1/*
2 *  ebtables
3 *
4 *	Authors:
5 *	Bart De Schuymer		<bdschuym@pandora.be>
6 *
7 *  ebtables.c,v 2.0, April, 2002
8 *
9 *  This code is stongly inspired on the iptables code which is
10 *  Copyright (C) 1999 Paul `Rusty' Russell & Michael J. Neuling
11 */
12#ifndef __LINUX_BRIDGE_EFF_H
13#define __LINUX_BRIDGE_EFF_H
14
15#include <uapi/linux/netfilter_bridge/ebtables.h>
16
17
18/* return values for match() functions */
19#define EBT_MATCH 0
20#define EBT_NOMATCH 1
21
22struct ebt_match {
23	struct list_head list;
24	const char name[EBT_FUNCTION_MAXNAMELEN];
25	bool (*match)(const struct sk_buff *skb, const struct net_device *in,
26		const struct net_device *out, const struct xt_match *match,
27		const void *matchinfo, int offset, unsigned int protoff,
28		bool *hotdrop);
29	bool (*checkentry)(const char *table, const void *entry,
30		const struct xt_match *match, void *matchinfo,
31		unsigned int hook_mask);
32	void (*destroy)(const struct xt_match *match, void *matchinfo);
33	unsigned int matchsize;
34	u_int8_t revision;
35	u_int8_t family;
36	struct module *me;
37};
38
39struct ebt_watcher {
40	struct list_head list;
41	const char name[EBT_FUNCTION_MAXNAMELEN];
42	unsigned int (*target)(struct sk_buff *skb,
43		const struct net_device *in, const struct net_device *out,
44		unsigned int hook_num, const struct xt_target *target,
45		const void *targinfo);
46	bool (*checkentry)(const char *table, const void *entry,
47		const struct xt_target *target, void *targinfo,
48		unsigned int hook_mask);
49	void (*destroy)(const struct xt_target *target, void *targinfo);
50	unsigned int targetsize;
51	u_int8_t revision;
52	u_int8_t family;
53	struct module *me;
54};
55
56struct ebt_target {
57	struct list_head list;
58	const char name[EBT_FUNCTION_MAXNAMELEN];
59	/* returns one of the standard EBT_* verdicts */
60	unsigned int (*target)(struct sk_buff *skb,
61		const struct net_device *in, const struct net_device *out,
62		unsigned int hook_num, const struct xt_target *target,
63		const void *targinfo);
64	bool (*checkentry)(const char *table, const void *entry,
65		const struct xt_target *target, void *targinfo,
66		unsigned int hook_mask);
67	void (*destroy)(const struct xt_target *target, void *targinfo);
68	unsigned int targetsize;
69	u_int8_t revision;
70	u_int8_t family;
71	struct module *me;
72};
73
74/* used for jumping from and into user defined chains (udc) */
75struct ebt_chainstack {
76	struct ebt_entries *chaininfo; /* pointer to chain data */
77	struct ebt_entry *e; /* pointer to entry data */
78	unsigned int n; /* n'th entry */
79};
80
81struct ebt_table_info {
82	/* total size of the entries */
83	unsigned int entries_size;
84	unsigned int nentries;
85	/* pointers to the start of the chains */
86	struct ebt_entries *hook_entry[NF_BR_NUMHOOKS];
87	/* room to maintain the stack used for jumping from and into udc */
88	struct ebt_chainstack **chainstack;
89	char *entries;
90	struct ebt_counter counters[0] ____cacheline_aligned;
91};
92
93struct ebt_table {
94	struct list_head list;
95	char name[EBT_TABLE_MAXNAMELEN];
96	struct ebt_replace_kernel *table;
97	unsigned int valid_hooks;
98	rwlock_t lock;
99	/* e.g. could be the table explicitly only allows certain
100	 * matches, targets, ... 0 == let it in */
101	int (*check)(const struct ebt_table_info *info,
102	   unsigned int valid_hooks);
103	/* the data used by the kernel */
104	struct ebt_table_info *private;
105	struct module *me;
106};
107
108#define EBT_ALIGN(s) (((s) + (__alignof__(struct _xt_align)-1)) & \
109		     ~(__alignof__(struct _xt_align)-1))
110extern struct ebt_table *ebt_register_table(struct net *net,
111					    const struct ebt_table *table);
112extern void ebt_unregister_table(struct net *net, struct ebt_table *table);
113extern unsigned int ebt_do_table(unsigned int hook, struct sk_buff *skb,
114   const struct net_device *in, const struct net_device *out,
115   struct ebt_table *table);
116
117/* Used in the kernel match() functions */
118#define FWINV(bool,invflg) ((bool) ^ !!(info->invflags & invflg))
119/* True if the hook mask denotes that the rule is in a base chain,
120 * used in the check() functions */
121#define BASE_CHAIN (par->hook_mask & (1 << NF_BR_NUMHOOKS))
122/* Clear the bit in the hook mask that tells if the rule is on a base chain */
123#define CLEAR_BASE_CHAIN_BIT (par->hook_mask &= ~(1 << NF_BR_NUMHOOKS))
124/* True if the target is not a standard target */
125#define INVALID_TARGET (info->target < -NUM_STANDARD_TARGETS || info->target >= 0)
126
127#endif
128