]> bbs.cooldavid.org Git - net-next-2.6.git/blame - net/netfilter/xt_connmark.c
netfilter: xtables: use "if" blocks in Kconfig
[net-next-2.6.git] / net / netfilter / xt_connmark.c
CommitLineData
96e32272
JE
1/*
2 * xt_connmark - Netfilter module to match connection mark values
1da177e4 3 *
96e32272
JE
4 * Copyright (C) 2002,2004 MARA Systems AB <http://www.marasystems.com>
5 * by Henrik Nordstrom <hno@marasystems.com>
6 * Copyright © CC Computer Consultants GmbH, 2007 - 2008
7 * Jan Engelhardt <jengelh@computergmbh.de>
1da177e4
LT
8 *
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
13 *
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
18 *
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
22 */
23
24#include <linux/module.h>
25#include <linux/skbuff.h>
587aa641
PM
26#include <net/netfilter/nf_conntrack.h>
27#include <linux/netfilter/x_tables.h>
28#include <linux/netfilter/xt_connmark.h>
1da177e4 29
3a4fa0a2 30MODULE_AUTHOR("Henrik Nordstrom <hno@marasystems.com>");
2ae15b64 31MODULE_DESCRIPTION("Xtables: connection mark match");
1da177e4 32MODULE_LICENSE("GPL");
2e4e6a17 33MODULE_ALIAS("ipt_connmark");
73aaf935 34MODULE_ALIAS("ip6t_connmark");
1da177e4 35
1d93a9cb 36static bool
d3c5ee6d
JE
37connmark_mt(const struct sk_buff *skb, const struct net_device *in,
38 const struct net_device *out, const struct xt_match *match,
39 const void *matchinfo, int offset, unsigned int protoff,
40 bool *hotdrop)
96e32272
JE
41{
42 const struct xt_connmark_mtinfo1 *info = matchinfo;
43 enum ip_conntrack_info ctinfo;
44 const struct nf_conn *ct;
45
46 ct = nf_ct_get(skb, &ctinfo);
47 if (ct == NULL)
48 return false;
49
50 return ((ct->mark & info->mask) == info->mark) ^ info->invert;
51}
52
53static bool
54connmark_mt_v0(const struct sk_buff *skb, const struct net_device *in,
55 const struct net_device *out, const struct xt_match *match,
56 const void *matchinfo, int offset, unsigned int protoff,
57 bool *hotdrop)
1da177e4 58{
2e4e6a17 59 const struct xt_connmark_info *info = matchinfo;
a47362a2 60 const struct nf_conn *ct;
587aa641
PM
61 enum ip_conntrack_info ctinfo;
62
63 ct = nf_ct_get(skb, &ctinfo);
64 if (!ct)
1d93a9cb 65 return false;
1da177e4 66
7c4e36bc 67 return ((ct->mark & info->mask) == info->mark) ^ info->invert;
1da177e4
LT
68}
69
ccb79bdc 70static bool
96e32272
JE
71connmark_mt_check_v0(const char *tablename, const void *ip,
72 const struct xt_match *match, void *matchinfo,
73 unsigned int hook_mask)
1da177e4 74{
a47362a2 75 const struct xt_connmark_info *cm = matchinfo;
1da177e4 76
bf3a46aa
HW
77 if (cm->mark > 0xffffffff || cm->mask > 0xffffffff) {
78 printk(KERN_WARNING "connmark: only support 32bit mark\n");
ccb79bdc 79 return false;
bf3a46aa 80 }
b9f78f9f 81 if (nf_ct_l3proto_try_module_get(match->family) < 0) {
fe0b9294 82 printk(KERN_WARNING "can't load conntrack support for "
df54aae0 83 "proto=%u\n", match->family);
ccb79bdc 84 return false;
b9f78f9f 85 }
ccb79bdc 86 return true;
1da177e4
LT
87}
88
96e32272
JE
89static bool
90connmark_mt_check(const char *tablename, const void *ip,
91 const struct xt_match *match, void *matchinfo,
92 unsigned int hook_mask)
93{
94 if (nf_ct_l3proto_try_module_get(match->family) < 0) {
95 printk(KERN_WARNING "cannot load conntrack support for "
96 "proto=%u\n", match->family);
97 return false;
98 }
99 return true;
100}
101
b9f78f9f 102static void
d3c5ee6d 103connmark_mt_destroy(const struct xt_match *match, void *matchinfo)
b9f78f9f 104{
b9f78f9f 105 nf_ct_l3proto_module_put(match->family);
b9f78f9f
PNA
106}
107
f1eda053
PM
108#ifdef CONFIG_COMPAT
109struct compat_xt_connmark_info {
110 compat_ulong_t mark, mask;
111 u_int8_t invert;
112 u_int8_t __pad1;
113 u_int16_t __pad2;
114};
115
96e32272 116static void connmark_mt_compat_from_user_v0(void *dst, void *src)
f1eda053 117{
a47362a2 118 const struct compat_xt_connmark_info *cm = src;
f1eda053
PM
119 struct xt_connmark_info m = {
120 .mark = cm->mark,
121 .mask = cm->mask,
122 .invert = cm->invert,
123 };
124 memcpy(dst, &m, sizeof(m));
125}
126
96e32272 127static int connmark_mt_compat_to_user_v0(void __user *dst, void *src)
f1eda053 128{
a47362a2 129 const struct xt_connmark_info *m = src;
f1eda053
PM
130 struct compat_xt_connmark_info cm = {
131 .mark = m->mark,
132 .mask = m->mask,
133 .invert = m->invert,
134 };
135 return copy_to_user(dst, &cm, sizeof(cm)) ? -EFAULT : 0;
136}
137#endif /* CONFIG_COMPAT */
138
d3c5ee6d 139static struct xt_match connmark_mt_reg[] __read_mostly = {
4470bbc7
PM
140 {
141 .name = "connmark",
96e32272 142 .revision = 0,
ee999d8b 143 .family = NFPROTO_IPV4,
96e32272
JE
144 .checkentry = connmark_mt_check_v0,
145 .match = connmark_mt_v0,
d3c5ee6d 146 .destroy = connmark_mt_destroy,
4470bbc7 147 .matchsize = sizeof(struct xt_connmark_info),
f1eda053
PM
148#ifdef CONFIG_COMPAT
149 .compatsize = sizeof(struct compat_xt_connmark_info),
96e32272
JE
150 .compat_from_user = connmark_mt_compat_from_user_v0,
151 .compat_to_user = connmark_mt_compat_to_user_v0,
f1eda053 152#endif
4470bbc7
PM
153 .me = THIS_MODULE
154 },
155 {
156 .name = "connmark",
96e32272 157 .revision = 0,
ee999d8b 158 .family = NFPROTO_IPV6,
96e32272
JE
159 .checkentry = connmark_mt_check_v0,
160 .match = connmark_mt_v0,
d3c5ee6d 161 .destroy = connmark_mt_destroy,
4470bbc7 162 .matchsize = sizeof(struct xt_connmark_info),
34f4c429
PM
163#ifdef CONFIG_COMPAT
164 .compatsize = sizeof(struct compat_xt_connmark_info),
96e32272
JE
165 .compat_from_user = connmark_mt_compat_from_user_v0,
166 .compat_to_user = connmark_mt_compat_to_user_v0,
34f4c429 167#endif
4470bbc7
PM
168 .me = THIS_MODULE
169 },
96e32272
JE
170 {
171 .name = "connmark",
172 .revision = 1,
ee999d8b 173 .family = NFPROTO_IPV4,
96e32272
JE
174 .checkentry = connmark_mt_check,
175 .match = connmark_mt,
176 .matchsize = sizeof(struct xt_connmark_mtinfo1),
177 .destroy = connmark_mt_destroy,
178 .me = THIS_MODULE,
179 },
180 {
181 .name = "connmark",
182 .revision = 1,
ee999d8b 183 .family = NFPROTO_IPV6,
96e32272
JE
184 .checkentry = connmark_mt_check,
185 .match = connmark_mt,
186 .matchsize = sizeof(struct xt_connmark_mtinfo1),
187 .destroy = connmark_mt_destroy,
188 .me = THIS_MODULE,
189 },
1da177e4
LT
190};
191
d3c5ee6d 192static int __init connmark_mt_init(void)
1da177e4 193{
d3c5ee6d
JE
194 return xt_register_matches(connmark_mt_reg,
195 ARRAY_SIZE(connmark_mt_reg));
1da177e4
LT
196}
197
d3c5ee6d 198static void __exit connmark_mt_exit(void)
1da177e4 199{
d3c5ee6d 200 xt_unregister_matches(connmark_mt_reg, ARRAY_SIZE(connmark_mt_reg));
1da177e4
LT
201}
202
d3c5ee6d
JE
203module_init(connmark_mt_init);
204module_exit(connmark_mt_exit);