2 * m_ipt.c iptables based targets
3 * utilities mostly ripped from iptables <duh, its the linux way>
5 * This program is free software; you can distribute it and/or
6 * modify it under the terms of the GNU General Public License
7 * as published by the Free Software Foundation; either version
8 * 2 of the License, or (at your option) any later version.
10 * Authors: J Hadi Salim (hadi@cyberus.ca)
12 * TODO: bad bad hardcoding IPT_LIB_DIR and PROC_SYS_MODPROBE
17 #include <sys/socket.h>
18 #include <netinet/in.h>
19 #include <arpa/inet.h>
21 #include <linux/netfilter_ipv4/ip_tables.h>
24 #include <linux/tc_act/tc_ipt.h>
39 static const char *pname
= "tc-ipt";
40 static const char *tname
= "mangle";
41 static const char *pversion
= "0.1";
43 static const char *ipthooks
[] = {
51 static struct option original_opts
[] = {
56 static struct iptables_target
*t_list
= NULL
;
57 static struct option
*opts
= original_opts
;
58 static unsigned int global_option_offset
= 0;
59 #define OPTION_OFFSET 256
63 register_target(struct iptables_target
*me
)
65 /* fprintf(stderr, "\nDummy register_target %s \n", me->name);
73 exit_tryhelp(int status
)
75 fprintf(stderr
, "Try `%s -h' or '%s --help' for more information.\n",
81 exit_error(enum exittype status
, char *msg
, ...)
86 fprintf(stderr
, "%s v%s: ", pname
, pversion
);
87 vfprintf(stderr
, msg
, args
);
89 fprintf(stderr
, "\n");
90 if (status
== PARAMETER_PROBLEM
)
92 if (status
== VERSION_PROBLEM
)
94 "Perhaps iptables or your kernel needs to be upgraded.\n");
98 /* stolen from iptables 1.2.11
99 They should really have them as a library so i can link to them
100 Email them next time i remember
104 addr_to_dotted(const struct in_addr
*addrp
)
107 const unsigned char *bytep
;
109 bytep
= (const unsigned char *) &(addrp
->s_addr
);
110 sprintf(buf
, "%d.%d.%d.%d", bytep
[0], bytep
[1], bytep
[2], bytep
[3]);
114 int string_to_number_ll(const char *s
, unsigned long long min
,
115 unsigned long long max
,
116 unsigned long long *ret
)
118 unsigned long long number
;
121 /* Handle hex, octal, etc. */
123 number
= strtoull(s
, &end
, 0);
124 if (*end
== '\0' && end
!= s
) {
125 /* we parsed a number, let's see if we want this */
126 if (errno
!= ERANGE
&& min
<= number
&& (!max
|| number
<= max
)) {
134 int string_to_number_l(const char *s
, unsigned long min
, unsigned long max
,
138 unsigned long long number
;
140 result
= string_to_number_ll(s
, min
, max
, &number
);
141 *ret
= (unsigned long)number
;
146 int string_to_number(const char *s
, unsigned int min
, unsigned int max
,
150 unsigned long number
;
152 result
= string_to_number_l(s
, min
, max
, &number
);
153 *ret
= (unsigned int)number
;
158 static void free_opts(struct option
*opts
)
160 if (opts
!= original_opts
) {
162 opts
= original_opts
;
163 global_option_offset
= 0;
167 static struct option
*
168 merge_options(struct option
*oldopts
, const struct option
*newopts
,
169 unsigned int *option_offset
)
171 struct option
*merge
;
172 unsigned int num_old
, num_new
, i
;
174 for (num_old
= 0; oldopts
[num_old
].name
; num_old
++) ;
175 for (num_new
= 0; newopts
[num_new
].name
; num_new
++) ;
177 *option_offset
= global_option_offset
+ OPTION_OFFSET
;
179 merge
= malloc(sizeof (struct option
) * (num_new
+ num_old
+ 1));
180 memcpy(merge
, oldopts
, num_old
* sizeof (struct option
));
181 for (i
= 0; i
< num_new
; i
++) {
182 merge
[num_old
+ i
] = newopts
[i
];
183 merge
[num_old
+ i
].val
+= *option_offset
;
185 memset(merge
+ num_old
+ num_new
, 0, sizeof (struct option
));
191 fw_calloc(size_t count
, size_t size
)
195 if ((p
= (void *) calloc(count
, size
)) == NULL
) {
196 perror("iptables: calloc failed");
202 static struct iptables_target
*
205 struct iptables_target
*m
;
206 for (m
= t_list
; m
; m
= m
->next
) {
207 if (strcmp(m
->name
, name
) == 0)
214 static struct iptables_target
*
215 get_target_name(char *name
)
219 char *new_name
, *lname
;
220 struct iptables_target
*m
;
222 char path
[sizeof (IPT_LIB_DIR
) + sizeof ("/libipt_.so") + strlen(name
)];
224 new_name
= malloc(strlen(name
) + 1);
225 lname
= malloc(strlen(name
) + 1);
227 memset(new_name
, '\0', strlen(name
) + 1);
229 exit_error(PARAMETER_PROBLEM
, "get_target_name");
232 memset(lname
, '\0', strlen(name
) + 1);
234 exit_error(PARAMETER_PROBLEM
, "get_target_name");
236 strcpy(new_name
, name
);
239 if (isupper(lname
[0])) {
241 for (i
= 0; i
< strlen(name
); i
++) {
242 lname
[i
] = tolower(lname
[i
]);
246 if (islower(new_name
[0])) {
248 for (i
= 0; i
< strlen(new_name
); i
++) {
249 new_name
[i
] = toupper(new_name
[i
]);
253 sprintf(path
, IPT_LIB_DIR
"/libipt_%s.so", new_name
);
254 handle
= dlopen(path
, RTLD_LAZY
);
256 sprintf(path
, IPT_LIB_DIR
"/libipt_%s.so", lname
);
257 handle
= dlopen(path
, RTLD_LAZY
);
259 fputs(dlerror(), stderr
);
265 m
= dlsym(handle
, new_name
);
266 if ((error
= dlerror()) != NULL
) {
267 m
= (struct iptables_target
*) dlsym(handle
, lname
);
268 if ((error
= dlerror()) != NULL
) {
269 m
= find_t(new_name
);
273 fputs(error
, stderr
);
274 fprintf(stderr
, "\n");
286 struct in_addr
*dotted_to_addr(const char *dotted
)
288 static struct in_addr addr
;
289 unsigned char *addrp
;
291 unsigned int onebyte
;
295 /* copy dotted string, because we need to modify it */
296 strncpy(buf
, dotted
, sizeof (buf
) - 1);
297 addrp
= (unsigned char *) &(addr
.s_addr
);
300 for (i
= 0; i
< 3; i
++) {
301 if ((q
= strchr(p
, '.')) == NULL
)
302 return (struct in_addr
*) NULL
;
305 if (string_to_number(p
, 0, 255, &onebyte
) == -1)
306 return (struct in_addr
*) NULL
;
308 addrp
[i
] = (unsigned char) onebyte
;
312 /* we've checked 3 bytes, now we check the last one */
313 if (string_to_number(p
, 0, 255, &onebyte
) == -1)
314 return (struct in_addr
*) NULL
;
316 addrp
[3] = (unsigned char) onebyte
;
321 static void set_revision(char *name
, u_int8_t revision
)
323 /* Old kernel sources don't have ".revision" field,
324 * but we stole a byte from name. */
325 name
[IPT_FUNCTION_MAXNAMELEN
- 2] = '\0';
326 name
[IPT_FUNCTION_MAXNAMELEN
- 1] = revision
;
330 * we may need to check for version mismatch
333 build_st(struct iptables_target
*target
, struct ipt_entry_target
*t
)
335 unsigned int nfcache
= 0;
341 IPT_ALIGN(sizeof (struct ipt_entry_target
)) + target
->size
;
344 target
->t
= fw_calloc(1, size
);
345 target
->t
->u
.target_size
= size
;
347 if (target
->init
!= NULL
)
348 target
->init(target
->t
, &nfcache
);
349 set_revision(target
->t
->u
.user
.name
, target
->revision
);
353 strcpy(target
->t
->u
.user
.name
, target
->name
);
360 static int parse_ipt(struct action_util
*a
,int *argc_p
,
361 char ***argv_p
, int tca_id
, struct nlmsghdr
*n
)
363 struct iptables_target
*m
= NULL
;
368 char **argv
= *argv_p
;
369 int argc
= 0, iargc
= 0;
374 __u32 hook
= 0, index
= 0;
379 for (i
= 0; i
< rargc
; i
++) {
380 if (NULL
== argv
[i
] || 0 == strcmp(argv
[i
], "action")) {
388 fprintf(stderr
,"bad arguements to ipt %d vs %d \n", argc
, rargc
);
393 c
= getopt_long(argc
, argv
, "j:", opts
, NULL
);
398 m
= get_target_name(optarg
);
401 if (0 > build_st(m
, NULL
)) {
402 printf(" %s error \n", m
->name
);
406 merge_options(opts
, m
->extra_opts
,
409 fprintf(stderr
," failed to find target %s\n\n", optarg
);
416 memset(&fw
, 0, sizeof (fw
));
418 m
->parse(c
- m
->option_offset
, argv
, 0,
419 &m
->tflags
, NULL
, &m
->t
);
421 fprintf(stderr
," failed to find target %s\n\n", optarg
);
431 if (iargc
> optind
) {
432 if (matches(argv
[optind
], "index") == 0) {
433 if (get_u32(&index
, argv
[optind
+ 1], 10)) {
434 fprintf(stderr
, "Illegal \"index\"\n");
445 fprintf(stderr
," ipt Parser BAD!! (%s)\n", *argv
);
449 /* check that we passed the correct parameters to the target */
451 m
->final_check(m
->tflags
);
454 struct tcmsg
*t
= NLMSG_DATA(n
);
455 if (t
->tcm_parent
!= TC_H_ROOT
456 && t
->tcm_parent
== TC_H_MAJ(TC_H_INGRESS
)) {
457 hook
= NF_IP_PRE_ROUTING
;
459 hook
= NF_IP_POST_ROUTING
;
463 tail
= NLMSG_TAIL(n
);
464 addattr_l(n
, MAX_MSG
, tca_id
, NULL
, 0);
465 fprintf(stdout
, "tablename: %s hook: %s\n ", tname
, ipthooks
[hook
]);
466 fprintf(stdout
, "\ttarget: ");
469 m
->print(NULL
, m
->t
, 0);
470 fprintf(stdout
, " index %d\n", index
);
472 if (strlen(tname
) > 16) {
476 size
= 1 + strlen(tname
);
478 strncpy(k
, tname
, size
);
480 addattr_l(n
, MAX_MSG
, TCA_IPT_TABLE
, k
, size
);
481 addattr_l(n
, MAX_MSG
, TCA_IPT_HOOK
, &hook
, 4);
482 addattr_l(n
, MAX_MSG
, TCA_IPT_INDEX
, &index
, 4);
484 addattr_l(n
, MAX_MSG
, TCA_IPT_TARG
, m
->t
, m
->t
->u
.target_size
);
485 tail
->rta_len
= (void *) NLMSG_TAIL(n
) - (void *) tail
;
489 *argc_p
= rargc
- iargc
;
500 print_ipt(struct action_util
*au
,FILE * f
, struct rtattr
*arg
)
502 struct rtattr
*tb
[TCA_IPT_MAX
+ 1];
503 struct ipt_entry_target
*t
= NULL
;
508 parse_rtattr_nested(tb
, TCA_IPT_MAX
, arg
);
510 if (tb
[TCA_IPT_TABLE
] == NULL
) {
511 fprintf(f
, "[NULL ipt table name ] assuming mangle ");
513 fprintf(f
, "tablename: %s ",
514 (char *) RTA_DATA(tb
[TCA_IPT_TABLE
]));
517 if (tb
[TCA_IPT_HOOK
] == NULL
) {
518 fprintf(f
, "[NULL ipt hook name ]\n ");
522 hook
= *(__u32
*) RTA_DATA(tb
[TCA_IPT_HOOK
]);
523 fprintf(f
, " hook: %s \n", ipthooks
[hook
]);
526 if (tb
[TCA_IPT_TARG
] == NULL
) {
527 fprintf(f
, "\t[NULL ipt target parameters ] \n");
530 struct iptables_target
*m
= NULL
;
531 t
= RTA_DATA(tb
[TCA_IPT_TARG
]);
532 m
= get_target_name(t
->u
.user
.name
);
534 if (0 > build_st(m
, t
)) {
535 fprintf(stderr
, " %s error \n", m
->name
);
540 merge_options(opts
, m
->extra_opts
,
543 fprintf(stderr
, " failed to find target %s\n\n",
547 fprintf(f
, "\ttarget ");
548 m
->print(NULL
, m
->t
, 0);
549 if (tb
[TCA_IPT_INDEX
] == NULL
) {
550 fprintf(f
, " [NULL ipt target index ]\n");
553 index
= *(__u32
*) RTA_DATA(tb
[TCA_IPT_INDEX
]);
554 fprintf(f
, " \n\tindex %d", index
);
557 if (tb
[TCA_IPT_CNT
]) {
558 struct tc_cnt
*c
= RTA_DATA(tb
[TCA_IPT_CNT
]);;
559 fprintf(f
, " ref %d bind %d", c
->refcnt
, c
->bindcnt
);
562 if (tb
[TCA_IPT_TM
]) {
563 struct tcf_t
*tm
= RTA_DATA(tb
[TCA_IPT_TM
]);
575 struct action_util ipt_action_util
= {
577 .parse_aopt
= parse_ipt
,
578 .print_aopt
= print_ipt
,