| /* Copyright (C) 2000-2002 Joakim Axelsson <gozem@linux.nu> |
| * Patrick Schaaf <bof@bof.de> |
| * Martin Josefsson <gandalf@wlug.westbo.se> |
| * Copyright (C) 2003-2010 Jozsef Kadlecsik <kadlec@blackhole.kfki.hu> |
| * |
| * This program is free software; you can redistribute it and/or modify |
| * it under the terms of the GNU General Public License version 2 as |
| * published by the Free Software Foundation. |
| */ |
| |
| /* Shared library add-on to iptables to add IP set mangling target. */ |
| #include <stdbool.h> |
| #include <stdio.h> |
| #include <netdb.h> |
| #include <string.h> |
| #include <stdlib.h> |
| #include <getopt.h> |
| #include <ctype.h> |
| |
| #include <xtables.h> |
| #include <linux/netfilter/xt_set.h> |
| #include "libxt_set.h" |
| |
| /* Revision 0 */ |
| |
| static void |
| set_target_help_v0(void) |
| { |
| printf("SET target options:\n" |
| " --add-set name flags\n" |
| " --del-set name flags\n" |
| " add/del src/dst IP/port from/to named sets,\n" |
| " where flags are the comma separated list of\n" |
| " 'src' and 'dst' specifications.\n"); |
| } |
| |
| static const struct option set_target_opts_v0[] = { |
| {.name = "add-set", .has_arg = true, .val = '1'}, |
| {.name = "del-set", .has_arg = true, .val = '2'}, |
| XT_GETOPT_TABLEEND, |
| }; |
| |
| static void |
| set_target_check_v0(unsigned int flags) |
| { |
| if (!flags) |
| xtables_error(PARAMETER_PROBLEM, |
| "You must specify either `--add-set' or `--del-set'"); |
| } |
| |
| static void |
| set_target_init_v0(struct xt_entry_target *target) |
| { |
| struct xt_set_info_target_v0 *info = |
| (struct xt_set_info_target_v0 *) target->data; |
| |
| info->add_set.index = |
| info->del_set.index = IPSET_INVALID_ID; |
| |
| } |
| |
| static void |
| parse_target_v0(char **argv, int invert, unsigned int *flags, |
| struct xt_set_info_v0 *info, const char *what) |
| { |
| if (info->u.flags[0]) |
| xtables_error(PARAMETER_PROBLEM, |
| "--%s can be specified only once", what); |
| |
| if (!argv[optind] |
| || argv[optind][0] == '-' || argv[optind][0] == '!') |
| xtables_error(PARAMETER_PROBLEM, |
| "--%s requires two args.", what); |
| |
| if (strlen(optarg) > IPSET_MAXNAMELEN - 1) |
| xtables_error(PARAMETER_PROBLEM, |
| "setname `%s' too long, max %d characters.", |
| optarg, IPSET_MAXNAMELEN - 1); |
| |
| get_set_byname(optarg, (struct xt_set_info *)info); |
| parse_dirs_v0(argv[optind], info); |
| optind++; |
| |
| *flags = 1; |
| } |
| |
| static int |
| set_target_parse_v0(int c, char **argv, int invert, unsigned int *flags, |
| const void *entry, struct xt_entry_target **target) |
| { |
| struct xt_set_info_target_v0 *myinfo = |
| (struct xt_set_info_target_v0 *) (*target)->data; |
| |
| switch (c) { |
| case '1': /* --add-set <set> <flags> */ |
| parse_target_v0(argv, invert, flags, |
| &myinfo->add_set, "add-set"); |
| break; |
| case '2': /* --del-set <set>[:<flags>] <flags> */ |
| parse_target_v0(argv, invert, flags, |
| &myinfo->del_set, "del-set"); |
| break; |
| } |
| return 1; |
| } |
| |
| static void |
| print_target_v0(const char *prefix, const struct xt_set_info_v0 *info) |
| { |
| int i; |
| char setname[IPSET_MAXNAMELEN]; |
| |
| if (info->index == IPSET_INVALID_ID) |
| return; |
| get_set_byid(setname, info->index); |
| printf(" %s %s", prefix, setname); |
| for (i = 0; i < IPSET_DIM_MAX; i++) { |
| if (!info->u.flags[i]) |
| break; |
| printf("%s%s", |
| i == 0 ? " " : ",", |
| info->u.flags[i] & IPSET_SRC ? "src" : "dst"); |
| } |
| } |
| |
| static void |
| set_target_print_v0(const void *ip, const struct xt_entry_target *target, |
| int numeric) |
| { |
| const struct xt_set_info_target_v0 *info = (const void *)target->data; |
| |
| print_target_v0("add-set", &info->add_set); |
| print_target_v0("del-set", &info->del_set); |
| } |
| |
| static void |
| set_target_save_v0(const void *ip, const struct xt_entry_target *target) |
| { |
| const struct xt_set_info_target_v0 *info = (const void *)target->data; |
| |
| print_target_v0("--add-set", &info->add_set); |
| print_target_v0("--del-set", &info->del_set); |
| } |
| |
| /* Revision 1 */ |
| static void |
| set_target_init_v1(struct xt_entry_target *target) |
| { |
| struct xt_set_info_target_v1 *info = |
| (struct xt_set_info_target_v1 *) target->data; |
| |
| info->add_set.index = |
| info->del_set.index = IPSET_INVALID_ID; |
| |
| } |
| |
| #define SET_TARGET_ADD 0x1 |
| #define SET_TARGET_DEL 0x2 |
| #define SET_TARGET_EXIST 0x4 |
| #define SET_TARGET_TIMEOUT 0x8 |
| #define SET_TARGET_MAP 0x10 |
| #define SET_TARGET_MAP_MARK 0x20 |
| #define SET_TARGET_MAP_PRIO 0x40 |
| #define SET_TARGET_MAP_QUEUE 0x80 |
| |
| static void |
| parse_target(char **argv, int invert, struct xt_set_info *info, |
| const char *what) |
| { |
| if (info->dim) |
| xtables_error(PARAMETER_PROBLEM, |
| "--%s can be specified only once", what); |
| if (!argv[optind] |
| || argv[optind][0] == '-' || argv[optind][0] == '!') |
| xtables_error(PARAMETER_PROBLEM, |
| "--%s requires two args.", what); |
| |
| if (strlen(optarg) > IPSET_MAXNAMELEN - 1) |
| xtables_error(PARAMETER_PROBLEM, |
| "setname `%s' too long, max %d characters.", |
| optarg, IPSET_MAXNAMELEN - 1); |
| |
| get_set_byname(optarg, info); |
| parse_dirs(argv[optind], info); |
| optind++; |
| } |
| |
| static int |
| set_target_parse_v1(int c, char **argv, int invert, unsigned int *flags, |
| const void *entry, struct xt_entry_target **target) |
| { |
| struct xt_set_info_target_v1 *myinfo = |
| (struct xt_set_info_target_v1 *) (*target)->data; |
| |
| switch (c) { |
| case '1': /* --add-set <set> <flags> */ |
| parse_target(argv, invert, &myinfo->add_set, "add-set"); |
| *flags |= SET_TARGET_ADD; |
| break; |
| case '2': /* --del-set <set>[:<flags>] <flags> */ |
| parse_target(argv, invert, &myinfo->del_set, "del-set"); |
| *flags |= SET_TARGET_DEL; |
| break; |
| } |
| return 1; |
| } |
| |
| static void |
| print_target(const char *prefix, const struct xt_set_info *info) |
| { |
| int i; |
| char setname[IPSET_MAXNAMELEN]; |
| |
| if (info->index == IPSET_INVALID_ID) |
| return; |
| get_set_byid(setname, info->index); |
| printf(" %s %s", prefix, setname); |
| for (i = 1; i <= info->dim; i++) { |
| printf("%s%s", |
| i == 1 ? " " : ",", |
| info->flags & (1 << i) ? "src" : "dst"); |
| } |
| } |
| |
| static void |
| set_target_print_v1(const void *ip, const struct xt_entry_target *target, |
| int numeric) |
| { |
| const struct xt_set_info_target_v1 *info = (const void *)target->data; |
| |
| print_target("add-set", &info->add_set); |
| print_target("del-set", &info->del_set); |
| } |
| |
| static void |
| set_target_save_v1(const void *ip, const struct xt_entry_target *target) |
| { |
| const struct xt_set_info_target_v1 *info = (const void *)target->data; |
| |
| print_target("--add-set", &info->add_set); |
| print_target("--del-set", &info->del_set); |
| } |
| |
| /* Revision 2 */ |
| |
| static void |
| set_target_help_v2(void) |
| { |
| printf("SET target options:\n" |
| " --add-set name flags [--exist] [--timeout n]\n" |
| " --del-set name flags\n" |
| " add/del src/dst IP/port from/to named sets,\n" |
| " where flags are the comma separated list of\n" |
| " 'src' and 'dst' specifications.\n"); |
| } |
| |
| static const struct option set_target_opts_v2[] = { |
| {.name = "add-set", .has_arg = true, .val = '1'}, |
| {.name = "del-set", .has_arg = true, .val = '2'}, |
| {.name = "exist", .has_arg = false, .val = '3'}, |
| {.name = "timeout", .has_arg = true, .val = '4'}, |
| XT_GETOPT_TABLEEND, |
| }; |
| |
| static void |
| set_target_check_v2(unsigned int flags) |
| { |
| if (!(flags & (SET_TARGET_ADD|SET_TARGET_DEL))) |
| xtables_error(PARAMETER_PROBLEM, |
| "You must specify either `--add-set' or `--del-set'"); |
| if (!(flags & SET_TARGET_ADD)) { |
| if (flags & SET_TARGET_EXIST) |
| xtables_error(PARAMETER_PROBLEM, |
| "Flag `--exist' can be used with `--add-set' only"); |
| if (flags & SET_TARGET_TIMEOUT) |
| xtables_error(PARAMETER_PROBLEM, |
| "Option `--timeout' can be used with `--add-set' only"); |
| } |
| } |
| |
| |
| static void |
| set_target_init_v2(struct xt_entry_target *target) |
| { |
| struct xt_set_info_target_v2 *info = |
| (struct xt_set_info_target_v2 *) target->data; |
| |
| info->add_set.index = |
| info->del_set.index = IPSET_INVALID_ID; |
| info->timeout = UINT32_MAX; |
| } |
| |
| static int |
| set_target_parse_v2(int c, char **argv, int invert, unsigned int *flags, |
| const void *entry, struct xt_entry_target **target) |
| { |
| struct xt_set_info_target_v2 *myinfo = |
| (struct xt_set_info_target_v2 *) (*target)->data; |
| unsigned int timeout; |
| |
| switch (c) { |
| case '1': /* --add-set <set> <flags> */ |
| parse_target(argv, invert, &myinfo->add_set, "add-set"); |
| *flags |= SET_TARGET_ADD; |
| break; |
| case '2': /* --del-set <set>[:<flags>] <flags> */ |
| parse_target(argv, invert, &myinfo->del_set, "del-set"); |
| *flags |= SET_TARGET_DEL; |
| break; |
| case '3': |
| myinfo->flags |= IPSET_FLAG_EXIST; |
| *flags |= SET_TARGET_EXIST; |
| break; |
| case '4': |
| if (!xtables_strtoui(optarg, NULL, &timeout, 0, UINT32_MAX - 1)) |
| xtables_error(PARAMETER_PROBLEM, |
| "Invalid value for option --timeout " |
| "or out of range 0-%u", UINT32_MAX - 1); |
| myinfo->timeout = timeout; |
| *flags |= SET_TARGET_TIMEOUT; |
| break; |
| } |
| return 1; |
| } |
| |
| static void |
| set_target_print_v2(const void *ip, const struct xt_entry_target *target, |
| int numeric) |
| { |
| const struct xt_set_info_target_v2 *info = (const void *)target->data; |
| |
| print_target("add-set", &info->add_set); |
| if (info->flags & IPSET_FLAG_EXIST) |
| printf(" exist"); |
| if (info->timeout != UINT32_MAX) |
| printf(" timeout %u", info->timeout); |
| print_target("del-set", &info->del_set); |
| } |
| |
| static void |
| set_target_save_v2(const void *ip, const struct xt_entry_target *target) |
| { |
| const struct xt_set_info_target_v2 *info = (const void *)target->data; |
| |
| print_target("--add-set", &info->add_set); |
| if (info->flags & IPSET_FLAG_EXIST) |
| printf(" --exist"); |
| if (info->timeout != UINT32_MAX) |
| printf(" --timeout %u", info->timeout); |
| print_target("--del-set", &info->del_set); |
| } |
| |
| |
| /* Revision 3 */ |
| |
| static void |
| set_target_help_v3(void) |
| { |
| printf("SET target options:\n" |
| " --add-set name flags [--exist] [--timeout n]\n" |
| " --del-set name flags\n" |
| " --map-set name flags" |
| " [--map-mark] [--map-prio] [--map-queue]\n" |
| " add/del src/dst IP/port from/to named sets,\n" |
| " where flags are the comma separated list of\n" |
| " 'src' and 'dst' specifications.\n"); |
| } |
| |
| static const struct option set_target_opts_v3[] = { |
| {.name = "add-set", .has_arg = true, .val = '1'}, |
| {.name = "del-set", .has_arg = true, .val = '2'}, |
| {.name = "exist", .has_arg = false, .val = '3'}, |
| {.name = "timeout", .has_arg = true, .val = '4'}, |
| {.name = "map-set", .has_arg = true, .val = '5'}, |
| {.name = "map-mark", .has_arg = false, .val = '6'}, |
| {.name = "map-prio", .has_arg = false, .val = '7'}, |
| {.name = "map-queue", .has_arg = false, .val = '8'}, |
| XT_GETOPT_TABLEEND, |
| }; |
| |
| static void |
| set_target_check_v3(unsigned int flags) |
| { |
| if (!(flags & (SET_TARGET_ADD|SET_TARGET_DEL|SET_TARGET_MAP))) |
| xtables_error(PARAMETER_PROBLEM, |
| "You must specify either `--add-set' or " |
| "`--del-set' or `--map-set'"); |
| if (!(flags & SET_TARGET_ADD)) { |
| if (flags & SET_TARGET_EXIST) |
| xtables_error(PARAMETER_PROBLEM, |
| "Flag `--exist' can be used with `--add-set' only"); |
| if (flags & SET_TARGET_TIMEOUT) |
| xtables_error(PARAMETER_PROBLEM, |
| "Option `--timeout' can be used with `--add-set' only"); |
| } |
| if (!(flags & SET_TARGET_MAP)) { |
| if (flags & SET_TARGET_MAP_MARK) |
| xtables_error(PARAMETER_PROBLEM, |
| "Flag `--map-mark' can be used with `--map-set' only"); |
| if (flags & SET_TARGET_MAP_PRIO) |
| xtables_error(PARAMETER_PROBLEM, |
| "Flag `--map-prio' can be used with `--map-set' only"); |
| if (flags & SET_TARGET_MAP_QUEUE) |
| xtables_error(PARAMETER_PROBLEM, |
| "Flag `--map-queue' can be used with `--map-set' only"); |
| } |
| if ((flags & SET_TARGET_MAP) && !(flags & (SET_TARGET_MAP_MARK | |
| SET_TARGET_MAP_PRIO | |
| SET_TARGET_MAP_QUEUE))) |
| xtables_error(PARAMETER_PROBLEM, |
| "You must specify flags `--map-mark' or " |
| "'--map-prio` or `--map-queue'"); |
| } |
| |
| static void |
| set_target_init_v3(struct xt_entry_target *target) |
| { |
| struct xt_set_info_target_v3 *info = |
| (struct xt_set_info_target_v3 *) target->data; |
| |
| info->add_set.index = |
| info->del_set.index = |
| info->map_set.index = IPSET_INVALID_ID; |
| info->timeout = UINT32_MAX; |
| } |
| |
| static int |
| set_target_parse_v3(int c, char **argv, int invert, unsigned int *flags, |
| const void *entry, struct xt_entry_target **target) |
| { |
| struct xt_set_info_target_v3 *myinfo = |
| (struct xt_set_info_target_v3 *) (*target)->data; |
| unsigned int timeout; |
| |
| switch (c) { |
| case '1': /* --add-set <set> <flags> */ |
| parse_target(argv, invert, &myinfo->add_set, "add-set"); |
| *flags |= SET_TARGET_ADD; |
| break; |
| case '2': /* --del-set <set>[:<flags>] <flags> */ |
| parse_target(argv, invert, &myinfo->del_set, "del-set"); |
| *flags |= SET_TARGET_DEL; |
| break; |
| case '3': |
| myinfo->flags |= IPSET_FLAG_EXIST; |
| *flags |= SET_TARGET_EXIST; |
| break; |
| case '4': |
| if (!xtables_strtoui(optarg, NULL, &timeout, 0, UINT32_MAX - 1)) |
| xtables_error(PARAMETER_PROBLEM, |
| "Invalid value for option --timeout " |
| "or out of range 0-%u", UINT32_MAX - 1); |
| myinfo->timeout = timeout; |
| *flags |= SET_TARGET_TIMEOUT; |
| break; |
| case '5': /* --map-set <set> <flags> */ |
| parse_target(argv, invert, &myinfo->map_set, "map-set"); |
| *flags |= SET_TARGET_MAP; |
| break; |
| case '6': |
| myinfo->flags |= IPSET_FLAG_MAP_SKBMARK; |
| *flags |= SET_TARGET_MAP_MARK; |
| break; |
| case '7': |
| myinfo->flags |= IPSET_FLAG_MAP_SKBPRIO; |
| *flags |= SET_TARGET_MAP_PRIO; |
| break; |
| case '8': |
| myinfo->flags |= IPSET_FLAG_MAP_SKBQUEUE; |
| *flags |= SET_TARGET_MAP_QUEUE; |
| break; |
| } |
| return 1; |
| } |
| |
| static void |
| set_target_print_v3(const void *ip, const struct xt_entry_target *target, |
| int numeric) |
| { |
| const struct xt_set_info_target_v3 *info = (const void *)target->data; |
| |
| print_target("add-set", &info->add_set); |
| if (info->flags & IPSET_FLAG_EXIST) |
| printf(" exist"); |
| if (info->timeout != UINT32_MAX) |
| printf(" timeout %u", info->timeout); |
| print_target("del-set", &info->del_set); |
| print_target("map-set", &info->map_set); |
| if (info->flags & IPSET_FLAG_MAP_SKBMARK) |
| printf(" map-mark"); |
| if (info->flags & IPSET_FLAG_MAP_SKBPRIO) |
| printf(" map-prio"); |
| if (info->flags & IPSET_FLAG_MAP_SKBQUEUE) |
| printf(" map-queue"); |
| } |
| |
| static void |
| set_target_save_v3(const void *ip, const struct xt_entry_target *target) |
| { |
| const struct xt_set_info_target_v3 *info = (const void *)target->data; |
| |
| print_target("--add-set", &info->add_set); |
| if (info->flags & IPSET_FLAG_EXIST) |
| printf(" --exist"); |
| if (info->timeout != UINT32_MAX) |
| printf(" --timeout %u", info->timeout); |
| print_target("--del-set", &info->del_set); |
| print_target("--map-set", &info->map_set); |
| if (info->flags & IPSET_FLAG_MAP_SKBMARK) |
| printf(" --map-mark"); |
| if (info->flags & IPSET_FLAG_MAP_SKBPRIO) |
| printf(" --map-prio"); |
| if (info->flags & IPSET_FLAG_MAP_SKBQUEUE) |
| printf(" --map-queue"); |
| } |
| |
| static struct xtables_target set_tg_reg[] = { |
| { |
| .name = "SET", |
| .revision = 0, |
| .version = XTABLES_VERSION, |
| .family = NFPROTO_IPV4, |
| .size = XT_ALIGN(sizeof(struct xt_set_info_target_v0)), |
| .userspacesize = XT_ALIGN(sizeof(struct xt_set_info_target_v0)), |
| .help = set_target_help_v0, |
| .init = set_target_init_v0, |
| .parse = set_target_parse_v0, |
| .final_check = set_target_check_v0, |
| .print = set_target_print_v0, |
| .save = set_target_save_v0, |
| .extra_opts = set_target_opts_v0, |
| }, |
| { |
| .name = "SET", |
| .revision = 1, |
| .version = XTABLES_VERSION, |
| .family = NFPROTO_UNSPEC, |
| .size = XT_ALIGN(sizeof(struct xt_set_info_target_v1)), |
| .userspacesize = XT_ALIGN(sizeof(struct xt_set_info_target_v1)), |
| .help = set_target_help_v0, |
| .init = set_target_init_v1, |
| .parse = set_target_parse_v1, |
| .final_check = set_target_check_v0, |
| .print = set_target_print_v1, |
| .save = set_target_save_v1, |
| .extra_opts = set_target_opts_v0, |
| }, |
| { |
| .name = "SET", |
| .revision = 2, |
| .version = XTABLES_VERSION, |
| .family = NFPROTO_UNSPEC, |
| .size = XT_ALIGN(sizeof(struct xt_set_info_target_v2)), |
| .userspacesize = XT_ALIGN(sizeof(struct xt_set_info_target_v2)), |
| .help = set_target_help_v2, |
| .init = set_target_init_v2, |
| .parse = set_target_parse_v2, |
| .final_check = set_target_check_v2, |
| .print = set_target_print_v2, |
| .save = set_target_save_v2, |
| .extra_opts = set_target_opts_v2, |
| }, |
| { |
| .name = "SET", |
| .revision = 3, |
| .version = XTABLES_VERSION, |
| .family = NFPROTO_UNSPEC, |
| .size = XT_ALIGN(sizeof(struct xt_set_info_target_v3)), |
| .userspacesize = XT_ALIGN(sizeof(struct xt_set_info_target_v3)), |
| .help = set_target_help_v3, |
| .init = set_target_init_v3, |
| .parse = set_target_parse_v3, |
| .final_check = set_target_check_v3, |
| .print = set_target_print_v3, |
| .save = set_target_save_v3, |
| .extra_opts = set_target_opts_v3, |
| }, |
| }; |
| |
| void _init(void) |
| { |
| xtables_register_targets(set_tg_reg, ARRAY_SIZE(set_tg_reg)); |
| } |