You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
750 lines
21 KiB
750 lines
21 KiB
/* Copyright (C) 2000-2002 Joakim Axelsson <gozem@linux.nu>
|
|
* Patrick Schaaf <bof@bof.de>
|
|
* Martin Josefsson <gandalf@wlug.westbo.se>
|
|
* Copyright (C) 2003-2010 Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License version 2 as
|
|
* published by the Free Software Foundation.
|
|
*/
|
|
|
|
/* Shared library add-on to iptables to add IP set matching. */
|
|
#include <stdbool.h>
|
|
#include <stdio.h>
|
|
#include <netdb.h>
|
|
#include <string.h>
|
|
#include <stdlib.h>
|
|
#include <getopt.h>
|
|
#include <ctype.h>
|
|
#include <errno.h>
|
|
|
|
#include <xtables.h>
|
|
#include <linux/netfilter/xt_set.h>
|
|
#include "libxt_set.h"
|
|
|
|
/* Revision 0 */
|
|
|
|
static void
|
|
set_help_v0(void)
|
|
{
|
|
printf("set match options:\n"
|
|
" [!] --match-set name flags\n"
|
|
" 'name' is the set name from to match,\n"
|
|
" 'flags' are the comma separated list of\n"
|
|
" 'src' and 'dst' specifications.\n");
|
|
}
|
|
|
|
static const struct option set_opts_v0[] = {
|
|
{.name = "match-set", .has_arg = true, .val = '1'},
|
|
{.name = "set", .has_arg = true, .val = '2'},
|
|
XT_GETOPT_TABLEEND,
|
|
};
|
|
|
|
static void
|
|
set_check_v0(unsigned int flags)
|
|
{
|
|
if (!flags)
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"You must specify `--match-set' with proper arguments");
|
|
}
|
|
|
|
static int
|
|
set_parse_v0(int c, char **argv, int invert, unsigned int *flags,
|
|
const void *entry, struct xt_entry_match **match)
|
|
{
|
|
struct xt_set_info_match_v0 *myinfo =
|
|
(struct xt_set_info_match_v0 *) (*match)->data;
|
|
struct xt_set_info_v0 *info = &myinfo->match_set;
|
|
|
|
switch (c) {
|
|
case '2':
|
|
fprintf(stderr,
|
|
"--set option deprecated, please use --match-set\n");
|
|
/* fall through */
|
|
case '1': /* --match-set <set> <flag>[,<flag> */
|
|
if (info->u.flags[0])
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"--match-set can be specified only once");
|
|
if (invert)
|
|
info->u.flags[0] |= IPSET_MATCH_INV;
|
|
|
|
if (!argv[optind]
|
|
|| argv[optind][0] == '-'
|
|
|| argv[optind][0] == '!')
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"--match-set requires two args.");
|
|
|
|
if (strlen(optarg) > IPSET_MAXNAMELEN - 1)
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"setname `%s' too long, max %d characters.",
|
|
optarg, IPSET_MAXNAMELEN - 1);
|
|
|
|
get_set_byname(optarg, (struct xt_set_info *)info);
|
|
parse_dirs_v0(argv[optind], info);
|
|
DEBUGP("parse: set index %u\n", info->index);
|
|
optind++;
|
|
|
|
*flags = 1;
|
|
break;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
static void
|
|
print_match_v0(const char *prefix, const struct xt_set_info_v0 *info)
|
|
{
|
|
int i;
|
|
char setname[IPSET_MAXNAMELEN];
|
|
|
|
get_set_byid(setname, info->index);
|
|
printf("%s %s %s",
|
|
(info->u.flags[0] & IPSET_MATCH_INV) ? " !" : "",
|
|
prefix,
|
|
setname);
|
|
for (i = 0; i < IPSET_DIM_MAX; i++) {
|
|
if (!info->u.flags[i])
|
|
break;
|
|
printf("%s%s",
|
|
i == 0 ? " " : ",",
|
|
info->u.flags[i] & IPSET_SRC ? "src" : "dst");
|
|
}
|
|
}
|
|
|
|
/* Prints out the matchinfo. */
|
|
static void
|
|
set_print_v0(const void *ip, const struct xt_entry_match *match, int numeric)
|
|
{
|
|
const struct xt_set_info_match_v0 *info = (const void *)match->data;
|
|
|
|
print_match_v0("match-set", &info->match_set);
|
|
}
|
|
|
|
static void
|
|
set_save_v0(const void *ip, const struct xt_entry_match *match)
|
|
{
|
|
const struct xt_set_info_match_v0 *info = (const void *)match->data;
|
|
|
|
print_match_v0("--match-set", &info->match_set);
|
|
}
|
|
|
|
/* Revision 1 */
|
|
static int
|
|
set_parse_v1(int c, char **argv, int invert, unsigned int *flags,
|
|
const void *entry, struct xt_entry_match **match)
|
|
{
|
|
struct xt_set_info_match_v1 *myinfo =
|
|
(struct xt_set_info_match_v1 *) (*match)->data;
|
|
struct xt_set_info *info = &myinfo->match_set;
|
|
|
|
switch (c) {
|
|
case '2':
|
|
fprintf(stderr,
|
|
"--set option deprecated, please use --match-set\n");
|
|
/* fall through */
|
|
case '1': /* --match-set <set> <flag>[,<flag> */
|
|
if (info->dim)
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"--match-set can be specified only once");
|
|
if (invert)
|
|
info->flags |= IPSET_INV_MATCH;
|
|
|
|
if (!argv[optind]
|
|
|| argv[optind][0] == '-'
|
|
|| argv[optind][0] == '!')
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"--match-set requires two args.");
|
|
|
|
if (strlen(optarg) > IPSET_MAXNAMELEN - 1)
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"setname `%s' too long, max %d characters.",
|
|
optarg, IPSET_MAXNAMELEN - 1);
|
|
|
|
get_set_byname(optarg, info);
|
|
parse_dirs(argv[optind], info);
|
|
DEBUGP("parse: set index %u\n", info->index);
|
|
optind++;
|
|
|
|
*flags = 1;
|
|
break;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
static void
|
|
print_match(const char *prefix, const struct xt_set_info *info)
|
|
{
|
|
int i;
|
|
char setname[IPSET_MAXNAMELEN];
|
|
|
|
get_set_byid(setname, info->index);
|
|
printf("%s %s %s",
|
|
(info->flags & IPSET_INV_MATCH) ? " !" : "",
|
|
prefix,
|
|
setname);
|
|
for (i = 1; i <= info->dim; i++) {
|
|
printf("%s%s",
|
|
i == 1 ? " " : ",",
|
|
info->flags & (1 << i) ? "src" : "dst");
|
|
}
|
|
}
|
|
|
|
/* Prints out the matchinfo. */
|
|
static void
|
|
set_print_v1(const void *ip, const struct xt_entry_match *match, int numeric)
|
|
{
|
|
const struct xt_set_info_match_v1 *info = (const void *)match->data;
|
|
|
|
print_match("match-set", &info->match_set);
|
|
}
|
|
|
|
static void
|
|
set_save_v1(const void *ip, const struct xt_entry_match *match)
|
|
{
|
|
const struct xt_set_info_match_v1 *info = (const void *)match->data;
|
|
|
|
print_match("--match-set", &info->match_set);
|
|
}
|
|
|
|
/* Revision 2 */
|
|
static void
|
|
set_help_v2(void)
|
|
{
|
|
printf("set match options:\n"
|
|
" [!] --match-set name flags [--return-nomatch]\n"
|
|
" 'name' is the set name from to match,\n"
|
|
" 'flags' are the comma separated list of\n"
|
|
" 'src' and 'dst' specifications.\n");
|
|
}
|
|
|
|
static const struct option set_opts_v2[] = {
|
|
{.name = "match-set", .has_arg = true, .val = '1'},
|
|
{.name = "set", .has_arg = true, .val = '2'},
|
|
{.name = "return-nomatch", .has_arg = false, .val = '3'},
|
|
XT_GETOPT_TABLEEND,
|
|
};
|
|
|
|
static int
|
|
set_parse_v2(int c, char **argv, int invert, unsigned int *flags,
|
|
const void *entry, struct xt_entry_match **match)
|
|
{
|
|
struct xt_set_info_match_v1 *myinfo =
|
|
(struct xt_set_info_match_v1 *) (*match)->data;
|
|
struct xt_set_info *info = &myinfo->match_set;
|
|
|
|
switch (c) {
|
|
case '3':
|
|
info->flags |= IPSET_RETURN_NOMATCH;
|
|
break;
|
|
case '2':
|
|
fprintf(stderr,
|
|
"--set option deprecated, please use --match-set\n");
|
|
/* fall through */
|
|
case '1': /* --match-set <set> <flag>[,<flag> */
|
|
if (info->dim)
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"--match-set can be specified only once");
|
|
if (invert)
|
|
info->flags |= IPSET_INV_MATCH;
|
|
|
|
if (!argv[optind]
|
|
|| argv[optind][0] == '-'
|
|
|| argv[optind][0] == '!')
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"--match-set requires two args.");
|
|
|
|
if (strlen(optarg) > IPSET_MAXNAMELEN - 1)
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"setname `%s' too long, max %d characters.",
|
|
optarg, IPSET_MAXNAMELEN - 1);
|
|
|
|
get_set_byname(optarg, info);
|
|
parse_dirs(argv[optind], info);
|
|
DEBUGP("parse: set index %u\n", info->index);
|
|
optind++;
|
|
|
|
*flags = 1;
|
|
break;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
/* Prints out the matchinfo. */
|
|
static void
|
|
set_print_v2(const void *ip, const struct xt_entry_match *match, int numeric)
|
|
{
|
|
const struct xt_set_info_match_v1 *info = (const void *)match->data;
|
|
|
|
print_match("match-set", &info->match_set);
|
|
if (info->match_set.flags & IPSET_RETURN_NOMATCH)
|
|
printf(" return-nomatch");
|
|
}
|
|
|
|
static void
|
|
set_save_v2(const void *ip, const struct xt_entry_match *match)
|
|
{
|
|
const struct xt_set_info_match_v1 *info = (const void *)match->data;
|
|
|
|
print_match("--match-set", &info->match_set);
|
|
if (info->match_set.flags & IPSET_RETURN_NOMATCH)
|
|
printf(" --return-nomatch");
|
|
}
|
|
|
|
/* Revision 3 */
|
|
static void
|
|
set_help_v3(void)
|
|
{
|
|
printf("set match options:\n"
|
|
" [!] --match-set name flags [--return-nomatch]\n"
|
|
" [! --update-counters] [! --update-subcounters]\n"
|
|
" [[!] --packets-eq value | --packets-lt value | --packets-gt value\n"
|
|
" [[!] --bytes-eq value | --bytes-lt value | --bytes-gt value\n"
|
|
" 'name' is the set name from to match,\n"
|
|
" 'flags' are the comma separated list of\n"
|
|
" 'src' and 'dst' specifications.\n");
|
|
}
|
|
|
|
static const struct option set_opts_v3[] = {
|
|
{.name = "match-set", .has_arg = true, .val = '1'},
|
|
{.name = "set", .has_arg = true, .val = '2'},
|
|
{.name = "return-nomatch", .has_arg = false, .val = '3'},
|
|
{.name = "update-counters", .has_arg = false, .val = '4'},
|
|
{.name = "packets-eq", .has_arg = true, .val = '5'},
|
|
{.name = "packets-lt", .has_arg = true, .val = '6'},
|
|
{.name = "packets-gt", .has_arg = true, .val = '7'},
|
|
{.name = "bytes-eq", .has_arg = true, .val = '8'},
|
|
{.name = "bytes-lt", .has_arg = true, .val = '9'},
|
|
{.name = "bytes-gt", .has_arg = true, .val = '0'},
|
|
{.name = "update-subcounters", .has_arg = false, .val = 'a'},
|
|
XT_GETOPT_TABLEEND,
|
|
};
|
|
|
|
static uint64_t
|
|
parse_counter(const char *opt)
|
|
{
|
|
uintmax_t value;
|
|
|
|
if (!xtables_strtoul(opt, NULL, &value, 0, UINT64_MAX))
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"Cannot parse %s as a counter value\n",
|
|
opt);
|
|
return (uint64_t)value;
|
|
}
|
|
|
|
static int
|
|
set_parse_v3(int c, char **argv, int invert, unsigned int *flags,
|
|
const void *entry, struct xt_entry_match **match)
|
|
{
|
|
struct xt_set_info_match_v3 *info =
|
|
(struct xt_set_info_match_v3 *) (*match)->data;
|
|
|
|
switch (c) {
|
|
case 'a':
|
|
if (invert)
|
|
info->flags |= IPSET_FLAG_SKIP_SUBCOUNTER_UPDATE;
|
|
break;
|
|
case '0':
|
|
if (info->bytes.op != IPSET_COUNTER_NONE)
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"only one of the --bytes-[eq|lt|gt]"
|
|
" is allowed\n");
|
|
if (invert)
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"--bytes-gt option cannot be inverted\n");
|
|
info->bytes.op = IPSET_COUNTER_GT;
|
|
info->bytes.value = parse_counter(optarg);
|
|
break;
|
|
case '9':
|
|
if (info->bytes.op != IPSET_COUNTER_NONE)
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"only one of the --bytes-[eq|lt|gt]"
|
|
" is allowed\n");
|
|
if (invert)
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"--bytes-lt option cannot be inverted\n");
|
|
info->bytes.op = IPSET_COUNTER_LT;
|
|
info->bytes.value = parse_counter(optarg);
|
|
break;
|
|
case '8':
|
|
if (info->bytes.op != IPSET_COUNTER_NONE)
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"only one of the --bytes-[eq|lt|gt]"
|
|
" is allowed\n");
|
|
info->bytes.op = invert ? IPSET_COUNTER_NE : IPSET_COUNTER_EQ;
|
|
info->bytes.value = parse_counter(optarg);
|
|
break;
|
|
case '7':
|
|
if (info->packets.op != IPSET_COUNTER_NONE)
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"only one of the --packets-[eq|lt|gt]"
|
|
" is allowed\n");
|
|
if (invert)
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"--packets-gt option cannot be inverted\n");
|
|
info->packets.op = IPSET_COUNTER_GT;
|
|
info->packets.value = parse_counter(optarg);
|
|
break;
|
|
case '6':
|
|
if (info->packets.op != IPSET_COUNTER_NONE)
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"only one of the --packets-[eq|lt|gt]"
|
|
" is allowed\n");
|
|
if (invert)
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"--packets-lt option cannot be inverted\n");
|
|
info->packets.op = IPSET_COUNTER_LT;
|
|
info->packets.value = parse_counter(optarg);
|
|
break;
|
|
case '5':
|
|
if (info->packets.op != IPSET_COUNTER_NONE)
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"only one of the --packets-[eq|lt|gt]"
|
|
" is allowed\n");
|
|
info->packets.op = invert ? IPSET_COUNTER_NE : IPSET_COUNTER_EQ;
|
|
info->packets.value = parse_counter(optarg);
|
|
break;
|
|
case '4':
|
|
if (invert)
|
|
info->flags |= IPSET_FLAG_SKIP_COUNTER_UPDATE;
|
|
break;
|
|
case '3':
|
|
if (invert)
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"--return-nomatch flag cannot be inverted\n");
|
|
info->flags |= IPSET_FLAG_RETURN_NOMATCH;
|
|
break;
|
|
case '2':
|
|
fprintf(stderr,
|
|
"--set option deprecated, please use --match-set\n");
|
|
/* fall through */
|
|
case '1': /* --match-set <set> <flag>[,<flag> */
|
|
if (info->match_set.dim)
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"--match-set can be specified only once");
|
|
if (invert)
|
|
info->match_set.flags |= IPSET_INV_MATCH;
|
|
|
|
if (!argv[optind]
|
|
|| argv[optind][0] == '-'
|
|
|| argv[optind][0] == '!')
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"--match-set requires two args.");
|
|
|
|
if (strlen(optarg) > IPSET_MAXNAMELEN - 1)
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"setname `%s' too long, max %d characters.",
|
|
optarg, IPSET_MAXNAMELEN - 1);
|
|
|
|
get_set_byname(optarg, &info->match_set);
|
|
parse_dirs(argv[optind], &info->match_set);
|
|
DEBUGP("parse: set index %u\n", info->match_set.index);
|
|
optind++;
|
|
|
|
*flags = 1;
|
|
break;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
static void
|
|
set_printv3_counter(const struct ip_set_counter_match0 *c, const char *name,
|
|
const char *sep)
|
|
{
|
|
switch (c->op) {
|
|
case IPSET_COUNTER_EQ:
|
|
printf(" %s%s-eq %llu", sep, name, c->value);
|
|
break;
|
|
case IPSET_COUNTER_NE:
|
|
printf(" ! %s%s-eq %llu", sep, name, c->value);
|
|
break;
|
|
case IPSET_COUNTER_LT:
|
|
printf(" %s%s-lt %llu", sep, name, c->value);
|
|
break;
|
|
case IPSET_COUNTER_GT:
|
|
printf(" %s%s-gt %llu", sep, name, c->value);
|
|
break;
|
|
}
|
|
}
|
|
|
|
static void
|
|
set_print_v3_matchinfo(const struct xt_set_info_match_v3 *info,
|
|
const char *opt, const char *sep)
|
|
{
|
|
print_match(opt, &info->match_set);
|
|
if (info->flags & IPSET_FLAG_RETURN_NOMATCH)
|
|
printf(" %sreturn-nomatch", sep);
|
|
if ((info->flags & IPSET_FLAG_SKIP_COUNTER_UPDATE))
|
|
printf(" ! %supdate-counters", sep);
|
|
if ((info->flags & IPSET_FLAG_SKIP_SUBCOUNTER_UPDATE))
|
|
printf(" ! %supdate-subcounters", sep);
|
|
set_printv3_counter(&info->packets, "packets", sep);
|
|
set_printv3_counter(&info->bytes, "bytes", sep);
|
|
}
|
|
|
|
/* Prints out the matchinfo. */
|
|
static void
|
|
set_print_v3(const void *ip, const struct xt_entry_match *match, int numeric)
|
|
{
|
|
const struct xt_set_info_match_v3 *info = (const void *)match->data;
|
|
|
|
set_print_v3_matchinfo(info, "match-set", "");
|
|
}
|
|
|
|
static void
|
|
set_save_v3(const void *ip, const struct xt_entry_match *match)
|
|
{
|
|
const struct xt_set_info_match_v3 *info = (const void *)match->data;
|
|
|
|
set_print_v3_matchinfo(info, "--match-set", "--");
|
|
}
|
|
|
|
/* Revision 4 */
|
|
static int
|
|
set_parse_v4(int c, char **argv, int invert, unsigned int *flags,
|
|
const void *entry, struct xt_entry_match **match)
|
|
{
|
|
struct xt_set_info_match_v4 *info =
|
|
(struct xt_set_info_match_v4 *) (*match)->data;
|
|
|
|
switch (c) {
|
|
case 'a':
|
|
if (invert)
|
|
info->flags |= IPSET_FLAG_SKIP_SUBCOUNTER_UPDATE;
|
|
break;
|
|
case '0':
|
|
if (info->bytes.op != IPSET_COUNTER_NONE)
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"only one of the --bytes-[eq|lt|gt]"
|
|
" is allowed\n");
|
|
if (invert)
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"--bytes-gt option cannot be inverted\n");
|
|
info->bytes.op = IPSET_COUNTER_GT;
|
|
info->bytes.value = parse_counter(optarg);
|
|
break;
|
|
case '9':
|
|
if (info->bytes.op != IPSET_COUNTER_NONE)
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"only one of the --bytes-[eq|lt|gt]"
|
|
" is allowed\n");
|
|
if (invert)
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"--bytes-lt option cannot be inverted\n");
|
|
info->bytes.op = IPSET_COUNTER_LT;
|
|
info->bytes.value = parse_counter(optarg);
|
|
break;
|
|
case '8':
|
|
if (info->bytes.op != IPSET_COUNTER_NONE)
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"only one of the --bytes-[eq|lt|gt]"
|
|
" is allowed\n");
|
|
info->bytes.op = invert ? IPSET_COUNTER_NE : IPSET_COUNTER_EQ;
|
|
info->bytes.value = parse_counter(optarg);
|
|
break;
|
|
case '7':
|
|
if (info->packets.op != IPSET_COUNTER_NONE)
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"only one of the --packets-[eq|lt|gt]"
|
|
" is allowed\n");
|
|
if (invert)
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"--packets-gt option cannot be inverted\n");
|
|
info->packets.op = IPSET_COUNTER_GT;
|
|
info->packets.value = parse_counter(optarg);
|
|
break;
|
|
case '6':
|
|
if (info->packets.op != IPSET_COUNTER_NONE)
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"only one of the --packets-[eq|lt|gt]"
|
|
" is allowed\n");
|
|
if (invert)
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"--packets-lt option cannot be inverted\n");
|
|
info->packets.op = IPSET_COUNTER_LT;
|
|
info->packets.value = parse_counter(optarg);
|
|
break;
|
|
case '5':
|
|
if (info->packets.op != IPSET_COUNTER_NONE)
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"only one of the --packets-[eq|lt|gt]"
|
|
" is allowed\n");
|
|
info->packets.op = invert ? IPSET_COUNTER_NE : IPSET_COUNTER_EQ;
|
|
info->packets.value = parse_counter(optarg);
|
|
break;
|
|
case '4':
|
|
if (invert)
|
|
info->flags |= IPSET_FLAG_SKIP_COUNTER_UPDATE;
|
|
break;
|
|
case '3':
|
|
if (invert)
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"--return-nomatch flag cannot be inverted\n");
|
|
info->flags |= IPSET_FLAG_RETURN_NOMATCH;
|
|
break;
|
|
case '2':
|
|
fprintf(stderr,
|
|
"--set option deprecated, please use --match-set\n");
|
|
/* fall through */
|
|
case '1': /* --match-set <set> <flag>[,<flag> */
|
|
if (info->match_set.dim)
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"--match-set can be specified only once");
|
|
if (invert)
|
|
info->match_set.flags |= IPSET_INV_MATCH;
|
|
|
|
if (!argv[optind]
|
|
|| argv[optind][0] == '-'
|
|
|| argv[optind][0] == '!')
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"--match-set requires two args.");
|
|
|
|
if (strlen(optarg) > IPSET_MAXNAMELEN - 1)
|
|
xtables_error(PARAMETER_PROBLEM,
|
|
"setname `%s' too long, max %d characters.",
|
|
optarg, IPSET_MAXNAMELEN - 1);
|
|
|
|
get_set_byname(optarg, &info->match_set);
|
|
parse_dirs(argv[optind], &info->match_set);
|
|
DEBUGP("parse: set index %u\n", info->match_set.index);
|
|
optind++;
|
|
|
|
*flags = 1;
|
|
break;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
static void
|
|
set_printv4_counter(const struct ip_set_counter_match *c, const char *name,
|
|
const char *sep)
|
|
{
|
|
switch (c->op) {
|
|
case IPSET_COUNTER_EQ:
|
|
printf(" %s%s-eq %llu", sep, name, c->value);
|
|
break;
|
|
case IPSET_COUNTER_NE:
|
|
printf(" ! %s%s-eq %llu", sep, name, c->value);
|
|
break;
|
|
case IPSET_COUNTER_LT:
|
|
printf(" %s%s-lt %llu", sep, name, c->value);
|
|
break;
|
|
case IPSET_COUNTER_GT:
|
|
printf(" %s%s-gt %llu", sep, name, c->value);
|
|
break;
|
|
}
|
|
}
|
|
|
|
static void
|
|
set_print_v4_matchinfo(const struct xt_set_info_match_v4 *info,
|
|
const char *opt, const char *sep)
|
|
{
|
|
print_match(opt, &info->match_set);
|
|
if (info->flags & IPSET_FLAG_RETURN_NOMATCH)
|
|
printf(" %sreturn-nomatch", sep);
|
|
if ((info->flags & IPSET_FLAG_SKIP_COUNTER_UPDATE))
|
|
printf(" ! %supdate-counters", sep);
|
|
if ((info->flags & IPSET_FLAG_SKIP_SUBCOUNTER_UPDATE))
|
|
printf(" ! %supdate-subcounters", sep);
|
|
set_printv4_counter(&info->packets, "packets", sep);
|
|
set_printv4_counter(&info->bytes, "bytes", sep);
|
|
}
|
|
|
|
/* Prints out the matchinfo. */
|
|
static void
|
|
set_print_v4(const void *ip, const struct xt_entry_match *match, int numeric)
|
|
{
|
|
const struct xt_set_info_match_v4 *info = (const void *)match->data;
|
|
|
|
set_print_v4_matchinfo(info, "match-set", "");
|
|
}
|
|
|
|
static void
|
|
set_save_v4(const void *ip, const struct xt_entry_match *match)
|
|
{
|
|
const struct xt_set_info_match_v4 *info = (const void *)match->data;
|
|
|
|
set_print_v4_matchinfo(info, "--match-set", "--");
|
|
}
|
|
|
|
static struct xtables_match set_mt_reg[] = {
|
|
{
|
|
.name = "set",
|
|
.revision = 0,
|
|
.version = XTABLES_VERSION,
|
|
.family = NFPROTO_IPV4,
|
|
.size = XT_ALIGN(sizeof(struct xt_set_info_match_v0)),
|
|
.userspacesize = XT_ALIGN(sizeof(struct xt_set_info_match_v0)),
|
|
.help = set_help_v0,
|
|
.parse = set_parse_v0,
|
|
.final_check = set_check_v0,
|
|
.print = set_print_v0,
|
|
.save = set_save_v0,
|
|
.extra_opts = set_opts_v0,
|
|
},
|
|
{
|
|
.name = "set",
|
|
.revision = 1,
|
|
.version = XTABLES_VERSION,
|
|
.family = NFPROTO_UNSPEC,
|
|
.size = XT_ALIGN(sizeof(struct xt_set_info_match_v1)),
|
|
.userspacesize = XT_ALIGN(sizeof(struct xt_set_info_match_v1)),
|
|
.help = set_help_v0,
|
|
.parse = set_parse_v1,
|
|
.final_check = set_check_v0,
|
|
.print = set_print_v1,
|
|
.save = set_save_v1,
|
|
.extra_opts = set_opts_v0,
|
|
},
|
|
{
|
|
.name = "set",
|
|
.revision = 2,
|
|
.version = XTABLES_VERSION,
|
|
.family = NFPROTO_UNSPEC,
|
|
.size = XT_ALIGN(sizeof(struct xt_set_info_match_v1)),
|
|
.userspacesize = XT_ALIGN(sizeof(struct xt_set_info_match_v1)),
|
|
.help = set_help_v2,
|
|
.parse = set_parse_v2,
|
|
.final_check = set_check_v0,
|
|
.print = set_print_v2,
|
|
.save = set_save_v2,
|
|
.extra_opts = set_opts_v2,
|
|
},
|
|
{
|
|
.name = "set",
|
|
.revision = 3,
|
|
.version = XTABLES_VERSION,
|
|
.family = NFPROTO_UNSPEC,
|
|
.size = XT_ALIGN(sizeof(struct xt_set_info_match_v3)),
|
|
.userspacesize = XT_ALIGN(sizeof(struct xt_set_info_match_v3)),
|
|
.help = set_help_v3,
|
|
.parse = set_parse_v3,
|
|
.final_check = set_check_v0,
|
|
.print = set_print_v3,
|
|
.save = set_save_v3,
|
|
.extra_opts = set_opts_v3,
|
|
},
|
|
{
|
|
.name = "set",
|
|
.revision = 4,
|
|
.version = XTABLES_VERSION,
|
|
.family = NFPROTO_UNSPEC,
|
|
.size = XT_ALIGN(sizeof(struct xt_set_info_match_v4)),
|
|
.userspacesize = XT_ALIGN(sizeof(struct xt_set_info_match_v4)),
|
|
.help = set_help_v3,
|
|
.parse = set_parse_v4,
|
|
.final_check = set_check_v0,
|
|
.print = set_print_v4,
|
|
.save = set_save_v4,
|
|
.extra_opts = set_opts_v3,
|
|
},
|
|
};
|
|
|
|
void _init(void)
|
|
{
|
|
xtables_register_matches(set_mt_reg, ARRAY_SIZE(set_mt_reg));
|
|
}
|