git.openpandora.org
/
pandora-kernel.git
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
netfilter: xtables: move extension arguments into compound structure (1/6)
[pandora-kernel.git]
/
net
/
netfilter
/
xt_policy.c
diff --git
a/net/netfilter/xt_policy.c
b/net/netfilter/xt_policy.c
index
6d6d3b7
..
b0a00fb
100644
(file)
--- a/
net/netfilter/xt_policy.c
+++ b/
net/netfilter/xt_policy.c
@@
-13,37
+13,38
@@
#include <linux/init.h>
#include <net/xfrm.h>
#include <linux/init.h>
#include <net/xfrm.h>
+#include <linux/netfilter.h>
#include <linux/netfilter/xt_policy.h>
#include <linux/netfilter/x_tables.h>
MODULE_AUTHOR("Patrick McHardy <kaber@trash.net>");
#include <linux/netfilter/xt_policy.h>
#include <linux/netfilter/x_tables.h>
MODULE_AUTHOR("Patrick McHardy <kaber@trash.net>");
-MODULE_DESCRIPTION("Xtables
IPsec policy matching module
");
+MODULE_DESCRIPTION("Xtables
: IPsec policy match
");
MODULE_LICENSE("GPL");
static inline bool
MODULE_LICENSE("GPL");
static inline bool
-xt_addr_cmp(const union
xt_policy_addr *a1, const union xt_policy
_addr *m,
- const union
xt_policy
_addr *a2, unsigned short family)
+xt_addr_cmp(const union
nf_inet_addr *a1, const union nf_inet
_addr *m,
+ const union
nf_inet
_addr *a2, unsigned short family)
{
switch (family) {
{
switch (family) {
- case
AF_INET
:
- return
!((a1->a4.s_addr ^ a2->a4.s_addr) & m->a4.s_addr)
;
- case
AF_INET
6:
- return
!ipv6_masked_addr_cmp(&a1->a6, &m->a6, &a2->a6)
;
+ case
NFPROTO_IPV4
:
+ return
((a1->ip ^ a2->ip) & m->ip) == 0
;
+ case
NFPROTO_IPV
6:
+ return
ipv6_masked_addr_cmp(&a1->in6, &m->in6, &a2->in6) == 0
;
}
return false;
}
}
return false;
}
-static
inline
bool
+static bool
match_xfrm_state(const struct xfrm_state *x, const struct xt_policy_elem *e,
unsigned short family)
{
#define MATCH_ADDR(x,y,z) (!e->match.x || \
match_xfrm_state(const struct xfrm_state *x, const struct xt_policy_elem *e,
unsigned short family)
{
#define MATCH_ADDR(x,y,z) (!e->match.x || \
- (xt_addr_cmp(&e->x, &e->y,
z
, family) \
+ (xt_addr_cmp(&e->x, &e->y,
(const union nf_inet_addr *)(z)
, family) \
^ e->invert.x))
#define MATCH(x,y) (!e->match.x || ((e->x == (y)) ^ e->invert.x))
^ e->invert.x))
#define MATCH(x,y) (!e->match.x || ((e->x == (y)) ^ e->invert.x))
- return MATCH_ADDR(saddr, smask,
(union xt_policy_addr *)
&x->props.saddr) &&
- MATCH_ADDR(daddr, dmask,
(union xt_policy_addr *)
&x->id.daddr) &&
+ return MATCH_ADDR(saddr, smask, &x->props.saddr) &&
+ MATCH_ADDR(daddr, dmask, &x->id.daddr) &&
MATCH(proto, x->id.proto) &&
MATCH(mode, x->props.mode) &&
MATCH(spi, x->id.spi) &&
MATCH(proto, x->id.proto) &&
MATCH(mode, x->props.mode) &&
MATCH(spi, x->id.spi) &&
@@
-108,22
+109,16
@@
match_policy_out(const struct sk_buff *skb, const struct xt_policy_info *info,
return strict ? i == info->len : 0;
}
return strict ? i == info->len : 0;
}
-static bool match(const struct sk_buff *skb,
- const struct net_device *in,
- const struct net_device *out,
- const struct xt_match *match,
- const void *matchinfo,
- int offset,
- unsigned int protoff,
- bool *hotdrop)
+static bool
+policy_mt(const struct sk_buff *skb, const struct xt_match_param *par)
{
{
- const struct xt_policy_info *info = matchinfo;
+ const struct xt_policy_info *info =
par->
matchinfo;
int ret;
if (info->flags & XT_POLICY_MATCH_IN)
int ret;
if (info->flags & XT_POLICY_MATCH_IN)
- ret = match_policy_in(skb, info, match->family);
+ ret = match_policy_in(skb, info,
par->
match->family);
else
else
- ret = match_policy_out(skb, info, match->family);
+ ret = match_policy_out(skb, info,
par->
match->family);
if (ret < 0)
ret = info->flags & XT_POLICY_MATCH_NONE ? true : false;
if (ret < 0)
ret = info->flags & XT_POLICY_MATCH_NONE ? true : false;
@@
-133,25
+128,25
@@
static bool match(const struct sk_buff *skb,
return ret;
}
return ret;
}
-static bool checkentry(const char *tablename, const void *ip_void,
- const struct xt_match *match,
- void *matchinfo, unsigned int hook_mask)
+static bool
+policy_mt_check(const char *tablename, const void *ip_void,
+ const struct xt_match *match, void *matchinfo,
+ unsigned int hook_mask)
{
{
- struct xt_policy_info *info = matchinfo;
+
const
struct xt_policy_info *info = matchinfo;
if (!(info->flags & (XT_POLICY_MATCH_IN|XT_POLICY_MATCH_OUT))) {
printk(KERN_ERR "xt_policy: neither incoming nor "
"outgoing policy selected\n");
return false;
}
if (!(info->flags & (XT_POLICY_MATCH_IN|XT_POLICY_MATCH_OUT))) {
printk(KERN_ERR "xt_policy: neither incoming nor "
"outgoing policy selected\n");
return false;
}
- /* hook values are equal for IPv4 and IPv6 */
- if (hook_mask & (1 << NF_IP_PRE_ROUTING | 1 << NF_IP_LOCAL_IN)
+ if (hook_mask & (1 << NF_INET_PRE_ROUTING | 1 << NF_INET_LOCAL_IN)
&& info->flags & XT_POLICY_MATCH_OUT) {
printk(KERN_ERR "xt_policy: output policy not valid in "
"PRE_ROUTING and INPUT\n");
return false;
}
&& info->flags & XT_POLICY_MATCH_OUT) {
printk(KERN_ERR "xt_policy: output policy not valid in "
"PRE_ROUTING and INPUT\n");
return false;
}
- if (hook_mask & (1 << NF_I
P_POST_ROUTING | 1 << NF_IP
_LOCAL_OUT)
+ if (hook_mask & (1 << NF_I
NET_POST_ROUTING | 1 << NF_INET
_LOCAL_OUT)
&& info->flags & XT_POLICY_MATCH_IN) {
printk(KERN_ERR "xt_policy: input policy not valid in "
"POST_ROUTING and OUTPUT\n");
&& info->flags & XT_POLICY_MATCH_IN) {
printk(KERN_ERR "xt_policy: input policy not valid in "
"POST_ROUTING and OUTPUT\n");
@@
-164,37
+159,36
@@
static bool checkentry(const char *tablename, const void *ip_void,
return true;
}
return true;
}
-static struct xt_match
xt_policy_match
[] __read_mostly = {
+static struct xt_match
policy_mt_reg
[] __read_mostly = {
{
.name = "policy",
{
.name = "policy",
- .family =
AF_INET
,
- .checkentry =
checkentry
,
- .match =
match
,
+ .family =
NFPROTO_IPV4
,
+ .checkentry =
policy_mt_check
,
+ .match =
policy_mt
,
.matchsize = sizeof(struct xt_policy_info),
.me = THIS_MODULE,
},
{
.name = "policy",
.matchsize = sizeof(struct xt_policy_info),
.me = THIS_MODULE,
},
{
.name = "policy",
- .family =
AF_INET
6,
- .checkentry =
checkentry
,
- .match =
match
,
+ .family =
NFPROTO_IPV
6,
+ .checkentry =
policy_mt_check
,
+ .match =
policy_mt
,
.matchsize = sizeof(struct xt_policy_info),
.me = THIS_MODULE,
},
};
.matchsize = sizeof(struct xt_policy_info),
.me = THIS_MODULE,
},
};
-static int __init init(void)
+static int __init
policy_mt_
init(void)
{
{
- return xt_register_matches(xt_policy_match,
- ARRAY_SIZE(xt_policy_match));
+ return xt_register_matches(policy_mt_reg, ARRAY_SIZE(policy_mt_reg));
}
}
-static void __exit
fini
(void)
+static void __exit
policy_mt_exit
(void)
{
{
- xt_unregister_matches(
xt_policy_match, ARRAY_SIZE(xt_policy_match
));
+ xt_unregister_matches(
policy_mt_reg, ARRAY_SIZE(policy_mt_reg
));
}
}
-module_init(init);
-module_exit(
fini
);
+module_init(
policy_mt_
init);
+module_exit(
policy_mt_exit
);
MODULE_ALIAS("ipt_policy");
MODULE_ALIAS("ip6t_policy");
MODULE_ALIAS("ipt_policy");
MODULE_ALIAS("ip6t_policy");