *out, 791da177e4SLinus Torvalds int (*okfn)(struct sk_buff *)) 801da177e4SLinus Torvalds { 811da177e4SLinus Torvalds #if 0 821da177e4SLinus Torvalds /* root is playing with raw sockets. */ 833db05feaSHerbert Xu if (skb->len < sizeof(struct iphdr) 843db05feaSHerbert Xu || ip_hdrlen(skb) < sizeof(struct iphdr)) { 851da177e4SLinus Torvalds if (net_ratelimit()) 861da177e4SLinus Torvalds printk("ip6t_hook: happy cracking.\n"); 871da177e4SLinus Torvalds return NF_ACCEPT; 881da177e4SLinus Torvalds } 891da177e4SLinus Torvalds #endif 901da177e4SLinus Torvalds 9143de9dfeSAlexey Dobriyan return ip6t_do_table(skb, hook, in, out, 9248dc7865SAlexey Dobriyan dev_net(out)->ipv6.ip6table_filter); 931da177e4SLinus Torvalds } 941da177e4SLinus Torvalds 951999414aSPatrick McHardy static struct nf_hook_ops ip6t_ops[] __read_mostly = { 961da177e4SLinus Torvalds { 9761d30158SAlexey Dobriyan .hook = ip6t_in_hook, 981da177e4SLinus Torvalds .owner = THIS_MODULE, 991da177e4SLinus Torvalds .pf = PF_INET6, 1006e23ae2aSPatrick McHardy .hooknum = NF_INET_LOCAL_IN, 1011da177e4SLinus Torvalds .priority = NF_IP6_PRI_FILTER, 1021da177e4SLinus Torvalds }, 1031da177e4SLinus Torvalds { 10461d30158SAlexey Dobriyan .hook = ip6t_in_hook, 1051da177e4SLinus Torvalds .owner = THIS_MODULE, 1061da177e4SLinus Torvalds .pf = PF_INET6, 1076e23ae2aSPatrick McHardy .hooknum = NF_INET_FORWARD, 1081da177e4SLinus Torvalds .priority = NF_IP6_PRI_FILTER, 1091da177e4SLinus Torvalds }, 1101da177e4SLinus Torvalds { 1111da177e4SLinus Torvalds .hook = ip6t_local_out_hook, 1121da177e4SLinus Torvalds .owner = THIS_MODULE, 1131da177e4SLinus Torvalds .pf = PF_INET6, 1146e23ae2aSPatrick McHardy .hooknum = NF_INET_LOCAL_OUT, 1151da177e4SLinus Torvalds .priority = NF_IP6_PRI_FILTER, 1161da177e4SLinus Torvalds }, 1171da177e4SLinus Torvalds }; 1181da177e4SLinus Torvalds 1191da177e4SLinus Torvalds /* Default to forward because I got too much mail already. */ 1201da177e4SLinus Torvalds static int forward = NF_ACCEPT; 1211da177e4SLinus Torvalds module_param(forward, bool, 0000); 1221da177e4SLinus Torvalds 1238280aa61SAlexey Dobriyan static int __net_init ip6table_filter_net_init(struct net *net) 1248280aa61SAlexey Dobriyan { 1258280aa61SAlexey Dobriyan /* Register table */ 1268280aa61SAlexey Dobriyan net->ipv6.ip6table_filter = 1278280aa61SAlexey Dobriyan ip6t_register_table(net, &packet_filter, &initial_table.repl); 1288280aa61SAlexey Dobriyan if (IS_ERR(net->ipv6.ip6table_filter)) 1298280aa61SAlexey Dobriyan return PTR_ERR(net->ipv6.ip6table_filter); 1308280aa61SAlexey Dobriyan return 0; 1318280aa61SAlexey Dobriyan } 1328280aa61SAlexey Dobriyan 1338280aa61SAlexey Dobriyan static void __net_exit ip6table_filter_net_exit(struct net *net) 1348280aa61SAlexey Dobriyan { 1358280aa61SAlexey Dobriyan ip6t_unregister_table(net->ipv6.ip6table_filter); 1368280aa61SAlexey Dobriyan } 1378280aa61SAlexey Dobriyan 1388280aa61SAlexey Dobriyan static struct pernet_operations ip6table_filter_net_ops = { 1398280aa61SAlexey Dobriyan .init = ip6table_filter_net_init, 1408280aa61SAlexey Dobriyan .exit = ip6table_filter_net_exit, 1418280aa61SAlexey Dobriyan }; 1428280aa61SAlexey Dobriyan 14365b4b4e8SAndrew Morton static int __init ip6table_filter_init(void) 1441da177e4SLinus Torvalds { 1451da177e4SLinus Torvalds int ret; 1461da177e4SLinus Torvalds 1471da177e4SLinus Torvalds if (forward < 0 || forward > NF_MAX_VERDICT) { 1481da177e4SLinus Torvalds printk("iptables forward must be 0 or 1\n"); 1491da177e4SLinus Torvalds return -EINVAL; 1501da177e4SLinus Torvalds } 1511da177e4SLinus Torvalds 1521da177e4SLinus Torvalds /* Entry 1 is the FORWARD hook */ 1531da177e4SLinus Torvalds initial_table.entries[1].target.verdict = -forward - 1; 1541da177e4SLinus Torvalds 1558280aa61SAlexey Dobriyan ret = register_pernet_subsys(&ip6table_filter_net_ops); 1568280aa61SAlexey Dobriyan if (ret < 0) 1578280aa61SAlexey Dobriyan return ret; 1581da177e4SLinus Torvalds 1591da177e4SLinus Torvalds /* Register hooks */ 160964ddaa1SPatrick McHardy ret = nf_register_hooks(ip6t_ops, ARRAY_SIZE(ip6t_ops)); 1611da177e4SLinus Torvalds if (ret < 0) 1621da177e4SLinus Torvalds goto cleanup_table; 1631da177e4SLinus Torvalds 1641da177e4SLinus Torvalds return ret; 1651da177e4SLinus Torvalds 1661da177e4SLinus Torvalds cleanup_table: 1678280aa61SAlexey Dobriyan unregister_pernet_subsys(&ip6table_filter_net_ops); 1681da177e4SLinus Torvalds return ret; 1691da177e4SLinus Torvalds } 1701da177e4SLinus Torvalds 17165b4b4e8SAndrew Morton static void __exit ip6table_filter_fini(void) 1721da177e4SLinus Torvalds { 173964ddaa1SPatrick McHardy nf_unregister_hooks(ip6t_ops, ARRAY_SIZE(ip6t_ops)); 1748280aa61SAlexey Dobriyan unregister_pernet_subsys(&ip6table_filter_net_ops); 1751da177e4SLinus Torvalds } 1761da177e4SLinus Torvalds 17765b4b4e8SAndrew Morton module_init(ip6table_filter_init); 17865b4b4e8SAndrew Morton module_exit(ip6table_filter_fini); 179