netfilter: x_tables: use NFPROTO_* in extensions
[deliverable/linux.git] / net / netfilter / nf_sockopt.c
CommitLineData
f6ebe77f
HW
1#include <linux/kernel.h>
2#include <linux/init.h>
3#include <linux/module.h>
4#include <linux/skbuff.h>
5#include <linux/netfilter.h>
4a3e2f71 6#include <linux/mutex.h>
f6ebe77f
HW
7#include <net/sock.h>
8
9#include "nf_internals.h"
10
11/* Sockopts only registered and called from user context, so
12 net locking would be overkill. Also, [gs]etsockopt calls may
13 sleep. */
4a3e2f71 14static DEFINE_MUTEX(nf_sockopt_mutex);
f6ebe77f
HW
15static LIST_HEAD(nf_sockopts);
16
17/* Do exclusive ranges overlap? */
18static inline int overlap(int min1, int max1, int min2, int max2)
19{
20 return max1 > min2 && min1 < max2;
21}
22
23/* Functions to register sockopt ranges (exclusive). */
24int nf_register_sockopt(struct nf_sockopt_ops *reg)
25{
55d84acd 26 struct nf_sockopt_ops *ops;
f6ebe77f
HW
27 int ret = 0;
28
4a3e2f71 29 if (mutex_lock_interruptible(&nf_sockopt_mutex) != 0)
f6ebe77f
HW
30 return -EINTR;
31
55d84acd 32 list_for_each_entry(ops, &nf_sockopts, list) {
f6ebe77f 33 if (ops->pf == reg->pf
601e68e1 34 && (overlap(ops->set_optmin, ops->set_optmax,
f6ebe77f 35 reg->set_optmin, reg->set_optmax)
601e68e1 36 || overlap(ops->get_optmin, ops->get_optmax,
f6ebe77f
HW
37 reg->get_optmin, reg->get_optmax))) {
38 NFDEBUG("nf_sock overlap: %u-%u/%u-%u v %u-%u/%u-%u\n",
601e68e1
YH
39 ops->set_optmin, ops->set_optmax,
40 ops->get_optmin, ops->get_optmax,
f6ebe77f
HW
41 reg->set_optmin, reg->set_optmax,
42 reg->get_optmin, reg->get_optmax);
43 ret = -EBUSY;
44 goto out;
45 }
46 }
47
48 list_add(&reg->list, &nf_sockopts);
49out:
4a3e2f71 50 mutex_unlock(&nf_sockopt_mutex);
f6ebe77f
HW
51 return ret;
52}
53EXPORT_SYMBOL(nf_register_sockopt);
54
55void nf_unregister_sockopt(struct nf_sockopt_ops *reg)
56{
4a3e2f71 57 mutex_lock(&nf_sockopt_mutex);
f6ebe77f 58 list_del(&reg->list);
4a3e2f71 59 mutex_unlock(&nf_sockopt_mutex);
f6ebe77f
HW
60}
61EXPORT_SYMBOL(nf_unregister_sockopt);
62
76108cea 63static struct nf_sockopt_ops *nf_sockopt_find(struct sock *sk, u_int8_t pf,
4ce5ba6a 64 int val, int get)
f6ebe77f 65{
f6ebe77f 66 struct nf_sockopt_ops *ops;
f6ebe77f 67
721499e8 68 if (!net_eq(sock_net(sk), &init_net))
4ce5ba6a 69 return ERR_PTR(-ENOPROTOOPT);
c48dad7e 70
4a3e2f71 71 if (mutex_lock_interruptible(&nf_sockopt_mutex) != 0)
4ce5ba6a 72 return ERR_PTR(-EINTR);
f6ebe77f 73
55d84acd 74 list_for_each_entry(ops, &nf_sockopts, list) {
f6ebe77f 75 if (ops->pf == pf) {
16fcec35
NH
76 if (!try_module_get(ops->owner))
77 goto out_nosup;
4ce5ba6a 78
f6ebe77f 79 if (get) {
4ce5ba6a
PE
80 if (val >= ops->get_optmin &&
81 val < ops->get_optmax)
f6ebe77f 82 goto out;
f6ebe77f 83 } else {
4ce5ba6a
PE
84 if (val >= ops->set_optmin &&
85 val < ops->set_optmax)
f6ebe77f 86 goto out;
f6ebe77f 87 }
16fcec35 88 module_put(ops->owner);
f6ebe77f
HW
89 }
90 }
4ce5ba6a
PE
91out_nosup:
92 ops = ERR_PTR(-ENOPROTOOPT);
93out:
4a3e2f71 94 mutex_unlock(&nf_sockopt_mutex);
4ce5ba6a
PE
95 return ops;
96}
97
98/* Call get/setsockopt() */
76108cea 99static int nf_sockopt(struct sock *sk, u_int8_t pf, int val,
4ce5ba6a
PE
100 char __user *opt, int *len, int get)
101{
102 struct nf_sockopt_ops *ops;
103 int ret;
104
105 ops = nf_sockopt_find(sk, pf, val, get);
106 if (IS_ERR(ops))
107 return PTR_ERR(ops);
108
109 if (get)
110 ret = ops->get(sk, val, opt, len);
111 else
112 ret = ops->set(sk, val, opt, *len);
601e68e1 113
16fcec35 114 module_put(ops->owner);
f6ebe77f
HW
115 return ret;
116}
117
76108cea 118int nf_setsockopt(struct sock *sk, u_int8_t pf, int val, char __user *opt,
f6ebe77f
HW
119 int len)
120{
121 return nf_sockopt(sk, pf, val, opt, &len, 0);
122}
123EXPORT_SYMBOL(nf_setsockopt);
124
76108cea
JE
125int nf_getsockopt(struct sock *sk, u_int8_t pf, int val, char __user *opt,
126 int *len)
f6ebe77f
HW
127{
128 return nf_sockopt(sk, pf, val, opt, len, 1);
129}
130EXPORT_SYMBOL(nf_getsockopt);
131
3fdadf7d 132#ifdef CONFIG_COMPAT
76108cea 133static int compat_nf_sockopt(struct sock *sk, u_int8_t pf, int val,
543d9cfe 134 char __user *opt, int *len, int get)
3fdadf7d 135{
3fdadf7d
DM
136 struct nf_sockopt_ops *ops;
137 int ret;
138
4ce5ba6a
PE
139 ops = nf_sockopt_find(sk, pf, val, get);
140 if (IS_ERR(ops))
141 return PTR_ERR(ops);
142
143 if (get) {
144 if (ops->compat_get)
145 ret = ops->compat_get(sk, val, opt, len);
146 else
6452a5fd 147 ret = ops->get(sk, val, opt, len);
4ce5ba6a
PE
148 } else {
149 if (ops->compat_set)
6452a5fd 150 ret = ops->compat_set(sk, val, opt, *len);
4ce5ba6a 151 else
6452a5fd 152 ret = ops->set(sk, val, opt, *len);
3fdadf7d 153 }
3fdadf7d 154
16fcec35 155 module_put(ops->owner);
3fdadf7d
DM
156 return ret;
157}
158
76108cea 159int compat_nf_setsockopt(struct sock *sk, u_int8_t pf,
3fdadf7d
DM
160 int val, char __user *opt, int len)
161{
162 return compat_nf_sockopt(sk, pf, val, opt, &len, 0);
163}
164EXPORT_SYMBOL(compat_nf_setsockopt);
165
76108cea 166int compat_nf_getsockopt(struct sock *sk, u_int8_t pf,
3fdadf7d
DM
167 int val, char __user *opt, int *len)
168{
169 return compat_nf_sockopt(sk, pf, val, opt, len, 1);
170}
171EXPORT_SYMBOL(compat_nf_getsockopt);
172#endif
This page took 0.418533 seconds and 5 git commands to generate.