Jan Engelhardt | 64eb12f | 2008-01-14 23:40:53 -0800 | [diff] [blame] | 1 | /* |
| 2 | * xt_conntrack - Netfilter module to match connection tracking |
| 3 | * information. (Superset of Rusty's minimalistic state match.) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 4 | * |
Jan Engelhardt | 64eb12f | 2008-01-14 23:40:53 -0800 | [diff] [blame] | 5 | * (C) 2001 Marc Boucher (marc@mbsi.ca). |
| 6 | * Copyright © CC Computer Consultants GmbH, 2007 - 2008 |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 7 | * |
Jan Engelhardt | 64eb12f | 2008-01-14 23:40:53 -0800 | [diff] [blame] | 8 | * This program is free software; you can redistribute it and/or modify |
| 9 | * it under the terms of the GNU General Public License version 2 as |
| 10 | * published by the Free Software Foundation. |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 11 | */ |
| 12 | |
| 13 | #include <linux/module.h> |
| 14 | #include <linux/skbuff.h> |
Jan Engelhardt | 64eb12f | 2008-01-14 23:40:53 -0800 | [diff] [blame] | 15 | #include <net/ipv6.h> |
Harald Welte | 2e4e6a1 | 2006-01-12 13:30:04 -0800 | [diff] [blame] | 16 | #include <linux/netfilter/x_tables.h> |
| 17 | #include <linux/netfilter/xt_conntrack.h> |
Patrick McHardy | 587aa64 | 2007-03-14 16:37:25 -0700 | [diff] [blame] | 18 | #include <net/netfilter/nf_conntrack.h> |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 19 | |
| 20 | MODULE_LICENSE("GPL"); |
| 21 | MODULE_AUTHOR("Marc Boucher <marc@mbsi.ca>"); |
Jan Engelhardt | b416499 | 2008-01-31 03:58:24 -0800 | [diff] [blame] | 22 | MODULE_AUTHOR("Jan Engelhardt <jengelh@computergmbh.de>"); |
Jan Engelhardt | 2ae15b6 | 2008-01-14 23:42:28 -0800 | [diff] [blame] | 23 | MODULE_DESCRIPTION("Xtables: connection tracking state match"); |
Harald Welte | 2e4e6a1 | 2006-01-12 13:30:04 -0800 | [diff] [blame] | 24 | MODULE_ALIAS("ipt_conntrack"); |
Jan Engelhardt | 64eb12f | 2008-01-14 23:40:53 -0800 | [diff] [blame] | 25 | MODULE_ALIAS("ip6t_conntrack"); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 26 | |
Jan Engelhardt | 1d93a9c | 2007-07-07 22:15:35 -0700 | [diff] [blame] | 27 | static bool |
Jan Engelhardt | 64eb12f | 2008-01-14 23:40:53 -0800 | [diff] [blame] | 28 | conntrack_mt_v0(const struct sk_buff *skb, const struct net_device *in, |
| 29 | const struct net_device *out, const struct xt_match *match, |
| 30 | const void *matchinfo, int offset, unsigned int protoff, |
| 31 | bool *hotdrop) |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 32 | { |
Harald Welte | 2e4e6a1 | 2006-01-12 13:30:04 -0800 | [diff] [blame] | 33 | const struct xt_conntrack_info *sinfo = matchinfo; |
Jan Engelhardt | a47362a | 2007-07-07 22:16:55 -0700 | [diff] [blame] | 34 | const struct nf_conn *ct; |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 35 | enum ip_conntrack_info ctinfo; |
| 36 | unsigned int statebit; |
| 37 | |
Jan Engelhardt | a47362a | 2007-07-07 22:16:55 -0700 | [diff] [blame] | 38 | ct = nf_ct_get(skb, &ctinfo); |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 39 | |
Jan Engelhardt | e79ec50 | 2007-12-17 22:44:06 -0800 | [diff] [blame] | 40 | #define FWINV(bool, invflg) ((bool) ^ !!(sinfo->invflags & (invflg))) |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 41 | |
| 42 | if (ct == &nf_conntrack_untracked) |
Harald Welte | 2e4e6a1 | 2006-01-12 13:30:04 -0800 | [diff] [blame] | 43 | statebit = XT_CONNTRACK_STATE_UNTRACKED; |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 44 | else if (ct) |
YOSHIFUJI Hideaki | 601e68e | 2007-02-12 11:15:49 -0800 | [diff] [blame] | 45 | statebit = XT_CONNTRACK_STATE_BIT(ctinfo); |
| 46 | else |
| 47 | statebit = XT_CONNTRACK_STATE_INVALID; |
| 48 | |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 49 | if (sinfo->flags & XT_CONNTRACK_STATE) { |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 50 | if (ct) { |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 51 | if (test_bit(IPS_SRC_NAT_BIT, &ct->status)) |
Harald Welte | 2e4e6a1 | 2006-01-12 13:30:04 -0800 | [diff] [blame] | 52 | statebit |= XT_CONNTRACK_STATE_SNAT; |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 53 | if (test_bit(IPS_DST_NAT_BIT, &ct->status)) |
Harald Welte | 2e4e6a1 | 2006-01-12 13:30:04 -0800 | [diff] [blame] | 54 | statebit |= XT_CONNTRACK_STATE_DNAT; |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 55 | } |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 56 | if (FWINV((statebit & sinfo->statemask) == 0, |
| 57 | XT_CONNTRACK_STATE)) |
Jan Engelhardt | 1d93a9c | 2007-07-07 22:15:35 -0700 | [diff] [blame] | 58 | return false; |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 59 | } |
| 60 | |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 61 | if (ct == NULL) { |
| 62 | if (sinfo->flags & ~XT_CONNTRACK_STATE) |
Jan Engelhardt | 1d93a9c | 2007-07-07 22:15:35 -0700 | [diff] [blame] | 63 | return false; |
| 64 | return true; |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 65 | } |
| 66 | |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 67 | if (sinfo->flags & XT_CONNTRACK_PROTO && |
Patrick McHardy | 5e8fbe2 | 2008-04-14 11:15:52 +0200 | [diff] [blame] | 68 | FWINV(nf_ct_protonum(ct) != |
YOSHIFUJI Hideaki | 601e68e | 2007-02-12 11:15:49 -0800 | [diff] [blame] | 69 | sinfo->tuple[IP_CT_DIR_ORIGINAL].dst.protonum, |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 70 | XT_CONNTRACK_PROTO)) |
Jan Engelhardt | 1d93a9c | 2007-07-07 22:15:35 -0700 | [diff] [blame] | 71 | return false; |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 72 | |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 73 | if (sinfo->flags & XT_CONNTRACK_ORIGSRC && |
| 74 | FWINV((ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.src.u3.ip & |
YOSHIFUJI Hideaki | 601e68e | 2007-02-12 11:15:49 -0800 | [diff] [blame] | 75 | sinfo->sipmsk[IP_CT_DIR_ORIGINAL].s_addr) != |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 76 | sinfo->tuple[IP_CT_DIR_ORIGINAL].src.ip, |
| 77 | XT_CONNTRACK_ORIGSRC)) |
Jan Engelhardt | 1d93a9c | 2007-07-07 22:15:35 -0700 | [diff] [blame] | 78 | return false; |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 79 | |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 80 | if (sinfo->flags & XT_CONNTRACK_ORIGDST && |
| 81 | FWINV((ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.dst.u3.ip & |
YOSHIFUJI Hideaki | 601e68e | 2007-02-12 11:15:49 -0800 | [diff] [blame] | 82 | sinfo->dipmsk[IP_CT_DIR_ORIGINAL].s_addr) != |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 83 | sinfo->tuple[IP_CT_DIR_ORIGINAL].dst.ip, |
| 84 | XT_CONNTRACK_ORIGDST)) |
Jan Engelhardt | 1d93a9c | 2007-07-07 22:15:35 -0700 | [diff] [blame] | 85 | return false; |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 86 | |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 87 | if (sinfo->flags & XT_CONNTRACK_REPLSRC && |
| 88 | FWINV((ct->tuplehash[IP_CT_DIR_REPLY].tuple.src.u3.ip & |
YOSHIFUJI Hideaki | 601e68e | 2007-02-12 11:15:49 -0800 | [diff] [blame] | 89 | sinfo->sipmsk[IP_CT_DIR_REPLY].s_addr) != |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 90 | sinfo->tuple[IP_CT_DIR_REPLY].src.ip, |
| 91 | XT_CONNTRACK_REPLSRC)) |
Jan Engelhardt | 1d93a9c | 2007-07-07 22:15:35 -0700 | [diff] [blame] | 92 | return false; |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 93 | |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 94 | if (sinfo->flags & XT_CONNTRACK_REPLDST && |
| 95 | FWINV((ct->tuplehash[IP_CT_DIR_REPLY].tuple.dst.u3.ip & |
YOSHIFUJI Hideaki | 601e68e | 2007-02-12 11:15:49 -0800 | [diff] [blame] | 96 | sinfo->dipmsk[IP_CT_DIR_REPLY].s_addr) != |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 97 | sinfo->tuple[IP_CT_DIR_REPLY].dst.ip, |
| 98 | XT_CONNTRACK_REPLDST)) |
Jan Engelhardt | 1d93a9c | 2007-07-07 22:15:35 -0700 | [diff] [blame] | 99 | return false; |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 100 | |
| 101 | if (sinfo->flags & XT_CONNTRACK_STATUS && |
| 102 | FWINV((ct->status & sinfo->statusmask) == 0, |
YOSHIFUJI Hideaki | 601e68e | 2007-02-12 11:15:49 -0800 | [diff] [blame] | 103 | XT_CONNTRACK_STATUS)) |
Jan Engelhardt | 1d93a9c | 2007-07-07 22:15:35 -0700 | [diff] [blame] | 104 | return false; |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 105 | |
Harald Welte | 2e4e6a1 | 2006-01-12 13:30:04 -0800 | [diff] [blame] | 106 | if(sinfo->flags & XT_CONNTRACK_EXPIRES) { |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 107 | unsigned long expires = timer_pending(&ct->timeout) ? |
| 108 | (ct->timeout.expires - jiffies)/HZ : 0; |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 109 | |
Patrick McHardy | 50b9f1d | 2006-09-20 11:58:17 -0700 | [diff] [blame] | 110 | if (FWINV(!(expires >= sinfo->expires_min && |
| 111 | expires <= sinfo->expires_max), |
| 112 | XT_CONNTRACK_EXPIRES)) |
Jan Engelhardt | 1d93a9c | 2007-07-07 22:15:35 -0700 | [diff] [blame] | 113 | return false; |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 114 | } |
Jan Engelhardt | 1d93a9c | 2007-07-07 22:15:35 -0700 | [diff] [blame] | 115 | return true; |
Jan Engelhardt | e79ec50 | 2007-12-17 22:44:06 -0800 | [diff] [blame] | 116 | #undef FWINV |
Yasuyuki Kozakai | 9fb9cbb | 2005-11-09 16:38:16 -0800 | [diff] [blame] | 117 | } |
| 118 | |
Jan Engelhardt | ccb79bd | 2007-07-07 22:16:00 -0700 | [diff] [blame] | 119 | static bool |
Jan Engelhardt | 64eb12f | 2008-01-14 23:40:53 -0800 | [diff] [blame] | 120 | conntrack_addrcmp(const union nf_inet_addr *kaddr, |
| 121 | const union nf_inet_addr *uaddr, |
| 122 | const union nf_inet_addr *umask, unsigned int l3proto) |
| 123 | { |
| 124 | if (l3proto == AF_INET) |
Jan Engelhardt | 6556874 | 2008-02-27 12:20:41 -0800 | [diff] [blame] | 125 | return ((kaddr->ip ^ uaddr->ip) & umask->ip) == 0; |
Jan Engelhardt | 64eb12f | 2008-01-14 23:40:53 -0800 | [diff] [blame] | 126 | else if (l3proto == AF_INET6) |
| 127 | return ipv6_masked_addr_cmp(&kaddr->in6, &umask->in6, |
| 128 | &uaddr->in6) == 0; |
| 129 | else |
| 130 | return false; |
| 131 | } |
| 132 | |
| 133 | static inline bool |
| 134 | conntrack_mt_origsrc(const struct nf_conn *ct, |
| 135 | const struct xt_conntrack_mtinfo1 *info, |
| 136 | unsigned int family) |
| 137 | { |
| 138 | return conntrack_addrcmp(&ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.src.u3, |
| 139 | &info->origsrc_addr, &info->origsrc_mask, family); |
| 140 | } |
| 141 | |
| 142 | static inline bool |
| 143 | conntrack_mt_origdst(const struct nf_conn *ct, |
| 144 | const struct xt_conntrack_mtinfo1 *info, |
| 145 | unsigned int family) |
| 146 | { |
| 147 | return conntrack_addrcmp(&ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.dst.u3, |
| 148 | &info->origdst_addr, &info->origdst_mask, family); |
| 149 | } |
| 150 | |
| 151 | static inline bool |
| 152 | conntrack_mt_replsrc(const struct nf_conn *ct, |
| 153 | const struct xt_conntrack_mtinfo1 *info, |
| 154 | unsigned int family) |
| 155 | { |
| 156 | return conntrack_addrcmp(&ct->tuplehash[IP_CT_DIR_REPLY].tuple.src.u3, |
| 157 | &info->replsrc_addr, &info->replsrc_mask, family); |
| 158 | } |
| 159 | |
| 160 | static inline bool |
| 161 | conntrack_mt_repldst(const struct nf_conn *ct, |
| 162 | const struct xt_conntrack_mtinfo1 *info, |
| 163 | unsigned int family) |
| 164 | { |
| 165 | return conntrack_addrcmp(&ct->tuplehash[IP_CT_DIR_REPLY].tuple.dst.u3, |
| 166 | &info->repldst_addr, &info->repldst_mask, family); |
| 167 | } |
| 168 | |
Jan Engelhardt | b416499 | 2008-01-31 03:58:24 -0800 | [diff] [blame] | 169 | static inline bool |
| 170 | ct_proto_port_check(const struct xt_conntrack_mtinfo1 *info, |
| 171 | const struct nf_conn *ct) |
| 172 | { |
| 173 | const struct nf_conntrack_tuple *tuple; |
| 174 | |
| 175 | tuple = &ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple; |
| 176 | if ((info->match_flags & XT_CONNTRACK_PROTO) && |
Patrick McHardy | 5e8fbe2 | 2008-04-14 11:15:52 +0200 | [diff] [blame] | 177 | (nf_ct_protonum(ct) == info->l4proto) ^ |
Jan Engelhardt | b416499 | 2008-01-31 03:58:24 -0800 | [diff] [blame] | 178 | !(info->invert_flags & XT_CONNTRACK_PROTO)) |
| 179 | return false; |
| 180 | |
| 181 | /* Shortcut to match all recognized protocols by using ->src.all. */ |
| 182 | if ((info->match_flags & XT_CONNTRACK_ORIGSRC_PORT) && |
| 183 | (tuple->src.u.all == info->origsrc_port) ^ |
| 184 | !(info->invert_flags & XT_CONNTRACK_ORIGSRC_PORT)) |
| 185 | return false; |
| 186 | |
| 187 | if ((info->match_flags & XT_CONNTRACK_ORIGDST_PORT) && |
| 188 | (tuple->dst.u.all == info->origdst_port) ^ |
| 189 | !(info->invert_flags & XT_CONNTRACK_ORIGDST_PORT)) |
| 190 | return false; |
| 191 | |
| 192 | tuple = &ct->tuplehash[IP_CT_DIR_REPLY].tuple; |
| 193 | |
| 194 | if ((info->match_flags & XT_CONNTRACK_REPLSRC_PORT) && |
| 195 | (tuple->src.u.all == info->replsrc_port) ^ |
| 196 | !(info->invert_flags & XT_CONNTRACK_REPLSRC_PORT)) |
| 197 | return false; |
| 198 | |
| 199 | if ((info->match_flags & XT_CONNTRACK_REPLDST_PORT) && |
| 200 | (tuple->dst.u.all == info->repldst_port) ^ |
| 201 | !(info->invert_flags & XT_CONNTRACK_REPLDST_PORT)) |
| 202 | return false; |
| 203 | |
| 204 | return true; |
| 205 | } |
| 206 | |
Jan Engelhardt | 64eb12f | 2008-01-14 23:40:53 -0800 | [diff] [blame] | 207 | static bool |
| 208 | conntrack_mt(const struct sk_buff *skb, const struct net_device *in, |
| 209 | const struct net_device *out, const struct xt_match *match, |
| 210 | const void *matchinfo, int offset, unsigned int protoff, |
| 211 | bool *hotdrop) |
| 212 | { |
| 213 | const struct xt_conntrack_mtinfo1 *info = matchinfo; |
| 214 | enum ip_conntrack_info ctinfo; |
| 215 | const struct nf_conn *ct; |
| 216 | unsigned int statebit; |
| 217 | |
| 218 | ct = nf_ct_get(skb, &ctinfo); |
| 219 | |
| 220 | if (ct == &nf_conntrack_untracked) |
| 221 | statebit = XT_CONNTRACK_STATE_UNTRACKED; |
| 222 | else if (ct != NULL) |
| 223 | statebit = XT_CONNTRACK_STATE_BIT(ctinfo); |
| 224 | else |
| 225 | statebit = XT_CONNTRACK_STATE_INVALID; |
| 226 | |
| 227 | if (info->match_flags & XT_CONNTRACK_STATE) { |
| 228 | if (ct != NULL) { |
| 229 | if (test_bit(IPS_SRC_NAT_BIT, &ct->status)) |
| 230 | statebit |= XT_CONNTRACK_STATE_SNAT; |
| 231 | if (test_bit(IPS_DST_NAT_BIT, &ct->status)) |
| 232 | statebit |= XT_CONNTRACK_STATE_DNAT; |
| 233 | } |
Jan Engelhardt | d61f89e | 2008-02-27 12:09:05 -0800 | [diff] [blame] | 234 | if (!!(info->state_mask & statebit) ^ |
Jan Engelhardt | 64eb12f | 2008-01-14 23:40:53 -0800 | [diff] [blame] | 235 | !(info->invert_flags & XT_CONNTRACK_STATE)) |
| 236 | return false; |
| 237 | } |
| 238 | |
| 239 | if (ct == NULL) |
| 240 | return info->match_flags & XT_CONNTRACK_STATE; |
Jan Engelhardt | b416499 | 2008-01-31 03:58:24 -0800 | [diff] [blame] | 241 | if ((info->match_flags & XT_CONNTRACK_DIRECTION) && |
| 242 | (CTINFO2DIR(ctinfo) == IP_CT_DIR_ORIGINAL) ^ |
| 243 | !!(info->invert_flags & XT_CONNTRACK_DIRECTION)) |
Jan Engelhardt | 64eb12f | 2008-01-14 23:40:53 -0800 | [diff] [blame] | 244 | return false; |
| 245 | |
| 246 | if (info->match_flags & XT_CONNTRACK_ORIGSRC) |
| 247 | if (conntrack_mt_origsrc(ct, info, match->family) ^ |
| 248 | !(info->invert_flags & XT_CONNTRACK_ORIGSRC)) |
| 249 | return false; |
| 250 | |
| 251 | if (info->match_flags & XT_CONNTRACK_ORIGDST) |
| 252 | if (conntrack_mt_origdst(ct, info, match->family) ^ |
| 253 | !(info->invert_flags & XT_CONNTRACK_ORIGDST)) |
| 254 | return false; |
| 255 | |
| 256 | if (info->match_flags & XT_CONNTRACK_REPLSRC) |
| 257 | if (conntrack_mt_replsrc(ct, info, match->family) ^ |
| 258 | !(info->invert_flags & XT_CONNTRACK_REPLSRC)) |
| 259 | return false; |
| 260 | |
| 261 | if (info->match_flags & XT_CONNTRACK_REPLDST) |
| 262 | if (conntrack_mt_repldst(ct, info, match->family) ^ |
| 263 | !(info->invert_flags & XT_CONNTRACK_REPLDST)) |
| 264 | return false; |
| 265 | |
Jan Engelhardt | b416499 | 2008-01-31 03:58:24 -0800 | [diff] [blame] | 266 | if (!ct_proto_port_check(info, ct)) |
| 267 | return false; |
| 268 | |
Jan Engelhardt | 64eb12f | 2008-01-14 23:40:53 -0800 | [diff] [blame] | 269 | if ((info->match_flags & XT_CONNTRACK_STATUS) && |
| 270 | (!!(info->status_mask & ct->status) ^ |
| 271 | !(info->invert_flags & XT_CONNTRACK_STATUS))) |
| 272 | return false; |
| 273 | |
| 274 | if (info->match_flags & XT_CONNTRACK_EXPIRES) { |
| 275 | unsigned long expires = 0; |
| 276 | |
| 277 | if (timer_pending(&ct->timeout)) |
| 278 | expires = (ct->timeout.expires - jiffies) / HZ; |
| 279 | if ((expires >= info->expires_min && |
| 280 | expires <= info->expires_max) ^ |
| 281 | !(info->invert_flags & XT_CONNTRACK_EXPIRES)) |
| 282 | return false; |
| 283 | } |
| 284 | return true; |
| 285 | } |
| 286 | |
| 287 | static bool |
Jan Engelhardt | d3c5ee6 | 2007-12-04 23:24:03 -0800 | [diff] [blame] | 288 | conntrack_mt_check(const char *tablename, const void *ip, |
| 289 | const struct xt_match *match, void *matchinfo, |
| 290 | unsigned int hook_mask) |
Pablo Neira Ayuso | b9f78f9 | 2006-03-22 13:56:08 -0800 | [diff] [blame] | 291 | { |
Pablo Neira Ayuso | b9f78f9 | 2006-03-22 13:56:08 -0800 | [diff] [blame] | 292 | if (nf_ct_l3proto_try_module_get(match->family) < 0) { |
Yasuyuki Kozakai | fe0b929 | 2006-12-12 00:28:40 -0800 | [diff] [blame] | 293 | printk(KERN_WARNING "can't load conntrack support for " |
Jan Engelhardt | df54aae | 2007-12-17 22:43:15 -0800 | [diff] [blame] | 294 | "proto=%u\n", match->family); |
Jan Engelhardt | ccb79bd | 2007-07-07 22:16:00 -0700 | [diff] [blame] | 295 | return false; |
Pablo Neira Ayuso | b9f78f9 | 2006-03-22 13:56:08 -0800 | [diff] [blame] | 296 | } |
Jan Engelhardt | ccb79bd | 2007-07-07 22:16:00 -0700 | [diff] [blame] | 297 | return true; |
Pablo Neira Ayuso | b9f78f9 | 2006-03-22 13:56:08 -0800 | [diff] [blame] | 298 | } |
| 299 | |
Jan Engelhardt | d3c5ee6 | 2007-12-04 23:24:03 -0800 | [diff] [blame] | 300 | static void |
| 301 | conntrack_mt_destroy(const struct xt_match *match, void *matchinfo) |
Pablo Neira Ayuso | b9f78f9 | 2006-03-22 13:56:08 -0800 | [diff] [blame] | 302 | { |
Pablo Neira Ayuso | b9f78f9 | 2006-03-22 13:56:08 -0800 | [diff] [blame] | 303 | nf_ct_l3proto_module_put(match->family); |
Pablo Neira Ayuso | b9f78f9 | 2006-03-22 13:56:08 -0800 | [diff] [blame] | 304 | } |
| 305 | |
Patrick McHardy | da0dd23 | 2007-05-10 14:17:58 -0700 | [diff] [blame] | 306 | #ifdef CONFIG_COMPAT |
| 307 | struct compat_xt_conntrack_info |
| 308 | { |
| 309 | compat_uint_t statemask; |
| 310 | compat_uint_t statusmask; |
| 311 | struct ip_conntrack_old_tuple tuple[IP_CT_DIR_MAX]; |
| 312 | struct in_addr sipmsk[IP_CT_DIR_MAX]; |
| 313 | struct in_addr dipmsk[IP_CT_DIR_MAX]; |
| 314 | compat_ulong_t expires_min; |
| 315 | compat_ulong_t expires_max; |
| 316 | u_int8_t flags; |
| 317 | u_int8_t invflags; |
| 318 | }; |
| 319 | |
Jan Engelhardt | 64eb12f | 2008-01-14 23:40:53 -0800 | [diff] [blame] | 320 | static void conntrack_mt_compat_from_user_v0(void *dst, void *src) |
Patrick McHardy | da0dd23 | 2007-05-10 14:17:58 -0700 | [diff] [blame] | 321 | { |
Jan Engelhardt | a47362a | 2007-07-07 22:16:55 -0700 | [diff] [blame] | 322 | const struct compat_xt_conntrack_info *cm = src; |
Patrick McHardy | da0dd23 | 2007-05-10 14:17:58 -0700 | [diff] [blame] | 323 | struct xt_conntrack_info m = { |
| 324 | .statemask = cm->statemask, |
| 325 | .statusmask = cm->statusmask, |
| 326 | .expires_min = cm->expires_min, |
| 327 | .expires_max = cm->expires_max, |
| 328 | .flags = cm->flags, |
| 329 | .invflags = cm->invflags, |
| 330 | }; |
| 331 | memcpy(m.tuple, cm->tuple, sizeof(m.tuple)); |
| 332 | memcpy(m.sipmsk, cm->sipmsk, sizeof(m.sipmsk)); |
| 333 | memcpy(m.dipmsk, cm->dipmsk, sizeof(m.dipmsk)); |
| 334 | memcpy(dst, &m, sizeof(m)); |
| 335 | } |
| 336 | |
Jan Engelhardt | 64eb12f | 2008-01-14 23:40:53 -0800 | [diff] [blame] | 337 | static int conntrack_mt_compat_to_user_v0(void __user *dst, void *src) |
Patrick McHardy | da0dd23 | 2007-05-10 14:17:58 -0700 | [diff] [blame] | 338 | { |
Jan Engelhardt | a47362a | 2007-07-07 22:16:55 -0700 | [diff] [blame] | 339 | const struct xt_conntrack_info *m = src; |
Patrick McHardy | da0dd23 | 2007-05-10 14:17:58 -0700 | [diff] [blame] | 340 | struct compat_xt_conntrack_info cm = { |
| 341 | .statemask = m->statemask, |
| 342 | .statusmask = m->statusmask, |
| 343 | .expires_min = m->expires_min, |
| 344 | .expires_max = m->expires_max, |
| 345 | .flags = m->flags, |
| 346 | .invflags = m->invflags, |
| 347 | }; |
| 348 | memcpy(cm.tuple, m->tuple, sizeof(cm.tuple)); |
| 349 | memcpy(cm.sipmsk, m->sipmsk, sizeof(cm.sipmsk)); |
| 350 | memcpy(cm.dipmsk, m->dipmsk, sizeof(cm.dipmsk)); |
| 351 | return copy_to_user(dst, &cm, sizeof(cm)) ? -EFAULT : 0; |
| 352 | } |
| 353 | #endif |
| 354 | |
Jan Engelhardt | 64eb12f | 2008-01-14 23:40:53 -0800 | [diff] [blame] | 355 | static struct xt_match conntrack_mt_reg[] __read_mostly = { |
| 356 | { |
| 357 | .name = "conntrack", |
| 358 | .revision = 0, |
| 359 | .family = AF_INET, |
| 360 | .match = conntrack_mt_v0, |
| 361 | .checkentry = conntrack_mt_check, |
| 362 | .destroy = conntrack_mt_destroy, |
| 363 | .matchsize = sizeof(struct xt_conntrack_info), |
| 364 | .me = THIS_MODULE, |
Patrick McHardy | da0dd23 | 2007-05-10 14:17:58 -0700 | [diff] [blame] | 365 | #ifdef CONFIG_COMPAT |
Jan Engelhardt | 64eb12f | 2008-01-14 23:40:53 -0800 | [diff] [blame] | 366 | .compatsize = sizeof(struct compat_xt_conntrack_info), |
| 367 | .compat_from_user = conntrack_mt_compat_from_user_v0, |
| 368 | .compat_to_user = conntrack_mt_compat_to_user_v0, |
Patrick McHardy | da0dd23 | 2007-05-10 14:17:58 -0700 | [diff] [blame] | 369 | #endif |
Jan Engelhardt | 64eb12f | 2008-01-14 23:40:53 -0800 | [diff] [blame] | 370 | }, |
| 371 | { |
| 372 | .name = "conntrack", |
| 373 | .revision = 1, |
| 374 | .family = AF_INET, |
| 375 | .matchsize = sizeof(struct xt_conntrack_mtinfo1), |
| 376 | .match = conntrack_mt, |
| 377 | .checkentry = conntrack_mt_check, |
| 378 | .destroy = conntrack_mt_destroy, |
| 379 | .me = THIS_MODULE, |
| 380 | }, |
| 381 | { |
| 382 | .name = "conntrack", |
| 383 | .revision = 1, |
| 384 | .family = AF_INET6, |
| 385 | .matchsize = sizeof(struct xt_conntrack_mtinfo1), |
| 386 | .match = conntrack_mt, |
| 387 | .checkentry = conntrack_mt_check, |
| 388 | .destroy = conntrack_mt_destroy, |
| 389 | .me = THIS_MODULE, |
| 390 | }, |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 391 | }; |
| 392 | |
Jan Engelhardt | d3c5ee6 | 2007-12-04 23:24:03 -0800 | [diff] [blame] | 393 | static int __init conntrack_mt_init(void) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 394 | { |
Jan Engelhardt | 64eb12f | 2008-01-14 23:40:53 -0800 | [diff] [blame] | 395 | return xt_register_matches(conntrack_mt_reg, |
| 396 | ARRAY_SIZE(conntrack_mt_reg)); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 397 | } |
| 398 | |
Jan Engelhardt | d3c5ee6 | 2007-12-04 23:24:03 -0800 | [diff] [blame] | 399 | static void __exit conntrack_mt_exit(void) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 400 | { |
Jan Engelhardt | 64eb12f | 2008-01-14 23:40:53 -0800 | [diff] [blame] | 401 | xt_unregister_matches(conntrack_mt_reg, ARRAY_SIZE(conntrack_mt_reg)); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 402 | } |
| 403 | |
Jan Engelhardt | d3c5ee6 | 2007-12-04 23:24:03 -0800 | [diff] [blame] | 404 | module_init(conntrack_mt_init); |
| 405 | module_exit(conntrack_mt_exit); |