netfilter: xtables: move extension arguments into compound structure (1/6)
[deliverable/linux.git] / net / netfilter / xt_connmark.c
CommitLineData
96e32272
JE
1/*
2 * xt_connmark - Netfilter module to match connection mark values
1da177e4 3 *
96e32272
JE
4 * Copyright (C) 2002,2004 MARA Systems AB <http://www.marasystems.com>
5 * by Henrik Nordstrom <hno@marasystems.com>
6 * Copyright © CC Computer Consultants GmbH, 2007 - 2008
7 * Jan Engelhardt <jengelh@computergmbh.de>
1da177e4
LT
8 *
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
13 *
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
18 *
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
22 */
23
24#include <linux/module.h>
25#include <linux/skbuff.h>
587aa641
PM
26#include <net/netfilter/nf_conntrack.h>
27#include <linux/netfilter/x_tables.h>
28#include <linux/netfilter/xt_connmark.h>
1da177e4 29
3a4fa0a2 30MODULE_AUTHOR("Henrik Nordstrom <hno@marasystems.com>");
2ae15b64 31MODULE_DESCRIPTION("Xtables: connection mark match");
1da177e4 32MODULE_LICENSE("GPL");
2e4e6a17 33MODULE_ALIAS("ipt_connmark");
73aaf935 34MODULE_ALIAS("ip6t_connmark");
1da177e4 35
1d93a9cb 36static bool
f7108a20 37connmark_mt(const struct sk_buff *skb, const struct xt_match_param *par)
96e32272 38{
f7108a20 39 const struct xt_connmark_mtinfo1 *info = par->matchinfo;
96e32272
JE
40 enum ip_conntrack_info ctinfo;
41 const struct nf_conn *ct;
42
43 ct = nf_ct_get(skb, &ctinfo);
44 if (ct == NULL)
45 return false;
46
47 return ((ct->mark & info->mask) == info->mark) ^ info->invert;
48}
49
50static bool
f7108a20 51connmark_mt_v0(const struct sk_buff *skb, const struct xt_match_param *par)
1da177e4 52{
f7108a20 53 const struct xt_connmark_info *info = par->matchinfo;
a47362a2 54 const struct nf_conn *ct;
587aa641
PM
55 enum ip_conntrack_info ctinfo;
56
57 ct = nf_ct_get(skb, &ctinfo);
58 if (!ct)
1d93a9cb 59 return false;
1da177e4 60
7c4e36bc 61 return ((ct->mark & info->mask) == info->mark) ^ info->invert;
1da177e4
LT
62}
63
ccb79bdc 64static bool
96e32272
JE
65connmark_mt_check_v0(const char *tablename, const void *ip,
66 const struct xt_match *match, void *matchinfo,
67 unsigned int hook_mask)
1da177e4 68{
a47362a2 69 const struct xt_connmark_info *cm = matchinfo;
1da177e4 70
bf3a46aa
HW
71 if (cm->mark > 0xffffffff || cm->mask > 0xffffffff) {
72 printk(KERN_WARNING "connmark: only support 32bit mark\n");
ccb79bdc 73 return false;
bf3a46aa 74 }
b9f78f9f 75 if (nf_ct_l3proto_try_module_get(match->family) < 0) {
fe0b9294 76 printk(KERN_WARNING "can't load conntrack support for "
df54aae0 77 "proto=%u\n", match->family);
ccb79bdc 78 return false;
b9f78f9f 79 }
ccb79bdc 80 return true;
1da177e4
LT
81}
82
96e32272
JE
83static bool
84connmark_mt_check(const char *tablename, const void *ip,
85 const struct xt_match *match, void *matchinfo,
86 unsigned int hook_mask)
87{
88 if (nf_ct_l3proto_try_module_get(match->family) < 0) {
89 printk(KERN_WARNING "cannot load conntrack support for "
90 "proto=%u\n", match->family);
91 return false;
92 }
93 return true;
94}
95
b9f78f9f 96static void
d3c5ee6d 97connmark_mt_destroy(const struct xt_match *match, void *matchinfo)
b9f78f9f 98{
b9f78f9f 99 nf_ct_l3proto_module_put(match->family);
b9f78f9f
PNA
100}
101
f1eda053
PM
102#ifdef CONFIG_COMPAT
103struct compat_xt_connmark_info {
104 compat_ulong_t mark, mask;
105 u_int8_t invert;
106 u_int8_t __pad1;
107 u_int16_t __pad2;
108};
109
96e32272 110static void connmark_mt_compat_from_user_v0(void *dst, void *src)
f1eda053 111{
a47362a2 112 const struct compat_xt_connmark_info *cm = src;
f1eda053
PM
113 struct xt_connmark_info m = {
114 .mark = cm->mark,
115 .mask = cm->mask,
116 .invert = cm->invert,
117 };
118 memcpy(dst, &m, sizeof(m));
119}
120
96e32272 121static int connmark_mt_compat_to_user_v0(void __user *dst, void *src)
f1eda053 122{
a47362a2 123 const struct xt_connmark_info *m = src;
f1eda053
PM
124 struct compat_xt_connmark_info cm = {
125 .mark = m->mark,
126 .mask = m->mask,
127 .invert = m->invert,
128 };
129 return copy_to_user(dst, &cm, sizeof(cm)) ? -EFAULT : 0;
130}
131#endif /* CONFIG_COMPAT */
132
d3c5ee6d 133static struct xt_match connmark_mt_reg[] __read_mostly = {
4470bbc7
PM
134 {
135 .name = "connmark",
96e32272 136 .revision = 0,
ee999d8b 137 .family = NFPROTO_IPV4,
96e32272
JE
138 .checkentry = connmark_mt_check_v0,
139 .match = connmark_mt_v0,
d3c5ee6d 140 .destroy = connmark_mt_destroy,
4470bbc7 141 .matchsize = sizeof(struct xt_connmark_info),
f1eda053
PM
142#ifdef CONFIG_COMPAT
143 .compatsize = sizeof(struct compat_xt_connmark_info),
96e32272
JE
144 .compat_from_user = connmark_mt_compat_from_user_v0,
145 .compat_to_user = connmark_mt_compat_to_user_v0,
f1eda053 146#endif
4470bbc7
PM
147 .me = THIS_MODULE
148 },
149 {
150 .name = "connmark",
96e32272 151 .revision = 0,
ee999d8b 152 .family = NFPROTO_IPV6,
96e32272
JE
153 .checkentry = connmark_mt_check_v0,
154 .match = connmark_mt_v0,
d3c5ee6d 155 .destroy = connmark_mt_destroy,
4470bbc7 156 .matchsize = sizeof(struct xt_connmark_info),
34f4c429
PM
157#ifdef CONFIG_COMPAT
158 .compatsize = sizeof(struct compat_xt_connmark_info),
96e32272
JE
159 .compat_from_user = connmark_mt_compat_from_user_v0,
160 .compat_to_user = connmark_mt_compat_to_user_v0,
34f4c429 161#endif
4470bbc7
PM
162 .me = THIS_MODULE
163 },
96e32272
JE
164 {
165 .name = "connmark",
166 .revision = 1,
ee999d8b 167 .family = NFPROTO_IPV4,
96e32272
JE
168 .checkentry = connmark_mt_check,
169 .match = connmark_mt,
170 .matchsize = sizeof(struct xt_connmark_mtinfo1),
171 .destroy = connmark_mt_destroy,
172 .me = THIS_MODULE,
173 },
174 {
175 .name = "connmark",
176 .revision = 1,
ee999d8b 177 .family = NFPROTO_IPV6,
96e32272
JE
178 .checkentry = connmark_mt_check,
179 .match = connmark_mt,
180 .matchsize = sizeof(struct xt_connmark_mtinfo1),
181 .destroy = connmark_mt_destroy,
182 .me = THIS_MODULE,
183 },
1da177e4
LT
184};
185
d3c5ee6d 186static int __init connmark_mt_init(void)
1da177e4 187{
d3c5ee6d
JE
188 return xt_register_matches(connmark_mt_reg,
189 ARRAY_SIZE(connmark_mt_reg));
1da177e4
LT
190}
191
d3c5ee6d 192static void __exit connmark_mt_exit(void)
1da177e4 193{
d3c5ee6d 194 xt_unregister_matches(connmark_mt_reg, ARRAY_SIZE(connmark_mt_reg));
1da177e4
LT
195}
196
d3c5ee6d
JE
197module_init(connmark_mt_init);
198module_exit(connmark_mt_exit);
This page took 0.392381 seconds and 5 git commands to generate.