1 /* Copyright (C) 2000-2002 Joakim Axelsson <gozem@linux.nu>
2 * Patrick Schaaf <bof@bof.de>
3 * Martin Josefsson <gandalf@wlug.westbo.se>
4 * Copyright (C) 2003-2013 Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License version 2 as
8 * published by the Free Software Foundation.
11 /* Kernel module which implements the set match and SET target
12 * for netfilter/iptables. */
14 #include <linux/module.h>
15 #include <linux/skbuff.h>
17 #include <linux/netfilter/x_tables.h>
18 #include <linux/netfilter/xt_set.h>
19 #include <linux/netfilter/ipset/ip_set_timeout.h>
21 MODULE_LICENSE("GPL");
22 MODULE_AUTHOR("Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>");
23 MODULE_DESCRIPTION("Xtables: IP set match and target module");
24 MODULE_ALIAS("xt_SET");
25 MODULE_ALIAS("ipt_set");
26 MODULE_ALIAS("ip6t_set");
27 MODULE_ALIAS("ipt_SET");
28 MODULE_ALIAS("ip6t_SET");
31 match_set(ip_set_id_t index
, const struct sk_buff
*skb
,
32 const struct xt_action_param
*par
,
33 struct ip_set_adt_opt
*opt
, int inv
)
35 if (ip_set_test(index
, skb
, par
, opt
))
40 #define ADT_OPT(n, f, d, fs, cfs, t) \
41 struct ip_set_adt_opt n = { \
49 /* Revision 0 interface: backward compatible with netfilter/iptables */
52 set_match_v0(const struct sk_buff
*skb
, struct xt_action_param
*par
)
54 const struct xt_set_info_match_v0
*info
= par
->matchinfo
;
55 ADT_OPT(opt
, par
->family
, info
->match_set
.u
.compat
.dim
,
56 info
->match_set
.u
.compat
.flags
, 0, UINT_MAX
);
58 return match_set(info
->match_set
.index
, skb
, par
, &opt
,
59 info
->match_set
.u
.compat
.flags
& IPSET_INV_MATCH
);
63 compat_flags(struct xt_set_info_v0
*info
)
67 /* Fill out compatibility data according to enum ip_set_kopt */
68 info
->u
.compat
.dim
= IPSET_DIM_ZERO
;
69 if (info
->u
.flags
[0] & IPSET_MATCH_INV
)
70 info
->u
.compat
.flags
|= IPSET_INV_MATCH
;
71 for (i
= 0; i
< IPSET_DIM_MAX
-1 && info
->u
.flags
[i
]; i
++) {
73 if (info
->u
.flags
[i
] & IPSET_SRC
)
74 info
->u
.compat
.flags
|= (1<<info
->u
.compat
.dim
);
79 set_match_v0_checkentry(const struct xt_mtchk_param
*par
)
81 struct xt_set_info_match_v0
*info
= par
->matchinfo
;
84 index
= ip_set_nfnl_get_byindex(par
->net
, info
->match_set
.index
);
86 if (index
== IPSET_INVALID_ID
) {
87 pr_warn("Cannot find set identified by id %u to match\n",
88 info
->match_set
.index
);
91 if (info
->match_set
.u
.flags
[IPSET_DIM_MAX
-1] != 0) {
92 pr_warn("Protocol error: set match dimension is over the limit!\n");
93 ip_set_nfnl_put(par
->net
, info
->match_set
.index
);
97 /* Fill out compatibility data */
98 compat_flags(&info
->match_set
);
104 set_match_v0_destroy(const struct xt_mtdtor_param
*par
)
106 struct xt_set_info_match_v0
*info
= par
->matchinfo
;
108 ip_set_nfnl_put(par
->net
, info
->match_set
.index
);
111 /* Revision 1 match */
114 set_match_v1(const struct sk_buff
*skb
, struct xt_action_param
*par
)
116 const struct xt_set_info_match_v1
*info
= par
->matchinfo
;
117 ADT_OPT(opt
, par
->family
, info
->match_set
.dim
,
118 info
->match_set
.flags
, 0, UINT_MAX
);
120 if (opt
.flags
& IPSET_RETURN_NOMATCH
)
121 opt
.cmdflags
|= IPSET_FLAG_RETURN_NOMATCH
;
123 return match_set(info
->match_set
.index
, skb
, par
, &opt
,
124 info
->match_set
.flags
& IPSET_INV_MATCH
);
128 set_match_v1_checkentry(const struct xt_mtchk_param
*par
)
130 struct xt_set_info_match_v1
*info
= par
->matchinfo
;
133 index
= ip_set_nfnl_get_byindex(par
->net
, info
->match_set
.index
);
135 if (index
== IPSET_INVALID_ID
) {
136 pr_warn("Cannot find set identified by id %u to match\n",
137 info
->match_set
.index
);
140 if (info
->match_set
.dim
> IPSET_DIM_MAX
) {
141 pr_warn("Protocol error: set match dimension is over the limit!\n");
142 ip_set_nfnl_put(par
->net
, info
->match_set
.index
);
150 set_match_v1_destroy(const struct xt_mtdtor_param
*par
)
152 struct xt_set_info_match_v1
*info
= par
->matchinfo
;
154 ip_set_nfnl_put(par
->net
, info
->match_set
.index
);
157 /* Revision 3 match */
160 match_counter(u64 counter
, const struct ip_set_counter_match
*info
)
163 case IPSET_COUNTER_NONE
:
165 case IPSET_COUNTER_EQ
:
166 return counter
== info
->value
;
167 case IPSET_COUNTER_NE
:
168 return counter
!= info
->value
;
169 case IPSET_COUNTER_LT
:
170 return counter
< info
->value
;
171 case IPSET_COUNTER_GT
:
172 return counter
> info
->value
;
178 set_match_v3(const struct sk_buff
*skb
, struct xt_action_param
*par
)
180 const struct xt_set_info_match_v3
*info
= par
->matchinfo
;
181 ADT_OPT(opt
, par
->family
, info
->match_set
.dim
,
182 info
->match_set
.flags
, info
->flags
, UINT_MAX
);
185 if (info
->packets
.op
!= IPSET_COUNTER_NONE
||
186 info
->bytes
.op
!= IPSET_COUNTER_NONE
)
187 opt
.cmdflags
|= IPSET_FLAG_MATCH_COUNTERS
;
189 ret
= match_set(info
->match_set
.index
, skb
, par
, &opt
,
190 info
->match_set
.flags
& IPSET_INV_MATCH
);
192 if (!(ret
&& opt
.cmdflags
& IPSET_FLAG_MATCH_COUNTERS
))
195 if (!match_counter(opt
.ext
.packets
, &info
->packets
))
197 return match_counter(opt
.ext
.bytes
, &info
->bytes
);
200 #define set_match_v3_checkentry set_match_v1_checkentry
201 #define set_match_v3_destroy set_match_v1_destroy
203 /* Revision 0 interface: backward compatible with netfilter/iptables */
206 set_target_v0(struct sk_buff
*skb
, const struct xt_action_param
*par
)
208 const struct xt_set_info_target_v0
*info
= par
->targinfo
;
209 ADT_OPT(add_opt
, par
->family
, info
->add_set
.u
.compat
.dim
,
210 info
->add_set
.u
.compat
.flags
, 0, UINT_MAX
);
211 ADT_OPT(del_opt
, par
->family
, info
->del_set
.u
.compat
.dim
,
212 info
->del_set
.u
.compat
.flags
, 0, UINT_MAX
);
214 if (info
->add_set
.index
!= IPSET_INVALID_ID
)
215 ip_set_add(info
->add_set
.index
, skb
, par
, &add_opt
);
216 if (info
->del_set
.index
!= IPSET_INVALID_ID
)
217 ip_set_del(info
->del_set
.index
, skb
, par
, &del_opt
);
223 set_target_v0_checkentry(const struct xt_tgchk_param
*par
)
225 struct xt_set_info_target_v0
*info
= par
->targinfo
;
228 if (info
->add_set
.index
!= IPSET_INVALID_ID
) {
229 index
= ip_set_nfnl_get_byindex(par
->net
, info
->add_set
.index
);
230 if (index
== IPSET_INVALID_ID
) {
231 pr_warn("Cannot find add_set index %u as target\n",
232 info
->add_set
.index
);
237 if (info
->del_set
.index
!= IPSET_INVALID_ID
) {
238 index
= ip_set_nfnl_get_byindex(par
->net
, info
->del_set
.index
);
239 if (index
== IPSET_INVALID_ID
) {
240 pr_warn("Cannot find del_set index %u as target\n",
241 info
->del_set
.index
);
242 if (info
->add_set
.index
!= IPSET_INVALID_ID
)
243 ip_set_nfnl_put(par
->net
, info
->add_set
.index
);
247 if (info
->add_set
.u
.flags
[IPSET_DIM_MAX
-1] != 0 ||
248 info
->del_set
.u
.flags
[IPSET_DIM_MAX
-1] != 0) {
249 pr_warn("Protocol error: SET target dimension is over the limit!\n");
250 if (info
->add_set
.index
!= IPSET_INVALID_ID
)
251 ip_set_nfnl_put(par
->net
, info
->add_set
.index
);
252 if (info
->del_set
.index
!= IPSET_INVALID_ID
)
253 ip_set_nfnl_put(par
->net
, info
->del_set
.index
);
257 /* Fill out compatibility data */
258 compat_flags(&info
->add_set
);
259 compat_flags(&info
->del_set
);
265 set_target_v0_destroy(const struct xt_tgdtor_param
*par
)
267 const struct xt_set_info_target_v0
*info
= par
->targinfo
;
269 if (info
->add_set
.index
!= IPSET_INVALID_ID
)
270 ip_set_nfnl_put(par
->net
, info
->add_set
.index
);
271 if (info
->del_set
.index
!= IPSET_INVALID_ID
)
272 ip_set_nfnl_put(par
->net
, info
->del_set
.index
);
275 /* Revision 1 target */
278 set_target_v1(struct sk_buff
*skb
, const struct xt_action_param
*par
)
280 const struct xt_set_info_target_v1
*info
= par
->targinfo
;
281 ADT_OPT(add_opt
, par
->family
, info
->add_set
.dim
,
282 info
->add_set
.flags
, 0, UINT_MAX
);
283 ADT_OPT(del_opt
, par
->family
, info
->del_set
.dim
,
284 info
->del_set
.flags
, 0, UINT_MAX
);
286 if (info
->add_set
.index
!= IPSET_INVALID_ID
)
287 ip_set_add(info
->add_set
.index
, skb
, par
, &add_opt
);
288 if (info
->del_set
.index
!= IPSET_INVALID_ID
)
289 ip_set_del(info
->del_set
.index
, skb
, par
, &del_opt
);
295 set_target_v1_checkentry(const struct xt_tgchk_param
*par
)
297 const struct xt_set_info_target_v1
*info
= par
->targinfo
;
300 if (info
->add_set
.index
!= IPSET_INVALID_ID
) {
301 index
= ip_set_nfnl_get_byindex(par
->net
, info
->add_set
.index
);
302 if (index
== IPSET_INVALID_ID
) {
303 pr_warn("Cannot find add_set index %u as target\n",
304 info
->add_set
.index
);
309 if (info
->del_set
.index
!= IPSET_INVALID_ID
) {
310 index
= ip_set_nfnl_get_byindex(par
->net
, info
->del_set
.index
);
311 if (index
== IPSET_INVALID_ID
) {
312 pr_warn("Cannot find del_set index %u as target\n",
313 info
->del_set
.index
);
314 if (info
->add_set
.index
!= IPSET_INVALID_ID
)
315 ip_set_nfnl_put(par
->net
, info
->add_set
.index
);
319 if (info
->add_set
.dim
> IPSET_DIM_MAX
||
320 info
->del_set
.dim
> IPSET_DIM_MAX
) {
321 pr_warn("Protocol error: SET target dimension is over the limit!\n");
322 if (info
->add_set
.index
!= IPSET_INVALID_ID
)
323 ip_set_nfnl_put(par
->net
, info
->add_set
.index
);
324 if (info
->del_set
.index
!= IPSET_INVALID_ID
)
325 ip_set_nfnl_put(par
->net
, info
->del_set
.index
);
333 set_target_v1_destroy(const struct xt_tgdtor_param
*par
)
335 const struct xt_set_info_target_v1
*info
= par
->targinfo
;
337 if (info
->add_set
.index
!= IPSET_INVALID_ID
)
338 ip_set_nfnl_put(par
->net
, info
->add_set
.index
);
339 if (info
->del_set
.index
!= IPSET_INVALID_ID
)
340 ip_set_nfnl_put(par
->net
, info
->del_set
.index
);
343 /* Revision 2 target */
346 set_target_v2(struct sk_buff
*skb
, const struct xt_action_param
*par
)
348 const struct xt_set_info_target_v2
*info
= par
->targinfo
;
349 ADT_OPT(add_opt
, par
->family
, info
->add_set
.dim
,
350 info
->add_set
.flags
, info
->flags
, info
->timeout
);
351 ADT_OPT(del_opt
, par
->family
, info
->del_set
.dim
,
352 info
->del_set
.flags
, 0, UINT_MAX
);
354 /* Normalize to fit into jiffies */
355 if (add_opt
.ext
.timeout
!= IPSET_NO_TIMEOUT
&&
356 add_opt
.ext
.timeout
> UINT_MAX
/MSEC_PER_SEC
)
357 add_opt
.ext
.timeout
= UINT_MAX
/MSEC_PER_SEC
;
358 if (info
->add_set
.index
!= IPSET_INVALID_ID
)
359 ip_set_add(info
->add_set
.index
, skb
, par
, &add_opt
);
360 if (info
->del_set
.index
!= IPSET_INVALID_ID
)
361 ip_set_del(info
->del_set
.index
, skb
, par
, &del_opt
);
366 #define set_target_v2_checkentry set_target_v1_checkentry
367 #define set_target_v2_destroy set_target_v1_destroy
369 /* Revision 3 target */
372 set_target_v3(struct sk_buff
*skb
, const struct xt_action_param
*par
)
374 const struct xt_set_info_target_v3
*info
= par
->targinfo
;
375 ADT_OPT(add_opt
, par
->family
, info
->add_set
.dim
,
376 info
->add_set
.flags
, info
->flags
, info
->timeout
);
377 ADT_OPT(del_opt
, par
->family
, info
->del_set
.dim
,
378 info
->del_set
.flags
, 0, UINT_MAX
);
379 ADT_OPT(map_opt
, par
->family
, info
->map_set
.dim
,
380 info
->map_set
.flags
, 0, UINT_MAX
);
384 /* Normalize to fit into jiffies */
385 if (add_opt
.ext
.timeout
!= IPSET_NO_TIMEOUT
&&
386 add_opt
.ext
.timeout
> UINT_MAX
/MSEC_PER_SEC
)
387 add_opt
.ext
.timeout
= UINT_MAX
/MSEC_PER_SEC
;
388 if (info
->add_set
.index
!= IPSET_INVALID_ID
)
389 ip_set_add(info
->add_set
.index
, skb
, par
, &add_opt
);
390 if (info
->del_set
.index
!= IPSET_INVALID_ID
)
391 ip_set_del(info
->del_set
.index
, skb
, par
, &del_opt
);
392 if (info
->map_set
.index
!= IPSET_INVALID_ID
) {
393 map_opt
.cmdflags
|= info
->flags
& (IPSET_FLAG_MAP_SKBMARK
|
394 IPSET_FLAG_MAP_SKBPRIO
|
395 IPSET_FLAG_MAP_SKBQUEUE
);
396 ret
= match_set(info
->map_set
.index
, skb
, par
, &map_opt
,
397 info
->map_set
.flags
& IPSET_INV_MATCH
);
400 if (map_opt
.cmdflags
& IPSET_FLAG_MAP_SKBMARK
)
401 skb
->mark
= (skb
->mark
& ~(map_opt
.ext
.skbmarkmask
))
402 ^ (map_opt
.ext
.skbmark
);
403 if (map_opt
.cmdflags
& IPSET_FLAG_MAP_SKBPRIO
)
404 skb
->priority
= map_opt
.ext
.skbprio
;
405 if ((map_opt
.cmdflags
& IPSET_FLAG_MAP_SKBQUEUE
) &&
407 skb
->dev
->real_num_tx_queues
> map_opt
.ext
.skbqueue
)
408 skb_set_queue_mapping(skb
, map_opt
.ext
.skbqueue
);
415 set_target_v3_checkentry(const struct xt_tgchk_param
*par
)
417 const struct xt_set_info_target_v3
*info
= par
->targinfo
;
420 if (info
->add_set
.index
!= IPSET_INVALID_ID
) {
421 index
= ip_set_nfnl_get_byindex(par
->net
,
422 info
->add_set
.index
);
423 if (index
== IPSET_INVALID_ID
) {
424 pr_warn("Cannot find add_set index %u as target\n",
425 info
->add_set
.index
);
430 if (info
->del_set
.index
!= IPSET_INVALID_ID
) {
431 index
= ip_set_nfnl_get_byindex(par
->net
,
432 info
->del_set
.index
);
433 if (index
== IPSET_INVALID_ID
) {
434 pr_warn("Cannot find del_set index %u as target\n",
435 info
->del_set
.index
);
436 if (info
->add_set
.index
!= IPSET_INVALID_ID
)
437 ip_set_nfnl_put(par
->net
,
438 info
->add_set
.index
);
443 if (info
->map_set
.index
!= IPSET_INVALID_ID
) {
444 if (strncmp(par
->table
, "mangle", 7)) {
445 pr_warn("--map-set only usable from mangle table\n");
448 if (((info
->flags
& IPSET_FLAG_MAP_SKBPRIO
) |
449 (info
->flags
& IPSET_FLAG_MAP_SKBQUEUE
)) &&
450 !(par
->hook_mask
& (1 << NF_INET_FORWARD
|
451 1 << NF_INET_LOCAL_OUT
|
452 1 << NF_INET_POST_ROUTING
))) {
453 pr_warn("mapping of prio or/and queue is allowed only"
454 "from OUTPUT/FORWARD/POSTROUTING chains\n");
457 index
= ip_set_nfnl_get_byindex(par
->net
,
458 info
->map_set
.index
);
459 if (index
== IPSET_INVALID_ID
) {
460 pr_warn("Cannot find map_set index %u as target\n",
461 info
->map_set
.index
);
462 if (info
->add_set
.index
!= IPSET_INVALID_ID
)
463 ip_set_nfnl_put(par
->net
,
464 info
->add_set
.index
);
465 if (info
->del_set
.index
!= IPSET_INVALID_ID
)
466 ip_set_nfnl_put(par
->net
,
467 info
->del_set
.index
);
472 if (info
->add_set
.dim
> IPSET_DIM_MAX
||
473 info
->del_set
.dim
> IPSET_DIM_MAX
||
474 info
->map_set
.dim
> IPSET_DIM_MAX
) {
475 pr_warn("Protocol error: SET target dimension "
476 "is over the limit!\n");
477 if (info
->add_set
.index
!= IPSET_INVALID_ID
)
478 ip_set_nfnl_put(par
->net
, info
->add_set
.index
);
479 if (info
->del_set
.index
!= IPSET_INVALID_ID
)
480 ip_set_nfnl_put(par
->net
, info
->del_set
.index
);
481 if (info
->map_set
.index
!= IPSET_INVALID_ID
)
482 ip_set_nfnl_put(par
->net
, info
->map_set
.index
);
490 set_target_v3_destroy(const struct xt_tgdtor_param
*par
)
492 const struct xt_set_info_target_v3
*info
= par
->targinfo
;
494 if (info
->add_set
.index
!= IPSET_INVALID_ID
)
495 ip_set_nfnl_put(par
->net
, info
->add_set
.index
);
496 if (info
->del_set
.index
!= IPSET_INVALID_ID
)
497 ip_set_nfnl_put(par
->net
, info
->del_set
.index
);
498 if (info
->map_set
.index
!= IPSET_INVALID_ID
)
499 ip_set_nfnl_put(par
->net
, info
->map_set
.index
);
503 static struct xt_match set_matches
[] __read_mostly
= {
506 .family
= NFPROTO_IPV4
,
508 .match
= set_match_v0
,
509 .matchsize
= sizeof(struct xt_set_info_match_v0
),
510 .checkentry
= set_match_v0_checkentry
,
511 .destroy
= set_match_v0_destroy
,
516 .family
= NFPROTO_IPV4
,
518 .match
= set_match_v1
,
519 .matchsize
= sizeof(struct xt_set_info_match_v1
),
520 .checkentry
= set_match_v1_checkentry
,
521 .destroy
= set_match_v1_destroy
,
526 .family
= NFPROTO_IPV6
,
528 .match
= set_match_v1
,
529 .matchsize
= sizeof(struct xt_set_info_match_v1
),
530 .checkentry
= set_match_v1_checkentry
,
531 .destroy
= set_match_v1_destroy
,
534 /* --return-nomatch flag support */
537 .family
= NFPROTO_IPV4
,
539 .match
= set_match_v1
,
540 .matchsize
= sizeof(struct xt_set_info_match_v1
),
541 .checkentry
= set_match_v1_checkentry
,
542 .destroy
= set_match_v1_destroy
,
547 .family
= NFPROTO_IPV6
,
549 .match
= set_match_v1
,
550 .matchsize
= sizeof(struct xt_set_info_match_v1
),
551 .checkentry
= set_match_v1_checkentry
,
552 .destroy
= set_match_v1_destroy
,
555 /* counters support: update, match */
558 .family
= NFPROTO_IPV4
,
560 .match
= set_match_v3
,
561 .matchsize
= sizeof(struct xt_set_info_match_v3
),
562 .checkentry
= set_match_v3_checkentry
,
563 .destroy
= set_match_v3_destroy
,
568 .family
= NFPROTO_IPV6
,
570 .match
= set_match_v3
,
571 .matchsize
= sizeof(struct xt_set_info_match_v3
),
572 .checkentry
= set_match_v3_checkentry
,
573 .destroy
= set_match_v3_destroy
,
578 static struct xt_target set_targets
[] __read_mostly
= {
582 .family
= NFPROTO_IPV4
,
583 .target
= set_target_v0
,
584 .targetsize
= sizeof(struct xt_set_info_target_v0
),
585 .checkentry
= set_target_v0_checkentry
,
586 .destroy
= set_target_v0_destroy
,
592 .family
= NFPROTO_IPV4
,
593 .target
= set_target_v1
,
594 .targetsize
= sizeof(struct xt_set_info_target_v1
),
595 .checkentry
= set_target_v1_checkentry
,
596 .destroy
= set_target_v1_destroy
,
602 .family
= NFPROTO_IPV6
,
603 .target
= set_target_v1
,
604 .targetsize
= sizeof(struct xt_set_info_target_v1
),
605 .checkentry
= set_target_v1_checkentry
,
606 .destroy
= set_target_v1_destroy
,
609 /* --timeout and --exist flags support */
613 .family
= NFPROTO_IPV4
,
614 .target
= set_target_v2
,
615 .targetsize
= sizeof(struct xt_set_info_target_v2
),
616 .checkentry
= set_target_v2_checkentry
,
617 .destroy
= set_target_v2_destroy
,
623 .family
= NFPROTO_IPV6
,
624 .target
= set_target_v2
,
625 .targetsize
= sizeof(struct xt_set_info_target_v2
),
626 .checkentry
= set_target_v2_checkentry
,
627 .destroy
= set_target_v2_destroy
,
630 /* --map-set support */
634 .family
= NFPROTO_IPV4
,
635 .target
= set_target_v3
,
636 .targetsize
= sizeof(struct xt_set_info_target_v3
),
637 .checkentry
= set_target_v3_checkentry
,
638 .destroy
= set_target_v3_destroy
,
644 .family
= NFPROTO_IPV6
,
645 .target
= set_target_v3
,
646 .targetsize
= sizeof(struct xt_set_info_target_v3
),
647 .checkentry
= set_target_v3_checkentry
,
648 .destroy
= set_target_v3_destroy
,
653 static int __init
xt_set_init(void)
655 int ret
= xt_register_matches(set_matches
, ARRAY_SIZE(set_matches
));
658 ret
= xt_register_targets(set_targets
,
659 ARRAY_SIZE(set_targets
));
661 xt_unregister_matches(set_matches
,
662 ARRAY_SIZE(set_matches
));
667 static void __exit
xt_set_fini(void)
669 xt_unregister_matches(set_matches
, ARRAY_SIZE(set_matches
));
670 xt_unregister_targets(set_targets
, ARRAY_SIZE(set_targets
));
673 module_init(xt_set_init
);
674 module_exit(xt_set_fini
);