]> git.proxmox.com Git - mirror_ubuntu-zesty-kernel.git/blame - net/netfilter/ipset/ip_set_bitmap_ip.c
netfilter: ipset: Fix "may be used uninitialized" warnings
[mirror_ubuntu-zesty-kernel.git] / net / netfilter / ipset / ip_set_bitmap_ip.c
CommitLineData
72205fc6
JK
1/* Copyright (C) 2000-2002 Joakim Axelsson <gozem@linux.nu>
2 * Patrick Schaaf <bof@bof.de>
b0da3905 3 * Copyright (C) 2003-2013 Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
72205fc6
JK
4 *
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License version 2 as
7 * published by the Free Software Foundation.
8 */
9
10/* Kernel module implementing an IP set type: the bitmap:ip type */
11
12#include <linux/module.h>
13#include <linux/ip.h>
14#include <linux/skbuff.h>
15#include <linux/errno.h>
72205fc6
JK
16#include <linux/bitops.h>
17#include <linux/spinlock.h>
18#include <linux/netlink.h>
19#include <linux/jiffies.h>
20#include <linux/timer.h>
21#include <net/netlink.h>
22#include <net/tcp.h>
23
24#include <linux/netfilter/ipset/pfxlen.h>
25#include <linux/netfilter/ipset/ip_set.h>
26#include <linux/netfilter/ipset/ip_set_bitmap.h>
72205fc6 27
35b8dcf8
JK
28#define IPSET_TYPE_REV_MIN 0
29#define IPSET_TYPE_REV_MAX 1 /* Counter support added */
10111a6e 30
72205fc6
JK
31MODULE_LICENSE("GPL");
32MODULE_AUTHOR("Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>");
35b8dcf8 33IP_SET_MODULE_DESC("bitmap:ip", IPSET_TYPE_REV_MIN, IPSET_TYPE_REV_MAX);
72205fc6
JK
34MODULE_ALIAS("ip_set_bitmap:ip");
35
b0da3905
JK
36#define MTYPE bitmap_ip
37
72205fc6
JK
38/* Type structure */
39struct bitmap_ip {
40 void *members; /* the set members */
b0da3905 41 void *extensions; /* data extensions */
72205fc6
JK
42 u32 first_ip; /* host byte order, included in range */
43 u32 last_ip; /* host byte order, included in range */
44 u32 elements; /* number of max elements in the set */
45 u32 hosts; /* number of hosts in a subnet */
46 size_t memsize; /* members size */
b0da3905
JK
47 size_t dsize; /* extensions struct size */
48 size_t offset[IPSET_OFFSET_MAX]; /* Offsets to extensions */
72205fc6
JK
49 u8 netmask; /* subnet netmask */
50 u32 timeout; /* timeout parameter */
51 struct timer_list gc; /* garbage collection */
52};
53
b0da3905
JK
54/* ADT structure for generic function args */
55struct bitmap_ip_adt_elem {
56 u16 id;
57};
72205fc6
JK
58
59static inline u32
60ip_to_id(const struct bitmap_ip *m, u32 ip)
61{
62 return ((ip & ip_set_hostmask(m->netmask)) - m->first_ip)/m->hosts;
63}
64
b0da3905 65/* Common functions */
72205fc6 66
b0da3905
JK
67static inline int
68bitmap_ip_do_test(const struct bitmap_ip_adt_elem *e, struct bitmap_ip *map)
72205fc6 69{
b0da3905 70 return !!test_bit(e->id, map->members);
72205fc6
JK
71}
72
b0da3905
JK
73static inline int
74bitmap_ip_gc_test(u16 id, const struct bitmap_ip *map)
72205fc6 75{
b0da3905 76 return !!test_bit(id, map->members);
72205fc6
JK
77}
78
b0da3905
JK
79static inline int
80bitmap_ip_do_add(const struct bitmap_ip_adt_elem *e, struct bitmap_ip *map,
81 u32 flags)
72205fc6 82{
b0da3905 83 return !!test_and_set_bit(e->id, map->members);
72205fc6
JK
84}
85
b0da3905
JK
86static inline int
87bitmap_ip_do_del(const struct bitmap_ip_adt_elem *e, struct bitmap_ip *map)
72205fc6 88{
b0da3905 89 return !test_and_clear_bit(e->id, map->members);
72205fc6
JK
90}
91
b0da3905
JK
92static inline int
93bitmap_ip_do_list(struct sk_buff *skb, const struct bitmap_ip *map, u32 id)
72205fc6 94{
b0da3905
JK
95 return nla_put_ipaddr4(skb, IPSET_ATTR_IP,
96 htonl(map->first_ip + id * map->hosts));
72205fc6
JK
97}
98
b0da3905
JK
99static inline int
100bitmap_ip_do_head(struct sk_buff *skb, const struct bitmap_ip *map)
72205fc6 101{
b0da3905
JK
102 return nla_put_ipaddr4(skb, IPSET_ATTR_IP, htonl(map->first_ip)) ||
103 nla_put_ipaddr4(skb, IPSET_ATTR_IP_TO, htonl(map->last_ip)) ||
104 (map->netmask != 32 &&
105 nla_put_u8(skb, IPSET_ATTR_NETMASK, map->netmask));
72205fc6
JK
106}
107
108static int
109bitmap_ip_kadt(struct ip_set *set, const struct sk_buff *skb,
b66554cf 110 const struct xt_action_param *par,
b0da3905 111 enum ipset_adt adt, struct ip_set_adt_opt *opt)
72205fc6
JK
112{
113 struct bitmap_ip *map = set->data;
114 ipset_adtfn adtfn = set->variant->adt[adt];
b0da3905
JK
115 struct bitmap_ip_adt_elem e = { };
116 struct ip_set_ext ext = IP_SET_INIT_KEXT(skb, opt, map);
72205fc6
JK
117 u32 ip;
118
ac8cc925 119 ip = ntohl(ip4addr(skb, opt->flags & IPSET_DIM_ONE_SRC));
72205fc6
JK
120 if (ip < map->first_ip || ip > map->last_ip)
121 return -IPSET_ERR_BITMAP_RANGE;
122
b0da3905 123 e.id = ip_to_id(map, ip);
72205fc6 124
b0da3905 125 return adtfn(set, &e, &ext, &opt->ext, opt->cmdflags);
72205fc6
JK
126}
127
128static int
129bitmap_ip_uadt(struct ip_set *set, struct nlattr *tb[],
3d14b171 130 enum ipset_adt adt, u32 *lineno, u32 flags, bool retried)
72205fc6
JK
131{
132 struct bitmap_ip *map = set->data;
133 ipset_adtfn adtfn = set->variant->adt[adt];
20b2fab4 134 u32 ip = 0, ip_to = 0;
b0da3905
JK
135 struct bitmap_ip_adt_elem e = { };
136 struct ip_set_ext ext = IP_SET_INIT_UEXT(map);
72205fc6
JK
137 int ret = 0;
138
139 if (unlikely(!tb[IPSET_ATTR_IP] ||
f48d19db
JK
140 !ip_set_optattr_netorder(tb, IPSET_ATTR_TIMEOUT) ||
141 !ip_set_optattr_netorder(tb, IPSET_ATTR_PACKETS) ||
142 !ip_set_optattr_netorder(tb, IPSET_ATTR_BYTES)))
72205fc6
JK
143 return -IPSET_ERR_PROTOCOL;
144
145 if (tb[IPSET_ATTR_LINENO])
146 *lineno = nla_get_u32(tb[IPSET_ATTR_LINENO]);
147
b0da3905
JK
148 ret = ip_set_get_hostipaddr4(tb[IPSET_ATTR_IP], &ip) ||
149 ip_set_get_extensions(set, tb, &ext);
72205fc6
JK
150 if (ret)
151 return ret;
152
153 if (ip < map->first_ip || ip > map->last_ip)
154 return -IPSET_ERR_BITMAP_RANGE;
155
72205fc6 156 if (adt == IPSET_TEST) {
b0da3905
JK
157 e.id = ip_to_id(map, ip);
158 return adtfn(set, &e, &ext, &ext, flags);
72205fc6
JK
159 }
160
161 if (tb[IPSET_ATTR_IP_TO]) {
162 ret = ip_set_get_hostipaddr4(tb[IPSET_ATTR_IP_TO], &ip_to);
163 if (ret)
164 return ret;
165 if (ip > ip_to) {
166 swap(ip, ip_to);
167 if (ip < map->first_ip)
168 return -IPSET_ERR_BITMAP_RANGE;
169 }
170 } else if (tb[IPSET_ATTR_CIDR]) {
171 u8 cidr = nla_get_u8(tb[IPSET_ATTR_CIDR]);
172
b9fed748 173 if (!cidr || cidr > 32)
72205fc6 174 return -IPSET_ERR_INVALID_CIDR;
e6146e86 175 ip_set_mask_from_to(ip, ip_to, cidr);
72205fc6
JK
176 } else
177 ip_to = ip;
178
179 if (ip_to > map->last_ip)
180 return -IPSET_ERR_BITMAP_RANGE;
181
182 for (; !before(ip_to, ip); ip += map->hosts) {
b0da3905
JK
183 e.id = ip_to_id(map, ip);
184 ret = adtfn(set, &e, &ext, &ext, flags);
72205fc6
JK
185
186 if (ret && !ip_set_eexist(ret, flags))
187 return ret;
188 else
189 ret = 0;
190 }
191 return ret;
192}
193
72205fc6
JK
194static bool
195bitmap_ip_same_set(const struct ip_set *a, const struct ip_set *b)
196{
197 const struct bitmap_ip *x = a->data;
198 const struct bitmap_ip *y = b->data;
199
200 return x->first_ip == y->first_ip &&
201 x->last_ip == y->last_ip &&
202 x->netmask == y->netmask &&
b0da3905
JK
203 x->timeout == y->timeout &&
204 a->extensions == b->extensions;
72205fc6
JK
205}
206
b0da3905 207/* Plain variant */
72205fc6 208
b0da3905 209struct bitmap_ip_elem {
72205fc6
JK
210};
211
b0da3905 212/* Timeout variant */
72205fc6 213
b0da3905
JK
214struct bitmap_ipt_elem {
215 unsigned long timeout;
216};
72205fc6 217
f48d19db
JK
218/* Plain variant with counter */
219
220struct bitmap_ipc_elem {
221 struct ip_set_counter counter;
222};
223
224/* Timeout variant with counter */
225
226struct bitmap_ipct_elem {
227 unsigned long timeout;
228 struct ip_set_counter counter;
229};
230
b0da3905 231#include "ip_set_bitmap_gen.h"
72205fc6
JK
232
233/* Create bitmap:ip type of sets */
234
235static bool
236init_map_ip(struct ip_set *set, struct bitmap_ip *map,
237 u32 first_ip, u32 last_ip,
238 u32 elements, u32 hosts, u8 netmask)
239{
240 map->members = ip_set_alloc(map->memsize);
241 if (!map->members)
242 return false;
b0da3905
JK
243 if (map->dsize) {
244 map->extensions = ip_set_alloc(map->dsize * elements);
245 if (!map->extensions) {
246 kfree(map->members);
247 return false;
248 }
249 }
72205fc6
JK
250 map->first_ip = first_ip;
251 map->last_ip = last_ip;
252 map->elements = elements;
253 map->hosts = hosts;
254 map->netmask = netmask;
255 map->timeout = IPSET_NO_TIMEOUT;
256
257 set->data = map;
c15f1c83 258 set->family = NFPROTO_IPV4;
72205fc6
JK
259
260 return true;
261}
262
263static int
264bitmap_ip_create(struct ip_set *set, struct nlattr *tb[], u32 flags)
265{
266 struct bitmap_ip *map;
20b2fab4 267 u32 first_ip = 0, last_ip = 0, hosts, cadt_flags = 0;
b9fed748 268 u64 elements;
72205fc6
JK
269 u8 netmask = 32;
270 int ret;
271
272 if (unlikely(!tb[IPSET_ATTR_IP] ||
f48d19db
JK
273 !ip_set_optattr_netorder(tb, IPSET_ATTR_TIMEOUT) ||
274 !ip_set_optattr_netorder(tb, IPSET_ATTR_CADT_FLAGS)))
72205fc6
JK
275 return -IPSET_ERR_PROTOCOL;
276
277 ret = ip_set_get_hostipaddr4(tb[IPSET_ATTR_IP], &first_ip);
278 if (ret)
279 return ret;
280
281 if (tb[IPSET_ATTR_IP_TO]) {
282 ret = ip_set_get_hostipaddr4(tb[IPSET_ATTR_IP_TO], &last_ip);
283 if (ret)
284 return ret;
285 if (first_ip > last_ip) {
286 u32 tmp = first_ip;
287
288 first_ip = last_ip;
289 last_ip = tmp;
290 }
291 } else if (tb[IPSET_ATTR_CIDR]) {
292 u8 cidr = nla_get_u8(tb[IPSET_ATTR_CIDR]);
293
294 if (cidr >= 32)
295 return -IPSET_ERR_INVALID_CIDR;
e6146e86 296 ip_set_mask_from_to(first_ip, last_ip, cidr);
72205fc6
JK
297 } else
298 return -IPSET_ERR_PROTOCOL;
299
300 if (tb[IPSET_ATTR_NETMASK]) {
301 netmask = nla_get_u8(tb[IPSET_ATTR_NETMASK]);
302
303 if (netmask > 32)
304 return -IPSET_ERR_INVALID_NETMASK;
305
306 first_ip &= ip_set_hostmask(netmask);
307 last_ip |= ~ip_set_hostmask(netmask);
308 }
309
310 if (netmask == 32) {
311 hosts = 1;
b9fed748 312 elements = (u64)last_ip - first_ip + 1;
72205fc6
JK
313 } else {
314 u8 mask_bits;
315 u32 mask;
316
317 mask = range_to_mask(first_ip, last_ip, &mask_bits);
318
319 if ((!mask && (first_ip || last_ip != 0xFFFFFFFF)) ||
320 netmask <= mask_bits)
321 return -IPSET_ERR_BITMAP_RANGE;
322
323 pr_debug("mask_bits %u, netmask %u\n", mask_bits, netmask);
324 hosts = 2 << (32 - netmask - 1);
325 elements = 2 << (netmask - mask_bits - 1);
326 }
327 if (elements > IPSET_BITMAP_MAX_RANGE + 1)
328 return -IPSET_ERR_BITMAP_RANGE_SIZE;
329
b9fed748
JK
330 pr_debug("hosts %u, elements %llu\n",
331 hosts, (unsigned long long)elements);
72205fc6
JK
332
333 map = kzalloc(sizeof(*map), GFP_KERNEL);
334 if (!map)
335 return -ENOMEM;
336
b0da3905
JK
337 map->memsize = bitmap_bytes(0, elements - 1);
338 set->variant = &bitmap_ip;
f48d19db
JK
339 if (tb[IPSET_ATTR_CADT_FLAGS])
340 cadt_flags = ip_set_get_h32(tb[IPSET_ATTR_CADT_FLAGS]);
341 if (cadt_flags & IPSET_FLAG_WITH_COUNTERS) {
342 set->extensions |= IPSET_EXT_COUNTER;
343 if (tb[IPSET_ATTR_TIMEOUT]) {
344 map->dsize = sizeof(struct bitmap_ipct_elem);
345 map->offset[IPSET_OFFSET_TIMEOUT] =
346 offsetof(struct bitmap_ipct_elem, timeout);
347 map->offset[IPSET_OFFSET_COUNTER] =
348 offsetof(struct bitmap_ipct_elem, counter);
349
350 if (!init_map_ip(set, map, first_ip, last_ip,
351 elements, hosts, netmask)) {
352 kfree(map);
353 return -ENOMEM;
354 }
355
356 map->timeout = ip_set_timeout_uget(
357 tb[IPSET_ATTR_TIMEOUT]);
358 set->extensions |= IPSET_EXT_TIMEOUT;
359
360 bitmap_ip_gc_init(set, bitmap_ip_gc);
361 } else {
362 map->dsize = sizeof(struct bitmap_ipc_elem);
363 map->offset[IPSET_OFFSET_COUNTER] =
364 offsetof(struct bitmap_ipc_elem, counter);
365
366 if (!init_map_ip(set, map, first_ip, last_ip,
367 elements, hosts, netmask)) {
368 kfree(map);
369 return -ENOMEM;
370 }
371 }
372 } else if (tb[IPSET_ATTR_TIMEOUT]) {
b0da3905
JK
373 map->dsize = sizeof(struct bitmap_ipt_elem);
374 map->offset[IPSET_OFFSET_TIMEOUT] =
375 offsetof(struct bitmap_ipt_elem, timeout);
72205fc6
JK
376
377 if (!init_map_ip(set, map, first_ip, last_ip,
378 elements, hosts, netmask)) {
379 kfree(map);
380 return -ENOMEM;
381 }
382
383 map->timeout = ip_set_timeout_uget(tb[IPSET_ATTR_TIMEOUT]);
b0da3905 384 set->extensions |= IPSET_EXT_TIMEOUT;
72205fc6 385
b0da3905 386 bitmap_ip_gc_init(set, bitmap_ip_gc);
72205fc6 387 } else {
b0da3905 388 map->dsize = 0;
72205fc6
JK
389 if (!init_map_ip(set, map, first_ip, last_ip,
390 elements, hosts, netmask)) {
391 kfree(map);
392 return -ENOMEM;
393 }
72205fc6
JK
394 }
395 return 0;
396}
397
398static struct ip_set_type bitmap_ip_type __read_mostly = {
399 .name = "bitmap:ip",
400 .protocol = IPSET_PROTOCOL,
401 .features = IPSET_TYPE_IP,
402 .dimension = IPSET_DIM_ONE,
c15f1c83 403 .family = NFPROTO_IPV4,
35b8dcf8
JK
404 .revision_min = IPSET_TYPE_REV_MIN,
405 .revision_max = IPSET_TYPE_REV_MAX,
72205fc6
JK
406 .create = bitmap_ip_create,
407 .create_policy = {
408 [IPSET_ATTR_IP] = { .type = NLA_NESTED },
409 [IPSET_ATTR_IP_TO] = { .type = NLA_NESTED },
410 [IPSET_ATTR_CIDR] = { .type = NLA_U8 },
411 [IPSET_ATTR_NETMASK] = { .type = NLA_U8 },
412 [IPSET_ATTR_TIMEOUT] = { .type = NLA_U32 },
f48d19db 413 [IPSET_ATTR_CADT_FLAGS] = { .type = NLA_U32 },
72205fc6
JK
414 },
415 .adt_policy = {
416 [IPSET_ATTR_IP] = { .type = NLA_NESTED },
417 [IPSET_ATTR_IP_TO] = { .type = NLA_NESTED },
418 [IPSET_ATTR_CIDR] = { .type = NLA_U8 },
419 [IPSET_ATTR_TIMEOUT] = { .type = NLA_U32 },
420 [IPSET_ATTR_LINENO] = { .type = NLA_U32 },
f48d19db
JK
421 [IPSET_ATTR_BYTES] = { .type = NLA_U64 },
422 [IPSET_ATTR_PACKETS] = { .type = NLA_U64 },
72205fc6
JK
423 },
424 .me = THIS_MODULE,
425};
426
427static int __init
428bitmap_ip_init(void)
429{
430 return ip_set_type_register(&bitmap_ip_type);
431}
432
433static void __exit
434bitmap_ip_fini(void)
435{
436 ip_set_type_unregister(&bitmap_ip_type);
437}
438
439module_init(bitmap_ip_init);
440module_exit(bitmap_ip_fini);