5 * Bart De Schuymer <bdschuym@pandora.be>
7 * ebtables.c,v 2.0, July, 2002
9 * This code is stongly inspired on the iptables code which is
10 * Copyright (C) 1999 Paul `Rusty' Russell & Michael J. Neuling
12 * This program is free software; you can redistribute it and/or
13 * modify it under the terms of the GNU General Public License
14 * as published by the Free Software Foundation; either version
15 * 2 of the License, or (at your option) any later version.
18 /* used for print_string */
19 #include <linux/sched.h>
20 #include <linux/tty.h>
22 #include <linux/kmod.h>
23 #include <linux/module.h>
24 #include <linux/vmalloc.h>
25 #include <linux/netfilter_bridge/ebtables.h>
26 #include <linux/spinlock.h>
27 #include <linux/mutex.h>
28 #include <asm/uaccess.h>
29 #include <linux/smp.h>
30 #include <linux/cpumask.h>
32 /* needed for logical [in,out]-dev filtering */
33 #include "../br_private.h"
35 #define BUGPRINT(format, args...) printk("kernel msg: ebtables bug: please "\
36 "report to author: "format, ## args)
37 /* #define BUGPRINT(format, args...) */
38 #define MEMPRINT(format, args...) printk("kernel msg: ebtables "\
39 ": out of memory: "format, ## args)
40 /* #define MEMPRINT(format, args...) */
45 * Each cpu has its own set of counters, so there is no need for write_lock in
47 * For reading or updating the counters, the user context needs to
51 /* The size of each set of counters is altered to get cache alignment */
52 #define SMP_ALIGN(x) (((x) + SMP_CACHE_BYTES-1) & ~(SMP_CACHE_BYTES-1))
53 #define COUNTER_OFFSET(n) (SMP_ALIGN(n * sizeof(struct ebt_counter)))
54 #define COUNTER_BASE(c, n, cpu) ((struct ebt_counter *)(((char *)c) + \
55 COUNTER_OFFSET(n) * cpu))
59 static DEFINE_MUTEX(ebt_mutex);
60 static LIST_HEAD(ebt_tables);
61 static LIST_HEAD(ebt_targets);
62 static LIST_HEAD(ebt_matches);
63 static LIST_HEAD(ebt_watchers);
65 static struct ebt_target ebt_standard_target =
66 { {NULL, NULL}, EBT_STANDARD_TARGET, NULL, NULL, NULL, NULL};
68 static inline int ebt_do_watcher (struct ebt_entry_watcher *w,
69 const struct sk_buff *skb, unsigned int hooknr, const struct net_device *in,
70 const struct net_device *out)
72 w->u.watcher->watcher(skb, hooknr, in, out, w->data,
74 /* watchers don't give a verdict */
78 static inline int ebt_do_match (struct ebt_entry_match *m,
79 const struct sk_buff *skb, const struct net_device *in,
80 const struct net_device *out)
82 return m->u.match->match(skb, in, out, m->data,
86 static inline int ebt_dev_check(char *entry, const struct net_device *device)
89 const char *devname = device->name;
95 /* 1 is the wildcard token */
96 while (entry[i] != '\0' && entry[i] != 1 && entry[i] == devname[i])
98 return (devname[i] != entry[i] && entry[i] != 1);
101 #define FWINV2(bool,invflg) ((bool) ^ !!(e->invflags & invflg))
102 /* process standard matches */
103 static inline int ebt_basic_match(struct ebt_entry *e, struct ethhdr *h,
104 const struct net_device *in, const struct net_device *out)
108 if (e->bitmask & EBT_802_3) {
109 if (FWINV2(ntohs(h->h_proto) >= 1536, EBT_IPROTO))
111 } else if (!(e->bitmask & EBT_NOPROTO) &&
112 FWINV2(e->ethproto != h->h_proto, EBT_IPROTO))
115 if (FWINV2(ebt_dev_check(e->in, in), EBT_IIN))
117 if (FWINV2(ebt_dev_check(e->out, out), EBT_IOUT))
119 if ((!in || !in->br_port) ? 0 : FWINV2(ebt_dev_check(
120 e->logical_in, in->br_port->br->dev), EBT_ILOGICALIN))
122 if ((!out || !out->br_port) ? 0 : FWINV2(ebt_dev_check(
123 e->logical_out, out->br_port->br->dev), EBT_ILOGICALOUT))
126 if (e->bitmask & EBT_SOURCEMAC) {
128 for (i = 0; i < 6; i++)
129 verdict |= (h->h_source[i] ^ e->sourcemac[i]) &
131 if (FWINV2(verdict != 0, EBT_ISOURCE) )
134 if (e->bitmask & EBT_DESTMAC) {
136 for (i = 0; i < 6; i++)
137 verdict |= (h->h_dest[i] ^ e->destmac[i]) &
139 if (FWINV2(verdict != 0, EBT_IDEST) )
145 /* Do some firewalling */
146 unsigned int ebt_do_table (unsigned int hook, struct sk_buff **pskb,
147 const struct net_device *in, const struct net_device *out,
148 struct ebt_table *table)
151 struct ebt_entry *point;
152 struct ebt_counter *counter_base, *cb_base;
153 struct ebt_entry_target *t;
155 struct ebt_chainstack *cs;
156 struct ebt_entries *chaininfo;
158 struct ebt_table_info *private;
160 read_lock_bh(&table->lock);
161 private = table->private;
162 cb_base = COUNTER_BASE(private->counters, private->nentries,
164 if (private->chainstack)
165 cs = private->chainstack[smp_processor_id()];
168 chaininfo = private->hook_entry[hook];
169 nentries = private->hook_entry[hook]->nentries;
170 point = (struct ebt_entry *)(private->hook_entry[hook]->data);
171 counter_base = cb_base + private->hook_entry[hook]->counter_offset;
172 /* base for chain jumps */
173 base = private->entries;
175 while (i < nentries) {
176 if (ebt_basic_match(point, eth_hdr(*pskb), in, out))
179 if (EBT_MATCH_ITERATE(point, ebt_do_match, *pskb, in, out) != 0)
182 /* increase counter */
183 (*(counter_base + i)).pcnt++;
184 (*(counter_base + i)).bcnt+=(**pskb).len;
186 /* these should only watch: not modify, nor tell us
187 what to do with the packet */
188 EBT_WATCHER_ITERATE(point, ebt_do_watcher, *pskb, hook, in,
191 t = (struct ebt_entry_target *)
192 (((char *)point) + point->target_offset);
193 /* standard target */
194 if (!t->u.target->target)
195 verdict = ((struct ebt_standard_target *)t)->verdict;
197 verdict = t->u.target->target(pskb, hook,
198 in, out, t->data, t->target_size);
199 if (verdict == EBT_ACCEPT) {
200 read_unlock_bh(&table->lock);
203 if (verdict == EBT_DROP) {
204 read_unlock_bh(&table->lock);
207 if (verdict == EBT_RETURN) {
209 #ifdef CONFIG_NETFILTER_DEBUG
211 BUGPRINT("RETURN on base chain");
212 /* act like this is EBT_CONTINUE */
217 /* put all the local variables right */
219 chaininfo = cs[sp].chaininfo;
220 nentries = chaininfo->nentries;
222 counter_base = cb_base +
223 chaininfo->counter_offset;
226 if (verdict == EBT_CONTINUE)
228 #ifdef CONFIG_NETFILTER_DEBUG
230 BUGPRINT("bogus standard verdict\n");
231 read_unlock_bh(&table->lock);
237 cs[sp].chaininfo = chaininfo;
238 cs[sp].e = (struct ebt_entry *)
239 (((char *)point) + point->next_offset);
241 chaininfo = (struct ebt_entries *) (base + verdict);
242 #ifdef CONFIG_NETFILTER_DEBUG
243 if (chaininfo->distinguisher) {
244 BUGPRINT("jump to non-chain\n");
245 read_unlock_bh(&table->lock);
249 nentries = chaininfo->nentries;
250 point = (struct ebt_entry *)chaininfo->data;
251 counter_base = cb_base + chaininfo->counter_offset;
255 point = (struct ebt_entry *)
256 (((char *)point) + point->next_offset);
260 /* I actually like this :) */
261 if (chaininfo->policy == EBT_RETURN)
263 if (chaininfo->policy == EBT_ACCEPT) {
264 read_unlock_bh(&table->lock);
267 read_unlock_bh(&table->lock);
271 /* If it succeeds, returns element and locks mutex */
273 find_inlist_lock_noload(struct list_head *head, const char *name, int *error,
277 struct list_head list;
278 char name[EBT_FUNCTION_MAXNAMELEN];
281 *error = mutex_lock_interruptible(mutex);
285 list_for_each_entry(e, head, list) {
286 if (strcmp(e->name, name) == 0)
295 #define find_inlist_lock(h,n,p,e,m) find_inlist_lock_noload((h),(n),(e),(m))
298 find_inlist_lock(struct list_head *head, const char *name, const char *prefix,
299 int *error, struct mutex *mutex)
303 ret = find_inlist_lock_noload(head, name, error, mutex);
305 request_module("%s%s", prefix, name);
306 ret = find_inlist_lock_noload(head, name, error, mutex);
312 static inline struct ebt_table *
313 find_table_lock(const char *name, int *error, struct mutex *mutex)
315 return find_inlist_lock(&ebt_tables, name, "ebtable_", error, mutex);
318 static inline struct ebt_match *
319 find_match_lock(const char *name, int *error, struct mutex *mutex)
321 return find_inlist_lock(&ebt_matches, name, "ebt_", error, mutex);
324 static inline struct ebt_watcher *
325 find_watcher_lock(const char *name, int *error, struct mutex *mutex)
327 return find_inlist_lock(&ebt_watchers, name, "ebt_", error, mutex);
330 static inline struct ebt_target *
331 find_target_lock(const char *name, int *error, struct mutex *mutex)
333 return find_inlist_lock(&ebt_targets, name, "ebt_", error, mutex);
337 ebt_check_match(struct ebt_entry_match *m, struct ebt_entry *e,
338 const char *name, unsigned int hookmask, unsigned int *cnt)
340 struct ebt_match *match;
341 size_t left = ((char *)e + e->watchers_offset) - (char *)m;
344 if (left < sizeof(struct ebt_entry_match) ||
345 left - sizeof(struct ebt_entry_match) < m->match_size)
347 match = find_match_lock(m->u.name, &ret, &ebt_mutex);
351 if (!try_module_get(match->me)) {
352 mutex_unlock(&ebt_mutex);
355 mutex_unlock(&ebt_mutex);
357 match->check(name, hookmask, e, m->data, m->match_size) != 0) {
358 BUGPRINT("match->check failed\n");
359 module_put(match->me);
367 ebt_check_watcher(struct ebt_entry_watcher *w, struct ebt_entry *e,
368 const char *name, unsigned int hookmask, unsigned int *cnt)
370 struct ebt_watcher *watcher;
371 size_t left = ((char *)e + e->target_offset) - (char *)w;
374 if (left < sizeof(struct ebt_entry_watcher) ||
375 left - sizeof(struct ebt_entry_watcher) < w->watcher_size)
377 watcher = find_watcher_lock(w->u.name, &ret, &ebt_mutex);
380 w->u.watcher = watcher;
381 if (!try_module_get(watcher->me)) {
382 mutex_unlock(&ebt_mutex);
385 mutex_unlock(&ebt_mutex);
386 if (watcher->check &&
387 watcher->check(name, hookmask, e, w->data, w->watcher_size) != 0) {
388 BUGPRINT("watcher->check failed\n");
389 module_put(watcher->me);
396 static int ebt_verify_pointers(struct ebt_replace *repl,
397 struct ebt_table_info *newinfo)
399 unsigned int limit = repl->entries_size;
400 unsigned int valid_hooks = repl->valid_hooks;
401 unsigned int offset = 0;
404 for (i = 0; i < NF_BR_NUMHOOKS; i++)
405 newinfo->hook_entry[i] = NULL;
407 newinfo->entries_size = repl->entries_size;
408 newinfo->nentries = repl->nentries;
410 while (offset < limit) {
411 size_t left = limit - offset;
412 struct ebt_entry *e = (void *)newinfo->entries + offset;
414 if (left < sizeof(unsigned int))
417 for (i = 0; i < NF_BR_NUMHOOKS; i++) {
418 if ((valid_hooks & (1 << i)) == 0)
420 if ((char *)repl->hook_entry[i] == repl->entries + offset)
424 if (i != NF_BR_NUMHOOKS || !(e->bitmask & EBT_ENTRY_OR_ENTRIES)) {
425 if (e->bitmask != 0) {
426 /* we make userspace set this right,
427 so there is no misunderstanding */
428 BUGPRINT("EBT_ENTRY_OR_ENTRIES shouldn't be set "
429 "in distinguisher\n");
432 if (i != NF_BR_NUMHOOKS)
433 newinfo->hook_entry[i] = (struct ebt_entries *)e;
434 if (left < sizeof(struct ebt_entries))
436 offset += sizeof(struct ebt_entries);
438 if (left < sizeof(struct ebt_entry))
440 if (left < e->next_offset)
442 offset += e->next_offset;
445 if (offset != limit) {
446 BUGPRINT("entries_size too small\n");
450 /* check if all valid hooks have a chain */
451 for (i = 0; i < NF_BR_NUMHOOKS; i++) {
452 if (!newinfo->hook_entry[i] &&
453 (valid_hooks & (1 << i))) {
454 BUGPRINT("Valid hook without chain\n");
462 * this one is very careful, as it is the first function
463 * to parse the userspace data
466 ebt_check_entry_size_and_hooks(struct ebt_entry *e,
467 struct ebt_table_info *newinfo,
468 unsigned int *n, unsigned int *cnt,
469 unsigned int *totalcnt, unsigned int *udc_cnt)
473 for (i = 0; i < NF_BR_NUMHOOKS; i++) {
474 if ((void *)e == (void *)newinfo->hook_entry[i])
477 /* beginning of a new chain
478 if i == NF_BR_NUMHOOKS it must be a user defined chain */
479 if (i != NF_BR_NUMHOOKS || !e->bitmask) {
480 /* this checks if the previous chain has as many entries
483 BUGPRINT("nentries does not equal the nr of entries "
487 if (((struct ebt_entries *)e)->policy != EBT_DROP &&
488 ((struct ebt_entries *)e)->policy != EBT_ACCEPT) {
489 /* only RETURN from udc */
490 if (i != NF_BR_NUMHOOKS ||
491 ((struct ebt_entries *)e)->policy != EBT_RETURN) {
492 BUGPRINT("bad policy\n");
496 if (i == NF_BR_NUMHOOKS) /* it's a user defined chain */
498 if (((struct ebt_entries *)e)->counter_offset != *totalcnt) {
499 BUGPRINT("counter_offset != totalcnt");
502 *n = ((struct ebt_entries *)e)->nentries;
506 /* a plain old entry, heh */
507 if (sizeof(struct ebt_entry) > e->watchers_offset ||
508 e->watchers_offset > e->target_offset ||
509 e->target_offset >= e->next_offset) {
510 BUGPRINT("entry offsets not in right order\n");
513 /* this is not checked anywhere else */
514 if (e->next_offset - e->target_offset < sizeof(struct ebt_entry_target)) {
515 BUGPRINT("target size too small\n");
525 struct ebt_chainstack cs;
527 unsigned int hookmask;
531 * we need these positions to check that the jumps to a different part of the
532 * entries is a jump to the beginning of a new chain.
535 ebt_get_udc_positions(struct ebt_entry *e, struct ebt_table_info *newinfo,
536 unsigned int *n, struct ebt_cl_stack *udc)
540 /* we're only interested in chain starts */
543 for (i = 0; i < NF_BR_NUMHOOKS; i++) {
544 if (newinfo->hook_entry[i] == (struct ebt_entries *)e)
547 /* only care about udc */
548 if (i != NF_BR_NUMHOOKS)
551 udc[*n].cs.chaininfo = (struct ebt_entries *)e;
552 /* these initialisations are depended on later in check_chainloops() */
554 udc[*n].hookmask = 0;
561 ebt_cleanup_match(struct ebt_entry_match *m, unsigned int *i)
563 if (i && (*i)-- == 0)
565 if (m->u.match->destroy)
566 m->u.match->destroy(m->data, m->match_size);
567 module_put(m->u.match->me);
573 ebt_cleanup_watcher(struct ebt_entry_watcher *w, unsigned int *i)
575 if (i && (*i)-- == 0)
577 if (w->u.watcher->destroy)
578 w->u.watcher->destroy(w->data, w->watcher_size);
579 module_put(w->u.watcher->me);
585 ebt_cleanup_entry(struct ebt_entry *e, unsigned int *cnt)
587 struct ebt_entry_target *t;
592 if (cnt && (*cnt)-- == 0)
594 EBT_WATCHER_ITERATE(e, ebt_cleanup_watcher, NULL);
595 EBT_MATCH_ITERATE(e, ebt_cleanup_match, NULL);
596 t = (struct ebt_entry_target *)(((char *)e) + e->target_offset);
597 if (t->u.target->destroy)
598 t->u.target->destroy(t->data, t->target_size);
599 module_put(t->u.target->me);
605 ebt_check_entry(struct ebt_entry *e, struct ebt_table_info *newinfo,
606 const char *name, unsigned int *cnt, unsigned int valid_hooks,
607 struct ebt_cl_stack *cl_s, unsigned int udc_cnt)
609 struct ebt_entry_target *t;
610 struct ebt_target *target;
611 unsigned int i, j, hook = 0, hookmask = 0;
612 size_t gap = e->next_offset - e->target_offset;
615 /* don't mess with the struct ebt_entries */
619 if (e->bitmask & ~EBT_F_MASK) {
620 BUGPRINT("Unknown flag for bitmask\n");
623 if (e->invflags & ~EBT_INV_MASK) {
624 BUGPRINT("Unknown flag for inv bitmask\n");
627 if ( (e->bitmask & EBT_NOPROTO) && (e->bitmask & EBT_802_3) ) {
628 BUGPRINT("NOPROTO & 802_3 not allowed\n");
631 /* what hook do we belong to? */
632 for (i = 0; i < NF_BR_NUMHOOKS; i++) {
633 if ((valid_hooks & (1 << i)) == 0)
635 if ((char *)newinfo->hook_entry[i] < (char *)e)
640 /* (1 << NF_BR_NUMHOOKS) tells the check functions the rule is on
642 if (i < NF_BR_NUMHOOKS)
643 hookmask = (1 << hook) | (1 << NF_BR_NUMHOOKS);
645 for (i = 0; i < udc_cnt; i++)
646 if ((char *)(cl_s[i].cs.chaininfo) > (char *)e)
649 hookmask = (1 << hook) | (1 << NF_BR_NUMHOOKS);
651 hookmask = cl_s[i - 1].hookmask;
654 ret = EBT_MATCH_ITERATE(e, ebt_check_match, e, name, hookmask, &i);
656 goto cleanup_matches;
658 ret = EBT_WATCHER_ITERATE(e, ebt_check_watcher, e, name, hookmask, &j);
660 goto cleanup_watchers;
661 t = (struct ebt_entry_target *)(((char *)e) + e->target_offset);
662 target = find_target_lock(t->u.name, &ret, &ebt_mutex);
664 goto cleanup_watchers;
665 if (!try_module_get(target->me)) {
666 mutex_unlock(&ebt_mutex);
668 goto cleanup_watchers;
670 mutex_unlock(&ebt_mutex);
672 t->u.target = target;
673 if (t->u.target == &ebt_standard_target) {
674 if (gap < sizeof(struct ebt_standard_target)) {
675 BUGPRINT("Standard target size too big\n");
677 goto cleanup_watchers;
679 if (((struct ebt_standard_target *)t)->verdict <
680 -NUM_STANDARD_TARGETS) {
681 BUGPRINT("Invalid standard target\n");
683 goto cleanup_watchers;
685 } else if (t->target_size > gap - sizeof(struct ebt_entry_target) ||
686 (t->u.target->check &&
687 t->u.target->check(name, hookmask, e, t->data, t->target_size) != 0)){
688 module_put(t->u.target->me);
690 goto cleanup_watchers;
695 EBT_WATCHER_ITERATE(e, ebt_cleanup_watcher, &j);
697 EBT_MATCH_ITERATE(e, ebt_cleanup_match, &i);
702 * checks for loops and sets the hook mask for udc
703 * the hook mask for udc tells us from which base chains the udc can be
704 * accessed. This mask is a parameter to the check() functions of the extensions
706 static int check_chainloops(struct ebt_entries *chain, struct ebt_cl_stack *cl_s,
707 unsigned int udc_cnt, unsigned int hooknr, char *base)
709 int i, chain_nr = -1, pos = 0, nentries = chain->nentries, verdict;
710 struct ebt_entry *e = (struct ebt_entry *)chain->data;
711 struct ebt_entry_target *t;
713 while (pos < nentries || chain_nr != -1) {
714 /* end of udc, go back one 'recursion' step */
715 if (pos == nentries) {
716 /* put back values of the time when this chain was called */
717 e = cl_s[chain_nr].cs.e;
718 if (cl_s[chain_nr].from != -1)
720 cl_s[cl_s[chain_nr].from].cs.chaininfo->nentries;
722 nentries = chain->nentries;
723 pos = cl_s[chain_nr].cs.n;
724 /* make sure we won't see a loop that isn't one */
725 cl_s[chain_nr].cs.n = 0;
726 chain_nr = cl_s[chain_nr].from;
730 t = (struct ebt_entry_target *)
731 (((char *)e) + e->target_offset);
732 if (strcmp(t->u.name, EBT_STANDARD_TARGET))
734 if (e->target_offset + sizeof(struct ebt_standard_target) >
736 BUGPRINT("Standard target size too big\n");
739 verdict = ((struct ebt_standard_target *)t)->verdict;
740 if (verdict >= 0) { /* jump to another chain */
741 struct ebt_entries *hlp2 =
742 (struct ebt_entries *)(base + verdict);
743 for (i = 0; i < udc_cnt; i++)
744 if (hlp2 == cl_s[i].cs.chaininfo)
746 /* bad destination or loop */
748 BUGPRINT("bad destination\n");
755 if (cl_s[i].hookmask & (1 << hooknr))
757 /* this can't be 0, so the loop test is correct */
758 cl_s[i].cs.n = pos + 1;
760 cl_s[i].cs.e = ((void *)e + e->next_offset);
761 e = (struct ebt_entry *)(hlp2->data);
762 nentries = hlp2->nentries;
763 cl_s[i].from = chain_nr;
765 /* this udc is accessible from the base chain for hooknr */
766 cl_s[i].hookmask |= (1 << hooknr);
770 e = (void *)e + e->next_offset;
776 /* do the parsing of the table/chains/entries/matches/watchers/targets, heh */
777 static int translate_table(struct ebt_replace *repl,
778 struct ebt_table_info *newinfo)
780 unsigned int i, j, k, udc_cnt;
782 struct ebt_cl_stack *cl_s = NULL; /* used in the checking for chain loops */
784 ret = ebt_verify_pointers(repl, newinfo);
789 while (i < NF_BR_NUMHOOKS && !newinfo->hook_entry[i])
791 if (i == NF_BR_NUMHOOKS) {
792 BUGPRINT("No valid hooks specified\n");
795 if (newinfo->hook_entry[i] != (struct ebt_entries *)newinfo->entries) {
796 BUGPRINT("Chains don't start at beginning\n");
799 /* make sure chains are ordered after each other in same order
800 as their corresponding hooks */
801 for (j = i + 1; j < NF_BR_NUMHOOKS; j++) {
802 if (!newinfo->hook_entry[j])
804 if (newinfo->hook_entry[j] <= newinfo->hook_entry[i]) {
805 BUGPRINT("Hook order must be followed\n");
811 /* do some early checkings and initialize some things */
812 i = 0; /* holds the expected nr. of entries for the chain */
813 j = 0; /* holds the up to now counted entries for the chain */
814 k = 0; /* holds the total nr. of entries, should equal
815 newinfo->nentries afterwards */
816 udc_cnt = 0; /* will hold the nr. of user defined chains (udc) */
817 ret = EBT_ENTRY_ITERATE(newinfo->entries, newinfo->entries_size,
818 ebt_check_entry_size_and_hooks, newinfo,
819 &i, &j, &k, &udc_cnt);
825 BUGPRINT("nentries does not equal the nr of entries in the "
829 if (k != newinfo->nentries) {
830 BUGPRINT("Total nentries is wrong\n");
834 /* get the location of the udc, put them in an array
835 while we're at it, allocate the chainstack */
837 /* this will get free'd in do_replace()/ebt_register_table()
838 if an error occurs */
839 newinfo->chainstack =
840 vmalloc((highest_possible_processor_id()+1)
841 * sizeof(*(newinfo->chainstack)));
842 if (!newinfo->chainstack)
844 for_each_possible_cpu(i) {
845 newinfo->chainstack[i] =
846 vmalloc(udc_cnt * sizeof(*(newinfo->chainstack[0])));
847 if (!newinfo->chainstack[i]) {
849 vfree(newinfo->chainstack[--i]);
850 vfree(newinfo->chainstack);
851 newinfo->chainstack = NULL;
856 cl_s = vmalloc(udc_cnt * sizeof(*cl_s));
859 i = 0; /* the i'th udc */
860 EBT_ENTRY_ITERATE(newinfo->entries, newinfo->entries_size,
861 ebt_get_udc_positions, newinfo, &i, cl_s);
864 BUGPRINT("i != udc_cnt\n");
870 /* Check for loops */
871 for (i = 0; i < NF_BR_NUMHOOKS; i++)
872 if (newinfo->hook_entry[i])
873 if (check_chainloops(newinfo->hook_entry[i],
874 cl_s, udc_cnt, i, newinfo->entries)) {
879 /* we now know the following (along with E=mc²):
880 - the nr of entries in each chain is right
881 - the size of the allocated space is right
882 - all valid hooks have a corresponding chain
884 - wrong data can still be on the level of a single entry
885 - could be there are jumps to places that are not the
886 beginning of a chain. This can only occur in chains that
887 are not accessible from any base chains, so we don't care. */
889 /* used to know what we need to clean up if something goes wrong */
891 ret = EBT_ENTRY_ITERATE(newinfo->entries, newinfo->entries_size,
892 ebt_check_entry, newinfo, repl->name, &i, repl->valid_hooks,
895 EBT_ENTRY_ITERATE(newinfo->entries, newinfo->entries_size,
896 ebt_cleanup_entry, &i);
902 /* called under write_lock */
903 static void get_counters(struct ebt_counter *oldcounters,
904 struct ebt_counter *counters, unsigned int nentries)
907 struct ebt_counter *counter_base;
909 /* counters of cpu 0 */
910 memcpy(counters, oldcounters,
911 sizeof(struct ebt_counter) * nentries);
913 /* add other counters to those of cpu 0 */
914 for_each_possible_cpu(cpu) {
917 counter_base = COUNTER_BASE(oldcounters, nentries, cpu);
918 for (i = 0; i < nentries; i++) {
919 counters[i].pcnt += counter_base[i].pcnt;
920 counters[i].bcnt += counter_base[i].bcnt;
925 /* replace the table */
926 static int do_replace(void __user *user, unsigned int len)
928 int ret, i, countersize;
929 struct ebt_table_info *newinfo;
930 struct ebt_replace tmp;
932 struct ebt_counter *counterstmp = NULL;
933 /* used to be able to unlock earlier */
934 struct ebt_table_info *table;
936 if (copy_from_user(&tmp, user, sizeof(tmp)) != 0)
939 if (len != sizeof(tmp) + tmp.entries_size) {
940 BUGPRINT("Wrong len argument\n");
944 if (tmp.entries_size == 0) {
945 BUGPRINT("Entries_size never zero\n");
949 if (tmp.nentries >= ((INT_MAX - sizeof(struct ebt_table_info)) / NR_CPUS -
950 SMP_CACHE_BYTES) / sizeof(struct ebt_counter))
952 if (tmp.num_counters >= INT_MAX / sizeof(struct ebt_counter))
955 countersize = COUNTER_OFFSET(tmp.nentries) *
956 (highest_possible_processor_id()+1);
957 newinfo = vmalloc(sizeof(*newinfo) + countersize);
962 memset(newinfo->counters, 0, countersize);
964 newinfo->entries = vmalloc(tmp.entries_size);
965 if (!newinfo->entries) {
970 newinfo->entries, tmp.entries, tmp.entries_size) != 0) {
971 BUGPRINT("Couldn't copy entries from userspace\n");
976 /* the user wants counters back
977 the check on the size is done later, when we have the lock */
978 if (tmp.num_counters) {
979 counterstmp = vmalloc(tmp.num_counters * sizeof(*counterstmp));
988 /* this can get initialized by translate_table() */
989 newinfo->chainstack = NULL;
990 ret = translate_table(&tmp, newinfo);
993 goto free_counterstmp;
995 t = find_table_lock(tmp.name, &ret, &ebt_mutex);
1001 /* the table doesn't like it */
1002 if (t->check && (ret = t->check(newinfo, tmp.valid_hooks)))
1005 if (tmp.num_counters && tmp.num_counters != t->private->nentries) {
1006 BUGPRINT("Wrong nr. of counters requested\n");
1011 /* we have the mutex lock, so no danger in reading this pointer */
1013 /* make sure the table can only be rmmod'ed if it contains no rules */
1014 if (!table->nentries && newinfo->nentries && !try_module_get(t->me)) {
1017 } else if (table->nentries && !newinfo->nentries)
1019 /* we need an atomic snapshot of the counters */
1020 write_lock_bh(&t->lock);
1021 if (tmp.num_counters)
1022 get_counters(t->private->counters, counterstmp,
1023 t->private->nentries);
1025 t->private = newinfo;
1026 write_unlock_bh(&t->lock);
1027 mutex_unlock(&ebt_mutex);
1028 /* so, a user can change the chains while having messed up her counter
1029 allocation. Only reason why this is done is because this way the lock
1030 is held only once, while this doesn't bring the kernel into a
1032 if (tmp.num_counters &&
1033 copy_to_user(tmp.counters, counterstmp,
1034 tmp.num_counters * sizeof(struct ebt_counter))) {
1035 BUGPRINT("Couldn't copy counters to userspace\n");
1041 /* decrease module count and free resources */
1042 EBT_ENTRY_ITERATE(table->entries, table->entries_size,
1043 ebt_cleanup_entry, NULL);
1045 vfree(table->entries);
1046 if (table->chainstack) {
1047 for_each_possible_cpu(i)
1048 vfree(table->chainstack[i]);
1049 vfree(table->chainstack);
1057 mutex_unlock(&ebt_mutex);
1059 EBT_ENTRY_ITERATE(newinfo->entries, newinfo->entries_size,
1060 ebt_cleanup_entry, NULL);
1063 /* can be initialized in translate_table() */
1064 if (newinfo->chainstack) {
1065 for_each_possible_cpu(i)
1066 vfree(newinfo->chainstack[i]);
1067 vfree(newinfo->chainstack);
1070 vfree(newinfo->entries);
1076 int ebt_register_target(struct ebt_target *target)
1078 struct ebt_target *t;
1081 ret = mutex_lock_interruptible(&ebt_mutex);
1084 list_for_each_entry(t, &ebt_targets, list) {
1085 if (strcmp(t->name, target->name) == 0) {
1086 mutex_unlock(&ebt_mutex);
1090 list_add(&target->list, &ebt_targets);
1091 mutex_unlock(&ebt_mutex);
1096 void ebt_unregister_target(struct ebt_target *target)
1098 mutex_lock(&ebt_mutex);
1099 list_del(&target->list);
1100 mutex_unlock(&ebt_mutex);
1103 int ebt_register_match(struct ebt_match *match)
1105 struct ebt_match *m;
1108 ret = mutex_lock_interruptible(&ebt_mutex);
1111 list_for_each_entry(m, &ebt_matches, list) {
1112 if (strcmp(m->name, match->name) == 0) {
1113 mutex_unlock(&ebt_mutex);
1117 list_add(&match->list, &ebt_matches);
1118 mutex_unlock(&ebt_mutex);
1123 void ebt_unregister_match(struct ebt_match *match)
1125 mutex_lock(&ebt_mutex);
1126 list_del(&match->list);
1127 mutex_unlock(&ebt_mutex);
1130 int ebt_register_watcher(struct ebt_watcher *watcher)
1132 struct ebt_watcher *w;
1135 ret = mutex_lock_interruptible(&ebt_mutex);
1138 list_for_each_entry(w, &ebt_watchers, list) {
1139 if (strcmp(w->name, watcher->name) == 0) {
1140 mutex_unlock(&ebt_mutex);
1144 list_add(&watcher->list, &ebt_watchers);
1145 mutex_unlock(&ebt_mutex);
1150 void ebt_unregister_watcher(struct ebt_watcher *watcher)
1152 mutex_lock(&ebt_mutex);
1153 list_del(&watcher->list);
1154 mutex_unlock(&ebt_mutex);
1157 int ebt_register_table(struct ebt_table *table)
1159 struct ebt_table_info *newinfo;
1160 struct ebt_table *t;
1161 int ret, i, countersize;
1163 if (!table || !table->table ||!table->table->entries ||
1164 table->table->entries_size == 0 ||
1165 table->table->counters || table->private) {
1166 BUGPRINT("Bad table data for ebt_register_table!!!\n");
1170 countersize = COUNTER_OFFSET(table->table->nentries) *
1171 (highest_possible_processor_id()+1);
1172 newinfo = vmalloc(sizeof(*newinfo) + countersize);
1177 newinfo->entries = vmalloc(table->table->entries_size);
1178 if (!(newinfo->entries))
1181 memcpy(newinfo->entries, table->table->entries,
1182 table->table->entries_size);
1185 memset(newinfo->counters, 0, countersize);
1187 /* fill in newinfo and parse the entries */
1188 newinfo->chainstack = NULL;
1189 ret = translate_table(table->table, newinfo);
1191 BUGPRINT("Translate_table failed\n");
1192 goto free_chainstack;
1195 if (table->check && table->check(newinfo, table->valid_hooks)) {
1196 BUGPRINT("The table doesn't like its own initial data, lol\n");
1200 table->private = newinfo;
1201 rwlock_init(&table->lock);
1202 ret = mutex_lock_interruptible(&ebt_mutex);
1204 goto free_chainstack;
1206 list_for_each_entry(t, &ebt_tables, list) {
1207 if (strcmp(t->name, table->name) == 0) {
1209 BUGPRINT("Table name already exists\n");
1214 /* Hold a reference count if the chains aren't empty */
1215 if (newinfo->nentries && !try_module_get(table->me)) {
1219 list_add(&table->list, &ebt_tables);
1220 mutex_unlock(&ebt_mutex);
1223 mutex_unlock(&ebt_mutex);
1225 if (newinfo->chainstack) {
1226 for_each_possible_cpu(i)
1227 vfree(newinfo->chainstack[i]);
1228 vfree(newinfo->chainstack);
1230 vfree(newinfo->entries);
1236 void ebt_unregister_table(struct ebt_table *table)
1241 BUGPRINT("Request to unregister NULL table!!!\n");
1244 mutex_lock(&ebt_mutex);
1245 list_del(&table->list);
1246 mutex_unlock(&ebt_mutex);
1247 vfree(table->private->entries);
1248 if (table->private->chainstack) {
1249 for_each_possible_cpu(i)
1250 vfree(table->private->chainstack[i]);
1251 vfree(table->private->chainstack);
1253 vfree(table->private);
1256 /* userspace just supplied us with counters */
1257 static int update_counters(void __user *user, unsigned int len)
1260 struct ebt_counter *tmp;
1261 struct ebt_replace hlp;
1262 struct ebt_table *t;
1264 if (copy_from_user(&hlp, user, sizeof(hlp)))
1267 if (len != sizeof(hlp) + hlp.num_counters * sizeof(struct ebt_counter))
1269 if (hlp.num_counters == 0)
1272 if (!(tmp = vmalloc(hlp.num_counters * sizeof(*tmp)))) {
1273 MEMPRINT("Update_counters && nomemory\n");
1277 t = find_table_lock(hlp.name, &ret, &ebt_mutex);
1281 if (hlp.num_counters != t->private->nentries) {
1282 BUGPRINT("Wrong nr of counters\n");
1287 if ( copy_from_user(tmp, hlp.counters,
1288 hlp.num_counters * sizeof(struct ebt_counter)) ) {
1289 BUGPRINT("Updata_counters && !cfu\n");
1294 /* we want an atomic add of the counters */
1295 write_lock_bh(&t->lock);
1297 /* we add to the counters of the first cpu */
1298 for (i = 0; i < hlp.num_counters; i++) {
1299 t->private->counters[i].pcnt += tmp[i].pcnt;
1300 t->private->counters[i].bcnt += tmp[i].bcnt;
1303 write_unlock_bh(&t->lock);
1306 mutex_unlock(&ebt_mutex);
1312 static inline int ebt_make_matchname(struct ebt_entry_match *m,
1313 char *base, char *ubase)
1315 char *hlp = ubase - base + (char *)m;
1316 if (copy_to_user(hlp, m->u.match->name, EBT_FUNCTION_MAXNAMELEN))
1321 static inline int ebt_make_watchername(struct ebt_entry_watcher *w,
1322 char *base, char *ubase)
1324 char *hlp = ubase - base + (char *)w;
1325 if (copy_to_user(hlp , w->u.watcher->name, EBT_FUNCTION_MAXNAMELEN))
1330 static inline int ebt_make_names(struct ebt_entry *e, char *base, char *ubase)
1334 struct ebt_entry_target *t;
1336 if (e->bitmask == 0)
1339 hlp = ubase - base + (char *)e + e->target_offset;
1340 t = (struct ebt_entry_target *)(((char *)e) + e->target_offset);
1342 ret = EBT_MATCH_ITERATE(e, ebt_make_matchname, base, ubase);
1345 ret = EBT_WATCHER_ITERATE(e, ebt_make_watchername, base, ubase);
1348 if (copy_to_user(hlp, t->u.target->name, EBT_FUNCTION_MAXNAMELEN))
1353 /* called with ebt_mutex locked */
1354 static int copy_everything_to_user(struct ebt_table *t, void __user *user,
1357 struct ebt_replace tmp;
1358 struct ebt_counter *counterstmp, *oldcounters;
1359 unsigned int entries_size, nentries;
1362 if (cmd == EBT_SO_GET_ENTRIES) {
1363 entries_size = t->private->entries_size;
1364 nentries = t->private->nentries;
1365 entries = t->private->entries;
1366 oldcounters = t->private->counters;
1368 entries_size = t->table->entries_size;
1369 nentries = t->table->nentries;
1370 entries = t->table->entries;
1371 oldcounters = t->table->counters;
1374 if (copy_from_user(&tmp, user, sizeof(tmp))) {
1375 BUGPRINT("Cfu didn't work\n");
1379 if (*len != sizeof(struct ebt_replace) + entries_size +
1380 (tmp.num_counters? nentries * sizeof(struct ebt_counter): 0)) {
1381 BUGPRINT("Wrong size\n");
1385 if (tmp.nentries != nentries) {
1386 BUGPRINT("Nentries wrong\n");
1390 if (tmp.entries_size != entries_size) {
1391 BUGPRINT("Wrong size\n");
1395 /* userspace might not need the counters */
1396 if (tmp.num_counters) {
1397 if (tmp.num_counters != nentries) {
1398 BUGPRINT("Num_counters wrong\n");
1401 counterstmp = vmalloc(nentries * sizeof(*counterstmp));
1403 MEMPRINT("Couldn't copy counters, out of memory\n");
1406 write_lock_bh(&t->lock);
1407 get_counters(oldcounters, counterstmp, nentries);
1408 write_unlock_bh(&t->lock);
1410 if (copy_to_user(tmp.counters, counterstmp,
1411 nentries * sizeof(struct ebt_counter))) {
1412 BUGPRINT("Couldn't copy counters to userspace\n");
1419 if (copy_to_user(tmp.entries, entries, entries_size)) {
1420 BUGPRINT("Couldn't copy entries to userspace\n");
1423 /* set the match/watcher/target names right */
1424 return EBT_ENTRY_ITERATE(entries, entries_size,
1425 ebt_make_names, entries, tmp.entries);
1428 static int do_ebt_set_ctl(struct sock *sk,
1429 int cmd, void __user *user, unsigned int len)
1434 case EBT_SO_SET_ENTRIES:
1435 ret = do_replace(user, len);
1437 case EBT_SO_SET_COUNTERS:
1438 ret = update_counters(user, len);
1446 static int do_ebt_get_ctl(struct sock *sk, int cmd, void __user *user, int *len)
1449 struct ebt_replace tmp;
1450 struct ebt_table *t;
1452 if (copy_from_user(&tmp, user, sizeof(tmp)))
1455 t = find_table_lock(tmp.name, &ret, &ebt_mutex);
1460 case EBT_SO_GET_INFO:
1461 case EBT_SO_GET_INIT_INFO:
1462 if (*len != sizeof(struct ebt_replace)){
1464 mutex_unlock(&ebt_mutex);
1467 if (cmd == EBT_SO_GET_INFO) {
1468 tmp.nentries = t->private->nentries;
1469 tmp.entries_size = t->private->entries_size;
1470 tmp.valid_hooks = t->valid_hooks;
1472 tmp.nentries = t->table->nentries;
1473 tmp.entries_size = t->table->entries_size;
1474 tmp.valid_hooks = t->table->valid_hooks;
1476 mutex_unlock(&ebt_mutex);
1477 if (copy_to_user(user, &tmp, *len) != 0){
1478 BUGPRINT("c2u Didn't work\n");
1485 case EBT_SO_GET_ENTRIES:
1486 case EBT_SO_GET_INIT_ENTRIES:
1487 ret = copy_everything_to_user(t, user, len, cmd);
1488 mutex_unlock(&ebt_mutex);
1492 mutex_unlock(&ebt_mutex);
1499 static struct nf_sockopt_ops ebt_sockopts =
1502 .set_optmin = EBT_BASE_CTL,
1503 .set_optmax = EBT_SO_SET_MAX + 1,
1504 .set = do_ebt_set_ctl,
1505 .get_optmin = EBT_BASE_CTL,
1506 .get_optmax = EBT_SO_GET_MAX + 1,
1507 .get = do_ebt_get_ctl,
1510 static int __init ebtables_init(void)
1514 mutex_lock(&ebt_mutex);
1515 list_add(&ebt_standard_target.list, &ebt_targets);
1516 mutex_unlock(&ebt_mutex);
1517 if ((ret = nf_register_sockopt(&ebt_sockopts)) < 0)
1520 printk(KERN_NOTICE "Ebtables v2.0 registered\n");
1524 static void __exit ebtables_fini(void)
1526 nf_unregister_sockopt(&ebt_sockopts);
1527 printk(KERN_NOTICE "Ebtables v2.0 unregistered\n");
1530 EXPORT_SYMBOL(ebt_register_table);
1531 EXPORT_SYMBOL(ebt_unregister_table);
1532 EXPORT_SYMBOL(ebt_register_match);
1533 EXPORT_SYMBOL(ebt_unregister_match);
1534 EXPORT_SYMBOL(ebt_register_watcher);
1535 EXPORT_SYMBOL(ebt_unregister_watcher);
1536 EXPORT_SYMBOL(ebt_register_target);
1537 EXPORT_SYMBOL(ebt_unregister_target);
1538 EXPORT_SYMBOL(ebt_do_table);
1539 module_init(ebtables_init);
1540 module_exit(ebtables_fini);
1541 MODULE_LICENSE("GPL");