diff options
author | David S. Miller <davem@davemloft.net> | 2010-02-16 14:15:13 -0500 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2010-02-16 14:15:13 -0500 |
commit | 749f621e20ab0db35a15ff730088922603c809ba (patch) | |
tree | 2684d12199b58f2b9e0c5b7e6cc0ea3f002e611a /net/ipv4 | |
parent | 339c6e99853d2ef1f02ad8a313e079050a300427 (diff) | |
parent | 3e5e524ffb5fcf2447eb5dd9f8e54ad22dd9baa7 (diff) |
Merge branch 'master' of git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-next-2.6
Diffstat (limited to 'net/ipv4')
-rw-r--r-- | net/ipv4/netfilter/arp_tables.c | 80 | ||||
-rw-r--r-- | net/ipv4/netfilter/arptable_filter.c | 95 | ||||
-rw-r--r-- | net/ipv4/netfilter/ip_tables.c | 156 | ||||
-rw-r--r-- | net/ipv4/netfilter/ipt_CLUSTERIP.c | 14 | ||||
-rw-r--r-- | net/ipv4/netfilter/ipt_ULOG.c | 4 | ||||
-rw-r--r-- | net/ipv4/netfilter/iptable_filter.c | 124 | ||||
-rw-r--r-- | net/ipv4/netfilter/iptable_mangle.c | 166 | ||||
-rw-r--r-- | net/ipv4/netfilter/iptable_raw.c | 96 | ||||
-rw-r--r-- | net/ipv4/netfilter/iptable_security.c | 117 | ||||
-rw-r--r-- | net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c | 3 | ||||
-rw-r--r-- | net/ipv4/netfilter/nf_conntrack_proto_icmp.c | 11 | ||||
-rw-r--r-- | net/ipv4/netfilter/nf_defrag_ipv4.c | 15 | ||||
-rw-r--r-- | net/ipv4/netfilter/nf_nat_core.c | 24 | ||||
-rw-r--r-- | net/ipv4/netfilter/nf_nat_ftp.c | 105 | ||||
-rw-r--r-- | net/ipv4/netfilter/nf_nat_helper.c | 39 | ||||
-rw-r--r-- | net/ipv4/netfilter/nf_nat_pptp.c | 3 | ||||
-rw-r--r-- | net/ipv4/netfilter/nf_nat_rule.c | 41 | ||||
-rw-r--r-- | net/ipv4/netfilter/nf_nat_sip.c | 154 | ||||
-rw-r--r-- | net/ipv4/netfilter/nf_nat_snmp_basic.c | 31 |
19 files changed, 495 insertions, 783 deletions
diff --git a/net/ipv4/netfilter/arp_tables.c b/net/ipv4/netfilter/arp_tables.c index 90203e1b9187..4db5c1ece0f9 100644 --- a/net/ipv4/netfilter/arp_tables.c +++ b/net/ipv4/netfilter/arp_tables.c | |||
@@ -27,6 +27,7 @@ | |||
27 | 27 | ||
28 | #include <linux/netfilter/x_tables.h> | 28 | #include <linux/netfilter/x_tables.h> |
29 | #include <linux/netfilter_arp/arp_tables.h> | 29 | #include <linux/netfilter_arp/arp_tables.h> |
30 | #include "../../netfilter/xt_repldata.h" | ||
30 | 31 | ||
31 | MODULE_LICENSE("GPL"); | 32 | MODULE_LICENSE("GPL"); |
32 | MODULE_AUTHOR("David S. Miller <davem@redhat.com>"); | 33 | MODULE_AUTHOR("David S. Miller <davem@redhat.com>"); |
@@ -58,6 +59,12 @@ do { \ | |||
58 | #define ARP_NF_ASSERT(x) | 59 | #define ARP_NF_ASSERT(x) |
59 | #endif | 60 | #endif |
60 | 61 | ||
62 | void *arpt_alloc_initial_table(const struct xt_table *info) | ||
63 | { | ||
64 | return xt_alloc_initial_table(arpt, ARPT); | ||
65 | } | ||
66 | EXPORT_SYMBOL_GPL(arpt_alloc_initial_table); | ||
67 | |||
61 | static inline int arp_devaddr_compare(const struct arpt_devaddr_info *ap, | 68 | static inline int arp_devaddr_compare(const struct arpt_devaddr_info *ap, |
62 | const char *hdr_addr, int len) | 69 | const char *hdr_addr, int len) |
63 | { | 70 | { |
@@ -226,7 +233,14 @@ arpt_error(struct sk_buff *skb, const struct xt_target_param *par) | |||
226 | return NF_DROP; | 233 | return NF_DROP; |
227 | } | 234 | } |
228 | 235 | ||
229 | static inline struct arpt_entry *get_entry(void *base, unsigned int offset) | 236 | static inline const struct arpt_entry_target * |
237 | arpt_get_target_c(const struct arpt_entry *e) | ||
238 | { | ||
239 | return arpt_get_target((struct arpt_entry *)e); | ||
240 | } | ||
241 | |||
242 | static inline struct arpt_entry * | ||
243 | get_entry(const void *base, unsigned int offset) | ||
230 | { | 244 | { |
231 | return (struct arpt_entry *)(base + offset); | 245 | return (struct arpt_entry *)(base + offset); |
232 | } | 246 | } |
@@ -273,7 +287,7 @@ unsigned int arpt_do_table(struct sk_buff *skb, | |||
273 | 287 | ||
274 | arp = arp_hdr(skb); | 288 | arp = arp_hdr(skb); |
275 | do { | 289 | do { |
276 | struct arpt_entry_target *t; | 290 | const struct arpt_entry_target *t; |
277 | int hdr_len; | 291 | int hdr_len; |
278 | 292 | ||
279 | if (!arp_packet_match(arp, skb->dev, indev, outdev, &e->arp)) { | 293 | if (!arp_packet_match(arp, skb->dev, indev, outdev, &e->arp)) { |
@@ -285,7 +299,7 @@ unsigned int arpt_do_table(struct sk_buff *skb, | |||
285 | (2 * skb->dev->addr_len); | 299 | (2 * skb->dev->addr_len); |
286 | ADD_COUNTER(e->counters, hdr_len, 1); | 300 | ADD_COUNTER(e->counters, hdr_len, 1); |
287 | 301 | ||
288 | t = arpt_get_target(e); | 302 | t = arpt_get_target_c(e); |
289 | 303 | ||
290 | /* Standard target? */ | 304 | /* Standard target? */ |
291 | if (!t->u.kernel.target->target) { | 305 | if (!t->u.kernel.target->target) { |
@@ -351,7 +365,7 @@ static inline bool unconditional(const struct arpt_arp *arp) | |||
351 | /* Figures out from what hook each rule can be called: returns 0 if | 365 | /* Figures out from what hook each rule can be called: returns 0 if |
352 | * there are loops. Puts hook bitmask in comefrom. | 366 | * there are loops. Puts hook bitmask in comefrom. |
353 | */ | 367 | */ |
354 | static int mark_source_chains(struct xt_table_info *newinfo, | 368 | static int mark_source_chains(const struct xt_table_info *newinfo, |
355 | unsigned int valid_hooks, void *entry0) | 369 | unsigned int valid_hooks, void *entry0) |
356 | { | 370 | { |
357 | unsigned int hook; | 371 | unsigned int hook; |
@@ -372,7 +386,7 @@ static int mark_source_chains(struct xt_table_info *newinfo, | |||
372 | 386 | ||
373 | for (;;) { | 387 | for (;;) { |
374 | const struct arpt_standard_target *t | 388 | const struct arpt_standard_target *t |
375 | = (void *)arpt_get_target(e); | 389 | = (void *)arpt_get_target_c(e); |
376 | int visited = e->comefrom & (1 << hook); | 390 | int visited = e->comefrom & (1 << hook); |
377 | 391 | ||
378 | if (e->comefrom & (1 << NF_ARP_NUMHOOKS)) { | 392 | if (e->comefrom & (1 << NF_ARP_NUMHOOKS)) { |
@@ -456,7 +470,7 @@ static int mark_source_chains(struct xt_table_info *newinfo, | |||
456 | return 1; | 470 | return 1; |
457 | } | 471 | } |
458 | 472 | ||
459 | static inline int check_entry(struct arpt_entry *e, const char *name) | 473 | static inline int check_entry(const struct arpt_entry *e, const char *name) |
460 | { | 474 | { |
461 | const struct arpt_entry_target *t; | 475 | const struct arpt_entry_target *t; |
462 | 476 | ||
@@ -468,7 +482,7 @@ static inline int check_entry(struct arpt_entry *e, const char *name) | |||
468 | if (e->target_offset + sizeof(struct arpt_entry_target) > e->next_offset) | 482 | if (e->target_offset + sizeof(struct arpt_entry_target) > e->next_offset) |
469 | return -EINVAL; | 483 | return -EINVAL; |
470 | 484 | ||
471 | t = arpt_get_target(e); | 485 | t = arpt_get_target_c(e); |
472 | if (e->target_offset + t->u.target_size > e->next_offset) | 486 | if (e->target_offset + t->u.target_size > e->next_offset) |
473 | return -EINVAL; | 487 | return -EINVAL; |
474 | 488 | ||
@@ -533,14 +547,14 @@ out: | |||
533 | return ret; | 547 | return ret; |
534 | } | 548 | } |
535 | 549 | ||
536 | static bool check_underflow(struct arpt_entry *e) | 550 | static bool check_underflow(const struct arpt_entry *e) |
537 | { | 551 | { |
538 | const struct arpt_entry_target *t; | 552 | const struct arpt_entry_target *t; |
539 | unsigned int verdict; | 553 | unsigned int verdict; |
540 | 554 | ||
541 | if (!unconditional(&e->arp)) | 555 | if (!unconditional(&e->arp)) |
542 | return false; | 556 | return false; |
543 | t = arpt_get_target(e); | 557 | t = arpt_get_target_c(e); |
544 | if (strcmp(t->u.user.name, XT_STANDARD_TARGET) != 0) | 558 | if (strcmp(t->u.user.name, XT_STANDARD_TARGET) != 0) |
545 | return false; | 559 | return false; |
546 | verdict = ((struct arpt_standard_target *)t)->verdict; | 560 | verdict = ((struct arpt_standard_target *)t)->verdict; |
@@ -550,8 +564,8 @@ static bool check_underflow(struct arpt_entry *e) | |||
550 | 564 | ||
551 | static inline int check_entry_size_and_hooks(struct arpt_entry *e, | 565 | static inline int check_entry_size_and_hooks(struct arpt_entry *e, |
552 | struct xt_table_info *newinfo, | 566 | struct xt_table_info *newinfo, |
553 | unsigned char *base, | 567 | const unsigned char *base, |
554 | unsigned char *limit, | 568 | const unsigned char *limit, |
555 | const unsigned int *hook_entries, | 569 | const unsigned int *hook_entries, |
556 | const unsigned int *underflows, | 570 | const unsigned int *underflows, |
557 | unsigned int valid_hooks, | 571 | unsigned int valid_hooks, |
@@ -761,11 +775,11 @@ static void get_counters(const struct xt_table_info *t, | |||
761 | local_bh_enable(); | 775 | local_bh_enable(); |
762 | } | 776 | } |
763 | 777 | ||
764 | static struct xt_counters *alloc_counters(struct xt_table *table) | 778 | static struct xt_counters *alloc_counters(const struct xt_table *table) |
765 | { | 779 | { |
766 | unsigned int countersize; | 780 | unsigned int countersize; |
767 | struct xt_counters *counters; | 781 | struct xt_counters *counters; |
768 | struct xt_table_info *private = table->private; | 782 | const struct xt_table_info *private = table->private; |
769 | 783 | ||
770 | /* We need atomic snapshot of counters: rest doesn't change | 784 | /* We need atomic snapshot of counters: rest doesn't change |
771 | * (other than comefrom, which userspace doesn't care | 785 | * (other than comefrom, which userspace doesn't care |
@@ -783,11 +797,11 @@ static struct xt_counters *alloc_counters(struct xt_table *table) | |||
783 | } | 797 | } |
784 | 798 | ||
785 | static int copy_entries_to_user(unsigned int total_size, | 799 | static int copy_entries_to_user(unsigned int total_size, |
786 | struct xt_table *table, | 800 | const struct xt_table *table, |
787 | void __user *userptr) | 801 | void __user *userptr) |
788 | { | 802 | { |
789 | unsigned int off, num; | 803 | unsigned int off, num; |
790 | struct arpt_entry *e; | 804 | const struct arpt_entry *e; |
791 | struct xt_counters *counters; | 805 | struct xt_counters *counters; |
792 | struct xt_table_info *private = table->private; | 806 | struct xt_table_info *private = table->private; |
793 | int ret = 0; | 807 | int ret = 0; |
@@ -807,7 +821,7 @@ static int copy_entries_to_user(unsigned int total_size, | |||
807 | /* FIXME: use iterator macros --RR */ | 821 | /* FIXME: use iterator macros --RR */ |
808 | /* ... then go back and fix counters and names */ | 822 | /* ... then go back and fix counters and names */ |
809 | for (off = 0, num = 0; off < total_size; off += e->next_offset, num++){ | 823 | for (off = 0, num = 0; off < total_size; off += e->next_offset, num++){ |
810 | struct arpt_entry_target *t; | 824 | const struct arpt_entry_target *t; |
811 | 825 | ||
812 | e = (struct arpt_entry *)(loc_cpu_entry + off); | 826 | e = (struct arpt_entry *)(loc_cpu_entry + off); |
813 | if (copy_to_user(userptr + off | 827 | if (copy_to_user(userptr + off |
@@ -818,7 +832,7 @@ static int copy_entries_to_user(unsigned int total_size, | |||
818 | goto free_counters; | 832 | goto free_counters; |
819 | } | 833 | } |
820 | 834 | ||
821 | t = arpt_get_target(e); | 835 | t = arpt_get_target_c(e); |
822 | if (copy_to_user(userptr + off + e->target_offset | 836 | if (copy_to_user(userptr + off + e->target_offset |
823 | + offsetof(struct arpt_entry_target, | 837 | + offsetof(struct arpt_entry_target, |
824 | u.user.name), | 838 | u.user.name), |
@@ -835,7 +849,7 @@ static int copy_entries_to_user(unsigned int total_size, | |||
835 | } | 849 | } |
836 | 850 | ||
837 | #ifdef CONFIG_COMPAT | 851 | #ifdef CONFIG_COMPAT |
838 | static void compat_standard_from_user(void *dst, void *src) | 852 | static void compat_standard_from_user(void *dst, const void *src) |
839 | { | 853 | { |
840 | int v = *(compat_int_t *)src; | 854 | int v = *(compat_int_t *)src; |
841 | 855 | ||
@@ -844,7 +858,7 @@ static void compat_standard_from_user(void *dst, void *src) | |||
844 | memcpy(dst, &v, sizeof(v)); | 858 | memcpy(dst, &v, sizeof(v)); |
845 | } | 859 | } |
846 | 860 | ||
847 | static int compat_standard_to_user(void __user *dst, void *src) | 861 | static int compat_standard_to_user(void __user *dst, const void *src) |
848 | { | 862 | { |
849 | compat_int_t cv = *(int *)src; | 863 | compat_int_t cv = *(int *)src; |
850 | 864 | ||
@@ -853,18 +867,18 @@ static int compat_standard_to_user(void __user *dst, void *src) | |||
853 | return copy_to_user(dst, &cv, sizeof(cv)) ? -EFAULT : 0; | 867 | return copy_to_user(dst, &cv, sizeof(cv)) ? -EFAULT : 0; |
854 | } | 868 | } |
855 | 869 | ||
856 | static int compat_calc_entry(struct arpt_entry *e, | 870 | static int compat_calc_entry(const struct arpt_entry *e, |
857 | const struct xt_table_info *info, | 871 | const struct xt_table_info *info, |
858 | void *base, struct xt_table_info *newinfo) | 872 | const void *base, struct xt_table_info *newinfo) |
859 | { | 873 | { |
860 | struct arpt_entry_target *t; | 874 | const struct arpt_entry_target *t; |
861 | unsigned int entry_offset; | 875 | unsigned int entry_offset; |
862 | int off, i, ret; | 876 | int off, i, ret; |
863 | 877 | ||
864 | off = sizeof(struct arpt_entry) - sizeof(struct compat_arpt_entry); | 878 | off = sizeof(struct arpt_entry) - sizeof(struct compat_arpt_entry); |
865 | entry_offset = (void *)e - base; | 879 | entry_offset = (void *)e - base; |
866 | 880 | ||
867 | t = arpt_get_target(e); | 881 | t = arpt_get_target_c(e); |
868 | off += xt_compat_target_offset(t->u.kernel.target); | 882 | off += xt_compat_target_offset(t->u.kernel.target); |
869 | newinfo->size -= off; | 883 | newinfo->size -= off; |
870 | ret = xt_compat_add_offset(NFPROTO_ARP, entry_offset, off); | 884 | ret = xt_compat_add_offset(NFPROTO_ARP, entry_offset, off); |
@@ -900,7 +914,8 @@ static int compat_table_info(const struct xt_table_info *info, | |||
900 | } | 914 | } |
901 | #endif | 915 | #endif |
902 | 916 | ||
903 | static int get_info(struct net *net, void __user *user, int *len, int compat) | 917 | static int get_info(struct net *net, void __user *user, |
918 | const int *len, int compat) | ||
904 | { | 919 | { |
905 | char name[ARPT_TABLE_MAXNAMELEN]; | 920 | char name[ARPT_TABLE_MAXNAMELEN]; |
906 | struct xt_table *t; | 921 | struct xt_table *t; |
@@ -959,7 +974,7 @@ static int get_info(struct net *net, void __user *user, int *len, int compat) | |||
959 | } | 974 | } |
960 | 975 | ||
961 | static int get_entries(struct net *net, struct arpt_get_entries __user *uptr, | 976 | static int get_entries(struct net *net, struct arpt_get_entries __user *uptr, |
962 | int *len) | 977 | const int *len) |
963 | { | 978 | { |
964 | int ret; | 979 | int ret; |
965 | struct arpt_get_entries get; | 980 | struct arpt_get_entries get; |
@@ -1073,7 +1088,8 @@ static int __do_replace(struct net *net, const char *name, | |||
1073 | return ret; | 1088 | return ret; |
1074 | } | 1089 | } |
1075 | 1090 | ||
1076 | static int do_replace(struct net *net, void __user *user, unsigned int len) | 1091 | static int do_replace(struct net *net, const void __user *user, |
1092 | unsigned int len) | ||
1077 | { | 1093 | { |
1078 | int ret; | 1094 | int ret; |
1079 | struct arpt_replace tmp; | 1095 | struct arpt_replace tmp; |
@@ -1133,8 +1149,8 @@ add_counter_to_entry(struct arpt_entry *e, | |||
1133 | return 0; | 1149 | return 0; |
1134 | } | 1150 | } |
1135 | 1151 | ||
1136 | static int do_add_counters(struct net *net, void __user *user, unsigned int len, | 1152 | static int do_add_counters(struct net *net, const void __user *user, |
1137 | int compat) | 1153 | unsigned int len, int compat) |
1138 | { | 1154 | { |
1139 | unsigned int i, curcpu; | 1155 | unsigned int i, curcpu; |
1140 | struct xt_counters_info tmp; | 1156 | struct xt_counters_info tmp; |
@@ -1238,10 +1254,10 @@ static inline int | |||
1238 | check_compat_entry_size_and_hooks(struct compat_arpt_entry *e, | 1254 | check_compat_entry_size_and_hooks(struct compat_arpt_entry *e, |
1239 | struct xt_table_info *newinfo, | 1255 | struct xt_table_info *newinfo, |
1240 | unsigned int *size, | 1256 | unsigned int *size, |
1241 | unsigned char *base, | 1257 | const unsigned char *base, |
1242 | unsigned char *limit, | 1258 | const unsigned char *limit, |
1243 | unsigned int *hook_entries, | 1259 | const unsigned int *hook_entries, |
1244 | unsigned int *underflows, | 1260 | const unsigned int *underflows, |
1245 | unsigned int *i, | 1261 | unsigned int *i, |
1246 | const char *name) | 1262 | const char *name) |
1247 | { | 1263 | { |
diff --git a/net/ipv4/netfilter/arptable_filter.c b/net/ipv4/netfilter/arptable_filter.c index 97337601827a..bfe26f32b930 100644 --- a/net/ipv4/netfilter/arptable_filter.c +++ b/net/ipv4/netfilter/arptable_filter.c | |||
@@ -6,6 +6,7 @@ | |||
6 | */ | 6 | */ |
7 | 7 | ||
8 | #include <linux/module.h> | 8 | #include <linux/module.h> |
9 | #include <linux/netfilter/x_tables.h> | ||
9 | #include <linux/netfilter_arp/arp_tables.h> | 10 | #include <linux/netfilter_arp/arp_tables.h> |
10 | 11 | ||
11 | MODULE_LICENSE("GPL"); | 12 | MODULE_LICENSE("GPL"); |
@@ -15,93 +16,37 @@ MODULE_DESCRIPTION("arptables filter table"); | |||
15 | #define FILTER_VALID_HOOKS ((1 << NF_ARP_IN) | (1 << NF_ARP_OUT) | \ | 16 | #define FILTER_VALID_HOOKS ((1 << NF_ARP_IN) | (1 << NF_ARP_OUT) | \ |
16 | (1 << NF_ARP_FORWARD)) | 17 | (1 << NF_ARP_FORWARD)) |
17 | 18 | ||
18 | static const struct | ||
19 | { | ||
20 | struct arpt_replace repl; | ||
21 | struct arpt_standard entries[3]; | ||
22 | struct arpt_error term; | ||
23 | } initial_table __net_initdata = { | ||
24 | .repl = { | ||
25 | .name = "filter", | ||
26 | .valid_hooks = FILTER_VALID_HOOKS, | ||
27 | .num_entries = 4, | ||
28 | .size = sizeof(struct arpt_standard) * 3 + sizeof(struct arpt_error), | ||
29 | .hook_entry = { | ||
30 | [NF_ARP_IN] = 0, | ||
31 | [NF_ARP_OUT] = sizeof(struct arpt_standard), | ||
32 | [NF_ARP_FORWARD] = 2 * sizeof(struct arpt_standard), | ||
33 | }, | ||
34 | .underflow = { | ||
35 | [NF_ARP_IN] = 0, | ||
36 | [NF_ARP_OUT] = sizeof(struct arpt_standard), | ||
37 | [NF_ARP_FORWARD] = 2 * sizeof(struct arpt_standard), | ||
38 | }, | ||
39 | }, | ||
40 | .entries = { | ||
41 | ARPT_STANDARD_INIT(NF_ACCEPT), /* ARP_IN */ | ||
42 | ARPT_STANDARD_INIT(NF_ACCEPT), /* ARP_OUT */ | ||
43 | ARPT_STANDARD_INIT(NF_ACCEPT), /* ARP_FORWARD */ | ||
44 | }, | ||
45 | .term = ARPT_ERROR_INIT, | ||
46 | }; | ||
47 | |||
48 | static const struct xt_table packet_filter = { | 19 | static const struct xt_table packet_filter = { |
49 | .name = "filter", | 20 | .name = "filter", |
50 | .valid_hooks = FILTER_VALID_HOOKS, | 21 | .valid_hooks = FILTER_VALID_HOOKS, |
51 | .me = THIS_MODULE, | 22 | .me = THIS_MODULE, |
52 | .af = NFPROTO_ARP, | 23 | .af = NFPROTO_ARP, |
24 | .priority = NF_IP_PRI_FILTER, | ||
53 | }; | 25 | }; |
54 | 26 | ||
55 | /* The work comes in here from netfilter.c */ | 27 | /* The work comes in here from netfilter.c */ |
56 | static unsigned int arpt_in_hook(unsigned int hook, | 28 | static unsigned int |
57 | struct sk_buff *skb, | 29 | arptable_filter_hook(unsigned int hook, struct sk_buff *skb, |
58 | const struct net_device *in, | 30 | const struct net_device *in, const struct net_device *out, |
59 | const struct net_device *out, | 31 | int (*okfn)(struct sk_buff *)) |
60 | int (*okfn)(struct sk_buff *)) | ||
61 | { | 32 | { |
62 | return arpt_do_table(skb, hook, in, out, | 33 | const struct net *net = dev_net((in != NULL) ? in : out); |
63 | dev_net(in)->ipv4.arptable_filter); | ||
64 | } | ||
65 | 34 | ||
66 | static unsigned int arpt_out_hook(unsigned int hook, | 35 | return arpt_do_table(skb, hook, in, out, net->ipv4.arptable_filter); |
67 | struct sk_buff *skb, | ||
68 | const struct net_device *in, | ||
69 | const struct net_device *out, | ||
70 | int (*okfn)(struct sk_buff *)) | ||
71 | { | ||
72 | return arpt_do_table(skb, hook, in, out, | ||
73 | dev_net(out)->ipv4.arptable_filter); | ||
74 | } | 36 | } |
75 | 37 | ||
76 | static struct nf_hook_ops arpt_ops[] __read_mostly = { | 38 | static struct nf_hook_ops *arpfilter_ops __read_mostly; |
77 | { | ||
78 | .hook = arpt_in_hook, | ||
79 | .owner = THIS_MODULE, | ||
80 | .pf = NFPROTO_ARP, | ||
81 | .hooknum = NF_ARP_IN, | ||
82 | .priority = NF_IP_PRI_FILTER, | ||
83 | }, | ||
84 | { | ||
85 | .hook = arpt_out_hook, | ||
86 | .owner = THIS_MODULE, | ||
87 | .pf = NFPROTO_ARP, | ||
88 | .hooknum = NF_ARP_OUT, | ||
89 | .priority = NF_IP_PRI_FILTER, | ||
90 | }, | ||
91 | { | ||
92 | .hook = arpt_in_hook, | ||
93 | .owner = THIS_MODULE, | ||
94 | .pf = NFPROTO_ARP, | ||
95 | .hooknum = NF_ARP_FORWARD, | ||
96 | .priority = NF_IP_PRI_FILTER, | ||
97 | }, | ||
98 | }; | ||
99 | 39 | ||
100 | static int __net_init arptable_filter_net_init(struct net *net) | 40 | static int __net_init arptable_filter_net_init(struct net *net) |
101 | { | 41 | { |
102 | /* Register table */ | 42 | struct arpt_replace *repl; |
43 | |||
44 | repl = arpt_alloc_initial_table(&packet_filter); | ||
45 | if (repl == NULL) | ||
46 | return -ENOMEM; | ||
103 | net->ipv4.arptable_filter = | 47 | net->ipv4.arptable_filter = |
104 | arpt_register_table(net, &packet_filter, &initial_table.repl); | 48 | arpt_register_table(net, &packet_filter, repl); |
49 | kfree(repl); | ||
105 | if (IS_ERR(net->ipv4.arptable_filter)) | 50 | if (IS_ERR(net->ipv4.arptable_filter)) |
106 | return PTR_ERR(net->ipv4.arptable_filter); | 51 | return PTR_ERR(net->ipv4.arptable_filter); |
107 | return 0; | 52 | return 0; |
@@ -125,9 +70,11 @@ static int __init arptable_filter_init(void) | |||
125 | if (ret < 0) | 70 | if (ret < 0) |
126 | return ret; | 71 | return ret; |
127 | 72 | ||
128 | ret = nf_register_hooks(arpt_ops, ARRAY_SIZE(arpt_ops)); | 73 | arpfilter_ops = xt_hook_link(&packet_filter, arptable_filter_hook); |
129 | if (ret < 0) | 74 | if (IS_ERR(arpfilter_ops)) { |
75 | ret = PTR_ERR(arpfilter_ops); | ||
130 | goto cleanup_table; | 76 | goto cleanup_table; |
77 | } | ||
131 | return ret; | 78 | return ret; |
132 | 79 | ||
133 | cleanup_table: | 80 | cleanup_table: |
@@ -137,7 +84,7 @@ cleanup_table: | |||
137 | 84 | ||
138 | static void __exit arptable_filter_fini(void) | 85 | static void __exit arptable_filter_fini(void) |
139 | { | 86 | { |
140 | nf_unregister_hooks(arpt_ops, ARRAY_SIZE(arpt_ops)); | 87 | xt_hook_unlink(&packet_filter, arpfilter_ops); |
141 | unregister_pernet_subsys(&arptable_filter_net_ops); | 88 | unregister_pernet_subsys(&arptable_filter_net_ops); |
142 | } | 89 | } |
143 | 90 | ||
diff --git a/net/ipv4/netfilter/ip_tables.c b/net/ipv4/netfilter/ip_tables.c index 3ce53cf13d5a..e94c18bdfc68 100644 --- a/net/ipv4/netfilter/ip_tables.c +++ b/net/ipv4/netfilter/ip_tables.c | |||
@@ -28,6 +28,7 @@ | |||
28 | #include <linux/netfilter/x_tables.h> | 28 | #include <linux/netfilter/x_tables.h> |
29 | #include <linux/netfilter_ipv4/ip_tables.h> | 29 | #include <linux/netfilter_ipv4/ip_tables.h> |
30 | #include <net/netfilter/nf_log.h> | 30 | #include <net/netfilter/nf_log.h> |
31 | #include "../../netfilter/xt_repldata.h" | ||
31 | 32 | ||
32 | MODULE_LICENSE("GPL"); | 33 | MODULE_LICENSE("GPL"); |
33 | MODULE_AUTHOR("Netfilter Core Team <coreteam@netfilter.org>"); | 34 | MODULE_AUTHOR("Netfilter Core Team <coreteam@netfilter.org>"); |
@@ -66,6 +67,12 @@ do { \ | |||
66 | #define inline | 67 | #define inline |
67 | #endif | 68 | #endif |
68 | 69 | ||
70 | void *ipt_alloc_initial_table(const struct xt_table *info) | ||
71 | { | ||
72 | return xt_alloc_initial_table(ipt, IPT); | ||
73 | } | ||
74 | EXPORT_SYMBOL_GPL(ipt_alloc_initial_table); | ||
75 | |||
69 | /* | 76 | /* |
70 | We keep a set of rules for each CPU, so we can avoid write-locking | 77 | We keep a set of rules for each CPU, so we can avoid write-locking |
71 | them in the softirq when updating the counters and therefore | 78 | them in the softirq when updating the counters and therefore |
@@ -169,7 +176,7 @@ ipt_error(struct sk_buff *skb, const struct xt_target_param *par) | |||
169 | 176 | ||
170 | /* Performance critical - called for every packet */ | 177 | /* Performance critical - called for every packet */ |
171 | static inline bool | 178 | static inline bool |
172 | do_match(struct ipt_entry_match *m, const struct sk_buff *skb, | 179 | do_match(const struct ipt_entry_match *m, const struct sk_buff *skb, |
173 | struct xt_match_param *par) | 180 | struct xt_match_param *par) |
174 | { | 181 | { |
175 | par->match = m->u.kernel.match; | 182 | par->match = m->u.kernel.match; |
@@ -184,7 +191,7 @@ do_match(struct ipt_entry_match *m, const struct sk_buff *skb, | |||
184 | 191 | ||
185 | /* Performance critical */ | 192 | /* Performance critical */ |
186 | static inline struct ipt_entry * | 193 | static inline struct ipt_entry * |
187 | get_entry(void *base, unsigned int offset) | 194 | get_entry(const void *base, unsigned int offset) |
188 | { | 195 | { |
189 | return (struct ipt_entry *)(base + offset); | 196 | return (struct ipt_entry *)(base + offset); |
190 | } | 197 | } |
@@ -199,6 +206,13 @@ static inline bool unconditional(const struct ipt_ip *ip) | |||
199 | #undef FWINV | 206 | #undef FWINV |
200 | } | 207 | } |
201 | 208 | ||
209 | /* for const-correctness */ | ||
210 | static inline const struct ipt_entry_target * | ||
211 | ipt_get_target_c(const struct ipt_entry *e) | ||
212 | { | ||
213 | return ipt_get_target((struct ipt_entry *)e); | ||
214 | } | ||
215 | |||
202 | #if defined(CONFIG_NETFILTER_XT_TARGET_TRACE) || \ | 216 | #if defined(CONFIG_NETFILTER_XT_TARGET_TRACE) || \ |
203 | defined(CONFIG_NETFILTER_XT_TARGET_TRACE_MODULE) | 217 | defined(CONFIG_NETFILTER_XT_TARGET_TRACE_MODULE) |
204 | static const char *const hooknames[] = { | 218 | static const char *const hooknames[] = { |
@@ -233,11 +247,11 @@ static struct nf_loginfo trace_loginfo = { | |||
233 | 247 | ||
234 | /* Mildly perf critical (only if packet tracing is on) */ | 248 | /* Mildly perf critical (only if packet tracing is on) */ |
235 | static inline int | 249 | static inline int |
236 | get_chainname_rulenum(struct ipt_entry *s, struct ipt_entry *e, | 250 | get_chainname_rulenum(const struct ipt_entry *s, const struct ipt_entry *e, |
237 | const char *hookname, const char **chainname, | 251 | const char *hookname, const char **chainname, |
238 | const char **comment, unsigned int *rulenum) | 252 | const char **comment, unsigned int *rulenum) |
239 | { | 253 | { |
240 | struct ipt_standard_target *t = (void *)ipt_get_target(s); | 254 | const struct ipt_standard_target *t = (void *)ipt_get_target_c(s); |
241 | 255 | ||
242 | if (strcmp(t->target.u.kernel.target->name, IPT_ERROR_TARGET) == 0) { | 256 | if (strcmp(t->target.u.kernel.target->name, IPT_ERROR_TARGET) == 0) { |
243 | /* Head of user chain: ERROR target with chainname */ | 257 | /* Head of user chain: ERROR target with chainname */ |
@@ -263,15 +277,15 @@ get_chainname_rulenum(struct ipt_entry *s, struct ipt_entry *e, | |||
263 | return 0; | 277 | return 0; |
264 | } | 278 | } |
265 | 279 | ||
266 | static void trace_packet(struct sk_buff *skb, | 280 | static void trace_packet(const struct sk_buff *skb, |
267 | unsigned int hook, | 281 | unsigned int hook, |
268 | const struct net_device *in, | 282 | const struct net_device *in, |
269 | const struct net_device *out, | 283 | const struct net_device *out, |
270 | const char *tablename, | 284 | const char *tablename, |
271 | struct xt_table_info *private, | 285 | const struct xt_table_info *private, |
272 | struct ipt_entry *e) | 286 | const struct ipt_entry *e) |
273 | { | 287 | { |
274 | void *table_base; | 288 | const void *table_base; |
275 | const struct ipt_entry *root; | 289 | const struct ipt_entry *root; |
276 | const char *hookname, *chainname, *comment; | 290 | const char *hookname, *chainname, *comment; |
277 | unsigned int rulenum = 0; | 291 | unsigned int rulenum = 0; |
@@ -315,9 +329,9 @@ ipt_do_table(struct sk_buff *skb, | |||
315 | /* Initializing verdict to NF_DROP keeps gcc happy. */ | 329 | /* Initializing verdict to NF_DROP keeps gcc happy. */ |
316 | unsigned int verdict = NF_DROP; | 330 | unsigned int verdict = NF_DROP; |
317 | const char *indev, *outdev; | 331 | const char *indev, *outdev; |
318 | void *table_base; | 332 | const void *table_base; |
319 | struct ipt_entry *e, *back; | 333 | struct ipt_entry *e, *back; |
320 | struct xt_table_info *private; | 334 | const struct xt_table_info *private; |
321 | struct xt_match_param mtpar; | 335 | struct xt_match_param mtpar; |
322 | struct xt_target_param tgpar; | 336 | struct xt_target_param tgpar; |
323 | 337 | ||
@@ -350,7 +364,7 @@ ipt_do_table(struct sk_buff *skb, | |||
350 | back = get_entry(table_base, private->underflow[hook]); | 364 | back = get_entry(table_base, private->underflow[hook]); |
351 | 365 | ||
352 | do { | 366 | do { |
353 | struct ipt_entry_target *t; | 367 | const struct ipt_entry_target *t; |
354 | 368 | ||
355 | IP_NF_ASSERT(e); | 369 | IP_NF_ASSERT(e); |
356 | IP_NF_ASSERT(back); | 370 | IP_NF_ASSERT(back); |
@@ -443,7 +457,7 @@ ipt_do_table(struct sk_buff *skb, | |||
443 | /* Figures out from what hook each rule can be called: returns 0 if | 457 | /* Figures out from what hook each rule can be called: returns 0 if |
444 | there are loops. Puts hook bitmask in comefrom. */ | 458 | there are loops. Puts hook bitmask in comefrom. */ |
445 | static int | 459 | static int |
446 | mark_source_chains(struct xt_table_info *newinfo, | 460 | mark_source_chains(const struct xt_table_info *newinfo, |
447 | unsigned int valid_hooks, void *entry0) | 461 | unsigned int valid_hooks, void *entry0) |
448 | { | 462 | { |
449 | unsigned int hook; | 463 | unsigned int hook; |
@@ -461,8 +475,8 @@ mark_source_chains(struct xt_table_info *newinfo, | |||
461 | e->counters.pcnt = pos; | 475 | e->counters.pcnt = pos; |
462 | 476 | ||
463 | for (;;) { | 477 | for (;;) { |
464 | struct ipt_standard_target *t | 478 | const struct ipt_standard_target *t |
465 | = (void *)ipt_get_target(e); | 479 | = (void *)ipt_get_target_c(e); |
466 | int visited = e->comefrom & (1 << hook); | 480 | int visited = e->comefrom & (1 << hook); |
467 | 481 | ||
468 | if (e->comefrom & (1 << NF_INET_NUMHOOKS)) { | 482 | if (e->comefrom & (1 << NF_INET_NUMHOOKS)) { |
@@ -553,13 +567,14 @@ mark_source_chains(struct xt_table_info *newinfo, | |||
553 | } | 567 | } |
554 | 568 | ||
555 | static int | 569 | static int |
556 | cleanup_match(struct ipt_entry_match *m, unsigned int *i) | 570 | cleanup_match(struct ipt_entry_match *m, struct net *net, unsigned int *i) |
557 | { | 571 | { |
558 | struct xt_mtdtor_param par; | 572 | struct xt_mtdtor_param par; |
559 | 573 | ||
560 | if (i && (*i)-- == 0) | 574 | if (i && (*i)-- == 0) |
561 | return 1; | 575 | return 1; |
562 | 576 | ||
577 | par.net = net; | ||
563 | par.match = m->u.kernel.match; | 578 | par.match = m->u.kernel.match; |
564 | par.matchinfo = m->data; | 579 | par.matchinfo = m->data; |
565 | par.family = NFPROTO_IPV4; | 580 | par.family = NFPROTO_IPV4; |
@@ -570,9 +585,9 @@ cleanup_match(struct ipt_entry_match *m, unsigned int *i) | |||
570 | } | 585 | } |
571 | 586 | ||
572 | static int | 587 | static int |
573 | check_entry(struct ipt_entry *e, const char *name) | 588 | check_entry(const struct ipt_entry *e, const char *name) |
574 | { | 589 | { |
575 | struct ipt_entry_target *t; | 590 | const struct ipt_entry_target *t; |
576 | 591 | ||
577 | if (!ip_checkentry(&e->ip)) { | 592 | if (!ip_checkentry(&e->ip)) { |
578 | duprintf("ip_tables: ip check failed %p %s.\n", e, name); | 593 | duprintf("ip_tables: ip check failed %p %s.\n", e, name); |
@@ -583,7 +598,7 @@ check_entry(struct ipt_entry *e, const char *name) | |||
583 | e->next_offset) | 598 | e->next_offset) |
584 | return -EINVAL; | 599 | return -EINVAL; |
585 | 600 | ||
586 | t = ipt_get_target(e); | 601 | t = ipt_get_target_c(e); |
587 | if (e->target_offset + t->u.target_size > e->next_offset) | 602 | if (e->target_offset + t->u.target_size > e->next_offset) |
588 | return -EINVAL; | 603 | return -EINVAL; |
589 | 604 | ||
@@ -637,10 +652,11 @@ err: | |||
637 | return ret; | 652 | return ret; |
638 | } | 653 | } |
639 | 654 | ||
640 | static int check_target(struct ipt_entry *e, const char *name) | 655 | static int check_target(struct ipt_entry *e, struct net *net, const char *name) |
641 | { | 656 | { |
642 | struct ipt_entry_target *t = ipt_get_target(e); | 657 | struct ipt_entry_target *t = ipt_get_target(e); |
643 | struct xt_tgchk_param par = { | 658 | struct xt_tgchk_param par = { |
659 | .net = net, | ||
644 | .table = name, | 660 | .table = name, |
645 | .entryinfo = e, | 661 | .entryinfo = e, |
646 | .target = t->u.kernel.target, | 662 | .target = t->u.kernel.target, |
@@ -661,8 +677,8 @@ static int check_target(struct ipt_entry *e, const char *name) | |||
661 | } | 677 | } |
662 | 678 | ||
663 | static int | 679 | static int |
664 | find_check_entry(struct ipt_entry *e, const char *name, unsigned int size, | 680 | find_check_entry(struct ipt_entry *e, struct net *net, const char *name, |
665 | unsigned int *i) | 681 | unsigned int size, unsigned int *i) |
666 | { | 682 | { |
667 | struct ipt_entry_target *t; | 683 | struct ipt_entry_target *t; |
668 | struct xt_target *target; | 684 | struct xt_target *target; |
@@ -675,6 +691,7 @@ find_check_entry(struct ipt_entry *e, const char *name, unsigned int size, | |||
675 | return ret; | 691 | return ret; |
676 | 692 | ||
677 | j = 0; | 693 | j = 0; |
694 | mtpar.net = net; | ||
678 | mtpar.table = name; | 695 | mtpar.table = name; |
679 | mtpar.entryinfo = &e->ip; | 696 | mtpar.entryinfo = &e->ip; |
680 | mtpar.hook_mask = e->comefrom; | 697 | mtpar.hook_mask = e->comefrom; |
@@ -695,7 +712,7 @@ find_check_entry(struct ipt_entry *e, const char *name, unsigned int size, | |||
695 | } | 712 | } |
696 | t->u.kernel.target = target; | 713 | t->u.kernel.target = target; |
697 | 714 | ||
698 | ret = check_target(e, name); | 715 | ret = check_target(e, net, name); |
699 | if (ret) | 716 | if (ret) |
700 | goto err; | 717 | goto err; |
701 | 718 | ||
@@ -704,18 +721,18 @@ find_check_entry(struct ipt_entry *e, const char *name, unsigned int size, | |||
704 | err: | 721 | err: |
705 | module_put(t->u.kernel.target->me); | 722 | module_put(t->u.kernel.target->me); |
706 | cleanup_matches: | 723 | cleanup_matches: |
707 | IPT_MATCH_ITERATE(e, cleanup_match, &j); | 724 | IPT_MATCH_ITERATE(e, cleanup_match, net, &j); |
708 | return ret; | 725 | return ret; |
709 | } | 726 | } |
710 | 727 | ||
711 | static bool check_underflow(struct ipt_entry *e) | 728 | static bool check_underflow(const struct ipt_entry *e) |
712 | { | 729 | { |
713 | const struct ipt_entry_target *t; | 730 | const struct ipt_entry_target *t; |
714 | unsigned int verdict; | 731 | unsigned int verdict; |
715 | 732 | ||
716 | if (!unconditional(&e->ip)) | 733 | if (!unconditional(&e->ip)) |
717 | return false; | 734 | return false; |
718 | t = ipt_get_target(e); | 735 | t = ipt_get_target_c(e); |
719 | if (strcmp(t->u.user.name, XT_STANDARD_TARGET) != 0) | 736 | if (strcmp(t->u.user.name, XT_STANDARD_TARGET) != 0) |
720 | return false; | 737 | return false; |
721 | verdict = ((struct ipt_standard_target *)t)->verdict; | 738 | verdict = ((struct ipt_standard_target *)t)->verdict; |
@@ -726,8 +743,8 @@ static bool check_underflow(struct ipt_entry *e) | |||
726 | static int | 743 | static int |
727 | check_entry_size_and_hooks(struct ipt_entry *e, | 744 | check_entry_size_and_hooks(struct ipt_entry *e, |
728 | struct xt_table_info *newinfo, | 745 | struct xt_table_info *newinfo, |
729 | unsigned char *base, | 746 | const unsigned char *base, |
730 | unsigned char *limit, | 747 | const unsigned char *limit, |
731 | const unsigned int *hook_entries, | 748 | const unsigned int *hook_entries, |
732 | const unsigned int *underflows, | 749 | const unsigned int *underflows, |
733 | unsigned int valid_hooks, | 750 | unsigned int valid_hooks, |
@@ -774,7 +791,7 @@ check_entry_size_and_hooks(struct ipt_entry *e, | |||
774 | } | 791 | } |
775 | 792 | ||
776 | static int | 793 | static int |
777 | cleanup_entry(struct ipt_entry *e, unsigned int *i) | 794 | cleanup_entry(struct ipt_entry *e, struct net *net, unsigned int *i) |
778 | { | 795 | { |
779 | struct xt_tgdtor_param par; | 796 | struct xt_tgdtor_param par; |
780 | struct ipt_entry_target *t; | 797 | struct ipt_entry_target *t; |
@@ -783,9 +800,10 @@ cleanup_entry(struct ipt_entry *e, unsigned int *i) | |||
783 | return 1; | 800 | return 1; |
784 | 801 | ||
785 | /* Cleanup all matches */ | 802 | /* Cleanup all matches */ |
786 | IPT_MATCH_ITERATE(e, cleanup_match, NULL); | 803 | IPT_MATCH_ITERATE(e, cleanup_match, net, NULL); |
787 | t = ipt_get_target(e); | 804 | t = ipt_get_target(e); |
788 | 805 | ||
806 | par.net = net; | ||
789 | par.target = t->u.kernel.target; | 807 | par.target = t->u.kernel.target; |
790 | par.targinfo = t->data; | 808 | par.targinfo = t->data; |
791 | par.family = NFPROTO_IPV4; | 809 | par.family = NFPROTO_IPV4; |
@@ -798,7 +816,8 @@ cleanup_entry(struct ipt_entry *e, unsigned int *i) | |||
798 | /* Checks and translates the user-supplied table segment (held in | 816 | /* Checks and translates the user-supplied table segment (held in |
799 | newinfo) */ | 817 | newinfo) */ |
800 | static int | 818 | static int |
801 | translate_table(const char *name, | 819 | translate_table(struct net *net, |
820 | const char *name, | ||
802 | unsigned int valid_hooks, | 821 | unsigned int valid_hooks, |
803 | struct xt_table_info *newinfo, | 822 | struct xt_table_info *newinfo, |
804 | void *entry0, | 823 | void *entry0, |
@@ -860,11 +879,11 @@ translate_table(const char *name, | |||
860 | /* Finally, each sanity check must pass */ | 879 | /* Finally, each sanity check must pass */ |
861 | i = 0; | 880 | i = 0; |
862 | ret = IPT_ENTRY_ITERATE(entry0, newinfo->size, | 881 | ret = IPT_ENTRY_ITERATE(entry0, newinfo->size, |
863 | find_check_entry, name, size, &i); | 882 | find_check_entry, net, name, size, &i); |
864 | 883 | ||
865 | if (ret != 0) { | 884 | if (ret != 0) { |
866 | IPT_ENTRY_ITERATE(entry0, newinfo->size, | 885 | IPT_ENTRY_ITERATE(entry0, newinfo->size, |
867 | cleanup_entry, &i); | 886 | cleanup_entry, net, &i); |
868 | return ret; | 887 | return ret; |
869 | } | 888 | } |
870 | 889 | ||
@@ -940,11 +959,11 @@ get_counters(const struct xt_table_info *t, | |||
940 | local_bh_enable(); | 959 | local_bh_enable(); |
941 | } | 960 | } |
942 | 961 | ||
943 | static struct xt_counters * alloc_counters(struct xt_table *table) | 962 | static struct xt_counters *alloc_counters(const struct xt_table *table) |
944 | { | 963 | { |
945 | unsigned int countersize; | 964 | unsigned int countersize; |
946 | struct xt_counters *counters; | 965 | struct xt_counters *counters; |
947 | struct xt_table_info *private = table->private; | 966 | const struct xt_table_info *private = table->private; |
948 | 967 | ||
949 | /* We need atomic snapshot of counters: rest doesn't change | 968 | /* We need atomic snapshot of counters: rest doesn't change |
950 | (other than comefrom, which userspace doesn't care | 969 | (other than comefrom, which userspace doesn't care |
@@ -962,11 +981,11 @@ static struct xt_counters * alloc_counters(struct xt_table *table) | |||
962 | 981 | ||
963 | static int | 982 | static int |
964 | copy_entries_to_user(unsigned int total_size, | 983 | copy_entries_to_user(unsigned int total_size, |
965 | struct xt_table *table, | 984 | const struct xt_table *table, |
966 | void __user *userptr) | 985 | void __user *userptr) |
967 | { | 986 | { |
968 | unsigned int off, num; | 987 | unsigned int off, num; |
969 | struct ipt_entry *e; | 988 | const struct ipt_entry *e; |
970 | struct xt_counters *counters; | 989 | struct xt_counters *counters; |
971 | const struct xt_table_info *private = table->private; | 990 | const struct xt_table_info *private = table->private; |
972 | int ret = 0; | 991 | int ret = 0; |
@@ -1018,7 +1037,7 @@ copy_entries_to_user(unsigned int total_size, | |||
1018 | } | 1037 | } |
1019 | } | 1038 | } |
1020 | 1039 | ||
1021 | t = ipt_get_target(e); | 1040 | t = ipt_get_target_c(e); |
1022 | if (copy_to_user(userptr + off + e->target_offset | 1041 | if (copy_to_user(userptr + off + e->target_offset |
1023 | + offsetof(struct ipt_entry_target, | 1042 | + offsetof(struct ipt_entry_target, |
1024 | u.user.name), | 1043 | u.user.name), |
@@ -1035,7 +1054,7 @@ copy_entries_to_user(unsigned int total_size, | |||
1035 | } | 1054 | } |
1036 | 1055 | ||
1037 | #ifdef CONFIG_COMPAT | 1056 | #ifdef CONFIG_COMPAT |
1038 | static void compat_standard_from_user(void *dst, void *src) | 1057 | static void compat_standard_from_user(void *dst, const void *src) |
1039 | { | 1058 | { |
1040 | int v = *(compat_int_t *)src; | 1059 | int v = *(compat_int_t *)src; |
1041 | 1060 | ||
@@ -1044,7 +1063,7 @@ static void compat_standard_from_user(void *dst, void *src) | |||
1044 | memcpy(dst, &v, sizeof(v)); | 1063 | memcpy(dst, &v, sizeof(v)); |
1045 | } | 1064 | } |
1046 | 1065 | ||
1047 | static int compat_standard_to_user(void __user *dst, void *src) | 1066 | static int compat_standard_to_user(void __user *dst, const void *src) |
1048 | { | 1067 | { |
1049 | compat_int_t cv = *(int *)src; | 1068 | compat_int_t cv = *(int *)src; |
1050 | 1069 | ||
@@ -1054,24 +1073,24 @@ static int compat_standard_to_user(void __user *dst, void *src) | |||
1054 | } | 1073 | } |
1055 | 1074 | ||
1056 | static inline int | 1075 | static inline int |
1057 | compat_calc_match(struct ipt_entry_match *m, int *size) | 1076 | compat_calc_match(const struct ipt_entry_match *m, int *size) |
1058 | { | 1077 | { |
1059 | *size += xt_compat_match_offset(m->u.kernel.match); | 1078 | *size += xt_compat_match_offset(m->u.kernel.match); |
1060 | return 0; | 1079 | return 0; |
1061 | } | 1080 | } |
1062 | 1081 | ||
1063 | static int compat_calc_entry(struct ipt_entry *e, | 1082 | static int compat_calc_entry(const struct ipt_entry *e, |
1064 | const struct xt_table_info *info, | 1083 | const struct xt_table_info *info, |
1065 | void *base, struct xt_table_info *newinfo) | 1084 | const void *base, struct xt_table_info *newinfo) |
1066 | { | 1085 | { |
1067 | struct ipt_entry_target *t; | 1086 | const struct ipt_entry_target *t; |
1068 | unsigned int entry_offset; | 1087 | unsigned int entry_offset; |
1069 | int off, i, ret; | 1088 | int off, i, ret; |
1070 | 1089 | ||
1071 | off = sizeof(struct ipt_entry) - sizeof(struct compat_ipt_entry); | 1090 | off = sizeof(struct ipt_entry) - sizeof(struct compat_ipt_entry); |
1072 | entry_offset = (void *)e - base; | 1091 | entry_offset = (void *)e - base; |
1073 | IPT_MATCH_ITERATE(e, compat_calc_match, &off); | 1092 | IPT_MATCH_ITERATE(e, compat_calc_match, &off); |
1074 | t = ipt_get_target(e); | 1093 | t = ipt_get_target_c(e); |
1075 | off += xt_compat_target_offset(t->u.kernel.target); | 1094 | off += xt_compat_target_offset(t->u.kernel.target); |
1076 | newinfo->size -= off; | 1095 | newinfo->size -= off; |
1077 | ret = xt_compat_add_offset(AF_INET, entry_offset, off); | 1096 | ret = xt_compat_add_offset(AF_INET, entry_offset, off); |
@@ -1107,7 +1126,8 @@ static int compat_table_info(const struct xt_table_info *info, | |||
1107 | } | 1126 | } |
1108 | #endif | 1127 | #endif |
1109 | 1128 | ||
1110 | static int get_info(struct net *net, void __user *user, int *len, int compat) | 1129 | static int get_info(struct net *net, void __user *user, |
1130 | const int *len, int compat) | ||
1111 | { | 1131 | { |
1112 | char name[IPT_TABLE_MAXNAMELEN]; | 1132 | char name[IPT_TABLE_MAXNAMELEN]; |
1113 | struct xt_table *t; | 1133 | struct xt_table *t; |
@@ -1167,7 +1187,8 @@ static int get_info(struct net *net, void __user *user, int *len, int compat) | |||
1167 | } | 1187 | } |
1168 | 1188 | ||
1169 | static int | 1189 | static int |
1170 | get_entries(struct net *net, struct ipt_get_entries __user *uptr, int *len) | 1190 | get_entries(struct net *net, struct ipt_get_entries __user *uptr, |
1191 | const int *len) | ||
1171 | { | 1192 | { |
1172 | int ret; | 1193 | int ret; |
1173 | struct ipt_get_entries get; | 1194 | struct ipt_get_entries get; |
@@ -1258,7 +1279,7 @@ __do_replace(struct net *net, const char *name, unsigned int valid_hooks, | |||
1258 | /* Decrease module usage counts and free resource */ | 1279 | /* Decrease module usage counts and free resource */ |
1259 | loc_cpu_old_entry = oldinfo->entries[raw_smp_processor_id()]; | 1280 | loc_cpu_old_entry = oldinfo->entries[raw_smp_processor_id()]; |
1260 | IPT_ENTRY_ITERATE(loc_cpu_old_entry, oldinfo->size, cleanup_entry, | 1281 | IPT_ENTRY_ITERATE(loc_cpu_old_entry, oldinfo->size, cleanup_entry, |
1261 | NULL); | 1282 | net, NULL); |
1262 | xt_free_table_info(oldinfo); | 1283 | xt_free_table_info(oldinfo); |
1263 | if (copy_to_user(counters_ptr, counters, | 1284 | if (copy_to_user(counters_ptr, counters, |
1264 | sizeof(struct xt_counters) * num_counters) != 0) | 1285 | sizeof(struct xt_counters) * num_counters) != 0) |
@@ -1277,7 +1298,7 @@ __do_replace(struct net *net, const char *name, unsigned int valid_hooks, | |||
1277 | } | 1298 | } |
1278 | 1299 | ||
1279 | static int | 1300 | static int |
1280 | do_replace(struct net *net, void __user *user, unsigned int len) | 1301 | do_replace(struct net *net, const void __user *user, unsigned int len) |
1281 | { | 1302 | { |
1282 | int ret; | 1303 | int ret; |
1283 | struct ipt_replace tmp; | 1304 | struct ipt_replace tmp; |
@@ -1303,7 +1324,7 @@ do_replace(struct net *net, void __user *user, unsigned int len) | |||
1303 | goto free_newinfo; | 1324 | goto free_newinfo; |
1304 | } | 1325 | } |
1305 | 1326 | ||
1306 | ret = translate_table(tmp.name, tmp.valid_hooks, | 1327 | ret = translate_table(net, tmp.name, tmp.valid_hooks, |
1307 | newinfo, loc_cpu_entry, tmp.size, tmp.num_entries, | 1328 | newinfo, loc_cpu_entry, tmp.size, tmp.num_entries, |
1308 | tmp.hook_entry, tmp.underflow); | 1329 | tmp.hook_entry, tmp.underflow); |
1309 | if (ret != 0) | 1330 | if (ret != 0) |
@@ -1318,7 +1339,7 @@ do_replace(struct net *net, void __user *user, unsigned int len) | |||
1318 | return 0; | 1339 | return 0; |
1319 | 1340 | ||
1320 | free_newinfo_untrans: | 1341 | free_newinfo_untrans: |
1321 | IPT_ENTRY_ITERATE(loc_cpu_entry, newinfo->size, cleanup_entry, NULL); | 1342 | IPT_ENTRY_ITERATE(loc_cpu_entry, newinfo->size, cleanup_entry, net, NULL); |
1322 | free_newinfo: | 1343 | free_newinfo: |
1323 | xt_free_table_info(newinfo); | 1344 | xt_free_table_info(newinfo); |
1324 | return ret; | 1345 | return ret; |
@@ -1338,7 +1359,8 @@ add_counter_to_entry(struct ipt_entry *e, | |||
1338 | } | 1359 | } |
1339 | 1360 | ||
1340 | static int | 1361 | static int |
1341 | do_add_counters(struct net *net, void __user *user, unsigned int len, int compat) | 1362 | do_add_counters(struct net *net, const void __user *user, |
1363 | unsigned int len, int compat) | ||
1342 | { | 1364 | { |
1343 | unsigned int i, curcpu; | 1365 | unsigned int i, curcpu; |
1344 | struct xt_counters_info tmp; | 1366 | struct xt_counters_info tmp; |
@@ -1534,10 +1556,10 @@ static int | |||
1534 | check_compat_entry_size_and_hooks(struct compat_ipt_entry *e, | 1556 | check_compat_entry_size_and_hooks(struct compat_ipt_entry *e, |
1535 | struct xt_table_info *newinfo, | 1557 | struct xt_table_info *newinfo, |
1536 | unsigned int *size, | 1558 | unsigned int *size, |
1537 | unsigned char *base, | 1559 | const unsigned char *base, |
1538 | unsigned char *limit, | 1560 | const unsigned char *limit, |
1539 | unsigned int *hook_entries, | 1561 | const unsigned int *hook_entries, |
1540 | unsigned int *underflows, | 1562 | const unsigned int *underflows, |
1541 | unsigned int *i, | 1563 | unsigned int *i, |
1542 | const char *name) | 1564 | const char *name) |
1543 | { | 1565 | { |
@@ -1655,7 +1677,7 @@ compat_copy_entry_from_user(struct compat_ipt_entry *e, void **dstptr, | |||
1655 | } | 1677 | } |
1656 | 1678 | ||
1657 | static int | 1679 | static int |
1658 | compat_check_entry(struct ipt_entry *e, const char *name, | 1680 | compat_check_entry(struct ipt_entry *e, struct net *net, const char *name, |
1659 | unsigned int *i) | 1681 | unsigned int *i) |
1660 | { | 1682 | { |
1661 | struct xt_mtchk_param mtpar; | 1683 | struct xt_mtchk_param mtpar; |
@@ -1663,6 +1685,7 @@ compat_check_entry(struct ipt_entry *e, const char *name, | |||
1663 | int ret; | 1685 | int ret; |
1664 | 1686 | ||
1665 | j = 0; | 1687 | j = 0; |
1688 | mtpar.net = net; | ||
1666 | mtpar.table = name; | 1689 | mtpar.table = name; |
1667 | mtpar.entryinfo = &e->ip; | 1690 | mtpar.entryinfo = &e->ip; |
1668 | mtpar.hook_mask = e->comefrom; | 1691 | mtpar.hook_mask = e->comefrom; |
@@ -1671,7 +1694,7 @@ compat_check_entry(struct ipt_entry *e, const char *name, | |||
1671 | if (ret) | 1694 | if (ret) |
1672 | goto cleanup_matches; | 1695 | goto cleanup_matches; |
1673 | 1696 | ||
1674 | ret = check_target(e, name); | 1697 | ret = check_target(e, net, name); |
1675 | if (ret) | 1698 | if (ret) |
1676 | goto cleanup_matches; | 1699 | goto cleanup_matches; |
1677 | 1700 | ||
@@ -1679,12 +1702,13 @@ compat_check_entry(struct ipt_entry *e, const char *name, | |||
1679 | return 0; | 1702 | return 0; |
1680 | 1703 | ||
1681 | cleanup_matches: | 1704 | cleanup_matches: |
1682 | IPT_MATCH_ITERATE(e, cleanup_match, &j); | 1705 | IPT_MATCH_ITERATE(e, cleanup_match, net, &j); |
1683 | return ret; | 1706 | return ret; |
1684 | } | 1707 | } |
1685 | 1708 | ||
1686 | static int | 1709 | static int |
1687 | translate_compat_table(const char *name, | 1710 | translate_compat_table(struct net *net, |
1711 | const char *name, | ||
1688 | unsigned int valid_hooks, | 1712 | unsigned int valid_hooks, |
1689 | struct xt_table_info **pinfo, | 1713 | struct xt_table_info **pinfo, |
1690 | void **pentry0, | 1714 | void **pentry0, |
@@ -1773,12 +1797,12 @@ translate_compat_table(const char *name, | |||
1773 | 1797 | ||
1774 | i = 0; | 1798 | i = 0; |
1775 | ret = IPT_ENTRY_ITERATE(entry1, newinfo->size, compat_check_entry, | 1799 | ret = IPT_ENTRY_ITERATE(entry1, newinfo->size, compat_check_entry, |
1776 | name, &i); | 1800 | net, name, &i); |
1777 | if (ret) { | 1801 | if (ret) { |
1778 | j -= i; | 1802 | j -= i; |
1779 | COMPAT_IPT_ENTRY_ITERATE_CONTINUE(entry0, newinfo->size, i, | 1803 | COMPAT_IPT_ENTRY_ITERATE_CONTINUE(entry0, newinfo->size, i, |
1780 | compat_release_entry, &j); | 1804 | compat_release_entry, &j); |
1781 | IPT_ENTRY_ITERATE(entry1, newinfo->size, cleanup_entry, &i); | 1805 | IPT_ENTRY_ITERATE(entry1, newinfo->size, cleanup_entry, net, &i); |
1782 | xt_free_table_info(newinfo); | 1806 | xt_free_table_info(newinfo); |
1783 | return ret; | 1807 | return ret; |
1784 | } | 1808 | } |
@@ -1833,7 +1857,7 @@ compat_do_replace(struct net *net, void __user *user, unsigned int len) | |||
1833 | goto free_newinfo; | 1857 | goto free_newinfo; |
1834 | } | 1858 | } |
1835 | 1859 | ||
1836 | ret = translate_compat_table(tmp.name, tmp.valid_hooks, | 1860 | ret = translate_compat_table(net, tmp.name, tmp.valid_hooks, |
1837 | &newinfo, &loc_cpu_entry, tmp.size, | 1861 | &newinfo, &loc_cpu_entry, tmp.size, |
1838 | tmp.num_entries, tmp.hook_entry, | 1862 | tmp.num_entries, tmp.hook_entry, |
1839 | tmp.underflow); | 1863 | tmp.underflow); |
@@ -1849,7 +1873,7 @@ compat_do_replace(struct net *net, void __user *user, unsigned int len) | |||
1849 | return 0; | 1873 | return 0; |
1850 | 1874 | ||
1851 | free_newinfo_untrans: | 1875 | free_newinfo_untrans: |
1852 | IPT_ENTRY_ITERATE(loc_cpu_entry, newinfo->size, cleanup_entry, NULL); | 1876 | IPT_ENTRY_ITERATE(loc_cpu_entry, newinfo->size, cleanup_entry, net, NULL); |
1853 | free_newinfo: | 1877 | free_newinfo: |
1854 | xt_free_table_info(newinfo); | 1878 | xt_free_table_info(newinfo); |
1855 | return ret; | 1879 | return ret; |
@@ -2086,7 +2110,7 @@ struct xt_table *ipt_register_table(struct net *net, | |||
2086 | loc_cpu_entry = newinfo->entries[raw_smp_processor_id()]; | 2110 | loc_cpu_entry = newinfo->entries[raw_smp_processor_id()]; |
2087 | memcpy(loc_cpu_entry, repl->entries, repl->size); | 2111 | memcpy(loc_cpu_entry, repl->entries, repl->size); |
2088 | 2112 | ||
2089 | ret = translate_table(table->name, table->valid_hooks, | 2113 | ret = translate_table(net, table->name, table->valid_hooks, |
2090 | newinfo, loc_cpu_entry, repl->size, | 2114 | newinfo, loc_cpu_entry, repl->size, |
2091 | repl->num_entries, | 2115 | repl->num_entries, |
2092 | repl->hook_entry, | 2116 | repl->hook_entry, |
@@ -2108,7 +2132,7 @@ out: | |||
2108 | return ERR_PTR(ret); | 2132 | return ERR_PTR(ret); |
2109 | } | 2133 | } |
2110 | 2134 | ||
2111 | void ipt_unregister_table(struct xt_table *table) | 2135 | void ipt_unregister_table(struct net *net, struct xt_table *table) |
2112 | { | 2136 | { |
2113 | struct xt_table_info *private; | 2137 | struct xt_table_info *private; |
2114 | void *loc_cpu_entry; | 2138 | void *loc_cpu_entry; |
@@ -2118,7 +2142,7 @@ void ipt_unregister_table(struct xt_table *table) | |||
2118 | 2142 | ||
2119 | /* Decrease module usage counts and free resources */ | 2143 | /* Decrease module usage counts and free resources */ |
2120 | loc_cpu_entry = private->entries[raw_smp_processor_id()]; | 2144 | loc_cpu_entry = private->entries[raw_smp_processor_id()]; |
2121 | IPT_ENTRY_ITERATE(loc_cpu_entry, private->size, cleanup_entry, NULL); | 2145 | IPT_ENTRY_ITERATE(loc_cpu_entry, private->size, cleanup_entry, net, NULL); |
2122 | if (private->number > private->initial_entries) | 2146 | if (private->number > private->initial_entries) |
2123 | module_put(table_owner); | 2147 | module_put(table_owner); |
2124 | xt_free_table_info(private); | 2148 | xt_free_table_info(private); |
diff --git a/net/ipv4/netfilter/ipt_CLUSTERIP.c b/net/ipv4/netfilter/ipt_CLUSTERIP.c index 40ca2d240abb..0886f96c736b 100644 --- a/net/ipv4/netfilter/ipt_CLUSTERIP.c +++ b/net/ipv4/netfilter/ipt_CLUSTERIP.c | |||
@@ -560,8 +560,7 @@ struct clusterip_seq_position { | |||
560 | 560 | ||
561 | static void *clusterip_seq_start(struct seq_file *s, loff_t *pos) | 561 | static void *clusterip_seq_start(struct seq_file *s, loff_t *pos) |
562 | { | 562 | { |
563 | const struct proc_dir_entry *pde = s->private; | 563 | struct clusterip_config *c = s->private; |
564 | struct clusterip_config *c = pde->data; | ||
565 | unsigned int weight; | 564 | unsigned int weight; |
566 | u_int32_t local_nodes; | 565 | u_int32_t local_nodes; |
567 | struct clusterip_seq_position *idx; | 566 | struct clusterip_seq_position *idx; |
@@ -632,10 +631,9 @@ static int clusterip_proc_open(struct inode *inode, struct file *file) | |||
632 | 631 | ||
633 | if (!ret) { | 632 | if (!ret) { |
634 | struct seq_file *sf = file->private_data; | 633 | struct seq_file *sf = file->private_data; |
635 | struct proc_dir_entry *pde = PDE(inode); | 634 | struct clusterip_config *c = PDE(inode)->data; |
636 | struct clusterip_config *c = pde->data; | ||
637 | 635 | ||
638 | sf->private = pde; | 636 | sf->private = c; |
639 | 637 | ||
640 | clusterip_config_get(c); | 638 | clusterip_config_get(c); |
641 | } | 639 | } |
@@ -645,8 +643,7 @@ static int clusterip_proc_open(struct inode *inode, struct file *file) | |||
645 | 643 | ||
646 | static int clusterip_proc_release(struct inode *inode, struct file *file) | 644 | static int clusterip_proc_release(struct inode *inode, struct file *file) |
647 | { | 645 | { |
648 | struct proc_dir_entry *pde = PDE(inode); | 646 | struct clusterip_config *c = PDE(inode)->data; |
649 | struct clusterip_config *c = pde->data; | ||
650 | int ret; | 647 | int ret; |
651 | 648 | ||
652 | ret = seq_release(inode, file); | 649 | ret = seq_release(inode, file); |
@@ -660,10 +657,9 @@ static int clusterip_proc_release(struct inode *inode, struct file *file) | |||
660 | static ssize_t clusterip_proc_write(struct file *file, const char __user *input, | 657 | static ssize_t clusterip_proc_write(struct file *file, const char __user *input, |
661 | size_t size, loff_t *ofs) | 658 | size_t size, loff_t *ofs) |
662 | { | 659 | { |
660 | struct clusterip_config *c = PDE(file->f_path.dentry->d_inode)->data; | ||
663 | #define PROC_WRITELEN 10 | 661 | #define PROC_WRITELEN 10 |
664 | char buffer[PROC_WRITELEN+1]; | 662 | char buffer[PROC_WRITELEN+1]; |
665 | const struct proc_dir_entry *pde = PDE(file->f_path.dentry->d_inode); | ||
666 | struct clusterip_config *c = pde->data; | ||
667 | unsigned long nodenum; | 663 | unsigned long nodenum; |
668 | 664 | ||
669 | if (copy_from_user(buffer, input, PROC_WRITELEN)) | 665 | if (copy_from_user(buffer, input, PROC_WRITELEN)) |
diff --git a/net/ipv4/netfilter/ipt_ULOG.c b/net/ipv4/netfilter/ipt_ULOG.c index 399061c3fd7d..09a5d3f7cc41 100644 --- a/net/ipv4/netfilter/ipt_ULOG.c +++ b/net/ipv4/netfilter/ipt_ULOG.c | |||
@@ -338,7 +338,7 @@ struct compat_ipt_ulog_info { | |||
338 | char prefix[ULOG_PREFIX_LEN]; | 338 | char prefix[ULOG_PREFIX_LEN]; |
339 | }; | 339 | }; |
340 | 340 | ||
341 | static void ulog_tg_compat_from_user(void *dst, void *src) | 341 | static void ulog_tg_compat_from_user(void *dst, const void *src) |
342 | { | 342 | { |
343 | const struct compat_ipt_ulog_info *cl = src; | 343 | const struct compat_ipt_ulog_info *cl = src; |
344 | struct ipt_ulog_info l = { | 344 | struct ipt_ulog_info l = { |
@@ -351,7 +351,7 @@ static void ulog_tg_compat_from_user(void *dst, void *src) | |||
351 | memcpy(dst, &l, sizeof(l)); | 351 | memcpy(dst, &l, sizeof(l)); |
352 | } | 352 | } |
353 | 353 | ||
354 | static int ulog_tg_compat_to_user(void __user *dst, void *src) | 354 | static int ulog_tg_compat_to_user(void __user *dst, const void *src) |
355 | { | 355 | { |
356 | const struct ipt_ulog_info *l = src; | 356 | const struct ipt_ulog_info *l = src; |
357 | struct compat_ipt_ulog_info cl = { | 357 | struct compat_ipt_ulog_info cl = { |
diff --git a/net/ipv4/netfilter/iptable_filter.c b/net/ipv4/netfilter/iptable_filter.c index df566cbd68e5..c8dc9800d620 100644 --- a/net/ipv4/netfilter/iptable_filter.c +++ b/net/ipv4/netfilter/iptable_filter.c | |||
@@ -23,104 +23,32 @@ MODULE_DESCRIPTION("iptables filter table"); | |||
23 | (1 << NF_INET_FORWARD) | \ | 23 | (1 << NF_INET_FORWARD) | \ |
24 | (1 << NF_INET_LOCAL_OUT)) | 24 | (1 << NF_INET_LOCAL_OUT)) |
25 | 25 | ||
26 | static struct | ||
27 | { | ||
28 | struct ipt_replace repl; | ||
29 | struct ipt_standard entries[3]; | ||
30 | struct ipt_error term; | ||
31 | } initial_table __net_initdata = { | ||
32 | .repl = { | ||
33 | .name = "filter", | ||
34 | .valid_hooks = FILTER_VALID_HOOKS, | ||
35 | .num_entries = 4, | ||
36 | .size = sizeof(struct ipt_standard) * 3 + sizeof(struct ipt_error), | ||
37 | .hook_entry = { | ||
38 | [NF_INET_LOCAL_IN] = 0, | ||
39 | [NF_INET_FORWARD] = sizeof(struct ipt_standard), | ||
40 | [NF_INET_LOCAL_OUT] = sizeof(struct ipt_standard) * 2, | ||
41 | }, | ||
42 | .underflow = { | ||
43 | [NF_INET_LOCAL_IN] = 0, | ||
44 | [NF_INET_FORWARD] = sizeof(struct ipt_standard), | ||
45 | [NF_INET_LOCAL_OUT] = sizeof(struct ipt_standard) * 2, | ||
46 | }, | ||
47 | }, | ||
48 | .entries = { | ||
49 | IPT_STANDARD_INIT(NF_ACCEPT), /* LOCAL_IN */ | ||
50 | IPT_STANDARD_INIT(NF_ACCEPT), /* FORWARD */ | ||
51 | IPT_STANDARD_INIT(NF_ACCEPT), /* LOCAL_OUT */ | ||
52 | }, | ||
53 | .term = IPT_ERROR_INIT, /* ERROR */ | ||
54 | }; | ||
55 | |||
56 | static const struct xt_table packet_filter = { | 26 | static const struct xt_table packet_filter = { |
57 | .name = "filter", | 27 | .name = "filter", |
58 | .valid_hooks = FILTER_VALID_HOOKS, | 28 | .valid_hooks = FILTER_VALID_HOOKS, |
59 | .me = THIS_MODULE, | 29 | .me = THIS_MODULE, |
60 | .af = NFPROTO_IPV4, | 30 | .af = NFPROTO_IPV4, |
31 | .priority = NF_IP_PRI_FILTER, | ||
61 | }; | 32 | }; |
62 | 33 | ||
63 | /* The work comes in here from netfilter.c. */ | ||
64 | static unsigned int | ||
65 | ipt_local_in_hook(unsigned int hook, | ||
66 | struct sk_buff *skb, | ||
67 | const struct net_device *in, | ||
68 | const struct net_device *out, | ||
69 | int (*okfn)(struct sk_buff *)) | ||
70 | { | ||
71 | return ipt_do_table(skb, hook, in, out, | ||
72 | dev_net(in)->ipv4.iptable_filter); | ||
73 | } | ||
74 | |||
75 | static unsigned int | 34 | static unsigned int |
76 | ipt_hook(unsigned int hook, | 35 | iptable_filter_hook(unsigned int hook, struct sk_buff *skb, |
77 | struct sk_buff *skb, | 36 | const struct net_device *in, const struct net_device *out, |
78 | const struct net_device *in, | 37 | int (*okfn)(struct sk_buff *)) |
79 | const struct net_device *out, | ||
80 | int (*okfn)(struct sk_buff *)) | ||
81 | { | 38 | { |
82 | return ipt_do_table(skb, hook, in, out, | 39 | const struct net *net; |
83 | dev_net(in)->ipv4.iptable_filter); | ||
84 | } | ||
85 | 40 | ||
86 | static unsigned int | 41 | if (hook == NF_INET_LOCAL_OUT && |
87 | ipt_local_out_hook(unsigned int hook, | 42 | (skb->len < sizeof(struct iphdr) || |
88 | struct sk_buff *skb, | 43 | ip_hdrlen(skb) < sizeof(struct iphdr))) |
89 | const struct net_device *in, | 44 | /* root is playing with raw sockets. */ |
90 | const struct net_device *out, | ||
91 | int (*okfn)(struct sk_buff *)) | ||
92 | { | ||
93 | /* root is playing with raw sockets. */ | ||
94 | if (skb->len < sizeof(struct iphdr) || | ||
95 | ip_hdrlen(skb) < sizeof(struct iphdr)) | ||
96 | return NF_ACCEPT; | 45 | return NF_ACCEPT; |
97 | return ipt_do_table(skb, hook, in, out, | 46 | |
98 | dev_net(out)->ipv4.iptable_filter); | 47 | net = dev_net((in != NULL) ? in : out); |
48 | return ipt_do_table(skb, hook, in, out, net->ipv4.iptable_filter); | ||
99 | } | 49 | } |
100 | 50 | ||
101 | static struct nf_hook_ops ipt_ops[] __read_mostly = { | 51 | static struct nf_hook_ops *filter_ops __read_mostly; |
102 | { | ||
103 | .hook = ipt_local_in_hook, | ||
104 | .owner = THIS_MODULE, | ||
105 | .pf = NFPROTO_IPV4, | ||
106 | .hooknum = NF_INET_LOCAL_IN, | ||
107 | .priority = NF_IP_PRI_FILTER, | ||
108 | }, | ||
109 | { | ||
110 | .hook = ipt_hook, | ||
111 | .owner = THIS_MODULE, | ||
112 | .pf = NFPROTO_IPV4, | ||
113 | .hooknum = NF_INET_FORWARD, | ||
114 | .priority = NF_IP_PRI_FILTER, | ||
115 | }, | ||
116 | { | ||
117 | .hook = ipt_local_out_hook, | ||
118 | .owner = THIS_MODULE, | ||
119 | .pf = NFPROTO_IPV4, | ||
120 | .hooknum = NF_INET_LOCAL_OUT, | ||
121 | .priority = NF_IP_PRI_FILTER, | ||
122 | }, | ||
123 | }; | ||
124 | 52 | ||
125 | /* Default to forward because I got too much mail already. */ | 53 | /* Default to forward because I got too much mail already. */ |
126 | static int forward = NF_ACCEPT; | 54 | static int forward = NF_ACCEPT; |
@@ -128,9 +56,18 @@ module_param(forward, bool, 0000); | |||
128 | 56 | ||
129 | static int __net_init iptable_filter_net_init(struct net *net) | 57 | static int __net_init iptable_filter_net_init(struct net *net) |
130 | { | 58 | { |
131 | /* Register table */ | 59 | struct ipt_replace *repl; |
60 | |||
61 | repl = ipt_alloc_initial_table(&packet_filter); | ||
62 | if (repl == NULL) | ||
63 | return -ENOMEM; | ||
64 | /* Entry 1 is the FORWARD hook */ | ||
65 | ((struct ipt_standard *)repl->entries)[1].target.verdict = | ||
66 | -forward - 1; | ||
67 | |||
132 | net->ipv4.iptable_filter = | 68 | net->ipv4.iptable_filter = |
133 | ipt_register_table(net, &packet_filter, &initial_table.repl); | 69 | ipt_register_table(net, &packet_filter, repl); |
70 | kfree(repl); | ||
134 | if (IS_ERR(net->ipv4.iptable_filter)) | 71 | if (IS_ERR(net->ipv4.iptable_filter)) |
135 | return PTR_ERR(net->ipv4.iptable_filter); | 72 | return PTR_ERR(net->ipv4.iptable_filter); |
136 | return 0; | 73 | return 0; |
@@ -138,7 +75,7 @@ static int __net_init iptable_filter_net_init(struct net *net) | |||
138 | 75 | ||
139 | static void __net_exit iptable_filter_net_exit(struct net *net) | 76 | static void __net_exit iptable_filter_net_exit(struct net *net) |
140 | { | 77 | { |
141 | ipt_unregister_table(net->ipv4.iptable_filter); | 78 | ipt_unregister_table(net, net->ipv4.iptable_filter); |
142 | } | 79 | } |
143 | 80 | ||
144 | static struct pernet_operations iptable_filter_net_ops = { | 81 | static struct pernet_operations iptable_filter_net_ops = { |
@@ -155,17 +92,16 @@ static int __init iptable_filter_init(void) | |||
155 | return -EINVAL; | 92 | return -EINVAL; |
156 | } | 93 | } |
157 | 94 | ||
158 | /* Entry 1 is the FORWARD hook */ | ||
159 | initial_table.entries[1].target.verdict = -forward - 1; | ||
160 | |||
161 | ret = register_pernet_subsys(&iptable_filter_net_ops); | 95 | ret = register_pernet_subsys(&iptable_filter_net_ops); |
162 | if (ret < 0) | 96 | if (ret < 0) |
163 | return ret; | 97 | return ret; |
164 | 98 | ||
165 | /* Register hooks */ | 99 | /* Register hooks */ |
166 | ret = nf_register_hooks(ipt_ops, ARRAY_SIZE(ipt_ops)); | 100 | filter_ops = xt_hook_link(&packet_filter, iptable_filter_hook); |
167 | if (ret < 0) | 101 | if (IS_ERR(filter_ops)) { |
102 | ret = PTR_ERR(filter_ops); | ||
168 | goto cleanup_table; | 103 | goto cleanup_table; |
104 | } | ||
169 | 105 | ||
170 | return ret; | 106 | return ret; |
171 | 107 | ||
@@ -176,7 +112,7 @@ static int __init iptable_filter_init(void) | |||
176 | 112 | ||
177 | static void __exit iptable_filter_fini(void) | 113 | static void __exit iptable_filter_fini(void) |
178 | { | 114 | { |
179 | nf_unregister_hooks(ipt_ops, ARRAY_SIZE(ipt_ops)); | 115 | xt_hook_unlink(&packet_filter, filter_ops); |
180 | unregister_pernet_subsys(&iptable_filter_net_ops); | 116 | unregister_pernet_subsys(&iptable_filter_net_ops); |
181 | } | 117 | } |
182 | 118 | ||
diff --git a/net/ipv4/netfilter/iptable_mangle.c b/net/ipv4/netfilter/iptable_mangle.c index fae78c3076c4..b9b83464cbf4 100644 --- a/net/ipv4/netfilter/iptable_mangle.c +++ b/net/ipv4/netfilter/iptable_mangle.c | |||
@@ -27,101 +27,16 @@ MODULE_DESCRIPTION("iptables mangle table"); | |||
27 | (1 << NF_INET_LOCAL_OUT) | \ | 27 | (1 << NF_INET_LOCAL_OUT) | \ |
28 | (1 << NF_INET_POST_ROUTING)) | 28 | (1 << NF_INET_POST_ROUTING)) |
29 | 29 | ||
30 | /* Ouch - five different hooks? Maybe this should be a config option..... -- BC */ | ||
31 | static const struct | ||
32 | { | ||
33 | struct ipt_replace repl; | ||
34 | struct ipt_standard entries[5]; | ||
35 | struct ipt_error term; | ||
36 | } initial_table __net_initdata = { | ||
37 | .repl = { | ||
38 | .name = "mangle", | ||
39 | .valid_hooks = MANGLE_VALID_HOOKS, | ||
40 | .num_entries = 6, | ||
41 | .size = sizeof(struct ipt_standard) * 5 + sizeof(struct ipt_error), | ||
42 | .hook_entry = { | ||
43 | [NF_INET_PRE_ROUTING] = 0, | ||
44 | [NF_INET_LOCAL_IN] = sizeof(struct ipt_standard), | ||
45 | [NF_INET_FORWARD] = sizeof(struct ipt_standard) * 2, | ||
46 | [NF_INET_LOCAL_OUT] = sizeof(struct ipt_standard) * 3, | ||
47 | [NF_INET_POST_ROUTING] = sizeof(struct ipt_standard) * 4, | ||
48 | }, | ||
49 | .underflow = { | ||
50 | [NF_INET_PRE_ROUTING] = 0, | ||
51 | [NF_INET_LOCAL_IN] = sizeof(struct ipt_standard), | ||
52 | [NF_INET_FORWARD] = sizeof(struct ipt_standard) * 2, | ||
53 | [NF_INET_LOCAL_OUT] = sizeof(struct ipt_standard) * 3, | ||
54 | [NF_INET_POST_ROUTING] = sizeof(struct ipt_standard) * 4, | ||
55 | }, | ||
56 | }, | ||
57 | .entries = { | ||
58 | IPT_STANDARD_INIT(NF_ACCEPT), /* PRE_ROUTING */ | ||
59 | IPT_STANDARD_INIT(NF_ACCEPT), /* LOCAL_IN */ | ||
60 | IPT_STANDARD_INIT(NF_ACCEPT), /* FORWARD */ | ||
61 | IPT_STANDARD_INIT(NF_ACCEPT), /* LOCAL_OUT */ | ||
62 | IPT_STANDARD_INIT(NF_ACCEPT), /* POST_ROUTING */ | ||
63 | }, | ||
64 | .term = IPT_ERROR_INIT, /* ERROR */ | ||
65 | }; | ||
66 | |||
67 | static const struct xt_table packet_mangler = { | 30 | static const struct xt_table packet_mangler = { |
68 | .name = "mangle", | 31 | .name = "mangle", |
69 | .valid_hooks = MANGLE_VALID_HOOKS, | 32 | .valid_hooks = MANGLE_VALID_HOOKS, |
70 | .me = THIS_MODULE, | 33 | .me = THIS_MODULE, |
71 | .af = NFPROTO_IPV4, | 34 | .af = NFPROTO_IPV4, |
35 | .priority = NF_IP_PRI_MANGLE, | ||
72 | }; | 36 | }; |
73 | 37 | ||
74 | /* The work comes in here from netfilter.c. */ | ||
75 | static unsigned int | ||
76 | ipt_pre_routing_hook(unsigned int hook, | ||
77 | struct sk_buff *skb, | ||
78 | const struct net_device *in, | ||
79 | const struct net_device *out, | ||
80 | int (*okfn)(struct sk_buff *)) | ||
81 | { | ||
82 | return ipt_do_table(skb, hook, in, out, | ||
83 | dev_net(in)->ipv4.iptable_mangle); | ||
84 | } | ||
85 | |||
86 | static unsigned int | ||
87 | ipt_post_routing_hook(unsigned int hook, | ||
88 | struct sk_buff *skb, | ||
89 | const struct net_device *in, | ||
90 | const struct net_device *out, | ||
91 | int (*okfn)(struct sk_buff *)) | ||
92 | { | ||
93 | return ipt_do_table(skb, hook, in, out, | ||
94 | dev_net(out)->ipv4.iptable_mangle); | ||
95 | } | ||
96 | |||
97 | static unsigned int | ||
98 | ipt_local_in_hook(unsigned int hook, | ||
99 | struct sk_buff *skb, | ||
100 | const struct net_device *in, | ||
101 | const struct net_device *out, | ||
102 | int (*okfn)(struct sk_buff *)) | ||
103 | { | ||
104 | return ipt_do_table(skb, hook, in, out, | ||
105 | dev_net(in)->ipv4.iptable_mangle); | ||
106 | } | ||
107 | |||
108 | static unsigned int | ||
109 | ipt_forward_hook(unsigned int hook, | ||
110 | struct sk_buff *skb, | ||
111 | const struct net_device *in, | ||
112 | const struct net_device *out, | ||
113 | int (*okfn)(struct sk_buff *)) | ||
114 | { | ||
115 | return ipt_do_table(skb, hook, in, out, | ||
116 | dev_net(in)->ipv4.iptable_mangle); | ||
117 | } | ||
118 | |||
119 | static unsigned int | 38 | static unsigned int |
120 | ipt_local_hook(unsigned int hook, | 39 | ipt_mangle_out(struct sk_buff *skb, const struct net_device *out) |
121 | struct sk_buff *skb, | ||
122 | const struct net_device *in, | ||
123 | const struct net_device *out, | ||
124 | int (*okfn)(struct sk_buff *)) | ||
125 | { | 40 | { |
126 | unsigned int ret; | 41 | unsigned int ret; |
127 | const struct iphdr *iph; | 42 | const struct iphdr *iph; |
@@ -141,7 +56,7 @@ ipt_local_hook(unsigned int hook, | |||
141 | daddr = iph->daddr; | 56 | daddr = iph->daddr; |
142 | tos = iph->tos; | 57 | tos = iph->tos; |
143 | 58 | ||
144 | ret = ipt_do_table(skb, hook, in, out, | 59 | ret = ipt_do_table(skb, NF_INET_LOCAL_OUT, NULL, out, |
145 | dev_net(out)->ipv4.iptable_mangle); | 60 | dev_net(out)->ipv4.iptable_mangle); |
146 | /* Reroute for ANY change. */ | 61 | /* Reroute for ANY change. */ |
147 | if (ret != NF_DROP && ret != NF_STOLEN && ret != NF_QUEUE) { | 62 | if (ret != NF_DROP && ret != NF_STOLEN && ret != NF_QUEUE) { |
@@ -158,49 +73,36 @@ ipt_local_hook(unsigned int hook, | |||
158 | return ret; | 73 | return ret; |
159 | } | 74 | } |
160 | 75 | ||
161 | static struct nf_hook_ops ipt_ops[] __read_mostly = { | 76 | /* The work comes in here from netfilter.c. */ |
162 | { | 77 | static unsigned int |
163 | .hook = ipt_pre_routing_hook, | 78 | iptable_mangle_hook(unsigned int hook, |
164 | .owner = THIS_MODULE, | 79 | struct sk_buff *skb, |
165 | .pf = NFPROTO_IPV4, | 80 | const struct net_device *in, |
166 | .hooknum = NF_INET_PRE_ROUTING, | 81 | const struct net_device *out, |
167 | .priority = NF_IP_PRI_MANGLE, | 82 | int (*okfn)(struct sk_buff *)) |
168 | }, | 83 | { |
169 | { | 84 | if (hook == NF_INET_LOCAL_OUT) |
170 | .hook = ipt_local_in_hook, | 85 | return ipt_mangle_out(skb, out); |
171 | .owner = THIS_MODULE, | 86 | if (hook == NF_INET_POST_ROUTING) |
172 | .pf = NFPROTO_IPV4, | 87 | return ipt_do_table(skb, hook, in, out, |
173 | .hooknum = NF_INET_LOCAL_IN, | 88 | dev_net(out)->ipv4.iptable_mangle); |
174 | .priority = NF_IP_PRI_MANGLE, | 89 | /* PREROUTING/INPUT/FORWARD: */ |
175 | }, | 90 | return ipt_do_table(skb, hook, in, out, |
176 | { | 91 | dev_net(in)->ipv4.iptable_mangle); |
177 | .hook = ipt_forward_hook, | 92 | } |
178 | .owner = THIS_MODULE, | 93 | |
179 | .pf = NFPROTO_IPV4, | 94 | static struct nf_hook_ops *mangle_ops __read_mostly; |
180 | .hooknum = NF_INET_FORWARD, | ||
181 | .priority = NF_IP_PRI_MANGLE, | ||
182 | }, | ||
183 | { | ||
184 | .hook = ipt_local_hook, | ||
185 | .owner = THIS_MODULE, | ||
186 | .pf = NFPROTO_IPV4, | ||
187 | .hooknum = NF_INET_LOCAL_OUT, | ||
188 | .priority = NF_IP_PRI_MANGLE, | ||
189 | }, | ||
190 | { | ||
191 | .hook = ipt_post_routing_hook, | ||
192 | .owner = THIS_MODULE, | ||
193 | .pf = NFPROTO_IPV4, | ||
194 | .hooknum = NF_INET_POST_ROUTING, | ||
195 | .priority = NF_IP_PRI_MANGLE, | ||
196 | }, | ||
197 | }; | ||
198 | 95 | ||
199 | static int __net_init iptable_mangle_net_init(struct net *net) | 96 | static int __net_init iptable_mangle_net_init(struct net *net) |
200 | { | 97 | { |
201 | /* Register table */ | 98 | struct ipt_replace *repl; |
99 | |||
100 | repl = ipt_alloc_initial_table(&packet_mangler); | ||
101 | if (repl == NULL) | ||
102 | return -ENOMEM; | ||
202 | net->ipv4.iptable_mangle = | 103 | net->ipv4.iptable_mangle = |
203 | ipt_register_table(net, &packet_mangler, &initial_table.repl); | 104 | ipt_register_table(net, &packet_mangler, repl); |
105 | kfree(repl); | ||
204 | if (IS_ERR(net->ipv4.iptable_mangle)) | 106 | if (IS_ERR(net->ipv4.iptable_mangle)) |
205 | return PTR_ERR(net->ipv4.iptable_mangle); | 107 | return PTR_ERR(net->ipv4.iptable_mangle); |
206 | return 0; | 108 | return 0; |
@@ -208,7 +110,7 @@ static int __net_init iptable_mangle_net_init(struct net *net) | |||
208 | 110 | ||
209 | static void __net_exit iptable_mangle_net_exit(struct net *net) | 111 | static void __net_exit iptable_mangle_net_exit(struct net *net) |
210 | { | 112 | { |
211 | ipt_unregister_table(net->ipv4.iptable_mangle); | 113 | ipt_unregister_table(net, net->ipv4.iptable_mangle); |
212 | } | 114 | } |
213 | 115 | ||
214 | static struct pernet_operations iptable_mangle_net_ops = { | 116 | static struct pernet_operations iptable_mangle_net_ops = { |
@@ -225,9 +127,11 @@ static int __init iptable_mangle_init(void) | |||
225 | return ret; | 127 | return ret; |
226 | 128 | ||
227 | /* Register hooks */ | 129 | /* Register hooks */ |
228 | ret = nf_register_hooks(ipt_ops, ARRAY_SIZE(ipt_ops)); | 130 | mangle_ops = xt_hook_link(&packet_mangler, iptable_mangle_hook); |
229 | if (ret < 0) | 131 | if (IS_ERR(mangle_ops)) { |
132 | ret = PTR_ERR(mangle_ops); | ||
230 | goto cleanup_table; | 133 | goto cleanup_table; |
134 | } | ||
231 | 135 | ||
232 | return ret; | 136 | return ret; |
233 | 137 | ||
@@ -238,7 +142,7 @@ static int __init iptable_mangle_init(void) | |||
238 | 142 | ||
239 | static void __exit iptable_mangle_fini(void) | 143 | static void __exit iptable_mangle_fini(void) |
240 | { | 144 | { |
241 | nf_unregister_hooks(ipt_ops, ARRAY_SIZE(ipt_ops)); | 145 | xt_hook_unlink(&packet_mangler, mangle_ops); |
242 | unregister_pernet_subsys(&iptable_mangle_net_ops); | 146 | unregister_pernet_subsys(&iptable_mangle_net_ops); |
243 | } | 147 | } |
244 | 148 | ||
diff --git a/net/ipv4/netfilter/iptable_raw.c b/net/ipv4/netfilter/iptable_raw.c index 993edc23be09..06fb9d11953c 100644 --- a/net/ipv4/netfilter/iptable_raw.c +++ b/net/ipv4/netfilter/iptable_raw.c | |||
@@ -9,90 +9,44 @@ | |||
9 | 9 | ||
10 | #define RAW_VALID_HOOKS ((1 << NF_INET_PRE_ROUTING) | (1 << NF_INET_LOCAL_OUT)) | 10 | #define RAW_VALID_HOOKS ((1 << NF_INET_PRE_ROUTING) | (1 << NF_INET_LOCAL_OUT)) |
11 | 11 | ||
12 | static const struct | ||
13 | { | ||
14 | struct ipt_replace repl; | ||
15 | struct ipt_standard entries[2]; | ||
16 | struct ipt_error term; | ||
17 | } initial_table __net_initdata = { | ||
18 | .repl = { | ||
19 | .name = "raw", | ||
20 | .valid_hooks = RAW_VALID_HOOKS, | ||
21 | .num_entries = 3, | ||
22 | .size = sizeof(struct ipt_standard) * 2 + sizeof(struct ipt_error), | ||
23 | .hook_entry = { | ||
24 | [NF_INET_PRE_ROUTING] = 0, | ||
25 | [NF_INET_LOCAL_OUT] = sizeof(struct ipt_standard) | ||
26 | }, | ||
27 | .underflow = { | ||
28 | [NF_INET_PRE_ROUTING] = 0, | ||
29 | [NF_INET_LOCAL_OUT] = sizeof(struct ipt_standard) | ||
30 | }, | ||
31 | }, | ||
32 | .entries = { | ||
33 | IPT_STANDARD_INIT(NF_ACCEPT), /* PRE_ROUTING */ | ||
34 | IPT_STANDARD_INIT(NF_ACCEPT), /* LOCAL_OUT */ | ||
35 | }, | ||
36 | .term = IPT_ERROR_INIT, /* ERROR */ | ||
37 | }; | ||
38 | |||
39 | static const struct xt_table packet_raw = { | 12 | static const struct xt_table packet_raw = { |
40 | .name = "raw", | 13 | .name = "raw", |
41 | .valid_hooks = RAW_VALID_HOOKS, | 14 | .valid_hooks = RAW_VALID_HOOKS, |
42 | .me = THIS_MODULE, | 15 | .me = THIS_MODULE, |
43 | .af = NFPROTO_IPV4, | 16 | .af = NFPROTO_IPV4, |
17 | .priority = NF_IP_PRI_RAW, | ||
44 | }; | 18 | }; |
45 | 19 | ||
46 | /* The work comes in here from netfilter.c. */ | 20 | /* The work comes in here from netfilter.c. */ |
47 | static unsigned int | 21 | static unsigned int |
48 | ipt_hook(unsigned int hook, | 22 | iptable_raw_hook(unsigned int hook, struct sk_buff *skb, |
49 | struct sk_buff *skb, | 23 | const struct net_device *in, const struct net_device *out, |
50 | const struct net_device *in, | 24 | int (*okfn)(struct sk_buff *)) |
51 | const struct net_device *out, | ||
52 | int (*okfn)(struct sk_buff *)) | ||
53 | { | 25 | { |
54 | return ipt_do_table(skb, hook, in, out, | 26 | const struct net *net; |
55 | dev_net(in)->ipv4.iptable_raw); | ||
56 | } | ||
57 | 27 | ||
58 | static unsigned int | 28 | if (hook == NF_INET_LOCAL_OUT && |
59 | ipt_local_hook(unsigned int hook, | 29 | (skb->len < sizeof(struct iphdr) || |
60 | struct sk_buff *skb, | 30 | ip_hdrlen(skb) < sizeof(struct iphdr))) |
61 | const struct net_device *in, | 31 | /* root is playing with raw sockets. */ |
62 | const struct net_device *out, | ||
63 | int (*okfn)(struct sk_buff *)) | ||
64 | { | ||
65 | /* root is playing with raw sockets. */ | ||
66 | if (skb->len < sizeof(struct iphdr) || | ||
67 | ip_hdrlen(skb) < sizeof(struct iphdr)) | ||
68 | return NF_ACCEPT; | 32 | return NF_ACCEPT; |
69 | return ipt_do_table(skb, hook, in, out, | 33 | |
70 | dev_net(out)->ipv4.iptable_raw); | 34 | net = dev_net((in != NULL) ? in : out); |
35 | return ipt_do_table(skb, hook, in, out, net->ipv4.iptable_raw); | ||
71 | } | 36 | } |
72 | 37 | ||
73 | /* 'raw' is the very first table. */ | 38 | static struct nf_hook_ops *rawtable_ops __read_mostly; |
74 | static struct nf_hook_ops ipt_ops[] __read_mostly = { | ||
75 | { | ||
76 | .hook = ipt_hook, | ||
77 | .pf = NFPROTO_IPV4, | ||
78 | .hooknum = NF_INET_PRE_ROUTING, | ||
79 | .priority = NF_IP_PRI_RAW, | ||
80 | .owner = THIS_MODULE, | ||
81 | }, | ||
82 | { | ||
83 | .hook = ipt_local_hook, | ||
84 | .pf = NFPROTO_IPV4, | ||
85 | .hooknum = NF_INET_LOCAL_OUT, | ||
86 | .priority = NF_IP_PRI_RAW, | ||
87 | .owner = THIS_MODULE, | ||
88 | }, | ||
89 | }; | ||
90 | 39 | ||
91 | static int __net_init iptable_raw_net_init(struct net *net) | 40 | static int __net_init iptable_raw_net_init(struct net *net) |
92 | { | 41 | { |
93 | /* Register table */ | 42 | struct ipt_replace *repl; |
43 | |||
44 | repl = ipt_alloc_initial_table(&packet_raw); | ||
45 | if (repl == NULL) | ||
46 | return -ENOMEM; | ||
94 | net->ipv4.iptable_raw = | 47 | net->ipv4.iptable_raw = |
95 | ipt_register_table(net, &packet_raw, &initial_table.repl); | 48 | ipt_register_table(net, &packet_raw, repl); |
49 | kfree(repl); | ||
96 | if (IS_ERR(net->ipv4.iptable_raw)) | 50 | if (IS_ERR(net->ipv4.iptable_raw)) |
97 | return PTR_ERR(net->ipv4.iptable_raw); | 51 | return PTR_ERR(net->ipv4.iptable_raw); |
98 | return 0; | 52 | return 0; |
@@ -100,7 +54,7 @@ static int __net_init iptable_raw_net_init(struct net *net) | |||
100 | 54 | ||
101 | static void __net_exit iptable_raw_net_exit(struct net *net) | 55 | static void __net_exit iptable_raw_net_exit(struct net *net) |
102 | { | 56 | { |
103 | ipt_unregister_table(net->ipv4.iptable_raw); | 57 | ipt_unregister_table(net, net->ipv4.iptable_raw); |
104 | } | 58 | } |
105 | 59 | ||
106 | static struct pernet_operations iptable_raw_net_ops = { | 60 | static struct pernet_operations iptable_raw_net_ops = { |
@@ -117,9 +71,11 @@ static int __init iptable_raw_init(void) | |||
117 | return ret; | 71 | return ret; |
118 | 72 | ||
119 | /* Register hooks */ | 73 | /* Register hooks */ |
120 | ret = nf_register_hooks(ipt_ops, ARRAY_SIZE(ipt_ops)); | 74 | rawtable_ops = xt_hook_link(&packet_raw, iptable_raw_hook); |
121 | if (ret < 0) | 75 | if (IS_ERR(rawtable_ops)) { |
76 | ret = PTR_ERR(rawtable_ops); | ||
122 | goto cleanup_table; | 77 | goto cleanup_table; |
78 | } | ||
123 | 79 | ||
124 | return ret; | 80 | return ret; |
125 | 81 | ||
@@ -130,7 +86,7 @@ static int __init iptable_raw_init(void) | |||
130 | 86 | ||
131 | static void __exit iptable_raw_fini(void) | 87 | static void __exit iptable_raw_fini(void) |
132 | { | 88 | { |
133 | nf_unregister_hooks(ipt_ops, ARRAY_SIZE(ipt_ops)); | 89 | xt_hook_unlink(&packet_raw, rawtable_ops); |
134 | unregister_pernet_subsys(&iptable_raw_net_ops); | 90 | unregister_pernet_subsys(&iptable_raw_net_ops); |
135 | } | 91 | } |
136 | 92 | ||
diff --git a/net/ipv4/netfilter/iptable_security.c b/net/ipv4/netfilter/iptable_security.c index 3bd3d6388da5..cce2f64e6f21 100644 --- a/net/ipv4/netfilter/iptable_security.c +++ b/net/ipv4/netfilter/iptable_security.c | |||
@@ -27,109 +27,44 @@ MODULE_DESCRIPTION("iptables security table, for MAC rules"); | |||
27 | (1 << NF_INET_FORWARD) | \ | 27 | (1 << NF_INET_FORWARD) | \ |
28 | (1 << NF_INET_LOCAL_OUT) | 28 | (1 << NF_INET_LOCAL_OUT) |
29 | 29 | ||
30 | static const struct | ||
31 | { | ||
32 | struct ipt_replace repl; | ||
33 | struct ipt_standard entries[3]; | ||
34 | struct ipt_error term; | ||
35 | } initial_table __net_initdata = { | ||
36 | .repl = { | ||
37 | .name = "security", | ||
38 | .valid_hooks = SECURITY_VALID_HOOKS, | ||
39 | .num_entries = 4, | ||
40 | .size = sizeof(struct ipt_standard) * 3 + sizeof(struct ipt_error), | ||
41 | .hook_entry = { | ||
42 | [NF_INET_LOCAL_IN] = 0, | ||
43 | [NF_INET_FORWARD] = sizeof(struct ipt_standard), | ||
44 | [NF_INET_LOCAL_OUT] = sizeof(struct ipt_standard) * 2, | ||
45 | }, | ||
46 | .underflow = { | ||
47 | [NF_INET_LOCAL_IN] = 0, | ||
48 | [NF_INET_FORWARD] = sizeof(struct ipt_standard), | ||
49 | [NF_INET_LOCAL_OUT] = sizeof(struct ipt_standard) * 2, | ||
50 | }, | ||
51 | }, | ||
52 | .entries = { | ||
53 | IPT_STANDARD_INIT(NF_ACCEPT), /* LOCAL_IN */ | ||
54 | IPT_STANDARD_INIT(NF_ACCEPT), /* FORWARD */ | ||
55 | IPT_STANDARD_INIT(NF_ACCEPT), /* LOCAL_OUT */ | ||
56 | }, | ||
57 | .term = IPT_ERROR_INIT, /* ERROR */ | ||
58 | }; | ||
59 | |||
60 | static const struct xt_table security_table = { | 30 | static const struct xt_table security_table = { |
61 | .name = "security", | 31 | .name = "security", |
62 | .valid_hooks = SECURITY_VALID_HOOKS, | 32 | .valid_hooks = SECURITY_VALID_HOOKS, |
63 | .me = THIS_MODULE, | 33 | .me = THIS_MODULE, |
64 | .af = NFPROTO_IPV4, | 34 | .af = NFPROTO_IPV4, |
35 | .priority = NF_IP_PRI_SECURITY, | ||
65 | }; | 36 | }; |
66 | 37 | ||
67 | static unsigned int | 38 | static unsigned int |
68 | ipt_local_in_hook(unsigned int hook, | 39 | iptable_security_hook(unsigned int hook, struct sk_buff *skb, |
69 | struct sk_buff *skb, | 40 | const struct net_device *in, |
70 | const struct net_device *in, | 41 | const struct net_device *out, |
71 | const struct net_device *out, | 42 | int (*okfn)(struct sk_buff *)) |
72 | int (*okfn)(struct sk_buff *)) | ||
73 | { | ||
74 | return ipt_do_table(skb, hook, in, out, | ||
75 | dev_net(in)->ipv4.iptable_security); | ||
76 | } | ||
77 | |||
78 | static unsigned int | ||
79 | ipt_forward_hook(unsigned int hook, | ||
80 | struct sk_buff *skb, | ||
81 | const struct net_device *in, | ||
82 | const struct net_device *out, | ||
83 | int (*okfn)(struct sk_buff *)) | ||
84 | { | 43 | { |
85 | return ipt_do_table(skb, hook, in, out, | 44 | const struct net *net; |
86 | dev_net(in)->ipv4.iptable_security); | ||
87 | } | ||
88 | 45 | ||
89 | static unsigned int | 46 | if (hook == NF_INET_LOCAL_OUT && |
90 | ipt_local_out_hook(unsigned int hook, | 47 | (skb->len < sizeof(struct iphdr) || |
91 | struct sk_buff *skb, | 48 | ip_hdrlen(skb) < sizeof(struct iphdr))) |
92 | const struct net_device *in, | 49 | /* Somebody is playing with raw sockets. */ |
93 | const struct net_device *out, | ||
94 | int (*okfn)(struct sk_buff *)) | ||
95 | { | ||
96 | /* Somebody is playing with raw sockets. */ | ||
97 | if (skb->len < sizeof(struct iphdr) || | ||
98 | ip_hdrlen(skb) < sizeof(struct iphdr)) | ||
99 | return NF_ACCEPT; | 50 | return NF_ACCEPT; |
100 | return ipt_do_table(skb, hook, in, out, | 51 | |
101 | dev_net(out)->ipv4.iptable_security); | 52 | net = dev_net((in != NULL) ? in : out); |
53 | return ipt_do_table(skb, hook, in, out, net->ipv4.iptable_security); | ||
102 | } | 54 | } |
103 | 55 | ||
104 | static struct nf_hook_ops ipt_ops[] __read_mostly = { | 56 | static struct nf_hook_ops *sectbl_ops __read_mostly; |
105 | { | ||
106 | .hook = ipt_local_in_hook, | ||
107 | .owner = THIS_MODULE, | ||
108 | .pf = NFPROTO_IPV4, | ||
109 | .hooknum = NF_INET_LOCAL_IN, | ||
110 | .priority = NF_IP_PRI_SECURITY, | ||
111 | }, | ||
112 | { | ||
113 | .hook = ipt_forward_hook, | ||
114 | .owner = THIS_MODULE, | ||
115 | .pf = NFPROTO_IPV4, | ||
116 | .hooknum = NF_INET_FORWARD, | ||
117 | .priority = NF_IP_PRI_SECURITY, | ||
118 | }, | ||
119 | { | ||
120 | .hook = ipt_local_out_hook, | ||
121 | .owner = THIS_MODULE, | ||
122 | .pf = NFPROTO_IPV4, | ||
123 | .hooknum = NF_INET_LOCAL_OUT, | ||
124 | .priority = NF_IP_PRI_SECURITY, | ||
125 | }, | ||
126 | }; | ||
127 | 57 | ||
128 | static int __net_init iptable_security_net_init(struct net *net) | 58 | static int __net_init iptable_security_net_init(struct net *net) |
129 | { | 59 | { |
130 | net->ipv4.iptable_security = | 60 | struct ipt_replace *repl; |
131 | ipt_register_table(net, &security_table, &initial_table.repl); | ||
132 | 61 | ||
62 | repl = ipt_alloc_initial_table(&security_table); | ||
63 | if (repl == NULL) | ||
64 | return -ENOMEM; | ||
65 | net->ipv4.iptable_security = | ||
66 | ipt_register_table(net, &security_table, repl); | ||
67 | kfree(repl); | ||
133 | if (IS_ERR(net->ipv4.iptable_security)) | 68 | if (IS_ERR(net->ipv4.iptable_security)) |
134 | return PTR_ERR(net->ipv4.iptable_security); | 69 | return PTR_ERR(net->ipv4.iptable_security); |
135 | 70 | ||
@@ -138,7 +73,7 @@ static int __net_init iptable_security_net_init(struct net *net) | |||
138 | 73 | ||
139 | static void __net_exit iptable_security_net_exit(struct net *net) | 74 | static void __net_exit iptable_security_net_exit(struct net *net) |
140 | { | 75 | { |
141 | ipt_unregister_table(net->ipv4.iptable_security); | 76 | ipt_unregister_table(net, net->ipv4.iptable_security); |
142 | } | 77 | } |
143 | 78 | ||
144 | static struct pernet_operations iptable_security_net_ops = { | 79 | static struct pernet_operations iptable_security_net_ops = { |
@@ -154,9 +89,11 @@ static int __init iptable_security_init(void) | |||
154 | if (ret < 0) | 89 | if (ret < 0) |
155 | return ret; | 90 | return ret; |
156 | 91 | ||
157 | ret = nf_register_hooks(ipt_ops, ARRAY_SIZE(ipt_ops)); | 92 | sectbl_ops = xt_hook_link(&security_table, iptable_security_hook); |
158 | if (ret < 0) | 93 | if (IS_ERR(sectbl_ops)) { |
94 | ret = PTR_ERR(sectbl_ops); | ||
159 | goto cleanup_table; | 95 | goto cleanup_table; |
96 | } | ||
160 | 97 | ||
161 | return ret; | 98 | return ret; |
162 | 99 | ||
@@ -167,7 +104,7 @@ cleanup_table: | |||
167 | 104 | ||
168 | static void __exit iptable_security_fini(void) | 105 | static void __exit iptable_security_fini(void) |
169 | { | 106 | { |
170 | nf_unregister_hooks(ipt_ops, ARRAY_SIZE(ipt_ops)); | 107 | xt_hook_unlink(&security_table, sectbl_ops); |
171 | unregister_pernet_subsys(&iptable_security_net_ops); | 108 | unregister_pernet_subsys(&iptable_security_net_ops); |
172 | } | 109 | } |
173 | 110 | ||
diff --git a/net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c b/net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c index d1ea38a7c490..2bb1f87051c4 100644 --- a/net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c +++ b/net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c | |||
@@ -22,6 +22,7 @@ | |||
22 | #include <net/netfilter/nf_conntrack_helper.h> | 22 | #include <net/netfilter/nf_conntrack_helper.h> |
23 | #include <net/netfilter/nf_conntrack_l4proto.h> | 23 | #include <net/netfilter/nf_conntrack_l4proto.h> |
24 | #include <net/netfilter/nf_conntrack_l3proto.h> | 24 | #include <net/netfilter/nf_conntrack_l3proto.h> |
25 | #include <net/netfilter/nf_conntrack_zones.h> | ||
25 | #include <net/netfilter/nf_conntrack_core.h> | 26 | #include <net/netfilter/nf_conntrack_core.h> |
26 | #include <net/netfilter/ipv4/nf_conntrack_ipv4.h> | 27 | #include <net/netfilter/ipv4/nf_conntrack_ipv4.h> |
27 | #include <net/netfilter/nf_nat_helper.h> | 28 | #include <net/netfilter/nf_nat_helper.h> |
@@ -266,7 +267,7 @@ getorigdst(struct sock *sk, int optval, void __user *user, int *len) | |||
266 | return -EINVAL; | 267 | return -EINVAL; |
267 | } | 268 | } |
268 | 269 | ||
269 | h = nf_conntrack_find_get(sock_net(sk), &tuple); | 270 | h = nf_conntrack_find_get(sock_net(sk), NF_CT_DEFAULT_ZONE, &tuple); |
270 | if (h) { | 271 | if (h) { |
271 | struct sockaddr_in sin; | 272 | struct sockaddr_in sin; |
272 | struct nf_conn *ct = nf_ct_tuplehash_to_ctrack(h); | 273 | struct nf_conn *ct = nf_ct_tuplehash_to_ctrack(h); |
diff --git a/net/ipv4/netfilter/nf_conntrack_proto_icmp.c b/net/ipv4/netfilter/nf_conntrack_proto_icmp.c index 7afd39b5b781..7404bde95994 100644 --- a/net/ipv4/netfilter/nf_conntrack_proto_icmp.c +++ b/net/ipv4/netfilter/nf_conntrack_proto_icmp.c | |||
@@ -18,6 +18,7 @@ | |||
18 | #include <net/netfilter/nf_conntrack_tuple.h> | 18 | #include <net/netfilter/nf_conntrack_tuple.h> |
19 | #include <net/netfilter/nf_conntrack_l4proto.h> | 19 | #include <net/netfilter/nf_conntrack_l4proto.h> |
20 | #include <net/netfilter/nf_conntrack_core.h> | 20 | #include <net/netfilter/nf_conntrack_core.h> |
21 | #include <net/netfilter/nf_conntrack_zones.h> | ||
21 | #include <net/netfilter/nf_log.h> | 22 | #include <net/netfilter/nf_log.h> |
22 | 23 | ||
23 | static unsigned int nf_ct_icmp_timeout __read_mostly = 30*HZ; | 24 | static unsigned int nf_ct_icmp_timeout __read_mostly = 30*HZ; |
@@ -114,13 +115,14 @@ static bool icmp_new(struct nf_conn *ct, const struct sk_buff *skb, | |||
114 | 115 | ||
115 | /* Returns conntrack if it dealt with ICMP, and filled in skb fields */ | 116 | /* Returns conntrack if it dealt with ICMP, and filled in skb fields */ |
116 | static int | 117 | static int |
117 | icmp_error_message(struct net *net, struct sk_buff *skb, | 118 | icmp_error_message(struct net *net, struct nf_conn *tmpl, struct sk_buff *skb, |
118 | enum ip_conntrack_info *ctinfo, | 119 | enum ip_conntrack_info *ctinfo, |
119 | unsigned int hooknum) | 120 | unsigned int hooknum) |
120 | { | 121 | { |
121 | struct nf_conntrack_tuple innertuple, origtuple; | 122 | struct nf_conntrack_tuple innertuple, origtuple; |
122 | const struct nf_conntrack_l4proto *innerproto; | 123 | const struct nf_conntrack_l4proto *innerproto; |
123 | const struct nf_conntrack_tuple_hash *h; | 124 | const struct nf_conntrack_tuple_hash *h; |
125 | u16 zone = tmpl ? nf_ct_zone(tmpl) : NF_CT_DEFAULT_ZONE; | ||
124 | 126 | ||
125 | NF_CT_ASSERT(skb->nfct == NULL); | 127 | NF_CT_ASSERT(skb->nfct == NULL); |
126 | 128 | ||
@@ -146,7 +148,7 @@ icmp_error_message(struct net *net, struct sk_buff *skb, | |||
146 | 148 | ||
147 | *ctinfo = IP_CT_RELATED; | 149 | *ctinfo = IP_CT_RELATED; |
148 | 150 | ||
149 | h = nf_conntrack_find_get(net, &innertuple); | 151 | h = nf_conntrack_find_get(net, zone, &innertuple); |
150 | if (!h) { | 152 | if (!h) { |
151 | pr_debug("icmp_error_message: no match\n"); | 153 | pr_debug("icmp_error_message: no match\n"); |
152 | return -NF_ACCEPT; | 154 | return -NF_ACCEPT; |
@@ -163,7 +165,8 @@ icmp_error_message(struct net *net, struct sk_buff *skb, | |||
163 | 165 | ||
164 | /* Small and modified version of icmp_rcv */ | 166 | /* Small and modified version of icmp_rcv */ |
165 | static int | 167 | static int |
166 | icmp_error(struct net *net, struct sk_buff *skb, unsigned int dataoff, | 168 | icmp_error(struct net *net, struct nf_conn *tmpl, |
169 | struct sk_buff *skb, unsigned int dataoff, | ||
167 | enum ip_conntrack_info *ctinfo, u_int8_t pf, unsigned int hooknum) | 170 | enum ip_conntrack_info *ctinfo, u_int8_t pf, unsigned int hooknum) |
168 | { | 171 | { |
169 | const struct icmphdr *icmph; | 172 | const struct icmphdr *icmph; |
@@ -208,7 +211,7 @@ icmp_error(struct net *net, struct sk_buff *skb, unsigned int dataoff, | |||
208 | icmph->type != ICMP_REDIRECT) | 211 | icmph->type != ICMP_REDIRECT) |
209 | return NF_ACCEPT; | 212 | return NF_ACCEPT; |
210 | 213 | ||
211 | return icmp_error_message(net, skb, ctinfo, hooknum); | 214 | return icmp_error_message(net, tmpl, skb, ctinfo, hooknum); |
212 | } | 215 | } |
213 | 216 | ||
214 | #if defined(CONFIG_NF_CT_NETLINK) || defined(CONFIG_NF_CT_NETLINK_MODULE) | 217 | #if defined(CONFIG_NF_CT_NETLINK) || defined(CONFIG_NF_CT_NETLINK_MODULE) |
diff --git a/net/ipv4/netfilter/nf_defrag_ipv4.c b/net/ipv4/netfilter/nf_defrag_ipv4.c index 331ead3ebd1b..d498a704d456 100644 --- a/net/ipv4/netfilter/nf_defrag_ipv4.c +++ b/net/ipv4/netfilter/nf_defrag_ipv4.c | |||
@@ -16,7 +16,9 @@ | |||
16 | 16 | ||
17 | #include <linux/netfilter_bridge.h> | 17 | #include <linux/netfilter_bridge.h> |
18 | #include <linux/netfilter_ipv4.h> | 18 | #include <linux/netfilter_ipv4.h> |
19 | #include <net/netfilter/nf_conntrack_zones.h> | ||
19 | #include <net/netfilter/ipv4/nf_defrag_ipv4.h> | 20 | #include <net/netfilter/ipv4/nf_defrag_ipv4.h> |
21 | #include <net/netfilter/nf_conntrack.h> | ||
20 | 22 | ||
21 | /* Returns new sk_buff, or NULL */ | 23 | /* Returns new sk_buff, or NULL */ |
22 | static int nf_ct_ipv4_gather_frags(struct sk_buff *skb, u_int32_t user) | 24 | static int nf_ct_ipv4_gather_frags(struct sk_buff *skb, u_int32_t user) |
@@ -38,15 +40,20 @@ static int nf_ct_ipv4_gather_frags(struct sk_buff *skb, u_int32_t user) | |||
38 | static enum ip_defrag_users nf_ct_defrag_user(unsigned int hooknum, | 40 | static enum ip_defrag_users nf_ct_defrag_user(unsigned int hooknum, |
39 | struct sk_buff *skb) | 41 | struct sk_buff *skb) |
40 | { | 42 | { |
43 | u16 zone = NF_CT_DEFAULT_ZONE; | ||
44 | |||
45 | if (skb->nfct) | ||
46 | zone = nf_ct_zone((struct nf_conn *)skb->nfct); | ||
47 | |||
41 | #ifdef CONFIG_BRIDGE_NETFILTER | 48 | #ifdef CONFIG_BRIDGE_NETFILTER |
42 | if (skb->nf_bridge && | 49 | if (skb->nf_bridge && |
43 | skb->nf_bridge->mask & BRNF_NF_BRIDGE_PREROUTING) | 50 | skb->nf_bridge->mask & BRNF_NF_BRIDGE_PREROUTING) |
44 | return IP_DEFRAG_CONNTRACK_BRIDGE_IN; | 51 | return IP_DEFRAG_CONNTRACK_BRIDGE_IN + zone; |
45 | #endif | 52 | #endif |
46 | if (hooknum == NF_INET_PRE_ROUTING) | 53 | if (hooknum == NF_INET_PRE_ROUTING) |
47 | return IP_DEFRAG_CONNTRACK_IN; | 54 | return IP_DEFRAG_CONNTRACK_IN + zone; |
48 | else | 55 | else |
49 | return IP_DEFRAG_CONNTRACK_OUT; | 56 | return IP_DEFRAG_CONNTRACK_OUT + zone; |
50 | } | 57 | } |
51 | 58 | ||
52 | static unsigned int ipv4_conntrack_defrag(unsigned int hooknum, | 59 | static unsigned int ipv4_conntrack_defrag(unsigned int hooknum, |
@@ -59,7 +66,7 @@ static unsigned int ipv4_conntrack_defrag(unsigned int hooknum, | |||
59 | #if !defined(CONFIG_NF_NAT) && !defined(CONFIG_NF_NAT_MODULE) | 66 | #if !defined(CONFIG_NF_NAT) && !defined(CONFIG_NF_NAT_MODULE) |
60 | /* Previously seen (loopback)? Ignore. Do this before | 67 | /* Previously seen (loopback)? Ignore. Do this before |
61 | fragment check. */ | 68 | fragment check. */ |
62 | if (skb->nfct) | 69 | if (skb->nfct && !nf_ct_is_template((struct nf_conn *)skb->nfct)) |
63 | return NF_ACCEPT; | 70 | return NF_ACCEPT; |
64 | #endif | 71 | #endif |
65 | #endif | 72 | #endif |
diff --git a/net/ipv4/netfilter/nf_nat_core.c b/net/ipv4/netfilter/nf_nat_core.c index 26066a2327ad..4595281c2863 100644 --- a/net/ipv4/netfilter/nf_nat_core.c +++ b/net/ipv4/netfilter/nf_nat_core.c | |||
@@ -30,6 +30,7 @@ | |||
30 | #include <net/netfilter/nf_conntrack_helper.h> | 30 | #include <net/netfilter/nf_conntrack_helper.h> |
31 | #include <net/netfilter/nf_conntrack_l3proto.h> | 31 | #include <net/netfilter/nf_conntrack_l3proto.h> |
32 | #include <net/netfilter/nf_conntrack_l4proto.h> | 32 | #include <net/netfilter/nf_conntrack_l4proto.h> |
33 | #include <net/netfilter/nf_conntrack_zones.h> | ||
33 | 34 | ||
34 | static DEFINE_SPINLOCK(nf_nat_lock); | 35 | static DEFINE_SPINLOCK(nf_nat_lock); |
35 | 36 | ||
@@ -69,13 +70,14 @@ EXPORT_SYMBOL_GPL(nf_nat_proto_put); | |||
69 | 70 | ||
70 | /* We keep an extra hash for each conntrack, for fast searching. */ | 71 | /* We keep an extra hash for each conntrack, for fast searching. */ |
71 | static inline unsigned int | 72 | static inline unsigned int |
72 | hash_by_src(const struct net *net, const struct nf_conntrack_tuple *tuple) | 73 | hash_by_src(const struct net *net, u16 zone, |
74 | const struct nf_conntrack_tuple *tuple) | ||
73 | { | 75 | { |
74 | unsigned int hash; | 76 | unsigned int hash; |
75 | 77 | ||
76 | /* Original src, to ensure we map it consistently if poss. */ | 78 | /* Original src, to ensure we map it consistently if poss. */ |
77 | hash = jhash_3words((__force u32)tuple->src.u3.ip, | 79 | hash = jhash_3words((__force u32)tuple->src.u3.ip, |
78 | (__force u32)tuple->src.u.all, | 80 | (__force u32)tuple->src.u.all ^ zone, |
79 | tuple->dst.protonum, 0); | 81 | tuple->dst.protonum, 0); |
80 | return ((u64)hash * net->ipv4.nat_htable_size) >> 32; | 82 | return ((u64)hash * net->ipv4.nat_htable_size) >> 32; |
81 | } | 83 | } |
@@ -139,12 +141,12 @@ same_src(const struct nf_conn *ct, | |||
139 | 141 | ||
140 | /* Only called for SRC manip */ | 142 | /* Only called for SRC manip */ |
141 | static int | 143 | static int |
142 | find_appropriate_src(struct net *net, | 144 | find_appropriate_src(struct net *net, u16 zone, |
143 | const struct nf_conntrack_tuple *tuple, | 145 | const struct nf_conntrack_tuple *tuple, |
144 | struct nf_conntrack_tuple *result, | 146 | struct nf_conntrack_tuple *result, |
145 | const struct nf_nat_range *range) | 147 | const struct nf_nat_range *range) |
146 | { | 148 | { |
147 | unsigned int h = hash_by_src(net, tuple); | 149 | unsigned int h = hash_by_src(net, zone, tuple); |
148 | const struct nf_conn_nat *nat; | 150 | const struct nf_conn_nat *nat; |
149 | const struct nf_conn *ct; | 151 | const struct nf_conn *ct; |
150 | const struct hlist_node *n; | 152 | const struct hlist_node *n; |
@@ -152,7 +154,7 @@ find_appropriate_src(struct net *net, | |||
152 | rcu_read_lock(); | 154 | rcu_read_lock(); |
153 | hlist_for_each_entry_rcu(nat, n, &net->ipv4.nat_bysource[h], bysource) { | 155 | hlist_for_each_entry_rcu(nat, n, &net->ipv4.nat_bysource[h], bysource) { |
154 | ct = nat->ct; | 156 | ct = nat->ct; |
155 | if (same_src(ct, tuple)) { | 157 | if (same_src(ct, tuple) && nf_ct_zone(ct) == zone) { |
156 | /* Copy source part from reply tuple. */ | 158 | /* Copy source part from reply tuple. */ |
157 | nf_ct_invert_tuplepr(result, | 159 | nf_ct_invert_tuplepr(result, |
158 | &ct->tuplehash[IP_CT_DIR_REPLY].tuple); | 160 | &ct->tuplehash[IP_CT_DIR_REPLY].tuple); |
@@ -175,7 +177,7 @@ find_appropriate_src(struct net *net, | |||
175 | the ip with the lowest src-ip/dst-ip/proto usage. | 177 | the ip with the lowest src-ip/dst-ip/proto usage. |
176 | */ | 178 | */ |
177 | static void | 179 | static void |
178 | find_best_ips_proto(struct nf_conntrack_tuple *tuple, | 180 | find_best_ips_proto(u16 zone, struct nf_conntrack_tuple *tuple, |
179 | const struct nf_nat_range *range, | 181 | const struct nf_nat_range *range, |
180 | const struct nf_conn *ct, | 182 | const struct nf_conn *ct, |
181 | enum nf_nat_manip_type maniptype) | 183 | enum nf_nat_manip_type maniptype) |
@@ -209,7 +211,7 @@ find_best_ips_proto(struct nf_conntrack_tuple *tuple, | |||
209 | maxip = ntohl(range->max_ip); | 211 | maxip = ntohl(range->max_ip); |
210 | j = jhash_2words((__force u32)tuple->src.u3.ip, | 212 | j = jhash_2words((__force u32)tuple->src.u3.ip, |
211 | range->flags & IP_NAT_RANGE_PERSISTENT ? | 213 | range->flags & IP_NAT_RANGE_PERSISTENT ? |
212 | 0 : (__force u32)tuple->dst.u3.ip, 0); | 214 | 0 : (__force u32)tuple->dst.u3.ip ^ zone, 0); |
213 | j = ((u64)j * (maxip - minip + 1)) >> 32; | 215 | j = ((u64)j * (maxip - minip + 1)) >> 32; |
214 | *var_ipp = htonl(minip + j); | 216 | *var_ipp = htonl(minip + j); |
215 | } | 217 | } |
@@ -229,6 +231,7 @@ get_unique_tuple(struct nf_conntrack_tuple *tuple, | |||
229 | { | 231 | { |
230 | struct net *net = nf_ct_net(ct); | 232 | struct net *net = nf_ct_net(ct); |
231 | const struct nf_nat_protocol *proto; | 233 | const struct nf_nat_protocol *proto; |
234 | u16 zone = nf_ct_zone(ct); | ||
232 | 235 | ||
233 | /* 1) If this srcip/proto/src-proto-part is currently mapped, | 236 | /* 1) If this srcip/proto/src-proto-part is currently mapped, |
234 | and that same mapping gives a unique tuple within the given | 237 | and that same mapping gives a unique tuple within the given |
@@ -239,7 +242,7 @@ get_unique_tuple(struct nf_conntrack_tuple *tuple, | |||
239 | manips not an issue. */ | 242 | manips not an issue. */ |
240 | if (maniptype == IP_NAT_MANIP_SRC && | 243 | if (maniptype == IP_NAT_MANIP_SRC && |
241 | !(range->flags & IP_NAT_RANGE_PROTO_RANDOM)) { | 244 | !(range->flags & IP_NAT_RANGE_PROTO_RANDOM)) { |
242 | if (find_appropriate_src(net, orig_tuple, tuple, range)) { | 245 | if (find_appropriate_src(net, zone, orig_tuple, tuple, range)) { |
243 | pr_debug("get_unique_tuple: Found current src map\n"); | 246 | pr_debug("get_unique_tuple: Found current src map\n"); |
244 | if (!nf_nat_used_tuple(tuple, ct)) | 247 | if (!nf_nat_used_tuple(tuple, ct)) |
245 | return; | 248 | return; |
@@ -249,7 +252,7 @@ get_unique_tuple(struct nf_conntrack_tuple *tuple, | |||
249 | /* 2) Select the least-used IP/proto combination in the given | 252 | /* 2) Select the least-used IP/proto combination in the given |
250 | range. */ | 253 | range. */ |
251 | *tuple = *orig_tuple; | 254 | *tuple = *orig_tuple; |
252 | find_best_ips_proto(tuple, range, ct, maniptype); | 255 | find_best_ips_proto(zone, tuple, range, ct, maniptype); |
253 | 256 | ||
254 | /* 3) The per-protocol part of the manip is made to map into | 257 | /* 3) The per-protocol part of the manip is made to map into |
255 | the range to make a unique tuple. */ | 258 | the range to make a unique tuple. */ |
@@ -327,7 +330,8 @@ nf_nat_setup_info(struct nf_conn *ct, | |||
327 | if (have_to_hash) { | 330 | if (have_to_hash) { |
328 | unsigned int srchash; | 331 | unsigned int srchash; |
329 | 332 | ||
330 | srchash = hash_by_src(net, &ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple); | 333 | srchash = hash_by_src(net, nf_ct_zone(ct), |
334 | &ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple); | ||
331 | spin_lock_bh(&nf_nat_lock); | 335 | spin_lock_bh(&nf_nat_lock); |
332 | /* nf_conntrack_alter_reply might re-allocate exntension aera */ | 336 | /* nf_conntrack_alter_reply might re-allocate exntension aera */ |
333 | nat = nfct_nat(ct); | 337 | nat = nfct_nat(ct); |
diff --git a/net/ipv4/netfilter/nf_nat_ftp.c b/net/ipv4/netfilter/nf_nat_ftp.c index a1d5d58a58bf..86e0e84ff0a0 100644 --- a/net/ipv4/netfilter/nf_nat_ftp.c +++ b/net/ipv4/netfilter/nf_nat_ftp.c | |||
@@ -27,76 +27,29 @@ MODULE_ALIAS("ip_nat_ftp"); | |||
27 | 27 | ||
28 | /* FIXME: Time out? --RR */ | 28 | /* FIXME: Time out? --RR */ |
29 | 29 | ||
30 | static int | 30 | static int nf_nat_ftp_fmt_cmd(enum nf_ct_ftp_type type, |
31 | mangle_rfc959_packet(struct sk_buff *skb, | 31 | char *buffer, size_t buflen, |
32 | __be32 newip, | 32 | __be32 addr, u16 port) |
33 | u_int16_t port, | ||
34 | unsigned int matchoff, | ||
35 | unsigned int matchlen, | ||
36 | struct nf_conn *ct, | ||
37 | enum ip_conntrack_info ctinfo) | ||
38 | { | 33 | { |
39 | char buffer[sizeof("nnn,nnn,nnn,nnn,nnn,nnn")]; | 34 | switch (type) { |
40 | 35 | case NF_CT_FTP_PORT: | |
41 | sprintf(buffer, "%u,%u,%u,%u,%u,%u", | 36 | case NF_CT_FTP_PASV: |
42 | NIPQUAD(newip), port>>8, port&0xFF); | 37 | return snprintf(buffer, buflen, "%u,%u,%u,%u,%u,%u", |
43 | 38 | ((unsigned char *)&addr)[0], | |
44 | pr_debug("calling nf_nat_mangle_tcp_packet\n"); | 39 | ((unsigned char *)&addr)[1], |
45 | 40 | ((unsigned char *)&addr)[2], | |
46 | return nf_nat_mangle_tcp_packet(skb, ct, ctinfo, matchoff, | 41 | ((unsigned char *)&addr)[3], |
47 | matchlen, buffer, strlen(buffer)); | 42 | port >> 8, |
48 | } | 43 | port & 0xFF); |
49 | 44 | case NF_CT_FTP_EPRT: | |
50 | /* |1|132.235.1.2|6275| */ | 45 | return snprintf(buffer, buflen, "|1|%pI4|%u|", &addr, port); |
51 | static int | 46 | case NF_CT_FTP_EPSV: |
52 | mangle_eprt_packet(struct sk_buff *skb, | 47 | return snprintf(buffer, buflen, "|||%u|", port); |
53 | __be32 newip, | 48 | } |
54 | u_int16_t port, | ||
55 | unsigned int matchoff, | ||
56 | unsigned int matchlen, | ||
57 | struct nf_conn *ct, | ||
58 | enum ip_conntrack_info ctinfo) | ||
59 | { | ||
60 | char buffer[sizeof("|1|255.255.255.255|65535|")]; | ||
61 | |||
62 | sprintf(buffer, "|1|%u.%u.%u.%u|%u|", NIPQUAD(newip), port); | ||
63 | |||
64 | pr_debug("calling nf_nat_mangle_tcp_packet\n"); | ||
65 | |||
66 | return nf_nat_mangle_tcp_packet(skb, ct, ctinfo, matchoff, | ||
67 | matchlen, buffer, strlen(buffer)); | ||
68 | } | ||
69 | |||
70 | /* |1|132.235.1.2|6275| */ | ||
71 | static int | ||
72 | mangle_epsv_packet(struct sk_buff *skb, | ||
73 | __be32 newip, | ||
74 | u_int16_t port, | ||
75 | unsigned int matchoff, | ||
76 | unsigned int matchlen, | ||
77 | struct nf_conn *ct, | ||
78 | enum ip_conntrack_info ctinfo) | ||
79 | { | ||
80 | char buffer[sizeof("|||65535|")]; | ||
81 | |||
82 | sprintf(buffer, "|||%u|", port); | ||
83 | |||
84 | pr_debug("calling nf_nat_mangle_tcp_packet\n"); | ||
85 | 49 | ||
86 | return nf_nat_mangle_tcp_packet(skb, ct, ctinfo, matchoff, | 50 | return 0; |
87 | matchlen, buffer, strlen(buffer)); | ||
88 | } | 51 | } |
89 | 52 | ||
90 | static int (*mangle[])(struct sk_buff *, __be32, u_int16_t, | ||
91 | unsigned int, unsigned int, struct nf_conn *, | ||
92 | enum ip_conntrack_info) | ||
93 | = { | ||
94 | [NF_CT_FTP_PORT] = mangle_rfc959_packet, | ||
95 | [NF_CT_FTP_PASV] = mangle_rfc959_packet, | ||
96 | [NF_CT_FTP_EPRT] = mangle_eprt_packet, | ||
97 | [NF_CT_FTP_EPSV] = mangle_epsv_packet | ||
98 | }; | ||
99 | |||
100 | /* So, this packet has hit the connection tracking matching code. | 53 | /* So, this packet has hit the connection tracking matching code. |
101 | Mangle it, and change the expectation to match the new version. */ | 54 | Mangle it, and change the expectation to match the new version. */ |
102 | static unsigned int nf_nat_ftp(struct sk_buff *skb, | 55 | static unsigned int nf_nat_ftp(struct sk_buff *skb, |
@@ -110,6 +63,8 @@ static unsigned int nf_nat_ftp(struct sk_buff *skb, | |||
110 | u_int16_t port; | 63 | u_int16_t port; |
111 | int dir = CTINFO2DIR(ctinfo); | 64 | int dir = CTINFO2DIR(ctinfo); |
112 | struct nf_conn *ct = exp->master; | 65 | struct nf_conn *ct = exp->master; |
66 | char buffer[sizeof("|1|255.255.255.255|65535|")]; | ||
67 | unsigned int buflen; | ||
113 | 68 | ||
114 | pr_debug("FTP_NAT: type %i, off %u len %u\n", type, matchoff, matchlen); | 69 | pr_debug("FTP_NAT: type %i, off %u len %u\n", type, matchoff, matchlen); |
115 | 70 | ||
@@ -132,11 +87,21 @@ static unsigned int nf_nat_ftp(struct sk_buff *skb, | |||
132 | if (port == 0) | 87 | if (port == 0) |
133 | return NF_DROP; | 88 | return NF_DROP; |
134 | 89 | ||
135 | if (!mangle[type](skb, newip, port, matchoff, matchlen, ct, ctinfo)) { | 90 | buflen = nf_nat_ftp_fmt_cmd(type, buffer, sizeof(buffer), newip, port); |
136 | nf_ct_unexpect_related(exp); | 91 | if (!buflen) |
137 | return NF_DROP; | 92 | goto out; |
138 | } | 93 | |
94 | pr_debug("calling nf_nat_mangle_tcp_packet\n"); | ||
95 | |||
96 | if (!nf_nat_mangle_tcp_packet(skb, ct, ctinfo, matchoff, | ||
97 | matchlen, buffer, buflen)) | ||
98 | goto out; | ||
99 | |||
139 | return NF_ACCEPT; | 100 | return NF_ACCEPT; |
101 | |||
102 | out: | ||
103 | nf_ct_unexpect_related(exp); | ||
104 | return NF_DROP; | ||
140 | } | 105 | } |
141 | 106 | ||
142 | static void __exit nf_nat_ftp_fini(void) | 107 | static void __exit nf_nat_ftp_fini(void) |
diff --git a/net/ipv4/netfilter/nf_nat_helper.c b/net/ipv4/netfilter/nf_nat_helper.c index 7f10a6be0191..4b6af4bb1f50 100644 --- a/net/ipv4/netfilter/nf_nat_helper.c +++ b/net/ipv4/netfilter/nf_nat_helper.c | |||
@@ -141,6 +141,17 @@ static int enlarge_skb(struct sk_buff *skb, unsigned int extra) | |||
141 | return 1; | 141 | return 1; |
142 | } | 142 | } |
143 | 143 | ||
144 | void nf_nat_set_seq_adjust(struct nf_conn *ct, enum ip_conntrack_info ctinfo, | ||
145 | __be32 seq, s16 off) | ||
146 | { | ||
147 | if (!off) | ||
148 | return; | ||
149 | set_bit(IPS_SEQ_ADJUST_BIT, &ct->status); | ||
150 | adjust_tcp_sequence(ntohl(seq), off, ct, ctinfo); | ||
151 | nf_conntrack_event_cache(IPCT_NATSEQADJ, ct); | ||
152 | } | ||
153 | EXPORT_SYMBOL_GPL(nf_nat_set_seq_adjust); | ||
154 | |||
144 | /* Generic function for mangling variable-length address changes inside | 155 | /* Generic function for mangling variable-length address changes inside |
145 | * NATed TCP connections (like the PORT XXX,XXX,XXX,XXX,XXX,XXX | 156 | * NATed TCP connections (like the PORT XXX,XXX,XXX,XXX,XXX,XXX |
146 | * command in FTP). | 157 | * command in FTP). |
@@ -149,14 +160,13 @@ static int enlarge_skb(struct sk_buff *skb, unsigned int extra) | |||
149 | * skb enlargement, ... | 160 | * skb enlargement, ... |
150 | * | 161 | * |
151 | * */ | 162 | * */ |
152 | int | 163 | int __nf_nat_mangle_tcp_packet(struct sk_buff *skb, |
153 | nf_nat_mangle_tcp_packet(struct sk_buff *skb, | 164 | struct nf_conn *ct, |
154 | struct nf_conn *ct, | 165 | enum ip_conntrack_info ctinfo, |
155 | enum ip_conntrack_info ctinfo, | 166 | unsigned int match_offset, |
156 | unsigned int match_offset, | 167 | unsigned int match_len, |
157 | unsigned int match_len, | 168 | const char *rep_buffer, |
158 | const char *rep_buffer, | 169 | unsigned int rep_len, bool adjust) |
159 | unsigned int rep_len) | ||
160 | { | 170 | { |
161 | struct rtable *rt = skb_rtable(skb); | 171 | struct rtable *rt = skb_rtable(skb); |
162 | struct iphdr *iph; | 172 | struct iphdr *iph; |
@@ -202,16 +212,13 @@ nf_nat_mangle_tcp_packet(struct sk_buff *skb, | |||
202 | inet_proto_csum_replace2(&tcph->check, skb, | 212 | inet_proto_csum_replace2(&tcph->check, skb, |
203 | htons(oldlen), htons(datalen), 1); | 213 | htons(oldlen), htons(datalen), 1); |
204 | 214 | ||
205 | if (rep_len != match_len) { | 215 | if (adjust && rep_len != match_len) |
206 | set_bit(IPS_SEQ_ADJUST_BIT, &ct->status); | 216 | nf_nat_set_seq_adjust(ct, ctinfo, tcph->seq, |
207 | adjust_tcp_sequence(ntohl(tcph->seq), | 217 | (int)rep_len - (int)match_len); |
208 | (int)rep_len - (int)match_len, | 218 | |
209 | ct, ctinfo); | ||
210 | nf_conntrack_event_cache(IPCT_NATSEQADJ, ct); | ||
211 | } | ||
212 | return 1; | 219 | return 1; |
213 | } | 220 | } |
214 | EXPORT_SYMBOL(nf_nat_mangle_tcp_packet); | 221 | EXPORT_SYMBOL(__nf_nat_mangle_tcp_packet); |
215 | 222 | ||
216 | /* Generic function for mangling variable-length address changes inside | 223 | /* Generic function for mangling variable-length address changes inside |
217 | * NATed UDP connections (like the CONNECT DATA XXXXX MESG XXXXX INDEX XXXXX | 224 | * NATed UDP connections (like the CONNECT DATA XXXXX MESG XXXXX INDEX XXXXX |
diff --git a/net/ipv4/netfilter/nf_nat_pptp.c b/net/ipv4/netfilter/nf_nat_pptp.c index 9eb171056c63..4c060038d29f 100644 --- a/net/ipv4/netfilter/nf_nat_pptp.c +++ b/net/ipv4/netfilter/nf_nat_pptp.c | |||
@@ -25,6 +25,7 @@ | |||
25 | #include <net/netfilter/nf_nat_rule.h> | 25 | #include <net/netfilter/nf_nat_rule.h> |
26 | #include <net/netfilter/nf_conntrack_helper.h> | 26 | #include <net/netfilter/nf_conntrack_helper.h> |
27 | #include <net/netfilter/nf_conntrack_expect.h> | 27 | #include <net/netfilter/nf_conntrack_expect.h> |
28 | #include <net/netfilter/nf_conntrack_zones.h> | ||
28 | #include <linux/netfilter/nf_conntrack_proto_gre.h> | 29 | #include <linux/netfilter/nf_conntrack_proto_gre.h> |
29 | #include <linux/netfilter/nf_conntrack_pptp.h> | 30 | #include <linux/netfilter/nf_conntrack_pptp.h> |
30 | 31 | ||
@@ -74,7 +75,7 @@ static void pptp_nat_expected(struct nf_conn *ct, | |||
74 | 75 | ||
75 | pr_debug("trying to unexpect other dir: "); | 76 | pr_debug("trying to unexpect other dir: "); |
76 | nf_ct_dump_tuple_ip(&t); | 77 | nf_ct_dump_tuple_ip(&t); |
77 | other_exp = nf_ct_expect_find_get(net, &t); | 78 | other_exp = nf_ct_expect_find_get(net, nf_ct_zone(ct), &t); |
78 | if (other_exp) { | 79 | if (other_exp) { |
79 | nf_ct_unexpect_related(other_exp); | 80 | nf_ct_unexpect_related(other_exp); |
80 | nf_ct_expect_put(other_exp); | 81 | nf_ct_expect_put(other_exp); |
diff --git a/net/ipv4/netfilter/nf_nat_rule.c b/net/ipv4/netfilter/nf_nat_rule.c index 9e81e0dfb4ec..ab74cc0535e2 100644 --- a/net/ipv4/netfilter/nf_nat_rule.c +++ b/net/ipv4/netfilter/nf_nat_rule.c | |||
@@ -28,36 +28,6 @@ | |||
28 | (1 << NF_INET_POST_ROUTING) | \ | 28 | (1 << NF_INET_POST_ROUTING) | \ |
29 | (1 << NF_INET_LOCAL_OUT)) | 29 | (1 << NF_INET_LOCAL_OUT)) |
30 | 30 | ||
31 | static const struct | ||
32 | { | ||
33 | struct ipt_replace repl; | ||
34 | struct ipt_standard entries[3]; | ||
35 | struct ipt_error term; | ||
36 | } nat_initial_table __net_initdata = { | ||
37 | .repl = { | ||
38 | .name = "nat", | ||
39 | .valid_hooks = NAT_VALID_HOOKS, | ||
40 | .num_entries = 4, | ||
41 | .size = sizeof(struct ipt_standard) * 3 + sizeof(struct ipt_error), | ||
42 | .hook_entry = { | ||
43 | [NF_INET_PRE_ROUTING] = 0, | ||
44 | [NF_INET_POST_ROUTING] = sizeof(struct ipt_standard), | ||
45 | [NF_INET_LOCAL_OUT] = sizeof(struct ipt_standard) * 2 | ||
46 | }, | ||
47 | .underflow = { | ||
48 | [NF_INET_PRE_ROUTING] = 0, | ||
49 | [NF_INET_POST_ROUTING] = sizeof(struct ipt_standard), | ||
50 | [NF_INET_LOCAL_OUT] = sizeof(struct ipt_standard) * 2 | ||
51 | }, | ||
52 | }, | ||
53 | .entries = { | ||
54 | IPT_STANDARD_INIT(NF_ACCEPT), /* PRE_ROUTING */ | ||
55 | IPT_STANDARD_INIT(NF_ACCEPT), /* POST_ROUTING */ | ||
56 | IPT_STANDARD_INIT(NF_ACCEPT), /* LOCAL_OUT */ | ||
57 | }, | ||
58 | .term = IPT_ERROR_INIT, /* ERROR */ | ||
59 | }; | ||
60 | |||
61 | static const struct xt_table nat_table = { | 31 | static const struct xt_table nat_table = { |
62 | .name = "nat", | 32 | .name = "nat", |
63 | .valid_hooks = NAT_VALID_HOOKS, | 33 | .valid_hooks = NAT_VALID_HOOKS, |
@@ -186,8 +156,13 @@ static struct xt_target ipt_dnat_reg __read_mostly = { | |||
186 | 156 | ||
187 | static int __net_init nf_nat_rule_net_init(struct net *net) | 157 | static int __net_init nf_nat_rule_net_init(struct net *net) |
188 | { | 158 | { |
189 | net->ipv4.nat_table = ipt_register_table(net, &nat_table, | 159 | struct ipt_replace *repl; |
190 | &nat_initial_table.repl); | 160 | |
161 | repl = ipt_alloc_initial_table(&nat_table); | ||
162 | if (repl == NULL) | ||
163 | return -ENOMEM; | ||
164 | net->ipv4.nat_table = ipt_register_table(net, &nat_table, repl); | ||
165 | kfree(repl); | ||
191 | if (IS_ERR(net->ipv4.nat_table)) | 166 | if (IS_ERR(net->ipv4.nat_table)) |
192 | return PTR_ERR(net->ipv4.nat_table); | 167 | return PTR_ERR(net->ipv4.nat_table); |
193 | return 0; | 168 | return 0; |
@@ -195,7 +170,7 @@ static int __net_init nf_nat_rule_net_init(struct net *net) | |||
195 | 170 | ||
196 | static void __net_exit nf_nat_rule_net_exit(struct net *net) | 171 | static void __net_exit nf_nat_rule_net_exit(struct net *net) |
197 | { | 172 | { |
198 | ipt_unregister_table(net->ipv4.nat_table); | 173 | ipt_unregister_table(net, net->ipv4.nat_table); |
199 | } | 174 | } |
200 | 175 | ||
201 | static struct pernet_operations nf_nat_rule_net_ops = { | 176 | static struct pernet_operations nf_nat_rule_net_ops = { |
diff --git a/net/ipv4/netfilter/nf_nat_sip.c b/net/ipv4/netfilter/nf_nat_sip.c index 07d61a57613c..11b538deaaec 100644 --- a/net/ipv4/netfilter/nf_nat_sip.c +++ b/net/ipv4/netfilter/nf_nat_sip.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* SIP extension for UDP NAT alteration. | 1 | /* SIP extension for NAT alteration. |
2 | * | 2 | * |
3 | * (C) 2005 by Christian Hentschel <chentschel@arnet.com.ar> | 3 | * (C) 2005 by Christian Hentschel <chentschel@arnet.com.ar> |
4 | * based on RR's ip_nat_ftp.c and other modules. | 4 | * based on RR's ip_nat_ftp.c and other modules. |
@@ -15,6 +15,7 @@ | |||
15 | #include <linux/ip.h> | 15 | #include <linux/ip.h> |
16 | #include <net/ip.h> | 16 | #include <net/ip.h> |
17 | #include <linux/udp.h> | 17 | #include <linux/udp.h> |
18 | #include <linux/tcp.h> | ||
18 | 19 | ||
19 | #include <net/netfilter/nf_nat.h> | 20 | #include <net/netfilter/nf_nat.h> |
20 | #include <net/netfilter/nf_nat_helper.h> | 21 | #include <net/netfilter/nf_nat_helper.h> |
@@ -29,25 +30,42 @@ MODULE_DESCRIPTION("SIP NAT helper"); | |||
29 | MODULE_ALIAS("ip_nat_sip"); | 30 | MODULE_ALIAS("ip_nat_sip"); |
30 | 31 | ||
31 | 32 | ||
32 | static unsigned int mangle_packet(struct sk_buff *skb, | 33 | static unsigned int mangle_packet(struct sk_buff *skb, unsigned int dataoff, |
33 | const char **dptr, unsigned int *datalen, | 34 | const char **dptr, unsigned int *datalen, |
34 | unsigned int matchoff, unsigned int matchlen, | 35 | unsigned int matchoff, unsigned int matchlen, |
35 | const char *buffer, unsigned int buflen) | 36 | const char *buffer, unsigned int buflen) |
36 | { | 37 | { |
37 | enum ip_conntrack_info ctinfo; | 38 | enum ip_conntrack_info ctinfo; |
38 | struct nf_conn *ct = nf_ct_get(skb, &ctinfo); | 39 | struct nf_conn *ct = nf_ct_get(skb, &ctinfo); |
39 | 40 | struct tcphdr *th; | |
40 | if (!nf_nat_mangle_udp_packet(skb, ct, ctinfo, matchoff, matchlen, | 41 | unsigned int baseoff; |
41 | buffer, buflen)) | 42 | |
42 | return 0; | 43 | if (nf_ct_protonum(ct) == IPPROTO_TCP) { |
44 | th = (struct tcphdr *)(skb->data + ip_hdrlen(skb)); | ||
45 | baseoff = ip_hdrlen(skb) + th->doff * 4; | ||
46 | matchoff += dataoff - baseoff; | ||
47 | |||
48 | if (!__nf_nat_mangle_tcp_packet(skb, ct, ctinfo, | ||
49 | matchoff, matchlen, | ||
50 | buffer, buflen, false)) | ||
51 | return 0; | ||
52 | } else { | ||
53 | baseoff = ip_hdrlen(skb) + sizeof(struct udphdr); | ||
54 | matchoff += dataoff - baseoff; | ||
55 | |||
56 | if (!nf_nat_mangle_udp_packet(skb, ct, ctinfo, | ||
57 | matchoff, matchlen, | ||
58 | buffer, buflen)) | ||
59 | return 0; | ||
60 | } | ||
43 | 61 | ||
44 | /* Reload data pointer and adjust datalen value */ | 62 | /* Reload data pointer and adjust datalen value */ |
45 | *dptr = skb->data + ip_hdrlen(skb) + sizeof(struct udphdr); | 63 | *dptr = skb->data + dataoff; |
46 | *datalen += buflen - matchlen; | 64 | *datalen += buflen - matchlen; |
47 | return 1; | 65 | return 1; |
48 | } | 66 | } |
49 | 67 | ||
50 | static int map_addr(struct sk_buff *skb, | 68 | static int map_addr(struct sk_buff *skb, unsigned int dataoff, |
51 | const char **dptr, unsigned int *datalen, | 69 | const char **dptr, unsigned int *datalen, |
52 | unsigned int matchoff, unsigned int matchlen, | 70 | unsigned int matchoff, unsigned int matchlen, |
53 | union nf_inet_addr *addr, __be16 port) | 71 | union nf_inet_addr *addr, __be16 port) |
@@ -76,11 +94,11 @@ static int map_addr(struct sk_buff *skb, | |||
76 | 94 | ||
77 | buflen = sprintf(buffer, "%pI4:%u", &newaddr, ntohs(newport)); | 95 | buflen = sprintf(buffer, "%pI4:%u", &newaddr, ntohs(newport)); |
78 | 96 | ||
79 | return mangle_packet(skb, dptr, datalen, matchoff, matchlen, | 97 | return mangle_packet(skb, dataoff, dptr, datalen, matchoff, matchlen, |
80 | buffer, buflen); | 98 | buffer, buflen); |
81 | } | 99 | } |
82 | 100 | ||
83 | static int map_sip_addr(struct sk_buff *skb, | 101 | static int map_sip_addr(struct sk_buff *skb, unsigned int dataoff, |
84 | const char **dptr, unsigned int *datalen, | 102 | const char **dptr, unsigned int *datalen, |
85 | enum sip_header_types type) | 103 | enum sip_header_types type) |
86 | { | 104 | { |
@@ -93,16 +111,18 @@ static int map_sip_addr(struct sk_buff *skb, | |||
93 | if (ct_sip_parse_header_uri(ct, *dptr, NULL, *datalen, type, NULL, | 111 | if (ct_sip_parse_header_uri(ct, *dptr, NULL, *datalen, type, NULL, |
94 | &matchoff, &matchlen, &addr, &port) <= 0) | 112 | &matchoff, &matchlen, &addr, &port) <= 0) |
95 | return 1; | 113 | return 1; |
96 | return map_addr(skb, dptr, datalen, matchoff, matchlen, &addr, port); | 114 | return map_addr(skb, dataoff, dptr, datalen, matchoff, matchlen, |
115 | &addr, port); | ||
97 | } | 116 | } |
98 | 117 | ||
99 | static unsigned int ip_nat_sip(struct sk_buff *skb, | 118 | static unsigned int ip_nat_sip(struct sk_buff *skb, unsigned int dataoff, |
100 | const char **dptr, unsigned int *datalen) | 119 | const char **dptr, unsigned int *datalen) |
101 | { | 120 | { |
102 | enum ip_conntrack_info ctinfo; | 121 | enum ip_conntrack_info ctinfo; |
103 | struct nf_conn *ct = nf_ct_get(skb, &ctinfo); | 122 | struct nf_conn *ct = nf_ct_get(skb, &ctinfo); |
104 | enum ip_conntrack_dir dir = CTINFO2DIR(ctinfo); | 123 | enum ip_conntrack_dir dir = CTINFO2DIR(ctinfo); |
105 | unsigned int dataoff, matchoff, matchlen; | 124 | unsigned int coff, matchoff, matchlen; |
125 | enum sip_header_types hdr; | ||
106 | union nf_inet_addr addr; | 126 | union nf_inet_addr addr; |
107 | __be16 port; | 127 | __be16 port; |
108 | int request, in_header; | 128 | int request, in_header; |
@@ -112,16 +132,21 @@ static unsigned int ip_nat_sip(struct sk_buff *skb, | |||
112 | if (ct_sip_parse_request(ct, *dptr, *datalen, | 132 | if (ct_sip_parse_request(ct, *dptr, *datalen, |
113 | &matchoff, &matchlen, | 133 | &matchoff, &matchlen, |
114 | &addr, &port) > 0 && | 134 | &addr, &port) > 0 && |
115 | !map_addr(skb, dptr, datalen, matchoff, matchlen, | 135 | !map_addr(skb, dataoff, dptr, datalen, matchoff, matchlen, |
116 | &addr, port)) | 136 | &addr, port)) |
117 | return NF_DROP; | 137 | return NF_DROP; |
118 | request = 1; | 138 | request = 1; |
119 | } else | 139 | } else |
120 | request = 0; | 140 | request = 0; |
121 | 141 | ||
142 | if (nf_ct_protonum(ct) == IPPROTO_TCP) | ||
143 | hdr = SIP_HDR_VIA_TCP; | ||
144 | else | ||
145 | hdr = SIP_HDR_VIA_UDP; | ||
146 | |||
122 | /* Translate topmost Via header and parameters */ | 147 | /* Translate topmost Via header and parameters */ |
123 | if (ct_sip_parse_header_uri(ct, *dptr, NULL, *datalen, | 148 | if (ct_sip_parse_header_uri(ct, *dptr, NULL, *datalen, |
124 | SIP_HDR_VIA, NULL, &matchoff, &matchlen, | 149 | hdr, NULL, &matchoff, &matchlen, |
125 | &addr, &port) > 0) { | 150 | &addr, &port) > 0) { |
126 | unsigned int matchend, poff, plen, buflen, n; | 151 | unsigned int matchend, poff, plen, buflen, n; |
127 | char buffer[sizeof("nnn.nnn.nnn.nnn:nnnnn")]; | 152 | char buffer[sizeof("nnn.nnn.nnn.nnn:nnnnn")]; |
@@ -138,7 +163,7 @@ static unsigned int ip_nat_sip(struct sk_buff *skb, | |||
138 | goto next; | 163 | goto next; |
139 | } | 164 | } |
140 | 165 | ||
141 | if (!map_addr(skb, dptr, datalen, matchoff, matchlen, | 166 | if (!map_addr(skb, dataoff, dptr, datalen, matchoff, matchlen, |
142 | &addr, port)) | 167 | &addr, port)) |
143 | return NF_DROP; | 168 | return NF_DROP; |
144 | 169 | ||
@@ -153,8 +178,8 @@ static unsigned int ip_nat_sip(struct sk_buff *skb, | |||
153 | addr.ip != ct->tuplehash[!dir].tuple.dst.u3.ip) { | 178 | addr.ip != ct->tuplehash[!dir].tuple.dst.u3.ip) { |
154 | buflen = sprintf(buffer, "%pI4", | 179 | buflen = sprintf(buffer, "%pI4", |
155 | &ct->tuplehash[!dir].tuple.dst.u3.ip); | 180 | &ct->tuplehash[!dir].tuple.dst.u3.ip); |
156 | if (!mangle_packet(skb, dptr, datalen, poff, plen, | 181 | if (!mangle_packet(skb, dataoff, dptr, datalen, |
157 | buffer, buflen)) | 182 | poff, plen, buffer, buflen)) |
158 | return NF_DROP; | 183 | return NF_DROP; |
159 | } | 184 | } |
160 | 185 | ||
@@ -167,8 +192,8 @@ static unsigned int ip_nat_sip(struct sk_buff *skb, | |||
167 | addr.ip != ct->tuplehash[!dir].tuple.src.u3.ip) { | 192 | addr.ip != ct->tuplehash[!dir].tuple.src.u3.ip) { |
168 | buflen = sprintf(buffer, "%pI4", | 193 | buflen = sprintf(buffer, "%pI4", |
169 | &ct->tuplehash[!dir].tuple.src.u3.ip); | 194 | &ct->tuplehash[!dir].tuple.src.u3.ip); |
170 | if (!mangle_packet(skb, dptr, datalen, poff, plen, | 195 | if (!mangle_packet(skb, dataoff, dptr, datalen, |
171 | buffer, buflen)) | 196 | poff, plen, buffer, buflen)) |
172 | return NF_DROP; | 197 | return NF_DROP; |
173 | } | 198 | } |
174 | 199 | ||
@@ -181,31 +206,45 @@ static unsigned int ip_nat_sip(struct sk_buff *skb, | |||
181 | htons(n) != ct->tuplehash[!dir].tuple.src.u.udp.port) { | 206 | htons(n) != ct->tuplehash[!dir].tuple.src.u.udp.port) { |
182 | __be16 p = ct->tuplehash[!dir].tuple.src.u.udp.port; | 207 | __be16 p = ct->tuplehash[!dir].tuple.src.u.udp.port; |
183 | buflen = sprintf(buffer, "%u", ntohs(p)); | 208 | buflen = sprintf(buffer, "%u", ntohs(p)); |
184 | if (!mangle_packet(skb, dptr, datalen, poff, plen, | 209 | if (!mangle_packet(skb, dataoff, dptr, datalen, |
185 | buffer, buflen)) | 210 | poff, plen, buffer, buflen)) |
186 | return NF_DROP; | 211 | return NF_DROP; |
187 | } | 212 | } |
188 | } | 213 | } |
189 | 214 | ||
190 | next: | 215 | next: |
191 | /* Translate Contact headers */ | 216 | /* Translate Contact headers */ |
192 | dataoff = 0; | 217 | coff = 0; |
193 | in_header = 0; | 218 | in_header = 0; |
194 | while (ct_sip_parse_header_uri(ct, *dptr, &dataoff, *datalen, | 219 | while (ct_sip_parse_header_uri(ct, *dptr, &coff, *datalen, |
195 | SIP_HDR_CONTACT, &in_header, | 220 | SIP_HDR_CONTACT, &in_header, |
196 | &matchoff, &matchlen, | 221 | &matchoff, &matchlen, |
197 | &addr, &port) > 0) { | 222 | &addr, &port) > 0) { |
198 | if (!map_addr(skb, dptr, datalen, matchoff, matchlen, | 223 | if (!map_addr(skb, dataoff, dptr, datalen, matchoff, matchlen, |
199 | &addr, port)) | 224 | &addr, port)) |
200 | return NF_DROP; | 225 | return NF_DROP; |
201 | } | 226 | } |
202 | 227 | ||
203 | if (!map_sip_addr(skb, dptr, datalen, SIP_HDR_FROM) || | 228 | if (!map_sip_addr(skb, dataoff, dptr, datalen, SIP_HDR_FROM) || |
204 | !map_sip_addr(skb, dptr, datalen, SIP_HDR_TO)) | 229 | !map_sip_addr(skb, dataoff, dptr, datalen, SIP_HDR_TO)) |
205 | return NF_DROP; | 230 | return NF_DROP; |
231 | |||
206 | return NF_ACCEPT; | 232 | return NF_ACCEPT; |
207 | } | 233 | } |
208 | 234 | ||
235 | static void ip_nat_sip_seq_adjust(struct sk_buff *skb, s16 off) | ||
236 | { | ||
237 | enum ip_conntrack_info ctinfo; | ||
238 | struct nf_conn *ct = nf_ct_get(skb, &ctinfo); | ||
239 | const struct tcphdr *th; | ||
240 | |||
241 | if (nf_ct_protonum(ct) != IPPROTO_TCP || off == 0) | ||
242 | return; | ||
243 | |||
244 | th = (struct tcphdr *)(skb->data + ip_hdrlen(skb)); | ||
245 | nf_nat_set_seq_adjust(ct, ctinfo, th->seq, off); | ||
246 | } | ||
247 | |||
209 | /* Handles expected signalling connections and media streams */ | 248 | /* Handles expected signalling connections and media streams */ |
210 | static void ip_nat_sip_expected(struct nf_conn *ct, | 249 | static void ip_nat_sip_expected(struct nf_conn *ct, |
211 | struct nf_conntrack_expect *exp) | 250 | struct nf_conntrack_expect *exp) |
@@ -232,7 +271,7 @@ static void ip_nat_sip_expected(struct nf_conn *ct, | |||
232 | } | 271 | } |
233 | } | 272 | } |
234 | 273 | ||
235 | static unsigned int ip_nat_sip_expect(struct sk_buff *skb, | 274 | static unsigned int ip_nat_sip_expect(struct sk_buff *skb, unsigned int dataoff, |
236 | const char **dptr, unsigned int *datalen, | 275 | const char **dptr, unsigned int *datalen, |
237 | struct nf_conntrack_expect *exp, | 276 | struct nf_conntrack_expect *exp, |
238 | unsigned int matchoff, | 277 | unsigned int matchoff, |
@@ -279,8 +318,8 @@ static unsigned int ip_nat_sip_expect(struct sk_buff *skb, | |||
279 | if (exp->tuple.dst.u3.ip != exp->saved_ip || | 318 | if (exp->tuple.dst.u3.ip != exp->saved_ip || |
280 | exp->tuple.dst.u.udp.port != exp->saved_proto.udp.port) { | 319 | exp->tuple.dst.u.udp.port != exp->saved_proto.udp.port) { |
281 | buflen = sprintf(buffer, "%pI4:%u", &newip, port); | 320 | buflen = sprintf(buffer, "%pI4:%u", &newip, port); |
282 | if (!mangle_packet(skb, dptr, datalen, matchoff, matchlen, | 321 | if (!mangle_packet(skb, dataoff, dptr, datalen, |
283 | buffer, buflen)) | 322 | matchoff, matchlen, buffer, buflen)) |
284 | goto err; | 323 | goto err; |
285 | } | 324 | } |
286 | return NF_ACCEPT; | 325 | return NF_ACCEPT; |
@@ -290,7 +329,7 @@ err: | |||
290 | return NF_DROP; | 329 | return NF_DROP; |
291 | } | 330 | } |
292 | 331 | ||
293 | static int mangle_content_len(struct sk_buff *skb, | 332 | static int mangle_content_len(struct sk_buff *skb, unsigned int dataoff, |
294 | const char **dptr, unsigned int *datalen) | 333 | const char **dptr, unsigned int *datalen) |
295 | { | 334 | { |
296 | enum ip_conntrack_info ctinfo; | 335 | enum ip_conntrack_info ctinfo; |
@@ -312,12 +351,13 @@ static int mangle_content_len(struct sk_buff *skb, | |||
312 | return 0; | 351 | return 0; |
313 | 352 | ||
314 | buflen = sprintf(buffer, "%u", c_len); | 353 | buflen = sprintf(buffer, "%u", c_len); |
315 | return mangle_packet(skb, dptr, datalen, matchoff, matchlen, | 354 | return mangle_packet(skb, dataoff, dptr, datalen, matchoff, matchlen, |
316 | buffer, buflen); | 355 | buffer, buflen); |
317 | } | 356 | } |
318 | 357 | ||
319 | static int mangle_sdp_packet(struct sk_buff *skb, const char **dptr, | 358 | static int mangle_sdp_packet(struct sk_buff *skb, unsigned int dataoff, |
320 | unsigned int dataoff, unsigned int *datalen, | 359 | const char **dptr, unsigned int *datalen, |
360 | unsigned int sdpoff, | ||
321 | enum sdp_header_types type, | 361 | enum sdp_header_types type, |
322 | enum sdp_header_types term, | 362 | enum sdp_header_types term, |
323 | char *buffer, int buflen) | 363 | char *buffer, int buflen) |
@@ -326,16 +366,16 @@ static int mangle_sdp_packet(struct sk_buff *skb, const char **dptr, | |||
326 | struct nf_conn *ct = nf_ct_get(skb, &ctinfo); | 366 | struct nf_conn *ct = nf_ct_get(skb, &ctinfo); |
327 | unsigned int matchlen, matchoff; | 367 | unsigned int matchlen, matchoff; |
328 | 368 | ||
329 | if (ct_sip_get_sdp_header(ct, *dptr, dataoff, *datalen, type, term, | 369 | if (ct_sip_get_sdp_header(ct, *dptr, sdpoff, *datalen, type, term, |
330 | &matchoff, &matchlen) <= 0) | 370 | &matchoff, &matchlen) <= 0) |
331 | return -ENOENT; | 371 | return -ENOENT; |
332 | return mangle_packet(skb, dptr, datalen, matchoff, matchlen, | 372 | return mangle_packet(skb, dataoff, dptr, datalen, matchoff, matchlen, |
333 | buffer, buflen) ? 0 : -EINVAL; | 373 | buffer, buflen) ? 0 : -EINVAL; |
334 | } | 374 | } |
335 | 375 | ||
336 | static unsigned int ip_nat_sdp_addr(struct sk_buff *skb, const char **dptr, | 376 | static unsigned int ip_nat_sdp_addr(struct sk_buff *skb, unsigned int dataoff, |
337 | unsigned int dataoff, | 377 | const char **dptr, unsigned int *datalen, |
338 | unsigned int *datalen, | 378 | unsigned int sdpoff, |
339 | enum sdp_header_types type, | 379 | enum sdp_header_types type, |
340 | enum sdp_header_types term, | 380 | enum sdp_header_types term, |
341 | const union nf_inet_addr *addr) | 381 | const union nf_inet_addr *addr) |
@@ -344,16 +384,15 @@ static unsigned int ip_nat_sdp_addr(struct sk_buff *skb, const char **dptr, | |||
344 | unsigned int buflen; | 384 | unsigned int buflen; |
345 | 385 | ||
346 | buflen = sprintf(buffer, "%pI4", &addr->ip); | 386 | buflen = sprintf(buffer, "%pI4", &addr->ip); |
347 | if (mangle_sdp_packet(skb, dptr, dataoff, datalen, type, term, | 387 | if (mangle_sdp_packet(skb, dataoff, dptr, datalen, sdpoff, type, term, |
348 | buffer, buflen)) | 388 | buffer, buflen)) |
349 | return 0; | 389 | return 0; |
350 | 390 | ||
351 | return mangle_content_len(skb, dptr, datalen); | 391 | return mangle_content_len(skb, dataoff, dptr, datalen); |
352 | } | 392 | } |
353 | 393 | ||
354 | static unsigned int ip_nat_sdp_port(struct sk_buff *skb, | 394 | static unsigned int ip_nat_sdp_port(struct sk_buff *skb, unsigned int dataoff, |
355 | const char **dptr, | 395 | const char **dptr, unsigned int *datalen, |
356 | unsigned int *datalen, | ||
357 | unsigned int matchoff, | 396 | unsigned int matchoff, |
358 | unsigned int matchlen, | 397 | unsigned int matchlen, |
359 | u_int16_t port) | 398 | u_int16_t port) |
@@ -362,16 +401,16 @@ static unsigned int ip_nat_sdp_port(struct sk_buff *skb, | |||
362 | unsigned int buflen; | 401 | unsigned int buflen; |
363 | 402 | ||
364 | buflen = sprintf(buffer, "%u", port); | 403 | buflen = sprintf(buffer, "%u", port); |
365 | if (!mangle_packet(skb, dptr, datalen, matchoff, matchlen, | 404 | if (!mangle_packet(skb, dataoff, dptr, datalen, matchoff, matchlen, |
366 | buffer, buflen)) | 405 | buffer, buflen)) |
367 | return 0; | 406 | return 0; |
368 | 407 | ||
369 | return mangle_content_len(skb, dptr, datalen); | 408 | return mangle_content_len(skb, dataoff, dptr, datalen); |
370 | } | 409 | } |
371 | 410 | ||
372 | static unsigned int ip_nat_sdp_session(struct sk_buff *skb, const char **dptr, | 411 | static unsigned int ip_nat_sdp_session(struct sk_buff *skb, unsigned int dataoff, |
373 | unsigned int dataoff, | 412 | const char **dptr, unsigned int *datalen, |
374 | unsigned int *datalen, | 413 | unsigned int sdpoff, |
375 | const union nf_inet_addr *addr) | 414 | const union nf_inet_addr *addr) |
376 | { | 415 | { |
377 | char buffer[sizeof("nnn.nnn.nnn.nnn")]; | 416 | char buffer[sizeof("nnn.nnn.nnn.nnn")]; |
@@ -379,12 +418,12 @@ static unsigned int ip_nat_sdp_session(struct sk_buff *skb, const char **dptr, | |||
379 | 418 | ||
380 | /* Mangle session description owner and contact addresses */ | 419 | /* Mangle session description owner and contact addresses */ |
381 | buflen = sprintf(buffer, "%pI4", &addr->ip); | 420 | buflen = sprintf(buffer, "%pI4", &addr->ip); |
382 | if (mangle_sdp_packet(skb, dptr, dataoff, datalen, | 421 | if (mangle_sdp_packet(skb, dataoff, dptr, datalen, sdpoff, |
383 | SDP_HDR_OWNER_IP4, SDP_HDR_MEDIA, | 422 | SDP_HDR_OWNER_IP4, SDP_HDR_MEDIA, |
384 | buffer, buflen)) | 423 | buffer, buflen)) |
385 | return 0; | 424 | return 0; |
386 | 425 | ||
387 | switch (mangle_sdp_packet(skb, dptr, dataoff, datalen, | 426 | switch (mangle_sdp_packet(skb, dataoff, dptr, datalen, sdpoff, |
388 | SDP_HDR_CONNECTION_IP4, SDP_HDR_MEDIA, | 427 | SDP_HDR_CONNECTION_IP4, SDP_HDR_MEDIA, |
389 | buffer, buflen)) { | 428 | buffer, buflen)) { |
390 | case 0: | 429 | case 0: |
@@ -401,14 +440,13 @@ static unsigned int ip_nat_sdp_session(struct sk_buff *skb, const char **dptr, | |||
401 | return 0; | 440 | return 0; |
402 | } | 441 | } |
403 | 442 | ||
404 | return mangle_content_len(skb, dptr, datalen); | 443 | return mangle_content_len(skb, dataoff, dptr, datalen); |
405 | } | 444 | } |
406 | 445 | ||
407 | /* So, this packet has hit the connection tracking matching code. | 446 | /* So, this packet has hit the connection tracking matching code. |
408 | Mangle it, and change the expectation to match the new version. */ | 447 | Mangle it, and change the expectation to match the new version. */ |
409 | static unsigned int ip_nat_sdp_media(struct sk_buff *skb, | 448 | static unsigned int ip_nat_sdp_media(struct sk_buff *skb, unsigned int dataoff, |
410 | const char **dptr, | 449 | const char **dptr, unsigned int *datalen, |
411 | unsigned int *datalen, | ||
412 | struct nf_conntrack_expect *rtp_exp, | 450 | struct nf_conntrack_expect *rtp_exp, |
413 | struct nf_conntrack_expect *rtcp_exp, | 451 | struct nf_conntrack_expect *rtcp_exp, |
414 | unsigned int mediaoff, | 452 | unsigned int mediaoff, |
@@ -456,7 +494,8 @@ static unsigned int ip_nat_sdp_media(struct sk_buff *skb, | |||
456 | 494 | ||
457 | /* Update media port. */ | 495 | /* Update media port. */ |
458 | if (rtp_exp->tuple.dst.u.udp.port != rtp_exp->saved_proto.udp.port && | 496 | if (rtp_exp->tuple.dst.u.udp.port != rtp_exp->saved_proto.udp.port && |
459 | !ip_nat_sdp_port(skb, dptr, datalen, mediaoff, medialen, port)) | 497 | !ip_nat_sdp_port(skb, dataoff, dptr, datalen, |
498 | mediaoff, medialen, port)) | ||
460 | goto err2; | 499 | goto err2; |
461 | 500 | ||
462 | return NF_ACCEPT; | 501 | return NF_ACCEPT; |
@@ -471,6 +510,7 @@ err1: | |||
471 | static void __exit nf_nat_sip_fini(void) | 510 | static void __exit nf_nat_sip_fini(void) |
472 | { | 511 | { |
473 | rcu_assign_pointer(nf_nat_sip_hook, NULL); | 512 | rcu_assign_pointer(nf_nat_sip_hook, NULL); |
513 | rcu_assign_pointer(nf_nat_sip_seq_adjust_hook, NULL); | ||
474 | rcu_assign_pointer(nf_nat_sip_expect_hook, NULL); | 514 | rcu_assign_pointer(nf_nat_sip_expect_hook, NULL); |
475 | rcu_assign_pointer(nf_nat_sdp_addr_hook, NULL); | 515 | rcu_assign_pointer(nf_nat_sdp_addr_hook, NULL); |
476 | rcu_assign_pointer(nf_nat_sdp_port_hook, NULL); | 516 | rcu_assign_pointer(nf_nat_sdp_port_hook, NULL); |
@@ -482,12 +522,14 @@ static void __exit nf_nat_sip_fini(void) | |||
482 | static int __init nf_nat_sip_init(void) | 522 | static int __init nf_nat_sip_init(void) |
483 | { | 523 | { |
484 | BUG_ON(nf_nat_sip_hook != NULL); | 524 | BUG_ON(nf_nat_sip_hook != NULL); |
525 | BUG_ON(nf_nat_sip_seq_adjust_hook != NULL); | ||
485 | BUG_ON(nf_nat_sip_expect_hook != NULL); | 526 | BUG_ON(nf_nat_sip_expect_hook != NULL); |
486 | BUG_ON(nf_nat_sdp_addr_hook != NULL); | 527 | BUG_ON(nf_nat_sdp_addr_hook != NULL); |
487 | BUG_ON(nf_nat_sdp_port_hook != NULL); | 528 | BUG_ON(nf_nat_sdp_port_hook != NULL); |
488 | BUG_ON(nf_nat_sdp_session_hook != NULL); | 529 | BUG_ON(nf_nat_sdp_session_hook != NULL); |
489 | BUG_ON(nf_nat_sdp_media_hook != NULL); | 530 | BUG_ON(nf_nat_sdp_media_hook != NULL); |
490 | rcu_assign_pointer(nf_nat_sip_hook, ip_nat_sip); | 531 | rcu_assign_pointer(nf_nat_sip_hook, ip_nat_sip); |
532 | rcu_assign_pointer(nf_nat_sip_seq_adjust_hook, ip_nat_sip_seq_adjust); | ||
491 | rcu_assign_pointer(nf_nat_sip_expect_hook, ip_nat_sip_expect); | 533 | rcu_assign_pointer(nf_nat_sip_expect_hook, ip_nat_sip_expect); |
492 | rcu_assign_pointer(nf_nat_sdp_addr_hook, ip_nat_sdp_addr); | 534 | rcu_assign_pointer(nf_nat_sdp_addr_hook, ip_nat_sdp_addr); |
493 | rcu_assign_pointer(nf_nat_sdp_port_hook, ip_nat_sdp_port); | 535 | rcu_assign_pointer(nf_nat_sdp_port_hook, ip_nat_sdp_port); |
diff --git a/net/ipv4/netfilter/nf_nat_snmp_basic.c b/net/ipv4/netfilter/nf_nat_snmp_basic.c index d9521f6f9ed0..0b9c7ce3d6c5 100644 --- a/net/ipv4/netfilter/nf_nat_snmp_basic.c +++ b/net/ipv4/netfilter/nf_nat_snmp_basic.c | |||
@@ -1038,7 +1038,7 @@ static int snmp_parse_mangle(unsigned char *msg, | |||
1038 | unsigned int cls, con, tag, vers, pdutype; | 1038 | unsigned int cls, con, tag, vers, pdutype; |
1039 | struct asn1_ctx ctx; | 1039 | struct asn1_ctx ctx; |
1040 | struct asn1_octstr comm; | 1040 | struct asn1_octstr comm; |
1041 | struct snmp_object **obj; | 1041 | struct snmp_object *obj; |
1042 | 1042 | ||
1043 | if (debug > 1) | 1043 | if (debug > 1) |
1044 | hex_dump(msg, len); | 1044 | hex_dump(msg, len); |
@@ -1148,43 +1148,34 @@ static int snmp_parse_mangle(unsigned char *msg, | |||
1148 | if (cls != ASN1_UNI || con != ASN1_CON || tag != ASN1_SEQ) | 1148 | if (cls != ASN1_UNI || con != ASN1_CON || tag != ASN1_SEQ) |
1149 | return 0; | 1149 | return 0; |
1150 | 1150 | ||
1151 | obj = kmalloc(sizeof(struct snmp_object), GFP_ATOMIC); | ||
1152 | if (obj == NULL) { | ||
1153 | if (net_ratelimit()) | ||
1154 | printk(KERN_WARNING "OOM in bsalg(%d)\n", __LINE__); | ||
1155 | return 0; | ||
1156 | } | ||
1157 | |||
1158 | while (!asn1_eoc_decode(&ctx, eoc)) { | 1151 | while (!asn1_eoc_decode(&ctx, eoc)) { |
1159 | unsigned int i; | 1152 | unsigned int i; |
1160 | 1153 | ||
1161 | if (!snmp_object_decode(&ctx, obj)) { | 1154 | if (!snmp_object_decode(&ctx, &obj)) { |
1162 | if (*obj) { | 1155 | if (obj) { |
1163 | kfree((*obj)->id); | 1156 | kfree(obj->id); |
1164 | kfree(*obj); | 1157 | kfree(obj); |
1165 | } | 1158 | } |
1166 | kfree(obj); | ||
1167 | return 0; | 1159 | return 0; |
1168 | } | 1160 | } |
1169 | 1161 | ||
1170 | if (debug > 1) { | 1162 | if (debug > 1) { |
1171 | printk(KERN_DEBUG "bsalg: object: "); | 1163 | printk(KERN_DEBUG "bsalg: object: "); |
1172 | for (i = 0; i < (*obj)->id_len; i++) { | 1164 | for (i = 0; i < obj->id_len; i++) { |
1173 | if (i > 0) | 1165 | if (i > 0) |
1174 | printk("."); | 1166 | printk("."); |
1175 | printk("%lu", (*obj)->id[i]); | 1167 | printk("%lu", obj->id[i]); |
1176 | } | 1168 | } |
1177 | printk(": type=%u\n", (*obj)->type); | 1169 | printk(": type=%u\n", obj->type); |
1178 | 1170 | ||
1179 | } | 1171 | } |
1180 | 1172 | ||
1181 | if ((*obj)->type == SNMP_IPADDR) | 1173 | if (obj->type == SNMP_IPADDR) |
1182 | mangle_address(ctx.begin, ctx.pointer - 4 , map, check); | 1174 | mangle_address(ctx.begin, ctx.pointer - 4 , map, check); |
1183 | 1175 | ||
1184 | kfree((*obj)->id); | 1176 | kfree(obj->id); |
1185 | kfree(*obj); | 1177 | kfree(obj); |
1186 | } | 1178 | } |
1187 | kfree(obj); | ||
1188 | 1179 | ||
1189 | if (!asn1_eoc_decode(&ctx, eoc)) | 1180 | if (!asn1_eoc_decode(&ctx, eoc)) |
1190 | return 0; | 1181 | return 0; |