#ifndef _NFT_BRIDGE_H_ #define _NFT_BRIDGE_H_ #include //#include #include #include #include #include /* We use replace->flags, so we can't use the following values: * 0x01 == OPT_COMMAND, 0x02 == OPT_TABLE, 0x100 == OPT_ZERO */ #define LIST_N 0x04 #define LIST_C 0x08 #define LIST_X 0x10 #define LIST_MAC2 0x20 extern unsigned char eb_mac_type_unicast[ETH_ALEN]; extern unsigned char eb_msk_type_unicast[ETH_ALEN]; extern unsigned char eb_mac_type_multicast[ETH_ALEN]; extern unsigned char eb_msk_type_multicast[ETH_ALEN]; extern unsigned char eb_mac_type_broadcast[ETH_ALEN]; extern unsigned char eb_msk_type_broadcast[ETH_ALEN]; extern unsigned char eb_mac_type_bridge_group[ETH_ALEN]; extern unsigned char eb_msk_type_bridge_group[ETH_ALEN]; int ebt_get_mac_and_mask(const char *from, unsigned char *to, unsigned char *mask); /* From: include/linux/netfilter_bridge/ebtables.h * * Adapted for the need of the ebtables-compat. */ #define EBT_TABLE_MAXNAMELEN 32 #define EBT_CHAIN_MAXNAMELEN EBT_TABLE_MAXNAMELEN #define EBT_FUNCTION_MAXNAMELEN EBT_TABLE_MAXNAMELEN /* verdicts >0 are "branches" */ #define EBT_ACCEPT -1 #define EBT_DROP -2 #define EBT_CONTINUE -3 #define EBT_RETURN -4 #define NUM_STANDARD_TARGETS 4 #define EBT_ENTRY_OR_ENTRIES 0x01 /* these are the normal masks */ #define EBT_NOPROTO 0x02 #define EBT_802_3 0x04 #define EBT_SOURCEMAC 0x08 #define EBT_DESTMAC 0x10 #define EBT_F_MASK (EBT_NOPROTO | EBT_802_3 | EBT_SOURCEMAC | EBT_DESTMAC \ | EBT_ENTRY_OR_ENTRIES) #define EBT_IPROTO 0x01 #define EBT_IIN 0x02 #define EBT_IOUT 0x04 #define EBT_ISOURCE 0x8 #define EBT_IDEST 0x10 #define EBT_ILOGICALIN 0x20 #define EBT_ILOGICALOUT 0x40 #define EBT_INV_MASK (EBT_IPROTO | EBT_IIN | EBT_IOUT | EBT_ILOGICALIN \ | EBT_ILOGICALOUT | EBT_ISOURCE | EBT_IDEST) /* ebtables target modules store the verdict inside an int. We can * reclaim a part of this int for backwards compatible extensions. * The 4 lsb are more than enough to store the verdict. */ #define EBT_VERDICT_BITS 0x0000000F struct nftnl_rule; static const char *ebt_standard_targets[NUM_STANDARD_TARGETS] = { "ACCEPT", "DROP", "CONTINUE", "RETURN", }; static inline const char *nft_ebt_standard_target(unsigned int num) { if (num > NUM_STANDARD_TARGETS) return NULL; return ebt_standard_targets[num]; } static inline int ebt_fill_target(const char *str, unsigned int *verdict) { int i, ret = 0; for (i = 0; i < NUM_STANDARD_TARGETS; i++) { if (!strcmp(str, nft_ebt_standard_target(i))) { *verdict = -i - 1; break; } } if (i == NUM_STANDARD_TARGETS) ret = 1; return ret; } static inline const char *ebt_target_name(unsigned int verdict) { return nft_ebt_standard_target(-verdict - 1); } #define EBT_CHECK_OPTION(flags, mask) ({ \ if (*flags & mask) \ xtables_error(PARAMETER_PROBLEM, \ "Multiple use of same " \ "option not allowed"); \ *flags |= mask; \ }) \ void ebt_cs_clean(struct iptables_command_state *cs); void ebt_load_match_extensions(void); void ebt_add_match(struct xtables_match *m, struct iptables_command_state *cs); void ebt_add_watcher(struct xtables_target *watcher, struct iptables_command_state *cs); #endif