mirror of
git://git.code.sf.net/p/xtables-addons/xtables-addons
synced 2025-09-21 03:54:59 +02:00
Compare commits
31 Commits
Author | SHA1 | Date | |
---|---|---|---|
![]() |
81ad2519a9 | ||
![]() |
f65ea59795 | ||
![]() |
baf7b1091a | ||
![]() |
2ae0413e31 | ||
![]() |
db76ea9a5c | ||
![]() |
3ed1a3cbf0 | ||
![]() |
9c4c76f9e2 | ||
![]() |
7f33590df8 | ||
![]() |
6733265358 | ||
![]() |
f757049112 | ||
![]() |
21cdf786f7 | ||
![]() |
7c248871f8 | ||
![]() |
3500a38767 | ||
![]() |
cf9b60a57e | ||
![]() |
e5eedb25c2 | ||
![]() |
e3ae8dcb81 | ||
![]() |
aca381d3b6 | ||
![]() |
bb15becc88 | ||
![]() |
14458b3a7e | ||
![]() |
2d36632d4a | ||
![]() |
b5e2c7255a | ||
![]() |
376a89e7d1 | ||
![]() |
03ec8a7696 | ||
![]() |
442982f04e | ||
![]() |
98b853cea3 | ||
![]() |
59401339b8 | ||
![]() |
121836ce80 | ||
![]() |
c23df41f6e | ||
![]() |
fb2eea69af | ||
![]() |
4815e3a8a6 | ||
![]() |
f9922c6f85 |
@@ -1,6 +1,8 @@
|
|||||||
# -*- Makefile -*-
|
# -*- Makefile -*-
|
||||||
# MANUAL
|
# MANUAL
|
||||||
|
|
||||||
|
abs_top_srcdir = @abs_top_srcdir@
|
||||||
|
|
||||||
prefix = @prefix@
|
prefix = @prefix@
|
||||||
exec_prefix = @exec_prefix@
|
exec_prefix = @exec_prefix@
|
||||||
libexecdir = @libexecdir@
|
libexecdir = @libexecdir@
|
||||||
@@ -9,11 +11,12 @@ xtlibdir = @xtlibdir@
|
|||||||
CC = @CC@
|
CC = @CC@
|
||||||
CCLD = ${CC}
|
CCLD = ${CC}
|
||||||
CFLAGS = @CFLAGS@
|
CFLAGS = @CFLAGS@
|
||||||
|
LDFLAGS = @LDFLAGS@
|
||||||
|
|
||||||
regular_CFLAGS = @regular_CFLAGS@
|
regular_CFLAGS = @regular_CFLAGS@
|
||||||
libxtables_CFLAGS = @libxtables_CFLAGS@
|
libxtables_CFLAGS = @libxtables_CFLAGS@
|
||||||
libxtables_LIBS = @libxtables_LIBS@
|
libxtables_LIBS = @libxtables_LIBS@
|
||||||
AM_CFLAGS = ${regular_CFLAGS} ${libxtables_CFLAGS}
|
AM_CFLAGS = ${regular_CFLAGS} ${libxtables_CFLAGS} -I${abs_top_srcdir}/extensions
|
||||||
AM_DEPFLAGS = -Wp,-MMD,$(@D)/.$(@F).d,-MT,$@
|
AM_DEPFLAGS = -Wp,-MMD,$(@D)/.$(@F).d,-MT,$@
|
||||||
|
|
||||||
AM_DEFAULT_VERBOSITY = 0
|
AM_DEFAULT_VERBOSITY = 0
|
||||||
|
41
configure.ac
41
configure.ac
@@ -1,9 +1,9 @@
|
|||||||
|
|
||||||
AC_INIT([xtables-addons], [1.28])
|
AC_INIT([xtables-addons], [1.31])
|
||||||
AC_CONFIG_HEADERS([config.h])
|
AC_CONFIG_HEADERS([config.h])
|
||||||
AC_CONFIG_MACRO_DIR([m4])
|
AC_CONFIG_MACRO_DIR([m4])
|
||||||
AC_PROG_INSTALL
|
AC_PROG_INSTALL
|
||||||
AM_INIT_AUTOMAKE([1.10 -Wall foreign subdir-objects])
|
AM_INIT_AUTOMAKE([1.10.2 -Wall foreign subdir-objects])
|
||||||
AC_PROG_CC
|
AC_PROG_CC
|
||||||
AM_PROG_CC_C_O
|
AM_PROG_CC_C_O
|
||||||
AC_DISABLE_STATIC
|
AC_DISABLE_STATIC
|
||||||
@@ -21,15 +21,17 @@ if [[ "$kbuilddir" == no ]]; then
|
|||||||
kbuilddir="";
|
kbuilddir="";
|
||||||
fi
|
fi
|
||||||
|
|
||||||
AC_ARG_WITH([xtlibdir],
|
|
||||||
AS_HELP_STRING([--with-xtlibdir=PATH],
|
|
||||||
[Path where to install Xtables extensions [[LIBEXECDIR/xtables]]]),
|
|
||||||
[xtlibdir="$withval"],
|
|
||||||
[xtlibdir='${libexecdir}/xtables'])
|
|
||||||
|
|
||||||
PKG_CHECK_MODULES([libxtables], [xtables >= 1.4.3])
|
|
||||||
AC_CHECK_HEADERS([linux/netfilter/x_tables.h], [],
|
AC_CHECK_HEADERS([linux/netfilter/x_tables.h], [],
|
||||||
[AC_MSG_ERROR([You need to have linux/netfilter/x_tables.h, see INSTALL file for details])])
|
[AC_MSG_ERROR([You need to have linux/netfilter/x_tables.h, see INSTALL file for details])])
|
||||||
|
PKG_CHECK_MODULES([libxtables], [xtables >= 1.4.3])
|
||||||
|
xtlibdir="$(pkg-config --variable=xtlibdir xtables)"
|
||||||
|
|
||||||
|
AC_ARG_WITH([xtlibdir],
|
||||||
|
AS_HELP_STRING([--with-xtlibdir=PATH],
|
||||||
|
[Path where to install Xtables extensions [[autodetect]]]]),
|
||||||
|
[xtlibdir="$withval"])
|
||||||
|
AC_MSG_CHECKING([Xtables module directory])
|
||||||
|
AC_MSG_RESULT([$xtlibdir])
|
||||||
|
|
||||||
regular_CFLAGS="-D_LARGEFILE_SOURCE=1 -D_LARGE_FILES -D_FILE_OFFSET_BITS=64 \
|
regular_CFLAGS="-D_LARGEFILE_SOURCE=1 -D_LARGE_FILES -D_FILE_OFFSET_BITS=64 \
|
||||||
-D_REENTRANT -Wall -Waggregate-return -Wmissing-declarations \
|
-D_REENTRANT -Wall -Waggregate-return -Wmissing-declarations \
|
||||||
@@ -46,6 +48,7 @@ if grep -q "CentOS release 5\." /etc/redhat-release 2>/dev/null ||
|
|||||||
# Well, just a warning. Maybe the admin updated the kernel.
|
# Well, just a warning. Maybe the admin updated the kernel.
|
||||||
echo "WARNING: This distribution's shipped kernel is not supported.";
|
echo "WARNING: This distribution's shipped kernel is not supported.";
|
||||||
fi;
|
fi;
|
||||||
|
AC_MSG_CHECKING([kernel version that we will build against])
|
||||||
krel="$(make -sC ${kbuilddir} kernelrelease)";
|
krel="$(make -sC ${kbuilddir} kernelrelease)";
|
||||||
krel="${krel%%-*}";
|
krel="${krel%%-*}";
|
||||||
kmajor="${krel%%.*}";
|
kmajor="${krel%%.*}";
|
||||||
@@ -54,22 +57,28 @@ kminor="${krel%%.*}";
|
|||||||
krel="${krel#*.}";
|
krel="${krel#*.}";
|
||||||
kmicro="${krel%%.*}";
|
kmicro="${krel%%.*}";
|
||||||
if test "$kmicro" = "$krel"; then
|
if test "$kmicro" = "$krel"; then
|
||||||
|
kmicro="$(($kmicro+0))"; # Get rid of non numbers ("2.6.36+" -> "2.6.36")
|
||||||
kstable=0;
|
kstable=0;
|
||||||
else
|
else
|
||||||
|
kmicro="$(($kmicro+0))";
|
||||||
kstable="${krel#*.}";
|
kstable="${krel#*.}";
|
||||||
if test -z "$kstable"; then
|
kstable="$(($kstable+0))";
|
||||||
kstable=0;
|
|
||||||
fi;
|
fi;
|
||||||
fi;
|
if test -z "$kmajor" -o -z "$kminor" -o -z "$kmicro"; then
|
||||||
echo "Found kernel version $kmajor.$kminor.$kmicro.$kstable in $kbuilddir";
|
echo "WARNING: Version detection did not succeed. Continue at own luck.";
|
||||||
if test "$kmajor" -gt 2 -o "$kminor" -gt 6 -o "$kmicro" -gt 35; then
|
else
|
||||||
|
echo "$kmajor.$kminor.$kmicro.$kstable in $kbuilddir";
|
||||||
|
if test "$kmajor" -gt 2 -o "$kminor" -gt 6 -o "$kmicro" -gt 36; then
|
||||||
echo "WARNING: You are trying a newer kernel. Results may vary. :-)";
|
echo "WARNING: You are trying a newer kernel. Results may vary. :-)";
|
||||||
elif test \( "$kmajor" -lt 2 -o "$kminor" -lt 6 -o "$kmicro" -lt 17 \) -o \
|
elif test \( "$kmajor" -lt 2 -o \
|
||||||
|
\( "$kmajor" -eq 2 -a "$kminor" -lt 6 \) -o \
|
||||||
|
\( "$kmajor" -eq 2 -a "$kminor" -eq 0 -a "$kmicro" -lt 17 \) -o \
|
||||||
\( "$kmajor" -eq 2 -a "$kminor" -eq 6 -a "$kmicro" -eq 18 -a \
|
\( "$kmajor" -eq 2 -a "$kminor" -eq 6 -a "$kmicro" -eq 18 -a \
|
||||||
"$kstable" -lt 5 \); then
|
"$kstable" -lt 5 \) \); then
|
||||||
echo "ERROR: That kernel version is not supported. Please see INSTALL for minimum configuration.";
|
echo "ERROR: That kernel version is not supported. Please see INSTALL for minimum configuration.";
|
||||||
exit 1;
|
exit 1;
|
||||||
fi;
|
fi;
|
||||||
|
fi;
|
||||||
|
|
||||||
AC_SUBST([regular_CFLAGS])
|
AC_SUBST([regular_CFLAGS])
|
||||||
AC_SUBST([kbuilddir])
|
AC_SUBST([kbuilddir])
|
||||||
|
64
doc/api/2.6.17.c
Normal file
64
doc/api/2.6.17.c
Normal file
@@ -0,0 +1,64 @@
|
|||||||
|
match:
|
||||||
|
|
||||||
|
/* true/false */
|
||||||
|
int
|
||||||
|
(*match)(
|
||||||
|
const struct sk_buff *skb,
|
||||||
|
const struct net_device *in,
|
||||||
|
const struct net_device *out,
|
||||||
|
const struct xt_match *match,
|
||||||
|
const void *matchinfo,
|
||||||
|
int offset,
|
||||||
|
unsigned int protoff,
|
||||||
|
int *hotdrop,
|
||||||
|
);
|
||||||
|
|
||||||
|
/* error code */
|
||||||
|
int
|
||||||
|
(*checkentry)(
|
||||||
|
const char *tablename,
|
||||||
|
const void *ip,
|
||||||
|
const struct xt_match *match,
|
||||||
|
void *matchinfo,
|
||||||
|
unsigned int matchinfosize,
|
||||||
|
unsigned int hook_mask,
|
||||||
|
);
|
||||||
|
|
||||||
|
void
|
||||||
|
(*destroy)(
|
||||||
|
const struct xt_match *match,
|
||||||
|
void *matchinfo,
|
||||||
|
unsigned int matchinfosize,
|
||||||
|
);
|
||||||
|
|
||||||
|
target:
|
||||||
|
|
||||||
|
/* verdict */
|
||||||
|
unsigned int
|
||||||
|
(*target)(
|
||||||
|
struct sk_buff **pskb,
|
||||||
|
const struct net_device *in,
|
||||||
|
const struct net_device *out,
|
||||||
|
unsigned int hooknum,
|
||||||
|
const struct xt_target *target,
|
||||||
|
const void *targinfo,
|
||||||
|
void *userdata,
|
||||||
|
);
|
||||||
|
|
||||||
|
/* error code */
|
||||||
|
int
|
||||||
|
(*checkentry)(
|
||||||
|
const char *tablename,
|
||||||
|
const void *entry,
|
||||||
|
const struct xt_target *target,
|
||||||
|
void *targinfo,
|
||||||
|
unsigned int targinfosize,
|
||||||
|
unsigned int hook_mask,
|
||||||
|
);
|
||||||
|
|
||||||
|
void
|
||||||
|
(*destroy)(
|
||||||
|
const struct xt_target *target,
|
||||||
|
void *targinfo,
|
||||||
|
unsigned int targinfosize,
|
||||||
|
);
|
59
doc/api/2.6.19.c
Normal file
59
doc/api/2.6.19.c
Normal file
@@ -0,0 +1,59 @@
|
|||||||
|
match:
|
||||||
|
|
||||||
|
/* true/false */
|
||||||
|
int
|
||||||
|
(*match)(
|
||||||
|
const struct sk_buff *skb,
|
||||||
|
const struct net_device *in,
|
||||||
|
const struct net_device *out,
|
||||||
|
const struct xt_match *match,
|
||||||
|
const void *matchinfo,
|
||||||
|
int offset,
|
||||||
|
unsigned int protoff,
|
||||||
|
int *hotdrop,
|
||||||
|
);
|
||||||
|
|
||||||
|
/* error code */
|
||||||
|
int
|
||||||
|
(*checkentry)(
|
||||||
|
const char *tablename,
|
||||||
|
const void *ip,
|
||||||
|
const struct xt_match *match,
|
||||||
|
void *matchinfo,
|
||||||
|
unsigned int hook_mask,
|
||||||
|
);
|
||||||
|
|
||||||
|
void
|
||||||
|
(*destroy)(
|
||||||
|
const struct xt_match *match,
|
||||||
|
void *matchinfo,
|
||||||
|
);
|
||||||
|
|
||||||
|
target:
|
||||||
|
|
||||||
|
/* verdict */
|
||||||
|
unsigned int
|
||||||
|
(*target)(
|
||||||
|
struct sk_buff **pskb,
|
||||||
|
const struct net_device *in,
|
||||||
|
const struct net_device *out,
|
||||||
|
unsigned int hooknum,
|
||||||
|
const struct xt_target *target,
|
||||||
|
const void *targinfo,
|
||||||
|
);
|
||||||
|
|
||||||
|
/* error code */
|
||||||
|
int
|
||||||
|
(*checkentry)(
|
||||||
|
const char *tablename,
|
||||||
|
const void *entry,
|
||||||
|
const struct xt_target *target,
|
||||||
|
void *targinfo,
|
||||||
|
unsigned int hook_mask,
|
||||||
|
);
|
||||||
|
|
||||||
|
void
|
||||||
|
(*destroy)(
|
||||||
|
const struct xt_target *target,
|
||||||
|
void *targinfo,
|
||||||
|
);
|
59
doc/api/2.6.23.c
Normal file
59
doc/api/2.6.23.c
Normal file
@@ -0,0 +1,59 @@
|
|||||||
|
match:
|
||||||
|
|
||||||
|
/* true/false */
|
||||||
|
bool
|
||||||
|
(*match)(
|
||||||
|
const struct sk_buff *skb,
|
||||||
|
const struct net_device *in,
|
||||||
|
const struct net_device *out,
|
||||||
|
const struct xt_match *match,
|
||||||
|
const void *matchinfo,
|
||||||
|
int offset,
|
||||||
|
unsigned int protoff,
|
||||||
|
bool *hotdrop,
|
||||||
|
);
|
||||||
|
|
||||||
|
/* true/false */
|
||||||
|
bool
|
||||||
|
(*checkentry)(
|
||||||
|
const char *tablename,
|
||||||
|
const void *ip,
|
||||||
|
const struct xt_match *match,
|
||||||
|
void *matchinfo,
|
||||||
|
unsigned int hook_mask,
|
||||||
|
);
|
||||||
|
|
||||||
|
void
|
||||||
|
(*destroy)(
|
||||||
|
const struct xt_match *match,
|
||||||
|
void *matchinfo,
|
||||||
|
);
|
||||||
|
|
||||||
|
target:
|
||||||
|
|
||||||
|
/* verdict */
|
||||||
|
unsigned int
|
||||||
|
(*target)(
|
||||||
|
struct sk_buff **pskb,
|
||||||
|
const struct net_device *in,
|
||||||
|
const struct net_device *out,
|
||||||
|
unsigned int hooknum,
|
||||||
|
const struct xt_target *target,
|
||||||
|
const void *targinfo,
|
||||||
|
);
|
||||||
|
|
||||||
|
/* true/false */
|
||||||
|
bool
|
||||||
|
(*checkentry)(
|
||||||
|
const char *tablename,
|
||||||
|
const void *entry,
|
||||||
|
const struct xt_target *target,
|
||||||
|
void *targinfo,
|
||||||
|
unsigned int hook_mask,
|
||||||
|
);
|
||||||
|
|
||||||
|
void
|
||||||
|
(*destroy)(
|
||||||
|
const struct xt_target *target,
|
||||||
|
void *targinfo,
|
||||||
|
);
|
59
doc/api/2.6.24.c
Normal file
59
doc/api/2.6.24.c
Normal file
@@ -0,0 +1,59 @@
|
|||||||
|
match:
|
||||||
|
|
||||||
|
/* true/false */
|
||||||
|
bool
|
||||||
|
(*match)(
|
||||||
|
const struct sk_buff *skb,
|
||||||
|
const struct net_device *in,
|
||||||
|
const struct net_device *out,
|
||||||
|
const struct xt_match *match,
|
||||||
|
const void *matchinfo,
|
||||||
|
int offset,
|
||||||
|
unsigned int protoff,
|
||||||
|
bool *hotdrop,
|
||||||
|
);
|
||||||
|
|
||||||
|
/* true/false */
|
||||||
|
bool
|
||||||
|
(*checkentry)(
|
||||||
|
const char *tablename,
|
||||||
|
const void *ip,
|
||||||
|
const struct xt_match *match,
|
||||||
|
void *matchinfo,
|
||||||
|
unsigned int hook_mask,
|
||||||
|
);
|
||||||
|
|
||||||
|
void
|
||||||
|
(*destroy)(
|
||||||
|
const struct xt_match *match,
|
||||||
|
void *matchinfo,
|
||||||
|
);
|
||||||
|
|
||||||
|
target:
|
||||||
|
|
||||||
|
/* verdict */
|
||||||
|
unsigned int
|
||||||
|
(*target)(
|
||||||
|
struct sk_buff *skb,
|
||||||
|
const struct net_device *in,
|
||||||
|
const struct net_device *out,
|
||||||
|
unsigned int hooknum,
|
||||||
|
const struct xt_target *target,
|
||||||
|
const void *targinfo,
|
||||||
|
);
|
||||||
|
|
||||||
|
/* true/false */
|
||||||
|
bool
|
||||||
|
(*checkentry)(
|
||||||
|
const char *tablename,
|
||||||
|
const void *entry,
|
||||||
|
const struct xt_target *target,
|
||||||
|
void *targinfo,
|
||||||
|
unsigned int hook_mask,
|
||||||
|
);
|
||||||
|
|
||||||
|
void
|
||||||
|
(*destroy)(
|
||||||
|
const struct xt_target *target,
|
||||||
|
void *targinfo,
|
||||||
|
);
|
39
doc/api/2.6.28.c
Normal file
39
doc/api/2.6.28.c
Normal file
@@ -0,0 +1,39 @@
|
|||||||
|
match:
|
||||||
|
|
||||||
|
/* true/false */
|
||||||
|
bool
|
||||||
|
(*match)(
|
||||||
|
const struct sk_buff *skb,
|
||||||
|
const struct xt_match_param *,
|
||||||
|
);
|
||||||
|
|
||||||
|
/* true/false */
|
||||||
|
bool
|
||||||
|
(*checkentry)(
|
||||||
|
const struct xt_mtchk_param *,
|
||||||
|
);
|
||||||
|
|
||||||
|
void
|
||||||
|
(*destroy)(
|
||||||
|
const struct xt_mtdtor_param *,
|
||||||
|
);
|
||||||
|
|
||||||
|
target:
|
||||||
|
|
||||||
|
/* verdict */
|
||||||
|
unsigned int
|
||||||
|
(*target)(
|
||||||
|
struct sk_buff *skb,
|
||||||
|
const struct xt_target_param *,
|
||||||
|
);
|
||||||
|
|
||||||
|
/* true/false */
|
||||||
|
bool
|
||||||
|
(*checkentry)(
|
||||||
|
const struct xt_tgchk_param *,
|
||||||
|
);
|
||||||
|
|
||||||
|
void
|
||||||
|
(*destroy)(
|
||||||
|
const struct xt_tgdtor_param *,
|
||||||
|
);
|
38
doc/api/2.6.31.c
Normal file
38
doc/api/2.6.31.c
Normal file
@@ -0,0 +1,38 @@
|
|||||||
|
match:
|
||||||
|
|
||||||
|
/* true/false */
|
||||||
|
bool
|
||||||
|
(*match)(
|
||||||
|
const struct sk_buff *skb,
|
||||||
|
const struct xt_match_param *,
|
||||||
|
);
|
||||||
|
|
||||||
|
/* true/false */
|
||||||
|
bool
|
||||||
|
(*checkentry)(
|
||||||
|
const struct xt_mtchk_param *,
|
||||||
|
);
|
||||||
|
|
||||||
|
void
|
||||||
|
(*destroy)(
|
||||||
|
const struct xt_mtdtor_param *,
|
||||||
|
);
|
||||||
|
|
||||||
|
target:
|
||||||
|
|
||||||
|
unsigned int
|
||||||
|
(*target)(
|
||||||
|
struct sk_buff *skb,
|
||||||
|
const struct xt_target_param *,
|
||||||
|
);
|
||||||
|
|
||||||
|
/* true/false */
|
||||||
|
bool
|
||||||
|
(*checkentry)(
|
||||||
|
const struct xt_tgchk_param *,
|
||||||
|
);
|
||||||
|
|
||||||
|
void
|
||||||
|
(*destroy)(
|
||||||
|
const struct xt_tgdtor_param *,
|
||||||
|
);
|
39
doc/api/2.6.32.c
Normal file
39
doc/api/2.6.32.c
Normal file
@@ -0,0 +1,39 @@
|
|||||||
|
match:
|
||||||
|
|
||||||
|
/* true/false */
|
||||||
|
bool
|
||||||
|
(*match)(
|
||||||
|
const struct sk_buff *skb,
|
||||||
|
const struct xt_match_param *,
|
||||||
|
);
|
||||||
|
|
||||||
|
/* true/false */
|
||||||
|
bool
|
||||||
|
(*checkentry)(
|
||||||
|
const struct xt_mtchk_param *,
|
||||||
|
);
|
||||||
|
|
||||||
|
void
|
||||||
|
(*destroy)(
|
||||||
|
const struct xt_mtdtor_param *,
|
||||||
|
);
|
||||||
|
|
||||||
|
target:
|
||||||
|
|
||||||
|
/* verdict */
|
||||||
|
unsigned int
|
||||||
|
(*target)(
|
||||||
|
struct sk_buff *skb,
|
||||||
|
const struct xt_target_param *,
|
||||||
|
);
|
||||||
|
|
||||||
|
/* true/false */
|
||||||
|
bool
|
||||||
|
(*checkentry)(
|
||||||
|
const struct xt_tgchk_param *,
|
||||||
|
);
|
||||||
|
|
||||||
|
void
|
||||||
|
(*destroy)(
|
||||||
|
const struct xt_tgdtor_param *,
|
||||||
|
);
|
39
doc/api/2.6.35.c
Normal file
39
doc/api/2.6.35.c
Normal file
@@ -0,0 +1,39 @@
|
|||||||
|
match:
|
||||||
|
|
||||||
|
/* true/false */
|
||||||
|
bool
|
||||||
|
(*match)(
|
||||||
|
const struct sk_buff *skb,
|
||||||
|
struct xt_action_param *,
|
||||||
|
);
|
||||||
|
|
||||||
|
/* error code */
|
||||||
|
int
|
||||||
|
(*checkentry)(
|
||||||
|
const struct xt_mtchk_param *,
|
||||||
|
);
|
||||||
|
|
||||||
|
void
|
||||||
|
(*destroy)(
|
||||||
|
const struct xt_mtdtor_param *,
|
||||||
|
);
|
||||||
|
|
||||||
|
target:
|
||||||
|
|
||||||
|
/* verdict */
|
||||||
|
unsigned int
|
||||||
|
(*target)(
|
||||||
|
struct sk_buff *skb,
|
||||||
|
const struct xt_action_param *,
|
||||||
|
);
|
||||||
|
|
||||||
|
/* error code */
|
||||||
|
int
|
||||||
|
(*checkentry)(
|
||||||
|
const struct xt_tgchk_param *,
|
||||||
|
);
|
||||||
|
|
||||||
|
void
|
||||||
|
(*destroy)(
|
||||||
|
const struct xt_tgdtor_param *,
|
||||||
|
);
|
39
doc/api/xt-a.c
Normal file
39
doc/api/xt-a.c
Normal file
@@ -0,0 +1,39 @@
|
|||||||
|
match:
|
||||||
|
|
||||||
|
/* true/false */
|
||||||
|
bool
|
||||||
|
(*match)(
|
||||||
|
const struct sk_buff *skb,
|
||||||
|
struct xt_action_param *,
|
||||||
|
);
|
||||||
|
|
||||||
|
/* error code */
|
||||||
|
int
|
||||||
|
(*checkentry)(
|
||||||
|
const struct xt_mtchk_param *,
|
||||||
|
);
|
||||||
|
|
||||||
|
void
|
||||||
|
(*destroy)(
|
||||||
|
const struct xt_mtdtor_param *,
|
||||||
|
);
|
||||||
|
|
||||||
|
target:
|
||||||
|
|
||||||
|
/* verdict */
|
||||||
|
unsigned int
|
||||||
|
(*target)(
|
||||||
|
struct sk_buff **pskb,
|
||||||
|
const struct xt_action_param *,
|
||||||
|
);
|
||||||
|
|
||||||
|
/* error code */
|
||||||
|
int
|
||||||
|
(*checkentry)(
|
||||||
|
const struct xt_tgchk_param *,
|
||||||
|
);
|
||||||
|
|
||||||
|
void
|
||||||
|
(*destroy)(
|
||||||
|
const struct xt_tgdtor_param *,
|
||||||
|
);
|
@@ -3,6 +3,41 @@ HEAD
|
|||||||
====
|
====
|
||||||
|
|
||||||
|
|
||||||
|
v1.31 (November 05 2010)
|
||||||
|
========================
|
||||||
|
- LOGMARK: print remaining lifetime of cts
|
||||||
|
- build: improve detection of kernel version and error handling
|
||||||
|
- build: automatically derive Xtables module directory, thus
|
||||||
|
--with-xtlibdir is no longer needed for ./configure in most cases
|
||||||
|
(If I still see a distro using it, I will scold you for not
|
||||||
|
reading this changelog.)
|
||||||
|
- xt_iface: allow matching against incoming/outgoing interface
|
||||||
|
- libxt_gradm: match packets based on status of grsecurity RBAC
|
||||||
|
(userspace part only - xt_gradm is in the grsec patch)
|
||||||
|
|
||||||
|
|
||||||
|
v1.30 (October 02 2010)
|
||||||
|
=======================
|
||||||
|
- update to ipset 4.4
|
||||||
|
* ipport{,ip,net}hash did not work with mixed "src" and "dst"
|
||||||
|
destination parameters
|
||||||
|
- deactivate building xt_TEE and xt_CHECKSUM by default, as these have been
|
||||||
|
merged upstream in Linux 2.6.35 and 2.6.36, respectively.
|
||||||
|
Distros still wishing to build this need to enable it in their build
|
||||||
|
script, e.g. perl -i -pe 's{^build_TEE=.*}{build_TEE=m}' mconfig;
|
||||||
|
|
||||||
|
|
||||||
|
v1.29 (September 29 2010)
|
||||||
|
=========================
|
||||||
|
- compat_xtables: return bool for match_check and target_check in 2.6.23..34
|
||||||
|
- ipset: enable building of ip_set_ipport{ip,net}hash.ko
|
||||||
|
- support for Linux 2.6.36
|
||||||
|
- SYSRQ: resolve compile error with Linux 2.6.36
|
||||||
|
- TEE: resolve compile error with Linux 2.6.36
|
||||||
|
- add workaround for broken linux-glibc-devel 2.6.34 userspace headers
|
||||||
|
("implicit declaration of function 'ALIGN'")
|
||||||
|
|
||||||
|
|
||||||
Xtables-addons 1.28 (July 24 2010)
|
Xtables-addons 1.28 (July 24 2010)
|
||||||
==================================
|
==================================
|
||||||
- RAWNAT: IPv6 variants erroneously rejected masks /33-/128
|
- RAWNAT: IPv6 variants erroneously rejected masks /33-/128
|
||||||
|
@@ -12,6 +12,7 @@
|
|||||||
#include <stddef.h>
|
#include <stddef.h>
|
||||||
#include <xtables.h>
|
#include <xtables.h>
|
||||||
#include "xt_ACCOUNT.h"
|
#include "xt_ACCOUNT.h"
|
||||||
|
#include "compat_user.h"
|
||||||
|
|
||||||
static struct option account_tg_opts[] = {
|
static struct option account_tg_opts[] = {
|
||||||
{.name = "addr", .has_arg = true, .val = 'a'},
|
{.name = "addr", .has_arg = true, .val = 'a'},
|
||||||
|
@@ -494,7 +494,7 @@ static unsigned int ipt_acc_target(struct sk_buff **pskb, const struct xt_action
|
|||||||
"IPs %u.%u.%u.%u/%u.%u.%u.%u\n", info->table_nr,
|
"IPs %u.%u.%u.%u/%u.%u.%u.%u\n", info->table_nr,
|
||||||
NIPQUAD(src_ip), NIPQUAD(dst_ip));
|
NIPQUAD(src_ip), NIPQUAD(dst_ip));
|
||||||
spin_unlock_bh(&ipt_acc_lock);
|
spin_unlock_bh(&ipt_acc_lock);
|
||||||
return IPT_CONTINUE;
|
return XT_CONTINUE;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* 8 bit network or "any" network */
|
/* 8 bit network or "any" network */
|
||||||
@@ -506,7 +506,7 @@ static unsigned int ipt_acc_target(struct sk_buff **pskb, const struct xt_action
|
|||||||
ipt_acc_tables[info->table_nr].netmask,
|
ipt_acc_tables[info->table_nr].netmask,
|
||||||
src_ip, dst_ip, size, &ipt_acc_tables[info->table_nr].itemcount);
|
src_ip, dst_ip, size, &ipt_acc_tables[info->table_nr].itemcount);
|
||||||
spin_unlock_bh(&ipt_acc_lock);
|
spin_unlock_bh(&ipt_acc_lock);
|
||||||
return IPT_CONTINUE;
|
return XT_CONTINUE;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* 16 bit network */
|
/* 16 bit network */
|
||||||
@@ -517,7 +517,7 @@ static unsigned int ipt_acc_target(struct sk_buff **pskb, const struct xt_action
|
|||||||
ipt_acc_tables[info->table_nr].netmask,
|
ipt_acc_tables[info->table_nr].netmask,
|
||||||
src_ip, dst_ip, size, &ipt_acc_tables[info->table_nr].itemcount);
|
src_ip, dst_ip, size, &ipt_acc_tables[info->table_nr].itemcount);
|
||||||
spin_unlock_bh(&ipt_acc_lock);
|
spin_unlock_bh(&ipt_acc_lock);
|
||||||
return IPT_CONTINUE;
|
return XT_CONTINUE;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* 24 bit network */
|
/* 24 bit network */
|
||||||
@@ -528,7 +528,7 @@ static unsigned int ipt_acc_target(struct sk_buff **pskb, const struct xt_action
|
|||||||
ipt_acc_tables[info->table_nr].netmask,
|
ipt_acc_tables[info->table_nr].netmask,
|
||||||
src_ip, dst_ip, size, &ipt_acc_tables[info->table_nr].itemcount);
|
src_ip, dst_ip, size, &ipt_acc_tables[info->table_nr].itemcount);
|
||||||
spin_unlock_bh(&ipt_acc_lock);
|
spin_unlock_bh(&ipt_acc_lock);
|
||||||
return IPT_CONTINUE;
|
return XT_CONTINUE;
|
||||||
}
|
}
|
||||||
|
|
||||||
printk("ACCOUNT: ipt_acc_target: Unable to process packet. "
|
printk("ACCOUNT: ipt_acc_target: Unable to process packet. "
|
||||||
@@ -536,7 +536,7 @@ static unsigned int ipt_acc_target(struct sk_buff **pskb, const struct xt_action
|
|||||||
info->table_nr, NIPQUAD(src_ip), NIPQUAD(dst_ip));
|
info->table_nr, NIPQUAD(src_ip), NIPQUAD(dst_ip));
|
||||||
|
|
||||||
spin_unlock_bh(&ipt_acc_lock);
|
spin_unlock_bh(&ipt_acc_lock);
|
||||||
return IPT_CONTINUE;
|
return XT_CONTINUE;
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
|
@@ -25,3 +25,4 @@ obj-${build_lscan} += libxt_lscan.so
|
|||||||
obj-${build_pknock} += pknock/
|
obj-${build_pknock} += pknock/
|
||||||
obj-${build_psd} += libxt_psd.so
|
obj-${build_psd} += libxt_psd.so
|
||||||
obj-${build_quota2} += libxt_quota2.so
|
obj-${build_quota2} += libxt_quota2.so
|
||||||
|
obj-${build_gradm} += libxt_gradm.so
|
||||||
|
12
extensions/compat_user.h
Normal file
12
extensions/compat_user.h
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
/*
|
||||||
|
* Userspace-level compat hacks
|
||||||
|
*/
|
||||||
|
#ifndef _XTABLES_COMPAT_USER_H
|
||||||
|
#define _XTABLES_COMPAT_USER_H 1
|
||||||
|
|
||||||
|
/* linux-glibc-devel 2.6.34 header screwup */
|
||||||
|
#ifndef ALIGN
|
||||||
|
# define ALIGN(s, n) (((s) + ((n) - 1)) & ~((n) - 1))
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#endif /* _XTABLES_COMPAT_USER_H */
|
@@ -105,7 +105,11 @@ static bool xtnu_match_check(const char *table, const void *entry,
|
|||||||
return false;
|
return false;
|
||||||
if (nm->checkentry == NULL)
|
if (nm->checkentry == NULL)
|
||||||
return true;
|
return true;
|
||||||
|
#if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 23)
|
||||||
return nm->checkentry(&local_par);
|
return nm->checkentry(&local_par);
|
||||||
|
#else
|
||||||
|
return nm->checkentry(&local_par) == 0;
|
||||||
|
#endif
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
#if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 6, 28) && \
|
#if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 6, 28) && \
|
||||||
@@ -118,7 +122,7 @@ static bool xtnu_match_check(const struct xt_mtchk_param *par)
|
|||||||
return false;
|
return false;
|
||||||
if (nm->checkentry == NULL)
|
if (nm->checkentry == NULL)
|
||||||
return true;
|
return true;
|
||||||
return nm->checkentry(par) == 0 ? true : false;
|
return nm->checkentry(par) == 0;
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
@@ -313,7 +317,11 @@ static bool xtnu_target_check(const char *table, const void *entry,
|
|||||||
if (nt->checkentry == NULL)
|
if (nt->checkentry == NULL)
|
||||||
/* this is valid, just like if there was no function */
|
/* this is valid, just like if there was no function */
|
||||||
return true;
|
return true;
|
||||||
|
#if LINUX_VERSION_CODE < KERNEL_VERSION(2, 6, 23)
|
||||||
return nt->checkentry(&local_par);
|
return nt->checkentry(&local_par);
|
||||||
|
#else
|
||||||
|
return nt->checkentry(&local_par) == 0;
|
||||||
|
#endif
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
@@ -327,7 +335,7 @@ static bool xtnu_target_check(const struct xt_tgchk_param *par)
|
|||||||
return false;
|
return false;
|
||||||
if (nt->checkentry == NULL)
|
if (nt->checkentry == NULL)
|
||||||
return true;
|
return true;
|
||||||
return nt->checkentry(par) == 0 ? true : false;
|
return nt->checkentry(par) == 0;
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
@@ -86,6 +86,11 @@
|
|||||||
# define ip6t_unregister_table(tbl) ip6t_unregister_table(tbl)
|
# define ip6t_unregister_table(tbl) ip6t_unregister_table(tbl)
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
#if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 6, 36)
|
||||||
|
# define rt_dst(rt) (&(rt)->dst)
|
||||||
|
#else
|
||||||
|
# define rt_dst(rt) (&(rt)->u.dst)
|
||||||
|
#endif
|
||||||
|
|
||||||
#if !defined(NIP6) && !defined(NIP6_FMT)
|
#if !defined(NIP6) && !defined(NIP6_FMT)
|
||||||
# define NIP6(addr) \
|
# define NIP6(addr) \
|
||||||
|
@@ -3,4 +3,5 @@
|
|||||||
obj-m += ipt_set.o ipt_SET.o
|
obj-m += ipt_set.o ipt_SET.o
|
||||||
obj-m += ip_set.o ip_set_ipmap.o ip_set_portmap.o ip_set_macipmap.o
|
obj-m += ip_set.o ip_set_ipmap.o ip_set_portmap.o ip_set_macipmap.o
|
||||||
obj-m += ip_set_iphash.o ip_set_nethash.o ip_set_ipporthash.o
|
obj-m += ip_set_iphash.o ip_set_nethash.o ip_set_ipporthash.o
|
||||||
|
obj-m += ip_set_ipportiphash.o ip_set_ipportnethash.o
|
||||||
obj-m += ip_set_iptree.o ip_set_iptreemap.o ip_set_setlist.o
|
obj-m += ip_set_iptree.o ip_set_iptreemap.o ip_set_setlist.o
|
||||||
|
@@ -929,11 +929,11 @@ ip_set_sockfn_set(struct sock *sk, int optval, void *user, unsigned int len)
|
|||||||
}
|
}
|
||||||
if (copy_from_user(data, user, len) != 0) {
|
if (copy_from_user(data, user, len) != 0) {
|
||||||
res = -EFAULT;
|
res = -EFAULT;
|
||||||
goto done;
|
goto cleanup;
|
||||||
}
|
}
|
||||||
if (down_interruptible(&ip_set_app_mutex)) {
|
if (down_interruptible(&ip_set_app_mutex)) {
|
||||||
res = -EINTR;
|
res = -EINTR;
|
||||||
goto done;
|
goto cleanup;
|
||||||
}
|
}
|
||||||
|
|
||||||
op = (unsigned *)data;
|
op = (unsigned *)data;
|
||||||
@@ -1109,6 +1109,7 @@ ip_set_sockfn_set(struct sock *sk, int optval, void *user, unsigned int len)
|
|||||||
|
|
||||||
done:
|
done:
|
||||||
up(&ip_set_app_mutex);
|
up(&ip_set_app_mutex);
|
||||||
|
cleanup:
|
||||||
vfree(data);
|
vfree(data);
|
||||||
if (res > 0)
|
if (res > 0)
|
||||||
res = 0;
|
res = 0;
|
||||||
@@ -1142,11 +1143,11 @@ ip_set_sockfn_get(struct sock *sk, int optval, void *user, int *len)
|
|||||||
}
|
}
|
||||||
if (copy_from_user(data, user, *len) != 0) {
|
if (copy_from_user(data, user, *len) != 0) {
|
||||||
res = -EFAULT;
|
res = -EFAULT;
|
||||||
goto done;
|
goto cleanup;
|
||||||
}
|
}
|
||||||
if (down_interruptible(&ip_set_app_mutex)) {
|
if (down_interruptible(&ip_set_app_mutex)) {
|
||||||
res = -EINTR;
|
res = -EINTR;
|
||||||
goto done;
|
goto cleanup;
|
||||||
}
|
}
|
||||||
|
|
||||||
op = (unsigned *) data;
|
op = (unsigned *) data;
|
||||||
@@ -1439,6 +1440,7 @@ ip_set_sockfn_get(struct sock *sk, int optval, void *user, int *len)
|
|||||||
|
|
||||||
done:
|
done:
|
||||||
up(&ip_set_app_mutex);
|
up(&ip_set_app_mutex);
|
||||||
|
cleanup:
|
||||||
vfree(data);
|
vfree(data);
|
||||||
if (res > 0)
|
if (res > 0)
|
||||||
res = 0;
|
res = 0;
|
||||||
|
@@ -68,7 +68,7 @@ ipporthash_test(struct ip_set *set, ip_set_ip_t ip, ip_set_ip_t port)
|
|||||||
if (flags[1] == 0) \
|
if (flags[1] == 0) \
|
||||||
return 0; \
|
return 0; \
|
||||||
\
|
\
|
||||||
port = get_port(skb, flags++); \
|
port = get_port(skb, ++flags); \
|
||||||
\
|
\
|
||||||
if (port == INVALID_PORT) \
|
if (port == INVALID_PORT) \
|
||||||
return 0;
|
return 0;
|
||||||
|
@@ -72,8 +72,8 @@ ipportiphash_test(struct ip_set *set,
|
|||||||
if (flags[2] == 0) \
|
if (flags[2] == 0) \
|
||||||
return 0; \
|
return 0; \
|
||||||
\
|
\
|
||||||
port = get_port(skb, flags++); \
|
port = get_port(skb, ++flags); \
|
||||||
ip1 = ipaddr(skb, flags++); \
|
ip1 = ipaddr(skb, ++flags); \
|
||||||
\
|
\
|
||||||
if (port == INVALID_PORT) \
|
if (port == INVALID_PORT) \
|
||||||
return 0;
|
return 0;
|
||||||
|
@@ -116,8 +116,8 @@ ipportnethash_utest(struct ip_set *set, const void *data, u_int32_t size)
|
|||||||
if (flags[2] == 0) \
|
if (flags[2] == 0) \
|
||||||
return 0; \
|
return 0; \
|
||||||
\
|
\
|
||||||
port = get_port(skb, flags++); \
|
port = get_port(skb, ++flags); \
|
||||||
ip1 = ipaddr(skb, flags++); \
|
ip1 = ipaddr(skb, ++flags); \
|
||||||
\
|
\
|
||||||
if (port == INVALID_PORT) \
|
if (port == INVALID_PORT) \
|
||||||
return 0;
|
return 0;
|
||||||
|
@@ -502,9 +502,13 @@ data storage in
|
|||||||
set and add src to the first single or src,dst to the first double
|
set and add src to the first single or src,dst to the first double
|
||||||
data storage set in
|
data storage set in
|
||||||
\fIb\fP.
|
\fIb\fP.
|
||||||
.P
|
|
||||||
You can imagine a setlist type of set as an ordered union of
|
You can imagine a setlist type of set as an ordered union of
|
||||||
the set elements.
|
the set elements.
|
||||||
|
.P
|
||||||
|
Please note: by the ipset command you can add, delete and
|
||||||
|
.B test
|
||||||
|
the setnames in a setlist type of set, and not the presence of
|
||||||
|
a set's member (such as an IP address).
|
||||||
.SH GENERAL RESTRICTIONS
|
.SH GENERAL RESTRICTIONS
|
||||||
Setnames starting with colon (:) cannot be defined. Zero valued set
|
Setnames starting with colon (:) cannot be defined. Zero valued set
|
||||||
entries cannot be used with hash type of sets.
|
entries cannot be used with hash type of sets.
|
||||||
|
@@ -30,7 +30,7 @@
|
|||||||
#define PROC_SYS_MODPROBE "/proc/sys/kernel/modprobe"
|
#define PROC_SYS_MODPROBE "/proc/sys/kernel/modprobe"
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#define IPSET_VERSION "4.2"
|
#define IPSET_VERSION "4.4"
|
||||||
|
|
||||||
char program_name[] = "ipset";
|
char program_name[] = "ipset";
|
||||||
char program_version[] = IPSET_VERSION;
|
char program_version[] = IPSET_VERSION;
|
||||||
|
@@ -16,6 +16,7 @@
|
|||||||
#include <xtables.h>
|
#include <xtables.h>
|
||||||
#include <linux/netfilter/x_tables.h>
|
#include <linux/netfilter/x_tables.h>
|
||||||
#include "xt_CHAOS.h"
|
#include "xt_CHAOS.h"
|
||||||
|
#include "compat_user.h"
|
||||||
|
|
||||||
enum {
|
enum {
|
||||||
F_DELUDE = 1 << 0,
|
F_DELUDE = 1 << 0,
|
||||||
|
@@ -12,6 +12,7 @@
|
|||||||
|
|
||||||
#include <xtables.h>
|
#include <xtables.h>
|
||||||
#include "xt_CHECKSUM.h"
|
#include "xt_CHECKSUM.h"
|
||||||
|
#include "compat_user.h"
|
||||||
|
|
||||||
static void CHECKSUM_help(void)
|
static void CHECKSUM_help(void)
|
||||||
{
|
{
|
||||||
|
@@ -13,6 +13,7 @@
|
|||||||
|
|
||||||
#include <xtables.h>
|
#include <xtables.h>
|
||||||
#include <linux/netfilter/x_tables.h>
|
#include <linux/netfilter/x_tables.h>
|
||||||
|
#include "compat_user.h"
|
||||||
|
|
||||||
static void delude_tg_help(void)
|
static void delude_tg_help(void)
|
||||||
{
|
{
|
||||||
|
@@ -17,6 +17,7 @@
|
|||||||
#include <xtables.h>
|
#include <xtables.h>
|
||||||
#include "xt_DHCPMAC.h"
|
#include "xt_DHCPMAC.h"
|
||||||
#include "mac.c"
|
#include "mac.c"
|
||||||
|
#include "compat_user.h"
|
||||||
|
|
||||||
enum {
|
enum {
|
||||||
F_MAC = 1 << 0,
|
F_MAC = 1 << 0,
|
||||||
|
@@ -10,6 +10,7 @@
|
|||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
#include <getopt.h>
|
#include <getopt.h>
|
||||||
#include <xtables.h>
|
#include <xtables.h>
|
||||||
|
#include "compat_user.h"
|
||||||
|
|
||||||
static void echo_tg_help(void)
|
static void echo_tg_help(void)
|
||||||
{
|
{
|
||||||
|
@@ -14,6 +14,7 @@
|
|||||||
#include <string.h>
|
#include <string.h>
|
||||||
#include <xtables.h>
|
#include <xtables.h>
|
||||||
#include "xt_IPMARK.h"
|
#include "xt_IPMARK.h"
|
||||||
|
#include "compat_user.h"
|
||||||
|
|
||||||
enum {
|
enum {
|
||||||
FL_ADDR_USED = 1 << 0,
|
FL_ADDR_USED = 1 << 0,
|
||||||
|
@@ -13,6 +13,7 @@
|
|||||||
#include <string.h>
|
#include <string.h>
|
||||||
#include <xtables.h>
|
#include <xtables.h>
|
||||||
#include "xt_LOGMARK.h"
|
#include "xt_LOGMARK.h"
|
||||||
|
#include "compat_user.h"
|
||||||
|
|
||||||
enum {
|
enum {
|
||||||
F_LEVEL = 1 << 0,
|
F_LEVEL = 1 << 0,
|
||||||
|
@@ -15,6 +15,7 @@
|
|||||||
#include <xtables.h>
|
#include <xtables.h>
|
||||||
#include <linux/netfilter.h>
|
#include <linux/netfilter.h>
|
||||||
#include "xt_RAWNAT.h"
|
#include "xt_RAWNAT.h"
|
||||||
|
#include "compat_user.h"
|
||||||
|
|
||||||
enum {
|
enum {
|
||||||
FLAGS_TO = 1 << 0,
|
FLAGS_TO = 1 << 0,
|
||||||
|
@@ -15,6 +15,7 @@
|
|||||||
#include <xtables.h>
|
#include <xtables.h>
|
||||||
#include <linux/netfilter.h>
|
#include <linux/netfilter.h>
|
||||||
#include "xt_RAWNAT.h"
|
#include "xt_RAWNAT.h"
|
||||||
|
#include "compat_user.h"
|
||||||
|
|
||||||
enum {
|
enum {
|
||||||
FLAGS_TO = 1 << 0,
|
FLAGS_TO = 1 << 0,
|
||||||
|
@@ -1,5 +1,6 @@
|
|||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
#include <xtables.h>
|
#include <xtables.h>
|
||||||
|
#include "compat_user.h"
|
||||||
|
|
||||||
static void steal_tg_help(void)
|
static void steal_tg_help(void)
|
||||||
{
|
{
|
||||||
|
@@ -5,6 +5,7 @@
|
|||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
#include <getopt.h>
|
#include <getopt.h>
|
||||||
#include <xtables.h>
|
#include <xtables.h>
|
||||||
|
#include "compat_user.h"
|
||||||
|
|
||||||
static void sysrq_tg_help(void)
|
static void sysrq_tg_help(void)
|
||||||
{
|
{
|
||||||
|
@@ -5,6 +5,7 @@
|
|||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
#include <getopt.h>
|
#include <getopt.h>
|
||||||
#include <xtables.h>
|
#include <xtables.h>
|
||||||
|
#include "compat_user.h"
|
||||||
|
|
||||||
static void tarpit_tg_help(void)
|
static void tarpit_tg_help(void)
|
||||||
{
|
{
|
||||||
|
@@ -23,6 +23,7 @@
|
|||||||
#include <linux/netfilter.h>
|
#include <linux/netfilter.h>
|
||||||
#include <linux/netfilter/x_tables.h>
|
#include <linux/netfilter/x_tables.h>
|
||||||
#include "xt_TEE.h"
|
#include "xt_TEE.h"
|
||||||
|
#include "compat_user.h"
|
||||||
|
|
||||||
enum {
|
enum {
|
||||||
FLAG_GATEWAY = 1 << 0,
|
FLAG_GATEWAY = 1 << 0,
|
||||||
|
@@ -16,6 +16,7 @@
|
|||||||
#include <getopt.h>
|
#include <getopt.h>
|
||||||
#include <xtables.h>
|
#include <xtables.h>
|
||||||
#include "xt_condition.h"
|
#include "xt_condition.h"
|
||||||
|
#include "compat_user.h"
|
||||||
|
|
||||||
static void condition_help(void)
|
static void condition_help(void)
|
||||||
{
|
{
|
||||||
|
@@ -16,6 +16,7 @@
|
|||||||
#include <xtables.h>
|
#include <xtables.h>
|
||||||
#include "xt_DHCPMAC.h"
|
#include "xt_DHCPMAC.h"
|
||||||
#include "mac.c"
|
#include "mac.c"
|
||||||
|
#include "compat_user.h"
|
||||||
|
|
||||||
enum {
|
enum {
|
||||||
F_MAC = 1 << 0,
|
F_MAC = 1 << 0,
|
||||||
|
@@ -15,6 +15,7 @@
|
|||||||
#include <string.h>
|
#include <string.h>
|
||||||
#include <xtables.h>
|
#include <xtables.h>
|
||||||
#include "xt_fuzzy.h"
|
#include "xt_fuzzy.h"
|
||||||
|
#include "compat_user.h"
|
||||||
|
|
||||||
static void fuzzy_mt_help(void)
|
static void fuzzy_mt_help(void)
|
||||||
{
|
{
|
||||||
|
@@ -24,6 +24,7 @@
|
|||||||
#include <unistd.h>
|
#include <unistd.h>
|
||||||
#include <xtables.h>
|
#include <xtables.h>
|
||||||
#include "xt_geoip.h"
|
#include "xt_geoip.h"
|
||||||
|
#include "compat_user.h"
|
||||||
#define GEOIP_DB_DIR "/usr/share/xt_geoip"
|
#define GEOIP_DB_DIR "/usr/share/xt_geoip"
|
||||||
|
|
||||||
static void geoip_help(void)
|
static void geoip_help(void)
|
||||||
|
98
extensions/libxt_gradm.c
Normal file
98
extensions/libxt_gradm.c
Normal file
@@ -0,0 +1,98 @@
|
|||||||
|
/*
|
||||||
|
* "gradm" match extension for iptables
|
||||||
|
* Zbigniew Krzystolik <zbyniu@destrukcja.pl>, 2010
|
||||||
|
*
|
||||||
|
* This program is free software; you can redistribute it and/or
|
||||||
|
* modify it under the terms of the GNU General Public License;
|
||||||
|
* either version 2 of the License, or any later version, as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*/
|
||||||
|
#include <getopt.h>
|
||||||
|
#include <netdb.h>
|
||||||
|
#include <stddef.h>
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <stdlib.h>
|
||||||
|
#include <string.h>
|
||||||
|
#include <xtables.h>
|
||||||
|
#include "xt_gradm.h"
|
||||||
|
|
||||||
|
static void gradm_mt_help(void)
|
||||||
|
{
|
||||||
|
printf(
|
||||||
|
"gradm match options:\n"
|
||||||
|
" [!] --enabled is Grsecurity RBAC enabled\n"
|
||||||
|
" [!] --disabled is Grsecurity RBAC disabled\n");
|
||||||
|
};
|
||||||
|
|
||||||
|
static const struct option gradm_mt_opts[] = {
|
||||||
|
{.name = "enabled", .has_arg = false, .val = '1'},
|
||||||
|
{.name = "disabled", .has_arg = false, .val = '2'},
|
||||||
|
{NULL},
|
||||||
|
};
|
||||||
|
|
||||||
|
static void gradm_mt_init(struct xt_entry_match *m)
|
||||||
|
{
|
||||||
|
}
|
||||||
|
|
||||||
|
static int gradm_mt_parse(int c, char **argv, int invert, unsigned int *flags,
|
||||||
|
const void *entry, struct xt_entry_match **match)
|
||||||
|
{
|
||||||
|
struct xt_gradm_mtinfo *info = (void *)(*match)->data;
|
||||||
|
|
||||||
|
switch (c) {
|
||||||
|
case '1':
|
||||||
|
if (invert)
|
||||||
|
info->invflags |= 1;
|
||||||
|
return true;
|
||||||
|
case '2':
|
||||||
|
if (!invert)
|
||||||
|
info->invflags |= 1;
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
static void gradm_mt_check(unsigned int flags)
|
||||||
|
{
|
||||||
|
}
|
||||||
|
|
||||||
|
static void gradm_mt_print(const void *ip, const struct xt_entry_match *match,
|
||||||
|
int numeric)
|
||||||
|
{
|
||||||
|
const struct xt_gradm_mtinfo *info = (const void *)match->data;
|
||||||
|
|
||||||
|
if (info->invflags)
|
||||||
|
printf("gradm: disabled");
|
||||||
|
else
|
||||||
|
printf("gradm: enabled");
|
||||||
|
}
|
||||||
|
|
||||||
|
static void gradm_mt_save(const void *ip, const struct xt_entry_match *match)
|
||||||
|
{
|
||||||
|
const struct xt_gradm_mtinfo *info = (const void *)match->data;
|
||||||
|
|
||||||
|
if (info->invflags)
|
||||||
|
printf("--disabled ");
|
||||||
|
else
|
||||||
|
printf("--enabled ");
|
||||||
|
}
|
||||||
|
|
||||||
|
static struct xtables_match gradm_mt_reg = {
|
||||||
|
.family = NFPROTO_UNSPEC,
|
||||||
|
.name = "gradm",
|
||||||
|
.version = XTABLES_VERSION,
|
||||||
|
.size = XT_ALIGN(sizeof(struct xt_gradm_mtinfo)),
|
||||||
|
.userspacesize = XT_ALIGN(sizeof(struct xt_gradm_mtinfo)),
|
||||||
|
.help = gradm_mt_help,
|
||||||
|
.init = gradm_mt_init,
|
||||||
|
.parse = gradm_mt_parse,
|
||||||
|
.final_check = gradm_mt_check,
|
||||||
|
.print = gradm_mt_print,
|
||||||
|
.save = gradm_mt_save,
|
||||||
|
.extra_opts = gradm_mt_opts,
|
||||||
|
};
|
||||||
|
|
||||||
|
static __attribute__((constructor)) void gradm_mt_ldr(void)
|
||||||
|
{
|
||||||
|
xtables_register_match(&gradm_mt_reg);
|
||||||
|
}
|
7
extensions/libxt_gradm.man
Normal file
7
extensions/libxt_gradm.man
Normal file
@@ -0,0 +1,7 @@
|
|||||||
|
This module matches packets based on grsecurity RBAC status.
|
||||||
|
.TP
|
||||||
|
[\fB!\fP] \fB\-\-enabled\fP
|
||||||
|
Matches packets if grsecurity RBAC is enabled.
|
||||||
|
.TP
|
||||||
|
[\fB!\fP] \fB\-\-disabled\fP
|
||||||
|
Matches packets if grsecurity RBAC is disabled.
|
@@ -15,9 +15,16 @@
|
|||||||
|
|
||||||
#include <xtables.h>
|
#include <xtables.h>
|
||||||
#include "xt_iface.h"
|
#include "xt_iface.h"
|
||||||
|
#include "compat_user.h"
|
||||||
|
|
||||||
|
enum {
|
||||||
|
XT_IFACE_IFACE = 1 << 16,
|
||||||
|
};
|
||||||
|
|
||||||
static const struct option iface_mt_opts[] = {
|
static const struct option iface_mt_opts[] = {
|
||||||
{.name = "iface", .has_arg = true, .val = 'i'},
|
{.name = "iface", .has_arg = true, .val = 'i'},
|
||||||
|
{.name = "dev-in", .has_arg = false, .val = 'I'},
|
||||||
|
{.name = "dev-out", .has_arg = false, .val = 'O'},
|
||||||
{.name = "up", .has_arg = false, .val = 'u'},
|
{.name = "up", .has_arg = false, .val = 'u'},
|
||||||
{.name = "down", .has_arg = false, .val = 'U'}, /* not up */
|
{.name = "down", .has_arg = false, .val = 'U'}, /* not up */
|
||||||
{.name = "broadcast", .has_arg = false, .val = 'b'},
|
{.name = "broadcast", .has_arg = false, .val = 'b'},
|
||||||
@@ -39,9 +46,7 @@ static void iface_print_opt(const struct xt_iface_mtinfo *info,
|
|||||||
const unsigned int option, const char *command)
|
const unsigned int option, const char *command)
|
||||||
{
|
{
|
||||||
if (info->flags & option)
|
if (info->flags & option)
|
||||||
printf(" %s", command);
|
printf(" %s%s", (info->invflags & option) ? "! " : "", command);
|
||||||
if (info->invflags & option)
|
|
||||||
printf(" ! %s", command);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
static void iface_setflag(struct xt_iface_mtinfo *info,
|
static void iface_setflag(struct xt_iface_mtinfo *info,
|
||||||
@@ -50,10 +55,9 @@ static void iface_setflag(struct xt_iface_mtinfo *info,
|
|||||||
if (*flags & flag)
|
if (*flags & flag)
|
||||||
xtables_error(PARAMETER_PROBLEM,
|
xtables_error(PARAMETER_PROBLEM,
|
||||||
"iface: \"--%s\" flag already specified", command);
|
"iface: \"--%s\" flag already specified", command);
|
||||||
|
info->flags |= flag;
|
||||||
if (invert)
|
if (invert)
|
||||||
info->invflags |= flag;
|
info->invflags |= flag;
|
||||||
else
|
|
||||||
info->flags |= flag;
|
|
||||||
*flags |= flag;
|
*flags |= flag;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -69,6 +73,7 @@ static void iface_mt_help(void)
|
|||||||
printf(
|
printf(
|
||||||
"iface match options:\n"
|
"iface match options:\n"
|
||||||
" --iface interface Name of interface\n"
|
" --iface interface Name of interface\n"
|
||||||
|
" --dev-in / --dev-out Use incoming/outgoing interface instead\n"
|
||||||
"[!] --up / --down match if UP flag (not) set\n"
|
"[!] --up / --down match if UP flag (not) set\n"
|
||||||
"[!] --broadcast match if BROADCAST flag (not) set\n"
|
"[!] --broadcast match if BROADCAST flag (not) set\n"
|
||||||
"[!] --loopback match if LOOPBACK flag (not) set\n"
|
"[!] --loopback match if LOOPBACK flag (not) set\n"
|
||||||
@@ -110,6 +115,18 @@ static int iface_mt_parse(int c, char **argv, int invert, unsigned int *flags,
|
|||||||
strcpy(info->ifname, optarg);
|
strcpy(info->ifname, optarg);
|
||||||
*flags |= XT_IFACE_IFACE;
|
*flags |= XT_IFACE_IFACE;
|
||||||
return true;
|
return true;
|
||||||
|
case 'I': /* --dev-in */
|
||||||
|
xtables_param_act(XTF_ONLY_ONCE, "iface", "--dev-in",
|
||||||
|
*flags & XT_IFACE_IFACE);
|
||||||
|
*flags |= XT_IFACE_IFACE;
|
||||||
|
iface_setflag(info, flags, invert, XT_IFACE_DEV_IN, "dev-in");
|
||||||
|
return true;
|
||||||
|
case 'O': /* --dev-out */
|
||||||
|
xtables_param_act(XTF_ONLY_ONCE, "iface", "--dev-out",
|
||||||
|
*flags & XT_IFACE_IFACE);
|
||||||
|
*flags |= XT_IFACE_IFACE;
|
||||||
|
iface_setflag(info, flags, invert, XT_IFACE_DEV_OUT, "dev-out");
|
||||||
|
return true;
|
||||||
case 'u': /* UP */
|
case 'u': /* UP */
|
||||||
iface_setflag(info, flags, invert, XT_IFACE_UP, "up");
|
iface_setflag(info, flags, invert, XT_IFACE_UP, "up");
|
||||||
return true;
|
return true;
|
||||||
@@ -152,7 +169,8 @@ static void iface_mt_check(unsigned int flags)
|
|||||||
if (!(flags & XT_IFACE_IFACE))
|
if (!(flags & XT_IFACE_IFACE))
|
||||||
xtables_error(PARAMETER_PROBLEM,
|
xtables_error(PARAMETER_PROBLEM,
|
||||||
"iface: You must specify an interface");
|
"iface: You must specify an interface");
|
||||||
if (flags == 0 || flags == XT_IFACE_IFACE)
|
if ((flags & ~(XT_IFACE_IFACE | XT_IFACE_DEV_IN |
|
||||||
|
XT_IFACE_DEV_OUT)) == 0)
|
||||||
xtables_error(PARAMETER_PROBLEM,
|
xtables_error(PARAMETER_PROBLEM,
|
||||||
"iface: You must specify at least one option");
|
"iface: You must specify at least one option");
|
||||||
}
|
}
|
||||||
@@ -162,7 +180,14 @@ static void iface_mt_print(const void *ip, const struct xt_entry_match *match,
|
|||||||
{
|
{
|
||||||
const struct xt_iface_mtinfo *info = (const void *)match->data;
|
const struct xt_iface_mtinfo *info = (const void *)match->data;
|
||||||
|
|
||||||
printf("iface: \"%s\" [state:", info->ifname);
|
printf("iface: ");
|
||||||
|
if (info->flags & XT_IFACE_DEV_IN)
|
||||||
|
printf("(in)");
|
||||||
|
else if (info->flags & XT_IFACE_DEV_OUT)
|
||||||
|
printf("(out)");
|
||||||
|
else
|
||||||
|
printf("%s", info->ifname);
|
||||||
|
printf(" [state:");
|
||||||
iface_print_opt(info, XT_IFACE_UP, "up");
|
iface_print_opt(info, XT_IFACE_UP, "up");
|
||||||
iface_print_opt(info, XT_IFACE_BROADCAST, "broadcast");
|
iface_print_opt(info, XT_IFACE_BROADCAST, "broadcast");
|
||||||
iface_print_opt(info, XT_IFACE_LOOPBACK, "loopback");
|
iface_print_opt(info, XT_IFACE_LOOPBACK, "loopback");
|
||||||
@@ -181,6 +206,11 @@ static void iface_mt_save(const void *ip, const struct xt_entry_match *match)
|
|||||||
{
|
{
|
||||||
const struct xt_iface_mtinfo *info = (const void *)match->data;
|
const struct xt_iface_mtinfo *info = (const void *)match->data;
|
||||||
|
|
||||||
|
if (info->flags & XT_IFACE_DEV_IN)
|
||||||
|
printf("--dev-in");
|
||||||
|
else if (info->flags & XT_IFACE_DEV_OUT)
|
||||||
|
printf("--dev-out");
|
||||||
|
else
|
||||||
printf("--iface %s", info->ifname);
|
printf("--iface %s", info->ifname);
|
||||||
iface_print_opt(info, XT_IFACE_UP, "--up");
|
iface_print_opt(info, XT_IFACE_UP, "--up");
|
||||||
iface_print_opt(info, XT_IFACE_BROADCAST, "--broadcast");
|
iface_print_opt(info, XT_IFACE_BROADCAST, "--broadcast");
|
||||||
|
@@ -1,7 +1,20 @@
|
|||||||
Allows you to check interface states.
|
Allows you to check interface states. First, an interface needs to be selected
|
||||||
|
for comparison. Exactly one option of the following three must be specified:
|
||||||
.TP
|
.TP
|
||||||
\fB\-\-iface\fP \fIname\fP
|
\fB\-\-iface\fP \fIname\fP
|
||||||
Check the states on the given interface. This option is required.
|
Check the states on the given interface.
|
||||||
|
.TP
|
||||||
|
\fB\-\-dev\-in\fP
|
||||||
|
Check the states on the interface on which the packet came in. If the input
|
||||||
|
device is not set, because for example you are using \-m iface in the OUTPUT
|
||||||
|
chain, this submatch returns false.
|
||||||
|
.TP
|
||||||
|
\fB\-\-dev\-out\fP
|
||||||
|
Check the states on the interface on which the packet will go out. If the
|
||||||
|
output device is not set, because for example you are using \-m iface in the
|
||||||
|
INPUT chain, this submatch returns false.
|
||||||
|
.PP
|
||||||
|
Following that, one can select the interface properties to check for:
|
||||||
.TP
|
.TP
|
||||||
[\fB!\fP] \fB\-\-up\fP, [\fB!\fP] \fB\-\-down\fP
|
[\fB!\fP] \fB\-\-up\fP, [\fB!\fP] \fB\-\-down\fP
|
||||||
Check the UP flag.
|
Check the UP flag.
|
||||||
|
@@ -17,6 +17,7 @@
|
|||||||
#include <ctype.h>
|
#include <ctype.h>
|
||||||
#include <xtables.h>
|
#include <xtables.h>
|
||||||
#include "xt_ipp2p.h"
|
#include "xt_ipp2p.h"
|
||||||
|
#include "compat_user.h"
|
||||||
#define param_act(t, s, f) xtables_param_act((t), "ipp2p", (s), (f))
|
#define param_act(t, s, f) xtables_param_act((t), "ipp2p", (s), (f))
|
||||||
|
|
||||||
static void ipp2p_mt_help(void)
|
static void ipp2p_mt_help(void)
|
||||||
|
@@ -14,6 +14,7 @@
|
|||||||
#include <string.h>
|
#include <string.h>
|
||||||
#include <xtables.h>
|
#include <xtables.h>
|
||||||
#include "xt_ipv4options.h"
|
#include "xt_ipv4options.h"
|
||||||
|
#include "compat_user.h"
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Overview from http://www.networksorcery.com/enp/protocol/ip.htm
|
* Overview from http://www.networksorcery.com/enp/protocol/ip.htm
|
||||||
|
@@ -5,6 +5,7 @@
|
|||||||
#include <string.h>
|
#include <string.h>
|
||||||
#include <xtables.h>
|
#include <xtables.h>
|
||||||
#include "xt_length2.h"
|
#include "xt_length2.h"
|
||||||
|
#include "compat_user.h"
|
||||||
|
|
||||||
enum {
|
enum {
|
||||||
F_LAYER = 1 << 0,
|
F_LAYER = 1 << 0,
|
||||||
|
@@ -17,6 +17,7 @@
|
|||||||
#include <xtables.h>
|
#include <xtables.h>
|
||||||
#include <linux/netfilter/x_tables.h>
|
#include <linux/netfilter/x_tables.h>
|
||||||
#include "xt_lscan.h"
|
#include "xt_lscan.h"
|
||||||
|
#include "compat_user.h"
|
||||||
|
|
||||||
static const struct option lscan_mt_opts[] = {
|
static const struct option lscan_mt_opts[] = {
|
||||||
{.name = "stealth", .has_arg = false, .val = 'x'},
|
{.name = "stealth", .has_arg = false, .val = 'x'},
|
||||||
|
@@ -28,6 +28,7 @@
|
|||||||
#include <xtables.h>
|
#include <xtables.h>
|
||||||
#include <linux/netfilter/x_tables.h>
|
#include <linux/netfilter/x_tables.h>
|
||||||
#include "xt_psd.h"
|
#include "xt_psd.h"
|
||||||
|
#include "compat_user.h"
|
||||||
|
|
||||||
/* Function which prints out usage message. */
|
/* Function which prints out usage message. */
|
||||||
static void psd_mt_help(void) {
|
static void psd_mt_help(void) {
|
||||||
|
@@ -15,6 +15,7 @@
|
|||||||
#include <string.h>
|
#include <string.h>
|
||||||
#include <xtables.h>
|
#include <xtables.h>
|
||||||
#include "xt_quota2.h"
|
#include "xt_quota2.h"
|
||||||
|
#include "compat_user.h"
|
||||||
|
|
||||||
enum {
|
enum {
|
||||||
FL_QUOTA = 1 << 0,
|
FL_QUOTA = 1 << 0,
|
||||||
|
@@ -16,6 +16,7 @@
|
|||||||
#include <linux/netfilter.h>
|
#include <linux/netfilter.h>
|
||||||
#include <linux/netfilter_ipv4/ip_tables.h>
|
#include <linux/netfilter_ipv4/ip_tables.h>
|
||||||
#include "xt_pknock.h"
|
#include "xt_pknock.h"
|
||||||
|
#include "compat_user.h"
|
||||||
|
|
||||||
static const struct option pknock_mt_opts[] = {
|
static const struct option pknock_mt_opts[] = {
|
||||||
/* .name, .has_arg, .flag, .val */
|
/* .name, .has_arg, .flag, .val */
|
||||||
|
@@ -2,7 +2,7 @@
|
|||||||
* "LOGMARK" target extension to Xtables
|
* "LOGMARK" target extension to Xtables
|
||||||
* useful for debugging
|
* useful for debugging
|
||||||
*
|
*
|
||||||
* Copyright © Jan Engelhardt <jengelh [at] medozas de>, 2008
|
* Copyright © Jan Engelhardt <jengelh [at] medozas de>, 2008-2010
|
||||||
*
|
*
|
||||||
* This program is free software; you can redistribute it and/or
|
* This program is free software; you can redistribute it and/or
|
||||||
* modify it under the terms of the GNU General Public License; either
|
* modify it under the terms of the GNU General Public License; either
|
||||||
@@ -75,6 +75,8 @@ logmark_tg(struct sk_buff **pskb, const struct xt_action_param *par)
|
|||||||
printk("%s""ASSURED", prev++ ? "," : "");
|
printk("%s""ASSURED", prev++ ? "," : "");
|
||||||
if (ct->status & IPS_CONFIRMED)
|
if (ct->status & IPS_CONFIRMED)
|
||||||
printk("%s""CONFIRMED", prev++ ? "," : "");
|
printk("%s""CONFIRMED", prev++ ? "," : "");
|
||||||
|
printk(" lifetime=%lus",
|
||||||
|
(jiffies - ct->timeout.expires) / HZ);
|
||||||
}
|
}
|
||||||
|
|
||||||
printk("\n");
|
printk("\n");
|
||||||
|
@@ -152,7 +152,9 @@ static unsigned int sysrq_tg(const void *pdata, uint16_t len)
|
|||||||
sysrq_seqno = new_seqno;
|
sysrq_seqno = new_seqno;
|
||||||
for (i = 0; i < len && data[i] != ','; ++i) {
|
for (i = 0; i < len && data[i] != ','; ++i) {
|
||||||
printk(KERN_INFO KBUILD_MODNAME ": SysRq %c\n", data[i]);
|
printk(KERN_INFO KBUILD_MODNAME ": SysRq %c\n", data[i]);
|
||||||
#if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 6, 19)
|
#if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 6, 36)
|
||||||
|
handle_sysrq(data[i]);
|
||||||
|
#elif LINUX_VERSION_CODE >= KERNEL_VERSION(2, 6, 19)
|
||||||
handle_sysrq(data[i], NULL);
|
handle_sysrq(data[i], NULL);
|
||||||
#else
|
#else
|
||||||
handle_sysrq(data[i], NULL, NULL);
|
handle_sysrq(data[i], NULL, NULL);
|
||||||
@@ -187,7 +189,9 @@ static unsigned int sysrq_tg(const void *pdata, uint16_t len)
|
|||||||
return NF_DROP;
|
return NF_DROP;
|
||||||
}
|
}
|
||||||
|
|
||||||
#if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 6, 19)
|
#if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 6, 36)
|
||||||
|
handle_sysrq(c);
|
||||||
|
#elif LINUX_VERSION_CODE >= KERNEL_VERSION(2, 6, 19)
|
||||||
handle_sysrq(c, NULL);
|
handle_sysrq(c, NULL);
|
||||||
#else
|
#else
|
||||||
handle_sysrq(c, NULL, NULL);
|
handle_sysrq(c, NULL, NULL);
|
||||||
|
@@ -73,7 +73,7 @@ static void tarpit_tcp(struct sk_buff *oldskb, unsigned int hook)
|
|||||||
/* Rate-limit replies to !SYN,ACKs */
|
/* Rate-limit replies to !SYN,ACKs */
|
||||||
#if 0
|
#if 0
|
||||||
if (!oth->syn && oth->ack)
|
if (!oth->syn && oth->ack)
|
||||||
if (!xrlim_allow(&ort->u.dst, HZ))
|
if (!xrlim_allow(rt_dst(ort), HZ))
|
||||||
return;
|
return;
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
@@ -51,8 +51,8 @@ tee_tg_route4(struct sk_buff *skb, const struct xt_tee_tginfo *info)
|
|||||||
return false;
|
return false;
|
||||||
|
|
||||||
dst_release(skb_dst(skb));
|
dst_release(skb_dst(skb));
|
||||||
skb_dst_set(skb, &rt->u.dst);
|
skb_dst_set(skb, rt_dst(rt));
|
||||||
skb->dev = rt->u.dst.dev;
|
skb->dev = rt_dst(rt)->dev;
|
||||||
skb->protocol = htons(ETH_P_IP);
|
skb->protocol = htons(ETH_P_IP);
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
9
extensions/xt_gradm.h
Normal file
9
extensions/xt_gradm.h
Normal file
@@ -0,0 +1,9 @@
|
|||||||
|
#ifndef _XT_GRADM_H
|
||||||
|
#define _XT_GRADM_H
|
||||||
|
|
||||||
|
struct xt_gradm_mtinfo {
|
||||||
|
__u16 flags;
|
||||||
|
__u16 invflags;
|
||||||
|
};
|
||||||
|
|
||||||
|
#endif
|
@@ -40,29 +40,46 @@ static const struct xt_iface_flag_pairs xt_iface_lookup[] =
|
|||||||
{.iface_flag = XT_IFACE_DORMANT, .iff_flag = IFF_DORMANT},
|
{.iface_flag = XT_IFACE_DORMANT, .iff_flag = IFF_DORMANT},
|
||||||
};
|
};
|
||||||
|
|
||||||
|
static const struct net_device *iface_get(const struct xt_iface_mtinfo *info,
|
||||||
|
const struct xt_action_param *par, struct net_device **put)
|
||||||
|
{
|
||||||
|
if (info->flags & XT_IFACE_DEV_IN)
|
||||||
|
return par->in;
|
||||||
|
else if (info->flags & XT_IFACE_DEV_OUT)
|
||||||
|
return par->out;
|
||||||
|
#if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 6, 24)
|
||||||
|
return *put = dev_get_by_name(&init_net, info->ifname);
|
||||||
|
#else
|
||||||
|
return *put = dev_get_by_name(info->ifname);
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
|
||||||
|
static bool iface_flagtest(unsigned int devflags, unsigned int flags,
|
||||||
|
unsigned int invflags)
|
||||||
|
{
|
||||||
|
unsigned int i;
|
||||||
|
|
||||||
|
for (i = 0; i < ARRAY_SIZE(xt_iface_lookup); ++i)
|
||||||
|
if ((flags & xt_iface_lookup[i].iface_flag) &&
|
||||||
|
!!(devflags & xt_iface_lookup[i].iff_flag) ^
|
||||||
|
!(invflags & xt_iface_lookup[i].iface_flag))
|
||||||
|
return false;
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
static bool xt_iface_mt(const struct sk_buff *skb,
|
static bool xt_iface_mt(const struct sk_buff *skb,
|
||||||
struct xt_action_param *par)
|
struct xt_action_param *par)
|
||||||
{
|
{
|
||||||
const struct xt_iface_mtinfo *info = par->matchinfo;
|
const struct xt_iface_mtinfo *info = par->matchinfo;
|
||||||
struct net_device *dev;
|
struct net_device *put = NULL;
|
||||||
|
const struct net_device *dev = iface_get(info, par, &put);
|
||||||
bool retval;
|
bool retval;
|
||||||
int i;
|
|
||||||
|
|
||||||
#if LINUX_VERSION_CODE >= KERNEL_VERSION(2, 6, 24)
|
if (dev == NULL)
|
||||||
dev = dev_get_by_name(&init_net, info->ifname);
|
return false;
|
||||||
#else
|
retval = iface_flagtest(dev->flags, info->flags, info->invflags);
|
||||||
dev = dev_get_by_name(info->ifname);
|
if (put != NULL)
|
||||||
#endif
|
dev_put(put);
|
||||||
retval = dev != NULL;
|
|
||||||
if (retval) {
|
|
||||||
for (i = 0; i < ARRAY_SIZE(xt_iface_lookup) && retval; ++i) {
|
|
||||||
if (info->flags & xt_iface_lookup[i].iface_flag)
|
|
||||||
retval &= dev->flags & xt_iface_lookup[i].iff_flag;
|
|
||||||
if (info->invflags & xt_iface_lookup[i].iface_flag)
|
|
||||||
retval &= !(dev->flags & xt_iface_lookup[i].iff_flag);
|
|
||||||
}
|
|
||||||
dev_put(dev);
|
|
||||||
}
|
|
||||||
return retval;
|
return retval;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -13,7 +13,8 @@ enum {
|
|||||||
XT_IFACE_DYNAMIC = 1 << 8,
|
XT_IFACE_DYNAMIC = 1 << 8,
|
||||||
XT_IFACE_LOWER_UP = 1 << 9,
|
XT_IFACE_LOWER_UP = 1 << 9,
|
||||||
XT_IFACE_DORMANT = 1 << 10,
|
XT_IFACE_DORMANT = 1 << 10,
|
||||||
XT_IFACE_IFACE = 1 << 15,
|
XT_IFACE_DEV_IN = 1 << 11,
|
||||||
|
XT_IFACE_DEV_OUT = 1 << 12,
|
||||||
};
|
};
|
||||||
|
|
||||||
struct xt_iface_mtinfo {
|
struct xt_iface_mtinfo {
|
||||||
|
5
mconfig
5
mconfig
@@ -2,7 +2,7 @@
|
|||||||
#
|
#
|
||||||
build_ACCOUNT=m
|
build_ACCOUNT=m
|
||||||
build_CHAOS=m
|
build_CHAOS=m
|
||||||
build_CHECKSUM=m
|
build_CHECKSUM=
|
||||||
build_DELUDE=m
|
build_DELUDE=m
|
||||||
build_DHCPMAC=m
|
build_DHCPMAC=m
|
||||||
build_ECHO=
|
build_ECHO=
|
||||||
@@ -12,10 +12,11 @@ build_RAWNAT=m
|
|||||||
build_STEAL=m
|
build_STEAL=m
|
||||||
build_SYSRQ=m
|
build_SYSRQ=m
|
||||||
build_TARPIT=m
|
build_TARPIT=m
|
||||||
build_TEE=m
|
build_TEE=
|
||||||
build_condition=m
|
build_condition=m
|
||||||
build_fuzzy=m
|
build_fuzzy=m
|
||||||
build_geoip=m
|
build_geoip=m
|
||||||
|
build_gradm=m
|
||||||
build_iface=m
|
build_iface=m
|
||||||
build_ipp2p=m
|
build_ipp2p=m
|
||||||
build_ipset=m
|
build_ipset=m
|
||||||
|
@@ -1,4 +1,4 @@
|
|||||||
.TH xtables-addons 8 "v1.28 (2010-07-24)" "" "v1.28 (2010-07-24)"
|
.TH xtables-addons 8 "v1.31 (2010-11-05)" "" "v1.31 (2010-11-05)"
|
||||||
.SH Name
|
.SH Name
|
||||||
Xtables-addons \(em additional extensions for iptables, ip6tables, etc.
|
Xtables-addons \(em additional extensions for iptables, ip6tables, etc.
|
||||||
.SH Targets
|
.SH Targets
|
||||||
|
Reference in New Issue
Block a user