⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 ebtables.h

📁 linux-2.6.15.6
💻 H
字号:
/* *  ebtables * *	Authors: *	Bart De Schuymer		<bdschuym@pandora.be> * *  ebtables.c,v 2.0, April, 2002 * *  This code is stongly inspired on the iptables code which is *  Copyright (C) 1999 Paul `Rusty' Russell & Michael J. Neuling */#ifndef __LINUX_BRIDGE_EFF_H#define __LINUX_BRIDGE_EFF_H#include <linux/if.h>#include <linux/netfilter_bridge.h>#include <linux/if_ether.h>#define EBT_TABLE_MAXNAMELEN 32#define EBT_CHAIN_MAXNAMELEN EBT_TABLE_MAXNAMELEN#define EBT_FUNCTION_MAXNAMELEN EBT_TABLE_MAXNAMELEN/* verdicts >0 are "branches" */#define EBT_ACCEPT   -1#define EBT_DROP     -2#define EBT_CONTINUE -3#define EBT_RETURN   -4#define NUM_STANDARD_TARGETS   4struct ebt_counter{	uint64_t pcnt;	uint64_t bcnt;};struct ebt_replace{	char name[EBT_TABLE_MAXNAMELEN];	unsigned int valid_hooks;	/* nr of rules in the table */	unsigned int nentries;	/* total size of the entries */	unsigned int entries_size;	/* start of the chains */	struct ebt_entries *hook_entry[NF_BR_NUMHOOKS];	/* nr of counters userspace expects back */	unsigned int num_counters;	/* where the kernel will put the old counters */	struct ebt_counter *counters;	char *entries;};struct ebt_entries {	/* this field is always set to zero	 * See EBT_ENTRY_OR_ENTRIES.	 * Must be same size as ebt_entry.bitmask */	unsigned int distinguisher;	/* the chain name */	char name[EBT_CHAIN_MAXNAMELEN];	/* counter offset for this chain */	unsigned int counter_offset;	/* one standard (accept, drop, return) per hook */	int policy;	/* nr. of entries */	unsigned int nentries;	/* entry list */	char data[0] __attribute__ ((aligned (__alignof__(struct ebt_replace))));};/* used for the bitmask of struct ebt_entry *//* This is a hack to make a difference between an ebt_entry struct and an * ebt_entries struct when traversing the entries from start to end. * Using this simplifies the code alot, while still being able to use * ebt_entries. * Contrary, iptables doesn't use something like ebt_entries and therefore uses * different techniques for naming the policy and such. So, iptables doesn't * need a hack like this. */#define EBT_ENTRY_OR_ENTRIES 0x01/* these are the normal masks */#define EBT_NOPROTO 0x02#define EBT_802_3 0x04#define EBT_SOURCEMAC 0x08#define EBT_DESTMAC 0x10#define EBT_F_MASK (EBT_NOPROTO | EBT_802_3 | EBT_SOURCEMAC | EBT_DESTMAC \   | EBT_ENTRY_OR_ENTRIES)#define EBT_IPROTO 0x01#define EBT_IIN 0x02#define EBT_IOUT 0x04#define EBT_ISOURCE 0x8#define EBT_IDEST 0x10#define EBT_ILOGICALIN 0x20#define EBT_ILOGICALOUT 0x40#define EBT_INV_MASK (EBT_IPROTO | EBT_IIN | EBT_IOUT | EBT_ILOGICALIN \   | EBT_ILOGICALOUT | EBT_ISOURCE | EBT_IDEST)struct ebt_entry_match{	union {		char name[EBT_FUNCTION_MAXNAMELEN];		struct ebt_match *match;	} u;	/* size of data */	unsigned int match_size;	unsigned char data[0] __attribute__ ((aligned (__alignof__(struct ebt_replace))));};struct ebt_entry_watcher{	union {		char name[EBT_FUNCTION_MAXNAMELEN];		struct ebt_watcher *watcher;	} u;	/* size of data */	unsigned int watcher_size;	unsigned char data[0] __attribute__ ((aligned (__alignof__(struct ebt_replace))));};struct ebt_entry_target{	union {		char name[EBT_FUNCTION_MAXNAMELEN];		struct ebt_target *target;	} u;	/* size of data */	unsigned int target_size;	unsigned char data[0] __attribute__ ((aligned (__alignof__(struct ebt_replace))));};#define EBT_STANDARD_TARGET "standard"struct ebt_standard_target{	struct ebt_entry_target target;	int verdict;};/* one entry */struct ebt_entry {	/* this needs to be the first field */	unsigned int bitmask;	unsigned int invflags;	uint16_t ethproto;	/* the physical in-dev */	char in[IFNAMSIZ];	/* the logical in-dev */	char logical_in[IFNAMSIZ];	/* the physical out-dev */	char out[IFNAMSIZ];	/* the logical out-dev */	char logical_out[IFNAMSIZ];	unsigned char sourcemac[ETH_ALEN];	unsigned char sourcemsk[ETH_ALEN];	unsigned char destmac[ETH_ALEN];	unsigned char destmsk[ETH_ALEN];	/* sizeof ebt_entry + matches */	unsigned int watchers_offset;	/* sizeof ebt_entry + matches + watchers */	unsigned int target_offset;	/* sizeof ebt_entry + matches + watchers + target */	unsigned int next_offset;	unsigned char elems[0] __attribute__ ((aligned (__alignof__(struct ebt_replace))));};/* {g,s}etsockopt numbers */#define EBT_BASE_CTL            128#define EBT_SO_SET_ENTRIES      (EBT_BASE_CTL)#define EBT_SO_SET_COUNTERS     (EBT_SO_SET_ENTRIES+1)#define EBT_SO_SET_MAX          (EBT_SO_SET_COUNTERS+1)#define EBT_SO_GET_INFO         (EBT_BASE_CTL)#define EBT_SO_GET_ENTRIES      (EBT_SO_GET_INFO+1)#define EBT_SO_GET_INIT_INFO    (EBT_SO_GET_ENTRIES+1)#define EBT_SO_GET_INIT_ENTRIES (EBT_SO_GET_INIT_INFO+1)#define EBT_SO_GET_MAX          (EBT_SO_GET_INIT_ENTRIES+1)#ifdef __KERNEL__/* return values for match() functions */#define EBT_MATCH 0#define EBT_NOMATCH 1struct ebt_match{	struct list_head list;	const char name[EBT_FUNCTION_MAXNAMELEN];	/* 0 == it matches */	int (*match)(const struct sk_buff *skb, const struct net_device *in,	   const struct net_device *out, const void *matchdata,	   unsigned int datalen);	/* 0 == let it in */	int (*check)(const char *tablename, unsigned int hookmask,	   const struct ebt_entry *e, void *matchdata, unsigned int datalen);	void (*destroy)(void *matchdata, unsigned int datalen);	struct module *me;};struct ebt_watcher{	struct list_head list;	const char name[EBT_FUNCTION_MAXNAMELEN];	void (*watcher)(const struct sk_buff *skb, unsigned int hooknr,	   const struct net_device *in, const struct net_device *out,	   const void *watcherdata, unsigned int datalen);	/* 0 == let it in */	int (*check)(const char *tablename, unsigned int hookmask,	   const struct ebt_entry *e, void *watcherdata, unsigned int datalen);	void (*destroy)(void *watcherdata, unsigned int datalen);	struct module *me;};struct ebt_target{	struct list_head list;	const char name[EBT_FUNCTION_MAXNAMELEN];	/* returns one of the standard verdicts */	int (*target)(struct sk_buff **pskb, unsigned int hooknr,	   const struct net_device *in, const struct net_device *out,	   const void *targetdata, unsigned int datalen);	/* 0 == let it in */	int (*check)(const char *tablename, unsigned int hookmask,	   const struct ebt_entry *e, void *targetdata, unsigned int datalen);	void (*destroy)(void *targetdata, unsigned int datalen);	struct module *me;};/* used for jumping from and into user defined chains (udc) */struct ebt_chainstack{	struct ebt_entries *chaininfo; /* pointer to chain data */	struct ebt_entry *e; /* pointer to entry data */	unsigned int n; /* n'th entry */};struct ebt_table_info{	/* total size of the entries */	unsigned int entries_size;	unsigned int nentries;	/* pointers to the start of the chains */	struct ebt_entries *hook_entry[NF_BR_NUMHOOKS];	/* room to maintain the stack used for jumping from and into udc */	struct ebt_chainstack **chainstack;	char *entries;	struct ebt_counter counters[0] ____cacheline_aligned;};struct ebt_table{	struct list_head list;	char name[EBT_TABLE_MAXNAMELEN];	struct ebt_replace *table;	unsigned int valid_hooks;	rwlock_t lock;	/* e.g. could be the table explicitly only allows certain	 * matches, targets, ... 0 == let it in */	int (*check)(const struct ebt_table_info *info,	   unsigned int valid_hooks);	/* the data used by the kernel */	struct ebt_table_info *private;	struct module *me;};#define EBT_ALIGN(s) (((s) + (__alignof__(struct ebt_replace)-1)) & \		     ~(__alignof__(struct ebt_replace)-1))extern int ebt_register_table(struct ebt_table *table);extern void ebt_unregister_table(struct ebt_table *table);extern int ebt_register_match(struct ebt_match *match);extern void ebt_unregister_match(struct ebt_match *match);extern int ebt_register_watcher(struct ebt_watcher *watcher);extern void ebt_unregister_watcher(struct ebt_watcher *watcher);extern int ebt_register_target(struct ebt_target *target);extern void ebt_unregister_target(struct ebt_target *target);extern unsigned int ebt_do_table(unsigned int hook, struct sk_buff **pskb,   const struct net_device *in, const struct net_device *out,   struct ebt_table *table);/* Used in the kernel match() functions */#define FWINV(bool,invflg) ((bool) ^ !!(info->invflags & invflg))/* True if the hook mask denotes that the rule is in a base chain, * used in the check() functions */#define BASE_CHAIN (hookmask & (1 << NF_BR_NUMHOOKS))/* Clear the bit in the hook mask that tells if the rule is on a base chain */#define CLEAR_BASE_CHAIN_BIT (hookmask &= ~(1 << NF_BR_NUMHOOKS))/* True if the target is not a standard target */#define INVALID_TARGET (info->target < -NUM_STANDARD_TARGETS || info->target >= 0)#endif /* __KERNEL__ *//* blatently stolen from ip_tables.h * fn returns 0 to continue iteration */#define EBT_MATCH_ITERATE(e, fn, args...)                   \({                                                          \	unsigned int __i;                                   \	int __ret = 0;                                      \	struct ebt_entry_match *__match;                    \	                                                    \	for (__i = sizeof(struct ebt_entry);                \	     __i < (e)->watchers_offset;                    \	     __i += __match->match_size +                   \	     sizeof(struct ebt_entry_match)) {              \		__match = (void *)(e) + __i;                \		                                            \		__ret = fn(__match , ## args);              \		if (__ret != 0)                             \			break;                              \	}                                                   \	if (__ret == 0) {                                   \		if (__i != (e)->watchers_offset)            \			__ret = -EINVAL;                    \	}                                                   \	__ret;                                              \})#define EBT_WATCHER_ITERATE(e, fn, args...)                 \({                                                          \	unsigned int __i;                                   \	int __ret = 0;                                      \	struct ebt_entry_watcher *__watcher;                \	                                                    \	for (__i = e->watchers_offset;                      \	     __i < (e)->target_offset;                      \	     __i += __watcher->watcher_size +               \	     sizeof(struct ebt_entry_watcher)) {            \		__watcher = (void *)(e) + __i;              \		                                            \		__ret = fn(__watcher , ## args);            \		if (__ret != 0)                             \			break;                              \	}                                                   \	if (__ret == 0) {                                   \		if (__i != (e)->target_offset)              \			__ret = -EINVAL;                    \	}                                                   \	__ret;                                              \})#define EBT_ENTRY_ITERATE(entries, size, fn, args...)       \({                                                          \	unsigned int __i;                                   \	int __ret = 0;                                      \	struct ebt_entry *__entry;                          \	                                                    \	for (__i = 0; __i < (size);) {                      \		__entry = (void *)(entries) + __i;          \		__ret = fn(__entry , ## args);              \		if (__ret != 0)                             \			break;                              \		if (__entry->bitmask != 0)                  \			__i += __entry->next_offset;        \		else                                        \			__i += sizeof(struct ebt_entries);  \	}                                                   \	if (__ret == 0) {                                   \		if (__i != (size))                          \			__ret = -EINVAL;                    \	}                                                   \	__ret;                                              \})#endif

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -