ebtables.c 39.1 KB
Newer Older
L
Linus Torvalds 已提交
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
/*
 *  ebtables
 *
 *  Author:
 *  Bart De Schuymer		<bdschuym@pandora.be>
 *
 *  ebtables.c,v 2.0, July, 2002
 *
 *  This code is stongly inspired on the iptables code which is
 *  Copyright (C) 1999 Paul `Rusty' Russell & Michael J. Neuling
 *
 *  This program is free software; you can redistribute it and/or
 *  modify it under the terms of the GNU General Public License
 *  as published by the Free Software Foundation; either version
 *  2 of the License, or (at your option) any later version.
 */


#include <linux/kmod.h>
#include <linux/module.h>
#include <linux/vmalloc.h>
22
#include <linux/netfilter/x_tables.h>
L
Linus Torvalds 已提交
23 24
#include <linux/netfilter_bridge/ebtables.h>
#include <linux/spinlock.h>
P
Patrick McHardy 已提交
25
#include <linux/mutex.h>
L
Linus Torvalds 已提交
26 27
#include <asm/uaccess.h>
#include <linux/smp.h>
28
#include <linux/cpumask.h>
L
Linus Torvalds 已提交
29 30 31 32 33
#include <net/sock.h>
/* needed for logical [in,out]-dev filtering */
#include "../br_private.h"

#define BUGPRINT(format, args...) printk("kernel msg: ebtables bug: please "\
34
					 "report to author: "format, ## args)
L
Linus Torvalds 已提交
35 36
/* #define BUGPRINT(format, args...) */
#define MEMPRINT(format, args...) printk("kernel msg: ebtables "\
37
					 ": out of memory: "format, ## args)
L
Linus Torvalds 已提交
38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56
/* #define MEMPRINT(format, args...) */



/*
 * Each cpu has its own set of counters, so there is no need for write_lock in
 * the softirq
 * For reading or updating the counters, the user context needs to
 * get a write_lock
 */

/* The size of each set of counters is altered to get cache alignment */
#define SMP_ALIGN(x) (((x) + SMP_CACHE_BYTES-1) & ~(SMP_CACHE_BYTES-1))
#define COUNTER_OFFSET(n) (SMP_ALIGN(n * sizeof(struct ebt_counter)))
#define COUNTER_BASE(c, n, cpu) ((struct ebt_counter *)(((char *)c) + \
   COUNTER_OFFSET(n) * cpu))



I
Ingo Molnar 已提交
57
static DEFINE_MUTEX(ebt_mutex);
L
Linus Torvalds 已提交
58

59
static struct xt_target ebt_standard_target = {
60 61 62
	.name       = "standard",
	.revision   = 0,
	.family     = NFPROTO_BRIDGE,
63
	.targetsize = sizeof(int),
64
};
L
Linus Torvalds 已提交
65

66 67 68
static inline int
ebt_do_watcher(const struct ebt_entry_watcher *w, struct sk_buff *skb,
	       struct xt_target_param *par)
L
Linus Torvalds 已提交
69
{
70 71 72
	par->target   = w->u.watcher;
	par->targinfo = w->data;
	w->u.watcher->target(skb, par);
L
Linus Torvalds 已提交
73 74 75 76 77
	/* watchers don't give a verdict */
	return 0;
}

static inline int ebt_do_match (struct ebt_entry_match *m,
78
   const struct sk_buff *skb, struct xt_match_param *par)
L
Linus Torvalds 已提交
79
{
80 81
	par->match     = m->u.match;
	par->matchinfo = m->data;
82
	return m->u.match->match(skb, par) ? EBT_MATCH : EBT_NOMATCH;
L
Linus Torvalds 已提交
83 84
}

85 86
static inline int
ebt_dev_check(const char *entry, const struct net_device *device)
L
Linus Torvalds 已提交
87 88
{
	int i = 0;
89
	const char *devname;
L
Linus Torvalds 已提交
90 91 92 93 94

	if (*entry == '\0')
		return 0;
	if (!device)
		return 1;
95
	devname = device->name;
L
Linus Torvalds 已提交
96 97 98 99 100 101 102 103
	/* 1 is the wildcard token */
	while (entry[i] != '\0' && entry[i] != 1 && entry[i] == devname[i])
		i++;
	return (devname[i] != entry[i] && entry[i] != 1);
}

#define FWINV2(bool,invflg) ((bool) ^ !!(e->invflags & invflg))
/* process standard matches */
104 105 106
static inline int
ebt_basic_match(const struct ebt_entry *e, const struct ethhdr *h,
                const struct net_device *in, const struct net_device *out)
L
Linus Torvalds 已提交
107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146
{
	int verdict, i;

	if (e->bitmask & EBT_802_3) {
		if (FWINV2(ntohs(h->h_proto) >= 1536, EBT_IPROTO))
			return 1;
	} else if (!(e->bitmask & EBT_NOPROTO) &&
	   FWINV2(e->ethproto != h->h_proto, EBT_IPROTO))
		return 1;

	if (FWINV2(ebt_dev_check(e->in, in), EBT_IIN))
		return 1;
	if (FWINV2(ebt_dev_check(e->out, out), EBT_IOUT))
		return 1;
	if ((!in || !in->br_port) ? 0 : FWINV2(ebt_dev_check(
	   e->logical_in, in->br_port->br->dev), EBT_ILOGICALIN))
		return 1;
	if ((!out || !out->br_port) ? 0 : FWINV2(ebt_dev_check(
	   e->logical_out, out->br_port->br->dev), EBT_ILOGICALOUT))
		return 1;

	if (e->bitmask & EBT_SOURCEMAC) {
		verdict = 0;
		for (i = 0; i < 6; i++)
			verdict |= (h->h_source[i] ^ e->sourcemac[i]) &
			   e->sourcemsk[i];
		if (FWINV2(verdict != 0, EBT_ISOURCE) )
			return 1;
	}
	if (e->bitmask & EBT_DESTMAC) {
		verdict = 0;
		for (i = 0; i < 6; i++)
			verdict |= (h->h_dest[i] ^ e->destmac[i]) &
			   e->destmsk[i];
		if (FWINV2(verdict != 0, EBT_IDEST) )
			return 1;
	}
	return 0;
}

147 148 149 150 151 152
static inline __pure
struct ebt_entry *ebt_next_entry(const struct ebt_entry *entry)
{
	return (void *)entry + entry->next_offset;
}

L
Linus Torvalds 已提交
153
/* Do some firewalling */
154
unsigned int ebt_do_table (unsigned int hook, struct sk_buff *skb,
L
Linus Torvalds 已提交
155 156 157 158 159 160
   const struct net_device *in, const struct net_device *out,
   struct ebt_table *table)
{
	int i, nentries;
	struct ebt_entry *point;
	struct ebt_counter *counter_base, *cb_base;
161
	const struct ebt_entry_target *t;
L
Linus Torvalds 已提交
162 163 164
	int verdict, sp = 0;
	struct ebt_chainstack *cs;
	struct ebt_entries *chaininfo;
165 166
	const char *base;
	const struct ebt_table_info *private;
167
	bool hotdrop = false;
168
	struct xt_match_param mtpar;
169
	struct xt_target_param tgpar;
170

171
	mtpar.family  = tgpar.family = NFPROTO_BRIDGE;
172 173
	mtpar.in      = tgpar.in  = in;
	mtpar.out     = tgpar.out = out;
174
	mtpar.hotdrop = &hotdrop;
175
	mtpar.hooknum = tgpar.hooknum = hook;
L
Linus Torvalds 已提交
176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192

	read_lock_bh(&table->lock);
	private = table->private;
	cb_base = COUNTER_BASE(private->counters, private->nentries,
	   smp_processor_id());
	if (private->chainstack)
		cs = private->chainstack[smp_processor_id()];
	else
		cs = NULL;
	chaininfo = private->hook_entry[hook];
	nentries = private->hook_entry[hook]->nentries;
	point = (struct ebt_entry *)(private->hook_entry[hook]->data);
	counter_base = cb_base + private->hook_entry[hook]->counter_offset;
	/* base for chain jumps */
	base = private->entries;
	i = 0;
	while (i < nentries) {
193
		if (ebt_basic_match(point, eth_hdr(skb), in, out))
L
Linus Torvalds 已提交
194 195
			goto letscontinue;

196
		if (EBT_MATCH_ITERATE(point, ebt_do_match, skb, &mtpar) != 0)
L
Linus Torvalds 已提交
197
			goto letscontinue;
198 199 200 201
		if (hotdrop) {
			read_unlock_bh(&table->lock);
			return NF_DROP;
		}
L
Linus Torvalds 已提交
202 203 204

		/* increase counter */
		(*(counter_base + i)).pcnt++;
205
		(*(counter_base + i)).bcnt += skb->len;
L
Linus Torvalds 已提交
206 207 208

		/* these should only watch: not modify, nor tell us
		   what to do with the packet */
209
		EBT_WATCHER_ITERATE(point, ebt_do_watcher, skb, &tgpar);
L
Linus Torvalds 已提交
210 211 212 213 214 215

		t = (struct ebt_entry_target *)
		   (((char *)point) + point->target_offset);
		/* standard target */
		if (!t->u.target->target)
			verdict = ((struct ebt_standard_target *)t)->verdict;
216 217 218 219 220
		else {
			tgpar.target   = t->u.target;
			tgpar.targinfo = t->data;
			verdict = t->u.target->target(skb, &tgpar);
		}
L
Linus Torvalds 已提交
221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259
		if (verdict == EBT_ACCEPT) {
			read_unlock_bh(&table->lock);
			return NF_ACCEPT;
		}
		if (verdict == EBT_DROP) {
			read_unlock_bh(&table->lock);
			return NF_DROP;
		}
		if (verdict == EBT_RETURN) {
letsreturn:
#ifdef CONFIG_NETFILTER_DEBUG
			if (sp == 0) {
				BUGPRINT("RETURN on base chain");
				/* act like this is EBT_CONTINUE */
				goto letscontinue;
			}
#endif
			sp--;
			/* put all the local variables right */
			i = cs[sp].n;
			chaininfo = cs[sp].chaininfo;
			nentries = chaininfo->nentries;
			point = cs[sp].e;
			counter_base = cb_base +
			   chaininfo->counter_offset;
			continue;
		}
		if (verdict == EBT_CONTINUE)
			goto letscontinue;
#ifdef CONFIG_NETFILTER_DEBUG
		if (verdict < 0) {
			BUGPRINT("bogus standard verdict\n");
			read_unlock_bh(&table->lock);
			return NF_DROP;
		}
#endif
		/* jump to a udc */
		cs[sp].n = i + 1;
		cs[sp].chaininfo = chaininfo;
260
		cs[sp].e = ebt_next_entry(point);
L
Linus Torvalds 已提交
261 262 263 264 265 266 267 268 269 270 271 272 273 274 275
		i = 0;
		chaininfo = (struct ebt_entries *) (base + verdict);
#ifdef CONFIG_NETFILTER_DEBUG
		if (chaininfo->distinguisher) {
			BUGPRINT("jump to non-chain\n");
			read_unlock_bh(&table->lock);
			return NF_DROP;
		}
#endif
		nentries = chaininfo->nentries;
		point = (struct ebt_entry *)chaininfo->data;
		counter_base = cb_base + chaininfo->counter_offset;
		sp++;
		continue;
letscontinue:
276
		point = ebt_next_entry(point);
L
Linus Torvalds 已提交
277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293
		i++;
	}

	/* I actually like this :) */
	if (chaininfo->policy == EBT_RETURN)
		goto letsreturn;
	if (chaininfo->policy == EBT_ACCEPT) {
		read_unlock_bh(&table->lock);
		return NF_ACCEPT;
	}
	read_unlock_bh(&table->lock);
	return NF_DROP;
}

/* If it succeeds, returns element and locks mutex */
static inline void *
find_inlist_lock_noload(struct list_head *head, const char *name, int *error,
I
Ingo Molnar 已提交
294
   struct mutex *mutex)
L
Linus Torvalds 已提交
295
{
P
Patrick McHardy 已提交
296 297 298 299
	struct {
		struct list_head list;
		char name[EBT_FUNCTION_MAXNAMELEN];
	} *e;
L
Linus Torvalds 已提交
300

I
Ingo Molnar 已提交
301
	*error = mutex_lock_interruptible(mutex);
L
Linus Torvalds 已提交
302 303 304
	if (*error != 0)
		return NULL;

P
Patrick McHardy 已提交
305 306 307
	list_for_each_entry(e, head, list) {
		if (strcmp(e->name, name) == 0)
			return e;
L
Linus Torvalds 已提交
308
	}
P
Patrick McHardy 已提交
309 310 311
	*error = -ENOENT;
	mutex_unlock(mutex);
	return NULL;
L
Linus Torvalds 已提交
312 313 314 315
}

static void *
find_inlist_lock(struct list_head *head, const char *name, const char *prefix,
I
Ingo Molnar 已提交
316
   int *error, struct mutex *mutex)
L
Linus Torvalds 已提交
317
{
318 319 320
	return try_then_request_module(
			find_inlist_lock_noload(head, name, error, mutex),
			"%s%s", prefix, name);
L
Linus Torvalds 已提交
321 322 323
}

static inline struct ebt_table *
324 325
find_table_lock(struct net *net, const char *name, int *error,
		struct mutex *mutex)
L
Linus Torvalds 已提交
326
{
327 328
	return find_inlist_lock(&net->xt.tables[NFPROTO_BRIDGE], name,
				"ebtable_", error, mutex);
L
Linus Torvalds 已提交
329 330 331
}

static inline int
332 333
ebt_check_match(struct ebt_entry_match *m, struct xt_mtchk_param *par,
		unsigned int *cnt)
L
Linus Torvalds 已提交
334
{
335
	const struct ebt_entry *e = par->entryinfo;
336
	struct xt_match *match;
337
	size_t left = ((char *)e + e->watchers_offset) - (char *)m;
L
Linus Torvalds 已提交
338 339
	int ret;

340 341
	if (left < sizeof(struct ebt_entry_match) ||
	    left - sizeof(struct ebt_entry_match) < m->match_size)
L
Linus Torvalds 已提交
342
		return -EINVAL;
343 344 345 346 347 348

	match = try_then_request_module(xt_find_match(NFPROTO_BRIDGE,
		m->u.name, 0), "ebt_%s", m->u.name);
	if (IS_ERR(match))
		return PTR_ERR(match);
	if (match == NULL)
L
Linus Torvalds 已提交
349
		return -ENOENT;
350 351
	m->u.match = match;

352 353
	par->match     = match;
	par->matchinfo = m->data;
354
	ret = xt_check_match(par, m->match_size,
355
	      e->ethproto, e->invflags & EBT_IPROTO);
356 357 358
	if (ret < 0) {
		module_put(match->me);
		return ret;
L
Linus Torvalds 已提交
359
	}
360

L
Linus Torvalds 已提交
361 362 363 364 365
	(*cnt)++;
	return 0;
}

static inline int
366 367
ebt_check_watcher(struct ebt_entry_watcher *w, struct xt_tgchk_param *par,
		  unsigned int *cnt)
L
Linus Torvalds 已提交
368
{
369
	const struct ebt_entry *e = par->entryinfo;
370
	struct xt_target *watcher;
371
	size_t left = ((char *)e + e->target_offset) - (char *)w;
L
Linus Torvalds 已提交
372 373
	int ret;

374 375
	if (left < sizeof(struct ebt_entry_watcher) ||
	   left - sizeof(struct ebt_entry_watcher) < w->watcher_size)
L
Linus Torvalds 已提交
376
		return -EINVAL;
377 378 379 380 381 382 383

	watcher = try_then_request_module(
		  xt_find_target(NFPROTO_BRIDGE, w->u.name, 0),
		  "ebt_%s", w->u.name);
	if (IS_ERR(watcher))
		return PTR_ERR(watcher);
	if (watcher == NULL)
L
Linus Torvalds 已提交
384
		return -ENOENT;
385 386
	w->u.watcher = watcher;

387 388
	par->target   = watcher;
	par->targinfo = w->data;
389
	ret = xt_check_target(par, w->watcher_size,
390
	      e->ethproto, e->invflags & EBT_IPROTO);
391 392 393
	if (ret < 0) {
		module_put(watcher->me);
		return ret;
L
Linus Torvalds 已提交
394
	}
395

L
Linus Torvalds 已提交
396 397 398 399
	(*cnt)++;
	return 0;
}

400
static int ebt_verify_pointers(const struct ebt_replace *repl,
401
			       struct ebt_table_info *newinfo)
L
Linus Torvalds 已提交
402
{
403 404 405
	unsigned int limit = repl->entries_size;
	unsigned int valid_hooks = repl->valid_hooks;
	unsigned int offset = 0;
L
Linus Torvalds 已提交
406 407
	int i;

408 409 410 411 412 413
	for (i = 0; i < NF_BR_NUMHOOKS; i++)
		newinfo->hook_entry[i] = NULL;

	newinfo->entries_size = repl->entries_size;
	newinfo->nentries = repl->nentries;

414 415 416
	while (offset < limit) {
		size_t left = limit - offset;
		struct ebt_entry *e = (void *)newinfo->entries + offset;
417

418
		if (left < sizeof(unsigned int))
L
Linus Torvalds 已提交
419
			break;
420 421 422 423

		for (i = 0; i < NF_BR_NUMHOOKS; i++) {
			if ((valid_hooks & (1 << i)) == 0)
				continue;
424 425
			if ((char __user *)repl->hook_entry[i] ==
			     repl->entries + offset)
426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447
				break;
		}

		if (i != NF_BR_NUMHOOKS || !(e->bitmask & EBT_ENTRY_OR_ENTRIES)) {
			if (e->bitmask != 0) {
				/* we make userspace set this right,
				   so there is no misunderstanding */
				BUGPRINT("EBT_ENTRY_OR_ENTRIES shouldn't be set "
					 "in distinguisher\n");
				return -EINVAL;
			}
			if (i != NF_BR_NUMHOOKS)
				newinfo->hook_entry[i] = (struct ebt_entries *)e;
			if (left < sizeof(struct ebt_entries))
				break;
			offset += sizeof(struct ebt_entries);
		} else {
			if (left < sizeof(struct ebt_entry))
				break;
			if (left < e->next_offset)
				break;
			offset += e->next_offset;
L
Linus Torvalds 已提交
448
		}
449
	}
450 451 452 453
	if (offset != limit) {
		BUGPRINT("entries_size too small\n");
		return -EINVAL;
	}
454 455 456 457 458 459 460 461 462

	/* check if all valid hooks have a chain */
	for (i = 0; i < NF_BR_NUMHOOKS; i++) {
		if (!newinfo->hook_entry[i] &&
		   (valid_hooks & (1 << i))) {
			BUGPRINT("Valid hook without chain\n");
			return -EINVAL;
		}
	}
463 464 465 466 467 468 469 470
	return 0;
}

/*
 * this one is very careful, as it is the first function
 * to parse the userspace data
 */
static inline int
471 472
ebt_check_entry_size_and_hooks(const struct ebt_entry *e,
   const struct ebt_table_info *newinfo,
473 474
   unsigned int *n, unsigned int *cnt,
   unsigned int *totalcnt, unsigned int *udc_cnt)
475 476 477 478
{
	int i;

	for (i = 0; i < NF_BR_NUMHOOKS; i++) {
479
		if ((void *)e == (void *)newinfo->hook_entry[i])
480 481 482 483 484
			break;
	}
	/* beginning of a new chain
	   if i == NF_BR_NUMHOOKS it must be a user defined chain */
	if (i != NF_BR_NUMHOOKS || !e->bitmask) {
L
Linus Torvalds 已提交
485 486 487 488
		/* this checks if the previous chain has as many entries
		   as it said it has */
		if (*n != *cnt) {
			BUGPRINT("nentries does not equal the nr of entries "
489
				 "in the chain\n");
L
Linus Torvalds 已提交
490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540
			return -EINVAL;
		}
		if (((struct ebt_entries *)e)->policy != EBT_DROP &&
		   ((struct ebt_entries *)e)->policy != EBT_ACCEPT) {
			/* only RETURN from udc */
			if (i != NF_BR_NUMHOOKS ||
			   ((struct ebt_entries *)e)->policy != EBT_RETURN) {
				BUGPRINT("bad policy\n");
				return -EINVAL;
			}
		}
		if (i == NF_BR_NUMHOOKS) /* it's a user defined chain */
			(*udc_cnt)++;
		if (((struct ebt_entries *)e)->counter_offset != *totalcnt) {
			BUGPRINT("counter_offset != totalcnt");
			return -EINVAL;
		}
		*n = ((struct ebt_entries *)e)->nentries;
		*cnt = 0;
		return 0;
	}
	/* a plain old entry, heh */
	if (sizeof(struct ebt_entry) > e->watchers_offset ||
	   e->watchers_offset > e->target_offset ||
	   e->target_offset >= e->next_offset) {
		BUGPRINT("entry offsets not in right order\n");
		return -EINVAL;
	}
	/* this is not checked anywhere else */
	if (e->next_offset - e->target_offset < sizeof(struct ebt_entry_target)) {
		BUGPRINT("target size too small\n");
		return -EINVAL;
	}
	(*cnt)++;
	(*totalcnt)++;
	return 0;
}

struct ebt_cl_stack
{
	struct ebt_chainstack cs;
	int from;
	unsigned int hookmask;
};

/*
 * we need these positions to check that the jumps to a different part of the
 * entries is a jump to the beginning of a new chain.
 */
static inline int
ebt_get_udc_positions(struct ebt_entry *e, struct ebt_table_info *newinfo,
541
   unsigned int *n, struct ebt_cl_stack *udc)
L
Linus Torvalds 已提交
542 543 544 545
{
	int i;

	/* we're only interested in chain starts */
546
	if (e->bitmask)
L
Linus Torvalds 已提交
547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565
		return 0;
	for (i = 0; i < NF_BR_NUMHOOKS; i++) {
		if (newinfo->hook_entry[i] == (struct ebt_entries *)e)
			break;
	}
	/* only care about udc */
	if (i != NF_BR_NUMHOOKS)
		return 0;

	udc[*n].cs.chaininfo = (struct ebt_entries *)e;
	/* these initialisations are depended on later in check_chainloops() */
	udc[*n].cs.n = 0;
	udc[*n].hookmask = 0;

	(*n)++;
	return 0;
}

static inline int
566
ebt_cleanup_match(struct ebt_entry_match *m, struct net *net, unsigned int *i)
L
Linus Torvalds 已提交
567
{
568 569
	struct xt_mtdtor_param par;

L
Linus Torvalds 已提交
570 571 572
	if (i && (*i)-- == 0)
		return 1;

573
	par.net       = net;
574 575
	par.match     = m->u.match;
	par.matchinfo = m->data;
576
	par.family    = NFPROTO_BRIDGE;
577 578 579
	if (par.match->destroy != NULL)
		par.match->destroy(&par);
	module_put(par.match->me);
L
Linus Torvalds 已提交
580 581 582 583
	return 0;
}

static inline int
584
ebt_cleanup_watcher(struct ebt_entry_watcher *w, struct net *net, unsigned int *i)
L
Linus Torvalds 已提交
585
{
586 587
	struct xt_tgdtor_param par;

L
Linus Torvalds 已提交
588 589 590
	if (i && (*i)-- == 0)
		return 1;

591
	par.net      = net;
592 593
	par.target   = w->u.watcher;
	par.targinfo = w->data;
594
	par.family   = NFPROTO_BRIDGE;
595 596 597
	if (par.target->destroy != NULL)
		par.target->destroy(&par);
	module_put(par.target->me);
L
Linus Torvalds 已提交
598 599 600 601
	return 0;
}

static inline int
602
ebt_cleanup_entry(struct ebt_entry *e, struct net *net, unsigned int *cnt)
L
Linus Torvalds 已提交
603
{
604
	struct xt_tgdtor_param par;
L
Linus Torvalds 已提交
605 606
	struct ebt_entry_target *t;

607
	if (e->bitmask == 0)
L
Linus Torvalds 已提交
608 609 610 611
		return 0;
	/* we're done */
	if (cnt && (*cnt)-- == 0)
		return 1;
612
	EBT_WATCHER_ITERATE(e, ebt_cleanup_watcher, net, NULL);
613
	EBT_MATCH_ITERATE(e, ebt_cleanup_match, net, NULL);
L
Linus Torvalds 已提交
614 615
	t = (struct ebt_entry_target *)(((char *)e) + e->target_offset);

616
	par.net      = net;
617 618
	par.target   = t->u.target;
	par.targinfo = t->data;
619
	par.family   = NFPROTO_BRIDGE;
620 621 622
	if (par.target->destroy != NULL)
		par.target->destroy(&par);
	module_put(par.target->me);
L
Linus Torvalds 已提交
623 624 625 626
	return 0;
}

static inline int
627 628
ebt_check_entry(struct ebt_entry *e, struct net *net,
   const struct ebt_table_info *newinfo,
629
   const char *name, unsigned int *cnt,
L
Linus Torvalds 已提交
630 631 632
   struct ebt_cl_stack *cl_s, unsigned int udc_cnt)
{
	struct ebt_entry_target *t;
633
	struct xt_target *target;
L
Linus Torvalds 已提交
634
	unsigned int i, j, hook = 0, hookmask = 0;
635
	size_t gap;
L
Linus Torvalds 已提交
636
	int ret;
637
	struct xt_mtchk_param mtpar;
638
	struct xt_tgchk_param tgpar;
L
Linus Torvalds 已提交
639 640

	/* don't mess with the struct ebt_entries */
641
	if (e->bitmask == 0)
L
Linus Torvalds 已提交
642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657
		return 0;

	if (e->bitmask & ~EBT_F_MASK) {
		BUGPRINT("Unknown flag for bitmask\n");
		return -EINVAL;
	}
	if (e->invflags & ~EBT_INV_MASK) {
		BUGPRINT("Unknown flag for inv bitmask\n");
		return -EINVAL;
	}
	if ( (e->bitmask & EBT_NOPROTO) && (e->bitmask & EBT_802_3) ) {
		BUGPRINT("NOPROTO & 802_3 not allowed\n");
		return -EINVAL;
	}
	/* what hook do we belong to? */
	for (i = 0; i < NF_BR_NUMHOOKS; i++) {
658
		if (!newinfo->hook_entry[i])
L
Linus Torvalds 已提交
659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678
			continue;
		if ((char *)newinfo->hook_entry[i] < (char *)e)
			hook = i;
		else
			break;
	}
	/* (1 << NF_BR_NUMHOOKS) tells the check functions the rule is on
	   a base chain */
	if (i < NF_BR_NUMHOOKS)
		hookmask = (1 << hook) | (1 << NF_BR_NUMHOOKS);
	else {
		for (i = 0; i < udc_cnt; i++)
			if ((char *)(cl_s[i].cs.chaininfo) > (char *)e)
				break;
		if (i == 0)
			hookmask = (1 << hook) | (1 << NF_BR_NUMHOOKS);
		else
			hookmask = cl_s[i - 1].hookmask;
	}
	i = 0;
679

680
	mtpar.net	= tgpar.net       = net;
681 682 683
	mtpar.table     = tgpar.table     = name;
	mtpar.entryinfo = tgpar.entryinfo = e;
	mtpar.hook_mask = tgpar.hook_mask = hookmask;
684
	mtpar.family    = tgpar.family    = NFPROTO_BRIDGE;
685
	ret = EBT_MATCH_ITERATE(e, ebt_check_match, &mtpar, &i);
L
Linus Torvalds 已提交
686 687 688
	if (ret != 0)
		goto cleanup_matches;
	j = 0;
689
	ret = EBT_WATCHER_ITERATE(e, ebt_check_watcher, &tgpar, &j);
L
Linus Torvalds 已提交
690 691 692
	if (ret != 0)
		goto cleanup_watchers;
	t = (struct ebt_entry_target *)(((char *)e) + e->target_offset);
693
	gap = e->next_offset - e->target_offset;
L
Linus Torvalds 已提交
694

695 696 697 698 699
	target = try_then_request_module(
		 xt_find_target(NFPROTO_BRIDGE, t->u.name, 0),
		 "ebt_%s", t->u.name);
	if (IS_ERR(target)) {
		ret = PTR_ERR(target);
700
		goto cleanup_watchers;
701 702
	} else if (target == NULL) {
		ret = -ENOENT;
703 704 705
		goto cleanup_watchers;
	}

L
Linus Torvalds 已提交
706 707
	t->u.target = target;
	if (t->u.target == &ebt_standard_target) {
708
		if (gap < sizeof(struct ebt_standard_target)) {
L
Linus Torvalds 已提交
709 710 711 712 713 714 715 716 717 718
			BUGPRINT("Standard target size too big\n");
			ret = -EFAULT;
			goto cleanup_watchers;
		}
		if (((struct ebt_standard_target *)t)->verdict <
		   -NUM_STANDARD_TARGETS) {
			BUGPRINT("Invalid standard target\n");
			ret = -EFAULT;
			goto cleanup_watchers;
		}
719 720 721 722
	} else if (t->target_size > gap - sizeof(struct ebt_entry_target)) {
		module_put(t->u.target->me);
		ret = -EFAULT;
		goto cleanup_watchers;
723 724
	}

725 726
	tgpar.target   = target;
	tgpar.targinfo = t->data;
727
	ret = xt_check_target(&tgpar, t->target_size,
728
	      e->ethproto, e->invflags & EBT_IPROTO);
729 730
	if (ret < 0) {
		module_put(target->me);
731
		goto cleanup_watchers;
L
Linus Torvalds 已提交
732 733 734 735
	}
	(*cnt)++;
	return 0;
cleanup_watchers:
736
	EBT_WATCHER_ITERATE(e, ebt_cleanup_watcher, net, &j);
L
Linus Torvalds 已提交
737
cleanup_matches:
738
	EBT_MATCH_ITERATE(e, ebt_cleanup_match, net, &i);
L
Linus Torvalds 已提交
739 740 741 742 743 744 745 746
	return ret;
}

/*
 * checks for loops and sets the hook mask for udc
 * the hook mask for udc tells us from which base chains the udc can be
 * accessed. This mask is a parameter to the check() functions of the extensions
 */
747
static int check_chainloops(const struct ebt_entries *chain, struct ebt_cl_stack *cl_s,
L
Linus Torvalds 已提交
748 749 750
   unsigned int udc_cnt, unsigned int hooknr, char *base)
{
	int i, chain_nr = -1, pos = 0, nentries = chain->nentries, verdict;
751 752
	const struct ebt_entry *e = (struct ebt_entry *)chain->data;
	const struct ebt_entry_target *t;
L
Linus Torvalds 已提交
753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795

	while (pos < nentries || chain_nr != -1) {
		/* end of udc, go back one 'recursion' step */
		if (pos == nentries) {
			/* put back values of the time when this chain was called */
			e = cl_s[chain_nr].cs.e;
			if (cl_s[chain_nr].from != -1)
				nentries =
				cl_s[cl_s[chain_nr].from].cs.chaininfo->nentries;
			else
				nentries = chain->nentries;
			pos = cl_s[chain_nr].cs.n;
			/* make sure we won't see a loop that isn't one */
			cl_s[chain_nr].cs.n = 0;
			chain_nr = cl_s[chain_nr].from;
			if (pos == nentries)
				continue;
		}
		t = (struct ebt_entry_target *)
		   (((char *)e) + e->target_offset);
		if (strcmp(t->u.name, EBT_STANDARD_TARGET))
			goto letscontinue;
		if (e->target_offset + sizeof(struct ebt_standard_target) >
		   e->next_offset) {
			BUGPRINT("Standard target size too big\n");
			return -1;
		}
		verdict = ((struct ebt_standard_target *)t)->verdict;
		if (verdict >= 0) { /* jump to another chain */
			struct ebt_entries *hlp2 =
			   (struct ebt_entries *)(base + verdict);
			for (i = 0; i < udc_cnt; i++)
				if (hlp2 == cl_s[i].cs.chaininfo)
					break;
			/* bad destination or loop */
			if (i == udc_cnt) {
				BUGPRINT("bad destination\n");
				return -1;
			}
			if (cl_s[i].cs.n) {
				BUGPRINT("loop\n");
				return -1;
			}
796 797 798
			if (cl_s[i].hookmask & (1 << hooknr))
				goto letscontinue;
			/* this can't be 0, so the loop test is correct */
L
Linus Torvalds 已提交
799 800
			cl_s[i].cs.n = pos + 1;
			pos = 0;
801
			cl_s[i].cs.e = ebt_next_entry(e);
L
Linus Torvalds 已提交
802 803 804 805 806 807 808 809 810
			e = (struct ebt_entry *)(hlp2->data);
			nentries = hlp2->nentries;
			cl_s[i].from = chain_nr;
			chain_nr = i;
			/* this udc is accessible from the base chain for hooknr */
			cl_s[i].hookmask |= (1 << hooknr);
			continue;
		}
letscontinue:
811
		e = ebt_next_entry(e);
L
Linus Torvalds 已提交
812 813 814 815 816 817
		pos++;
	}
	return 0;
}

/* do the parsing of the table/chains/entries/matches/watchers/targets, heh */
818
static int translate_table(struct net *net, const char *name,
819
			   struct ebt_table_info *newinfo)
L
Linus Torvalds 已提交
820 821 822 823 824 825
{
	unsigned int i, j, k, udc_cnt;
	int ret;
	struct ebt_cl_stack *cl_s = NULL; /* used in the checking for chain loops */

	i = 0;
826
	while (i < NF_BR_NUMHOOKS && !newinfo->hook_entry[i])
L
Linus Torvalds 已提交
827 828 829 830 831
		i++;
	if (i == NF_BR_NUMHOOKS) {
		BUGPRINT("No valid hooks specified\n");
		return -EINVAL;
	}
832
	if (newinfo->hook_entry[i] != (struct ebt_entries *)newinfo->entries) {
L
Linus Torvalds 已提交
833 834 835 836 837 838
		BUGPRINT("Chains don't start at beginning\n");
		return -EINVAL;
	}
	/* make sure chains are ordered after each other in same order
	   as their corresponding hooks */
	for (j = i + 1; j < NF_BR_NUMHOOKS; j++) {
839
		if (!newinfo->hook_entry[j])
L
Linus Torvalds 已提交
840
			continue;
841
		if (newinfo->hook_entry[j] <= newinfo->hook_entry[i]) {
L
Linus Torvalds 已提交
842 843 844 845 846 847 848 849 850 851
			BUGPRINT("Hook order must be followed\n");
			return -EINVAL;
		}
		i = j;
	}

	/* do some early checkings and initialize some things */
	i = 0; /* holds the expected nr. of entries for the chain */
	j = 0; /* holds the up to now counted entries for the chain */
	k = 0; /* holds the total nr. of entries, should equal
852
		  newinfo->nentries afterwards */
L
Linus Torvalds 已提交
853 854
	udc_cnt = 0; /* will hold the nr. of user defined chains (udc) */
	ret = EBT_ENTRY_ITERATE(newinfo->entries, newinfo->entries_size,
855 856
	   ebt_check_entry_size_and_hooks, newinfo,
	   &i, &j, &k, &udc_cnt);
L
Linus Torvalds 已提交
857 858 859 860 861 862

	if (ret != 0)
		return ret;

	if (i != j) {
		BUGPRINT("nentries does not equal the nr of entries in the "
863
			 "(last) chain\n");
L
Linus Torvalds 已提交
864 865 866 867 868 869 870 871 872 873 874 875
		return -EINVAL;
	}
	if (k != newinfo->nentries) {
		BUGPRINT("Total nentries is wrong\n");
		return -EINVAL;
	}

	/* get the location of the udc, put them in an array
	   while we're at it, allocate the chainstack */
	if (udc_cnt) {
		/* this will get free'd in do_replace()/ebt_register_table()
		   if an error occurs */
876
		newinfo->chainstack =
877
			vmalloc(nr_cpu_ids * sizeof(*(newinfo->chainstack)));
L
Linus Torvalds 已提交
878 879
		if (!newinfo->chainstack)
			return -ENOMEM;
880
		for_each_possible_cpu(i) {
L
Linus Torvalds 已提交
881
			newinfo->chainstack[i] =
882
			  vmalloc(udc_cnt * sizeof(*(newinfo->chainstack[0])));
L
Linus Torvalds 已提交
883 884 885 886 887 888 889 890 891
			if (!newinfo->chainstack[i]) {
				while (i)
					vfree(newinfo->chainstack[--i]);
				vfree(newinfo->chainstack);
				newinfo->chainstack = NULL;
				return -ENOMEM;
			}
		}

892
		cl_s = vmalloc(udc_cnt * sizeof(*cl_s));
L
Linus Torvalds 已提交
893 894 895 896
		if (!cl_s)
			return -ENOMEM;
		i = 0; /* the i'th udc */
		EBT_ENTRY_ITERATE(newinfo->entries, newinfo->entries_size,
897
		   ebt_get_udc_positions, newinfo, &i, cl_s);
L
Linus Torvalds 已提交
898 899 900 901 902 903 904 905 906 907
		/* sanity check */
		if (i != udc_cnt) {
			BUGPRINT("i != udc_cnt\n");
			vfree(cl_s);
			return -EFAULT;
		}
	}

	/* Check for loops */
	for (i = 0; i < NF_BR_NUMHOOKS; i++)
908
		if (newinfo->hook_entry[i])
L
Linus Torvalds 已提交
909 910
			if (check_chainloops(newinfo->hook_entry[i],
			   cl_s, udc_cnt, i, newinfo->entries)) {
911
				vfree(cl_s);
L
Linus Torvalds 已提交
912 913 914
				return -EINVAL;
			}

915
	/* we now know the following (along with E=mc²):
L
Linus Torvalds 已提交
916 917 918 919 920 921 922 923 924 925 926 927
	   - the nr of entries in each chain is right
	   - the size of the allocated space is right
	   - all valid hooks have a corresponding chain
	   - there are no loops
	   - wrong data can still be on the level of a single entry
	   - could be there are jumps to places that are not the
	     beginning of a chain. This can only occur in chains that
	     are not accessible from any base chains, so we don't care. */

	/* used to know what we need to clean up if something goes wrong */
	i = 0;
	ret = EBT_ENTRY_ITERATE(newinfo->entries, newinfo->entries_size,
928
	   ebt_check_entry, net, newinfo, name, &i, cl_s, udc_cnt);
L
Linus Torvalds 已提交
929 930
	if (ret != 0) {
		EBT_ENTRY_ITERATE(newinfo->entries, newinfo->entries_size,
931
				  ebt_cleanup_entry, net, &i);
L
Linus Torvalds 已提交
932
	}
933
	vfree(cl_s);
L
Linus Torvalds 已提交
934 935 936 937
	return ret;
}

/* called under write_lock */
938
static void get_counters(const struct ebt_counter *oldcounters,
L
Linus Torvalds 已提交
939 940 941 942 943 944 945
   struct ebt_counter *counters, unsigned int nentries)
{
	int i, cpu;
	struct ebt_counter *counter_base;

	/* counters of cpu 0 */
	memcpy(counters, oldcounters,
946 947
	       sizeof(struct ebt_counter) * nentries);

L
Linus Torvalds 已提交
948
	/* add other counters to those of cpu 0 */
949
	for_each_possible_cpu(cpu) {
950 951
		if (cpu == 0)
			continue;
L
Linus Torvalds 已提交
952 953 954 955 956 957 958 959 960
		counter_base = COUNTER_BASE(oldcounters, nentries, cpu);
		for (i = 0; i < nentries; i++) {
			counters[i].pcnt += counter_base[i].pcnt;
			counters[i].bcnt += counter_base[i].bcnt;
		}
	}
}

/* replace the table */
961 962
static int do_replace(struct net *net, const void __user *user,
		      unsigned int len)
L
Linus Torvalds 已提交
963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983
{
	int ret, i, countersize;
	struct ebt_table_info *newinfo;
	struct ebt_replace tmp;
	struct ebt_table *t;
	struct ebt_counter *counterstmp = NULL;
	/* used to be able to unlock earlier */
	struct ebt_table_info *table;

	if (copy_from_user(&tmp, user, sizeof(tmp)) != 0)
		return -EFAULT;

	if (len != sizeof(tmp) + tmp.entries_size) {
		BUGPRINT("Wrong len argument\n");
		return -EINVAL;
	}

	if (tmp.entries_size == 0) {
		BUGPRINT("Entries_size never zero\n");
		return -EINVAL;
	}
984 985 986 987 988 989 990
	/* overflow check */
	if (tmp.nentries >= ((INT_MAX - sizeof(struct ebt_table_info)) / NR_CPUS -
			SMP_CACHE_BYTES) / sizeof(struct ebt_counter))
		return -ENOMEM;
	if (tmp.num_counters >= INT_MAX / sizeof(struct ebt_counter))
		return -ENOMEM;

991
	countersize = COUNTER_OFFSET(tmp.nentries) * nr_cpu_ids;
992
	newinfo = vmalloc(sizeof(*newinfo) + countersize);
L
Linus Torvalds 已提交
993 994 995 996 997 998
	if (!newinfo)
		return -ENOMEM;

	if (countersize)
		memset(newinfo->counters, 0, countersize);

999
	newinfo->entries = vmalloc(tmp.entries_size);
L
Linus Torvalds 已提交
1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013
	if (!newinfo->entries) {
		ret = -ENOMEM;
		goto free_newinfo;
	}
	if (copy_from_user(
	   newinfo->entries, tmp.entries, tmp.entries_size) != 0) {
		BUGPRINT("Couldn't copy entries from userspace\n");
		ret = -EFAULT;
		goto free_entries;
	}

	/* the user wants counters back
	   the check on the size is done later, when we have the lock */
	if (tmp.num_counters) {
1014
		counterstmp = vmalloc(tmp.num_counters * sizeof(*counterstmp));
L
Linus Torvalds 已提交
1015 1016 1017 1018 1019 1020 1021 1022 1023 1024
		if (!counterstmp) {
			ret = -ENOMEM;
			goto free_entries;
		}
	}
	else
		counterstmp = NULL;

	/* this can get initialized by translate_table() */
	newinfo->chainstack = NULL;
1025 1026 1027 1028
	ret = ebt_verify_pointers(&tmp, newinfo);
	if (ret != 0)
		goto free_counterstmp;

1029
	ret = translate_table(net, tmp.name, newinfo);
L
Linus Torvalds 已提交
1030 1031 1032 1033

	if (ret != 0)
		goto free_counterstmp;

1034
	t = find_table_lock(net, tmp.name, &ret, &ebt_mutex);
L
Linus Torvalds 已提交
1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065
	if (!t) {
		ret = -ENOENT;
		goto free_iterate;
	}

	/* the table doesn't like it */
	if (t->check && (ret = t->check(newinfo, tmp.valid_hooks)))
		goto free_unlock;

	if (tmp.num_counters && tmp.num_counters != t->private->nentries) {
		BUGPRINT("Wrong nr. of counters requested\n");
		ret = -EINVAL;
		goto free_unlock;
	}

	/* we have the mutex lock, so no danger in reading this pointer */
	table = t->private;
	/* make sure the table can only be rmmod'ed if it contains no rules */
	if (!table->nentries && newinfo->nentries && !try_module_get(t->me)) {
		ret = -ENOENT;
		goto free_unlock;
	} else if (table->nentries && !newinfo->nentries)
		module_put(t->me);
	/* we need an atomic snapshot of the counters */
	write_lock_bh(&t->lock);
	if (tmp.num_counters)
		get_counters(t->private->counters, counterstmp,
		   t->private->nentries);

	t->private = newinfo;
	write_unlock_bh(&t->lock);
I
Ingo Molnar 已提交
1066
	mutex_unlock(&ebt_mutex);
L
Linus Torvalds 已提交
1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081
	/* so, a user can change the chains while having messed up her counter
	   allocation. Only reason why this is done is because this way the lock
	   is held only once, while this doesn't bring the kernel into a
	   dangerous state. */
	if (tmp.num_counters &&
	   copy_to_user(tmp.counters, counterstmp,
	   tmp.num_counters * sizeof(struct ebt_counter))) {
		BUGPRINT("Couldn't copy counters to userspace\n");
		ret = -EFAULT;
	}
	else
		ret = 0;

	/* decrease module count and free resources */
	EBT_ENTRY_ITERATE(table->entries, table->entries_size,
1082
			  ebt_cleanup_entry, net, NULL);
L
Linus Torvalds 已提交
1083 1084 1085

	vfree(table->entries);
	if (table->chainstack) {
1086
		for_each_possible_cpu(i)
L
Linus Torvalds 已提交
1087 1088 1089 1090 1091
			vfree(table->chainstack[i]);
		vfree(table->chainstack);
	}
	vfree(table);

1092
	vfree(counterstmp);
L
Linus Torvalds 已提交
1093 1094 1095
	return ret;

free_unlock:
I
Ingo Molnar 已提交
1096
	mutex_unlock(&ebt_mutex);
L
Linus Torvalds 已提交
1097 1098
free_iterate:
	EBT_ENTRY_ITERATE(newinfo->entries, newinfo->entries_size,
1099
			  ebt_cleanup_entry, net, NULL);
L
Linus Torvalds 已提交
1100
free_counterstmp:
1101
	vfree(counterstmp);
L
Linus Torvalds 已提交
1102 1103
	/* can be initialized in translate_table() */
	if (newinfo->chainstack) {
1104
		for_each_possible_cpu(i)
L
Linus Torvalds 已提交
1105 1106 1107 1108
			vfree(newinfo->chainstack[i]);
		vfree(newinfo->chainstack);
	}
free_entries:
1109
	vfree(newinfo->entries);
L
Linus Torvalds 已提交
1110
free_newinfo:
1111
	vfree(newinfo);
L
Linus Torvalds 已提交
1112 1113 1114
	return ret;
}

1115 1116
struct ebt_table *
ebt_register_table(struct net *net, const struct ebt_table *input_table)
L
Linus Torvalds 已提交
1117 1118
{
	struct ebt_table_info *newinfo;
1119
	struct ebt_table *t, *table;
1120
	struct ebt_replace_kernel *repl;
L
Linus Torvalds 已提交
1121
	int ret, i, countersize;
1122
	void *p;
L
Linus Torvalds 已提交
1123

1124 1125 1126
	if (input_table == NULL || (repl = input_table->table) == NULL ||
	    repl->entries == 0 || repl->entries_size == 0 ||
	    repl->counters != NULL || input_table->private != NULL) {
L
Linus Torvalds 已提交
1127
		BUGPRINT("Bad table data for ebt_register_table!!!\n");
1128 1129 1130 1131
		return ERR_PTR(-EINVAL);
	}

	/* Don't add one table to multiple lists. */
1132
	table = kmemdup(input_table, sizeof(struct ebt_table), GFP_KERNEL);
1133 1134 1135
	if (!table) {
		ret = -ENOMEM;
		goto out;
L
Linus Torvalds 已提交
1136 1137
	}

1138
	countersize = COUNTER_OFFSET(repl->nentries) * nr_cpu_ids;
1139
	newinfo = vmalloc(sizeof(*newinfo) + countersize);
L
Linus Torvalds 已提交
1140 1141
	ret = -ENOMEM;
	if (!newinfo)
1142
		goto free_table;
L
Linus Torvalds 已提交
1143

1144 1145
	p = vmalloc(repl->entries_size);
	if (!p)
L
Linus Torvalds 已提交
1146 1147
		goto free_newinfo;

1148 1149 1150 1151 1152
	memcpy(p, repl->entries, repl->entries_size);
	newinfo->entries = p;

	newinfo->entries_size = repl->entries_size;
	newinfo->nentries = repl->nentries;
L
Linus Torvalds 已提交
1153 1154 1155 1156 1157 1158

	if (countersize)
		memset(newinfo->counters, 0, countersize);

	/* fill in newinfo and parse the entries */
	newinfo->chainstack = NULL;
1159 1160 1161 1162 1163 1164 1165
	for (i = 0; i < NF_BR_NUMHOOKS; i++) {
		if ((repl->valid_hooks & (1 << i)) == 0)
			newinfo->hook_entry[i] = NULL;
		else
			newinfo->hook_entry[i] = p +
				((char *)repl->hook_entry[i] - repl->entries);
	}
1166
	ret = translate_table(net, repl->name, newinfo);
L
Linus Torvalds 已提交
1167 1168 1169 1170 1171 1172 1173
	if (ret != 0) {
		BUGPRINT("Translate_table failed\n");
		goto free_chainstack;
	}

	if (table->check && table->check(newinfo, table->valid_hooks)) {
		BUGPRINT("The table doesn't like its own initial data, lol\n");
1174
		return ERR_PTR(-EINVAL);
L
Linus Torvalds 已提交
1175 1176 1177 1178
	}

	table->private = newinfo;
	rwlock_init(&table->lock);
I
Ingo Molnar 已提交
1179
	ret = mutex_lock_interruptible(&ebt_mutex);
L
Linus Torvalds 已提交
1180 1181 1182
	if (ret != 0)
		goto free_chainstack;

1183
	list_for_each_entry(t, &net->xt.tables[NFPROTO_BRIDGE], list) {
P
Patrick McHardy 已提交
1184 1185 1186 1187 1188
		if (strcmp(t->name, table->name) == 0) {
			ret = -EEXIST;
			BUGPRINT("Table name already exists\n");
			goto free_unlock;
		}
L
Linus Torvalds 已提交
1189 1190 1191 1192 1193 1194 1195
	}

	/* Hold a reference count if the chains aren't empty */
	if (newinfo->nentries && !try_module_get(table->me)) {
		ret = -ENOENT;
		goto free_unlock;
	}
1196
	list_add(&table->list, &net->xt.tables[NFPROTO_BRIDGE]);
I
Ingo Molnar 已提交
1197
	mutex_unlock(&ebt_mutex);
1198
	return table;
L
Linus Torvalds 已提交
1199
free_unlock:
I
Ingo Molnar 已提交
1200
	mutex_unlock(&ebt_mutex);
L
Linus Torvalds 已提交
1201 1202
free_chainstack:
	if (newinfo->chainstack) {
1203
		for_each_possible_cpu(i)
L
Linus Torvalds 已提交
1204 1205 1206 1207 1208 1209
			vfree(newinfo->chainstack[i]);
		vfree(newinfo->chainstack);
	}
	vfree(newinfo->entries);
free_newinfo:
	vfree(newinfo);
1210 1211 1212 1213
free_table:
	kfree(table);
out:
	return ERR_PTR(ret);
L
Linus Torvalds 已提交
1214 1215
}

1216
void ebt_unregister_table(struct net *net, struct ebt_table *table)
L
Linus Torvalds 已提交
1217 1218 1219 1220 1221 1222 1223
{
	int i;

	if (!table) {
		BUGPRINT("Request to unregister NULL table!!!\n");
		return;
	}
I
Ingo Molnar 已提交
1224
	mutex_lock(&ebt_mutex);
P
Patrick McHardy 已提交
1225
	list_del(&table->list);
I
Ingo Molnar 已提交
1226
	mutex_unlock(&ebt_mutex);
1227
	EBT_ENTRY_ITERATE(table->private->entries, table->private->entries_size,
1228
			  ebt_cleanup_entry, net, NULL);
1229 1230
	if (table->private->nentries)
		module_put(table->me);
1231
	vfree(table->private->entries);
L
Linus Torvalds 已提交
1232
	if (table->private->chainstack) {
1233
		for_each_possible_cpu(i)
L
Linus Torvalds 已提交
1234 1235 1236 1237
			vfree(table->private->chainstack[i]);
		vfree(table->private->chainstack);
	}
	vfree(table->private);
1238
	kfree(table);
L
Linus Torvalds 已提交
1239 1240 1241
}

/* userspace just supplied us with counters */
1242 1243
static int update_counters(struct net *net, const void __user *user,
			   unsigned int len)
L
Linus Torvalds 已提交
1244 1245 1246 1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257
{
	int i, ret;
	struct ebt_counter *tmp;
	struct ebt_replace hlp;
	struct ebt_table *t;

	if (copy_from_user(&hlp, user, sizeof(hlp)))
		return -EFAULT;

	if (len != sizeof(hlp) + hlp.num_counters * sizeof(struct ebt_counter))
		return -EINVAL;
	if (hlp.num_counters == 0)
		return -EINVAL;

1258
	if (!(tmp = vmalloc(hlp.num_counters * sizeof(*tmp)))) {
L
Linus Torvalds 已提交
1259 1260 1261 1262
		MEMPRINT("Update_counters && nomemory\n");
		return -ENOMEM;
	}

1263
	t = find_table_lock(net, hlp.name, &ret, &ebt_mutex);
L
Linus Torvalds 已提交
1264 1265 1266 1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287 1288 1289 1290 1291
	if (!t)
		goto free_tmp;

	if (hlp.num_counters != t->private->nentries) {
		BUGPRINT("Wrong nr of counters\n");
		ret = -EINVAL;
		goto unlock_mutex;
	}

	if ( copy_from_user(tmp, hlp.counters,
	   hlp.num_counters * sizeof(struct ebt_counter)) ) {
		BUGPRINT("Updata_counters && !cfu\n");
		ret = -EFAULT;
		goto unlock_mutex;
	}

	/* we want an atomic add of the counters */
	write_lock_bh(&t->lock);

	/* we add to the counters of the first cpu */
	for (i = 0; i < hlp.num_counters; i++) {
		t->private->counters[i].pcnt += tmp[i].pcnt;
		t->private->counters[i].bcnt += tmp[i].bcnt;
	}

	write_unlock_bh(&t->lock);
	ret = 0;
unlock_mutex:
I
Ingo Molnar 已提交
1292
	mutex_unlock(&ebt_mutex);
L
Linus Torvalds 已提交
1293 1294 1295 1296 1297
free_tmp:
	vfree(tmp);
	return ret;
}

1298 1299
static inline int ebt_make_matchname(const struct ebt_entry_match *m,
    const char *base, char __user *ubase)
L
Linus Torvalds 已提交
1300
{
1301
	char __user *hlp = ubase + ((char *)m - base);
L
Linus Torvalds 已提交
1302 1303 1304 1305 1306
	if (copy_to_user(hlp, m->u.match->name, EBT_FUNCTION_MAXNAMELEN))
		return -EFAULT;
	return 0;
}

1307 1308
static inline int ebt_make_watchername(const struct ebt_entry_watcher *w,
    const char *base, char __user *ubase)
L
Linus Torvalds 已提交
1309
{
1310
	char __user *hlp = ubase + ((char *)w - base);
L
Linus Torvalds 已提交
1311 1312 1313 1314 1315
	if (copy_to_user(hlp , w->u.watcher->name, EBT_FUNCTION_MAXNAMELEN))
		return -EFAULT;
	return 0;
}

1316 1317
static inline int
ebt_make_names(struct ebt_entry *e, const char *base, char __user *ubase)
L
Linus Torvalds 已提交
1318 1319
{
	int ret;
1320
	char __user *hlp;
1321
	const struct ebt_entry_target *t;
L
Linus Torvalds 已提交
1322

1323
	if (e->bitmask == 0)
L
Linus Torvalds 已提交
1324 1325
		return 0;

1326
	hlp = ubase + (((char *)e + e->target_offset) - base);
L
Linus Torvalds 已提交
1327
	t = (struct ebt_entry_target *)(((char *)e) + e->target_offset);
1328

L
Linus Torvalds 已提交
1329 1330 1331 1332 1333 1334 1335 1336 1337 1338 1339
	ret = EBT_MATCH_ITERATE(e, ebt_make_matchname, base, ubase);
	if (ret != 0)
		return ret;
	ret = EBT_WATCHER_ITERATE(e, ebt_make_watchername, base, ubase);
	if (ret != 0)
		return ret;
	if (copy_to_user(hlp, t->u.target->name, EBT_FUNCTION_MAXNAMELEN))
		return -EFAULT;
	return 0;
}

I
Ingo Molnar 已提交
1340
/* called with ebt_mutex locked */
L
Linus Torvalds 已提交
1341
static int copy_everything_to_user(struct ebt_table *t, void __user *user,
1342
    const int *len, int cmd)
L
Linus Torvalds 已提交
1343 1344
{
	struct ebt_replace tmp;
1345 1346
	struct ebt_counter *counterstmp;
	const struct ebt_counter *oldcounters;
L
Linus Torvalds 已提交
1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367 1368 1369 1370 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388
	unsigned int entries_size, nentries;
	char *entries;

	if (cmd == EBT_SO_GET_ENTRIES) {
		entries_size = t->private->entries_size;
		nentries = t->private->nentries;
		entries = t->private->entries;
		oldcounters = t->private->counters;
	} else {
		entries_size = t->table->entries_size;
		nentries = t->table->nentries;
		entries = t->table->entries;
		oldcounters = t->table->counters;
	}

	if (copy_from_user(&tmp, user, sizeof(tmp))) {
		BUGPRINT("Cfu didn't work\n");
		return -EFAULT;
	}

	if (*len != sizeof(struct ebt_replace) + entries_size +
	   (tmp.num_counters? nentries * sizeof(struct ebt_counter): 0)) {
		BUGPRINT("Wrong size\n");
		return -EINVAL;
	}

	if (tmp.nentries != nentries) {
		BUGPRINT("Nentries wrong\n");
		return -EINVAL;
	}

	if (tmp.entries_size != entries_size) {
		BUGPRINT("Wrong size\n");
		return -EINVAL;
	}

	/* userspace might not need the counters */
	if (tmp.num_counters) {
		if (tmp.num_counters != nentries) {
			BUGPRINT("Num_counters wrong\n");
			return -EINVAL;
		}
1389
		counterstmp = vmalloc(nentries * sizeof(*counterstmp));
L
Linus Torvalds 已提交
1390 1391 1392 1393 1394 1395 1396 1397 1398 1399 1400 1401 1402 1403 1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420
		if (!counterstmp) {
			MEMPRINT("Couldn't copy counters, out of memory\n");
			return -ENOMEM;
		}
		write_lock_bh(&t->lock);
		get_counters(oldcounters, counterstmp, nentries);
		write_unlock_bh(&t->lock);

		if (copy_to_user(tmp.counters, counterstmp,
		   nentries * sizeof(struct ebt_counter))) {
			BUGPRINT("Couldn't copy counters to userspace\n");
			vfree(counterstmp);
			return -EFAULT;
		}
		vfree(counterstmp);
	}

	if (copy_to_user(tmp.entries, entries, entries_size)) {
		BUGPRINT("Couldn't copy entries to userspace\n");
		return -EFAULT;
	}
	/* set the match/watcher/target names right */
	return EBT_ENTRY_ITERATE(entries, entries_size,
	   ebt_make_names, entries, tmp.entries);
}

static int do_ebt_set_ctl(struct sock *sk,
	int cmd, void __user *user, unsigned int len)
{
	int ret;

1421 1422 1423
	if (!capable(CAP_NET_ADMIN))
		return -EPERM;

L
Linus Torvalds 已提交
1424 1425
	switch(cmd) {
	case EBT_SO_SET_ENTRIES:
1426
		ret = do_replace(sock_net(sk), user, len);
L
Linus Torvalds 已提交
1427 1428
		break;
	case EBT_SO_SET_COUNTERS:
1429
		ret = update_counters(sock_net(sk), user, len);
L
Linus Torvalds 已提交
1430 1431 1432 1433 1434 1435 1436 1437 1438 1439 1440 1441 1442
		break;
	default:
		ret = -EINVAL;
  }
	return ret;
}

static int do_ebt_get_ctl(struct sock *sk, int cmd, void __user *user, int *len)
{
	int ret;
	struct ebt_replace tmp;
	struct ebt_table *t;

1443 1444 1445
	if (!capable(CAP_NET_ADMIN))
		return -EPERM;

L
Linus Torvalds 已提交
1446 1447 1448
	if (copy_from_user(&tmp, user, sizeof(tmp)))
		return -EFAULT;

1449
	t = find_table_lock(sock_net(sk), tmp.name, &ret, &ebt_mutex);
L
Linus Torvalds 已提交
1450 1451 1452 1453 1454 1455 1456 1457
	if (!t)
		return ret;

	switch(cmd) {
	case EBT_SO_GET_INFO:
	case EBT_SO_GET_INIT_INFO:
		if (*len != sizeof(struct ebt_replace)){
			ret = -EINVAL;
I
Ingo Molnar 已提交
1458
			mutex_unlock(&ebt_mutex);
L
Linus Torvalds 已提交
1459 1460 1461 1462 1463 1464 1465 1466 1467 1468 1469
			break;
		}
		if (cmd == EBT_SO_GET_INFO) {
			tmp.nentries = t->private->nentries;
			tmp.entries_size = t->private->entries_size;
			tmp.valid_hooks = t->valid_hooks;
		} else {
			tmp.nentries = t->table->nentries;
			tmp.entries_size = t->table->entries_size;
			tmp.valid_hooks = t->table->valid_hooks;
		}
I
Ingo Molnar 已提交
1470
		mutex_unlock(&ebt_mutex);
L
Linus Torvalds 已提交
1471 1472 1473 1474 1475 1476 1477 1478 1479 1480 1481
		if (copy_to_user(user, &tmp, *len) != 0){
			BUGPRINT("c2u Didn't work\n");
			ret = -EFAULT;
			break;
		}
		ret = 0;
		break;

	case EBT_SO_GET_ENTRIES:
	case EBT_SO_GET_INIT_ENTRIES:
		ret = copy_everything_to_user(t, user, len, cmd);
I
Ingo Molnar 已提交
1482
		mutex_unlock(&ebt_mutex);
L
Linus Torvalds 已提交
1483 1484 1485
		break;

	default:
I
Ingo Molnar 已提交
1486
		mutex_unlock(&ebt_mutex);
L
Linus Torvalds 已提交
1487 1488 1489 1490 1491 1492 1493
		ret = -EINVAL;
	}

	return ret;
}

static struct nf_sockopt_ops ebt_sockopts =
A
Andrew Morton 已提交
1494 1495 1496 1497 1498 1499 1500 1501
{
	.pf		= PF_INET,
	.set_optmin	= EBT_BASE_CTL,
	.set_optmax	= EBT_SO_SET_MAX + 1,
	.set		= do_ebt_set_ctl,
	.get_optmin	= EBT_BASE_CTL,
	.get_optmax	= EBT_SO_GET_MAX + 1,
	.get		= do_ebt_get_ctl,
1502
	.owner		= THIS_MODULE,
L
Linus Torvalds 已提交
1503 1504
};

1505
static int __init ebtables_init(void)
L
Linus Torvalds 已提交
1506 1507 1508
{
	int ret;

1509 1510
	ret = xt_register_target(&ebt_standard_target);
	if (ret < 0)
L
Linus Torvalds 已提交
1511
		return ret;
1512 1513 1514 1515 1516
	ret = nf_register_sockopt(&ebt_sockopts);
	if (ret < 0) {
		xt_unregister_target(&ebt_standard_target);
		return ret;
	}
L
Linus Torvalds 已提交
1517

1518
	printk(KERN_INFO "Ebtables v2.0 registered\n");
L
Linus Torvalds 已提交
1519 1520 1521
	return 0;
}

1522
static void __exit ebtables_fini(void)
L
Linus Torvalds 已提交
1523 1524
{
	nf_unregister_sockopt(&ebt_sockopts);
1525
	xt_unregister_target(&ebt_standard_target);
1526
	printk(KERN_INFO "Ebtables v2.0 unregistered\n");
L
Linus Torvalds 已提交
1527 1528 1529 1530 1531
}

EXPORT_SYMBOL(ebt_register_table);
EXPORT_SYMBOL(ebt_unregister_table);
EXPORT_SYMBOL(ebt_do_table);
1532 1533
module_init(ebtables_init);
module_exit(ebtables_fini);
L
Linus Torvalds 已提交
1534
MODULE_LICENSE("GPL");