[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <45DBE249-1CDD-421A-903E-7021BD1426C7@gmail.com>
Date: Sun, 16 Apr 2017 22:09:34 +0300
From: Alexey Lyashkov <alexey.lyashkov@...il.com>
To: Andreas Dilger <adilger@...ger.ca>
Cc: Ts'o Theodore <tytso@....edu>,
linux-ext4 <linux-ext4@...r.kernel.org>,
James Simmons <jsimmons@...radead.org>
Subject: Re: [PATCH] ext4: xattr-in-inode support
Andreas,
I don’t sure it’s good idea to allocate one more inode to store a large EA.
It dramatically decrease a speed with accessing a EA data in this case.
And now we have already a hit a limit of inode count with large disks.
I think it code need to be rewritten to use an special extents to store a large EA, as it avoid so much problems related to bad credits while unlinking a parent inode,
some kind problems with integer overflow as backlink stored on mdata field, and other.
I know we don’t hit a problems in this area for last year, but anyway - i prefer a different solution.
> 13 апр. 2017 г., в 22:58, Andreas Dilger <adilger@...ger.ca> написал(а):
>
> Large xattr support is implemented for EXT4_FEATURE_INCOMPAT_EA_INODE.
>
> If the size of an xattr value is larger than will fit in a single
> external block, then the xattr value will be saved into the body
> of an external xattr inode.
>
> The also helps support a larger number of xattr, since only the headers
> will be stored in the in-inode space or the single external block.
>
> The inode is referenced from the xattr header via "e_value_inum",
> which was formerly "e_value_block", but that field was never used.
> The e_value_size still contains the xattr size so that listing
> xattrs does not need to look up the inode if the data is not accessed.
>
> struct ext4_xattr_entry {
> __u8 e_name_len; /* length of name */
> __u8 e_name_index; /* attribute name index */
> __le16 e_value_offs; /* offset in disk block of value */
> __le32 e_value_inum; /* inode in which value is stored */
> __le32 e_value_size; /* size of attribute value */
> __le32 e_hash; /* hash value of name and value */
> char e_name[0]; /* attribute name */
> };
>
> The xattr inode is marked with the EXT4_EA_INODE_FL flag and also
> holds a back-reference to the owning inode in its i_mtime field,
> allowing the ext4/e2fsck to verify the correct inode is accessed.
>
> Lustre-Jira: https://jira.hpdd.intel.com/browse/LU-80
> Lustre-bugzilla: https://bugzilla.lustre.org/show_bug.cgi?id=4424
> Signed-off-by: Kalpak Shah <kalpak.shah@....com>
> Signed-off-by: James Simmons <uja.ornl@...il.com>
> Signed-off-by: Andreas Dilger <andreas.dilger@...el.com>
> ---
>
> Per recent discussion, here is the latest version of the xattr-in-inode
> patch. This has just been freshly updated to the current kernel (from
> 4.4) and has not even been compiled, so it is unlikely to work properly.
> The functional parts of the feature and on-disk format are unchanged,
> and is really what Ted is interested in.
>
> Cheers, Andreas
> --
> diff --git a/fs/ext4/ext4.h b/fs/ext4/ext4.h
> index fb69ee2..afe830b 100644
> --- a/fs/ext4/ext4.h
> +++ b/fs/ext4/ext4.h
> @@ -1797,6 +1797,7 @@ static inline void ext4_clear_state_flags(struct ext4_inode_info *ei)
> EXT4_FEATURE_INCOMPAT_EXTENTS| \
> EXT4_FEATURE_INCOMPAT_64BIT| \
> EXT4_FEATURE_INCOMPAT_FLEX_BG| \
> + EXT4_FEATURE_INCOMPAT_EA_INODE| \
> EXT4_FEATURE_INCOMPAT_MMP | \
> EXT4_FEATURE_INCOMPAT_INLINE_DATA | \
> EXT4_FEATURE_INCOMPAT_ENCRYPT | \
> @@ -2220,6 +2221,12 @@ struct mmpd_data {
> #define EXT4_MMP_MAX_CHECK_INTERVAL 300UL
>
> /*
> + * Maximum size of xattr attributes for FEATURE_INCOMPAT_EA_INODE 1Mb
> + * This limit is arbitrary, but is reasonable for the xattr API.
> + */
> +#define EXT4_XATTR_MAX_LARGE_EA_SIZE (1024 * 1024)
> +
> +/*
> * Function prototypes
> */
>
> @@ -2231,6 +2238,10 @@ struct mmpd_data {
> # define ATTRIB_NORET __attribute__((noreturn))
> # define NORET_AND noreturn,
>
> +struct ext4_xattr_ino_array {
> + unsigned int xia_count; /* # of used item in the array */
> + unsigned int xia_inodes[0];
> +};
> /* bitmap.c */
> extern unsigned int ext4_count_free(char *bitmap, unsigned numchars);
> void ext4_inode_bitmap_csum_set(struct super_block *sb, ext4_group_t group,
> @@ -2480,6 +2491,7 @@ int do_journal_get_write_access(handle_t *handle,
> extern void ext4_get_inode_flags(struct ext4_inode_info *);
> extern int ext4_alloc_da_blocks(struct inode *inode);
> extern void ext4_set_aops(struct inode *inode);
> +extern int ext4_meta_trans_blocks(struct inode *, int nrblocks, int chunk);
> extern int ext4_writepage_trans_blocks(struct inode *);
> extern int ext4_chunk_trans_blocks(struct inode *, int nrblocks);
> extern int ext4_zero_partial_blocks(handle_t *handle, struct inode *inode,
> diff --git a/fs/ext4/ialloc.c b/fs/ext4/ialloc.c
> index 17bc043..01eaad6 100644
> --- a/fs/ext4/ialloc.c
> +++ b/fs/ext4/ialloc.c
> @@ -294,7 +294,6 @@ void ext4_free_inode(handle_t *handle, struct inode *inode)
> * as writing the quota to disk may need the lock as well.
> */
> dquot_initialize(inode);
> - ext4_xattr_delete_inode(handle, inode);
> dquot_free_inode(inode);
> dquot_drop(inode);
>
> diff --git a/fs/ext4/inline.c b/fs/ext4/inline.c
> index 375fb1c..9601496 100644
> --- a/fs/ext4/inline.c
> +++ b/fs/ext4/inline.c
> @@ -61,7 +61,7 @@ static int get_max_inline_xattr_value_size(struct inode *inode,
>
> /* Compute min_offs. */
> for (; !IS_LAST_ENTRY(entry); entry = EXT4_XATTR_NEXT(entry)) {
> - if (!entry->e_value_block && entry->e_value_size) {
> + if (!entry->e_value_inum && entry->e_value_size) {
> size_t offs = le16_to_cpu(entry->e_value_offs);
> if (offs < min_offs)
> min_offs = offs;
> diff --git a/fs/ext4/inode.c b/fs/ext4/inode.c
> index b9ffa9f..70069e0 100644
> --- a/fs/ext4/inode.c
> +++ b/fs/ext4/inode.c
> @@ -139,8 +139,6 @@ static void ext4_invalidatepage(struct page *page, unsigned int offset,
> unsigned int length);
> static int __ext4_journalled_writepage(struct page *page, unsigned int len);
> static int ext4_bh_delay_or_unwritten(handle_t *handle, struct buffer_head *bh);
> -static int ext4_meta_trans_blocks(struct inode *inode, int lblocks,
> - int pextents);
>
> /*
> * Test whether an inode is a fast symlink.
> @@ -189,6 +187,8 @@ void ext4_evict_inode(struct inode *inode)
> {
> handle_t *handle;
> int err;
> + int extra_credits = 3;
> + struct ext4_xattr_ino_array *lea_ino_array = NULL;
>
> trace_ext4_evict_inode(inode);
>
> @@ -238,8 +238,8 @@ void ext4_evict_inode(struct inode *inode)
> * protection against it
> */
> sb_start_intwrite(inode->i_sb);
> - handle = ext4_journal_start(inode, EXT4_HT_TRUNCATE,
> - ext4_blocks_for_truncate(inode)+3);
> +
> + handle = ext4_journal_start(inode, EXT4_HT_TRUNCATE, extra_credits);
> if (IS_ERR(handle)) {
> ext4_std_error(inode->i_sb, PTR_ERR(handle));
> /*
> @@ -251,9 +251,36 @@ void ext4_evict_inode(struct inode *inode)
> sb_end_intwrite(inode->i_sb);
> goto no_delete;
> }
> -
> if (IS_SYNC(inode))
> ext4_handle_sync(handle);
> +
> + /*
> + * Delete xattr inode before deleting the main inode.
> + */
> + err = ext4_xattr_delete_inode(handle, inode, &lea_ino_array);
> + if (err) {
> + ext4_warning(inode->i_sb,
> + "couldn't delete inode's xattr (err %d)", err);
> + goto stop_handle;
> + }
> +
> + if (!IS_NOQUOTA(inode))
> + extra_credits += 2 * EXT4_QUOTA_DEL_BLOCKS(inode->i_sb);
> +
> + if (!ext4_handle_has_enough_credits(handle,
> + ext4_blocks_for_truncate(inode) + extra_credits)) {
> + err = ext4_journal_extend(handle,
> + ext4_blocks_for_truncate(inode) + extra_credits);
> + if (err > 0)
> + err = ext4_journal_restart(handle,
> + ext4_blocks_for_truncate(inode) + extra_credits);
> + if (err != 0) {
> + ext4_warning(inode->i_sb,
> + "couldn't extend journal (err %d)", err);
> + goto stop_handle;
> + }
> + }
> +
> inode->i_size = 0;
> err = ext4_mark_inode_dirty(handle, inode);
> if (err) {
> @@ -277,10 +304,10 @@ void ext4_evict_inode(struct inode *inode)
> * enough credits left in the handle to remove the inode from
> * the orphan list and set the dtime field.
> */
> - if (!ext4_handle_has_enough_credits(handle, 3)) {
> - err = ext4_journal_extend(handle, 3);
> + if (!ext4_handle_has_enough_credits(handle, extra_credits)) {
> + err = ext4_journal_extend(handle, extra_credits);
> if (err > 0)
> - err = ext4_journal_restart(handle, 3);
> + err = ext4_journal_restart(handle, extra_credits);
> if (err != 0) {
> ext4_warning(inode->i_sb,
> "couldn't extend journal (err %d)", err);
> @@ -315,8 +342,12 @@ void ext4_evict_inode(struct inode *inode)
> ext4_clear_inode(inode);
> else
> ext4_free_inode(handle, inode);
> +
> ext4_journal_stop(handle);
> sb_end_intwrite(inode->i_sb);
> +
> + if (lea_ino_array != NULL)
> + ext4_xattr_inode_array_free(inode, lea_ino_array);
> return;
> no_delete:
> ext4_clear_inode(inode); /* We must guarantee clearing of inode... */
> @@ -5475,7 +5506,7 @@ static int ext4_index_trans_blocks(struct inode *inode, int lblocks,
> *
> * Also account for superblock, inode, quota and xattr blocks
> */
> -static int ext4_meta_trans_blocks(struct inode *inode, int lblocks,
> +int ext4_meta_trans_blocks(struct inode *inode, int lblocks,
> int pextents)
> {
> ext4_group_t groups, ngroups = ext4_get_groups_count(inode->i_sb);
> diff --git a/fs/ext4/xattr.c b/fs/ext4/xattr.c
> index 996e790..f158798 100644
> --- a/fs/ext4/xattr.c
> +++ b/fs/ext4/xattr.c
> @@ -190,9 +190,8 @@ static void ext4_xattr_block_csum_set(struct inode *inode,
>
> /* Check the values */
> while (!IS_LAST_ENTRY(entry)) {
> - if (entry->e_value_block != 0)
> - return -EFSCORRUPTED;
> - if (entry->e_value_size != 0) {
> + if (entry->e_value_size != 0 &&
> + entry->e_value_inum == 0) {
> u16 offs = le16_to_cpu(entry->e_value_offs);
> u32 size = le32_to_cpu(entry->e_value_size);
> void *value;
> @@ -258,19 +257,26 @@ static void ext4_xattr_block_csum_set(struct inode *inode,
> __xattr_check_inode((inode), (header), (end), __func__, __LINE__)
>
> static inline int
> -ext4_xattr_check_entry(struct ext4_xattr_entry *entry, size_t size)
> +ext4_xattr_check_entry(struct ext4_xattr_entry *entry, size_t size,
> + struct inode *inode)
> {
> size_t value_size = le32_to_cpu(entry->e_value_size);
>
> - if (entry->e_value_block != 0 || value_size > size ||
> + if (!entry->e_value_inum &&
> le16_to_cpu(entry->e_value_offs) + value_size > size)
> return -EFSCORRUPTED;
> + if (entry->e_value_inum &&
> + (le32_to_cpu(entry->e_value_inum) < EXT4_FIRST_INO(inode->i_sb) ||
> + le32_to_cpu(entry->e_value_inum) >
> + le32_to_cpu(EXT4_SB(inode->i_sb)->s_es->s_inodes_count)))
> + return -EFSCORRUPTED;
> return 0;
> }
>
> static int
> ext4_xattr_find_entry(struct ext4_xattr_entry **pentry, int name_index,
> - const char *name, size_t size, int sorted)
> + const char *name, size_t size, int sorted,
> + struct inode *inode)
> {
> struct ext4_xattr_entry *entry;
> size_t name_len;
> @@ -290,11 +296,104 @@ static void ext4_xattr_block_csum_set(struct inode *inode,
> break;
> }
> *pentry = entry;
> - if (!cmp && ext4_xattr_check_entry(entry, size))
> + if (!cmp && ext4_xattr_check_entry(entry, size, inode))
> return -EFSCORRUPTED;
> return cmp ? -ENODATA : 0;
> }
>
> +/*
> + * Read the EA value from an inode.
> + */
> +static int
> +ext4_xattr_inode_read(struct inode *ea_inode, void *buf, size_t *size)
> +{
> + unsigned long block = 0;
> + struct buffer_head *bh = NULL;
> + int blocksize;
> + size_t csize, ret_size = 0;
> +
> + if (*size == 0)
> + return 0;
> +
> + blocksize = ea_inode->i_sb->s_blocksize;
> +
> + while (ret_size < *size) {
> + csize = (*size - ret_size) > blocksize ? blocksize :
> + *size - ret_size;
> + bh = ext4_bread(NULL, ea_inode, block, 0);
> + if (IS_ERR(bh)) {
> + *size = ret_size;
> + return PTR_ERR(bh);
> + }
> + memcpy(buf, bh->b_data, csize);
> + brelse(bh);
> +
> + buf += csize;
> + block += 1;
> + ret_size += csize;
> + }
> +
> + *size = ret_size;
> +
> + return 0;
> +}
> +
> +struct inode *ext4_xattr_inode_iget(struct inode *parent, unsigned long ea_ino, int *err)
> +{
> + struct inode *ea_inode = NULL;
> +
> + ea_inode = ext4_iget(parent->i_sb, ea_ino);
> + if (IS_ERR(ea_inode) || is_bad_inode(ea_inode)) {
> + int rc = IS_ERR(ea_inode) ? PTR_ERR(ea_inode) : 0;
> + ext4_error(parent->i_sb, "error while reading EA inode %lu "
> + "/ %d %d", ea_ino, rc, is_bad_inode(ea_inode));
> + *err = rc != 0 ? rc : -EIO;
> + return NULL;
> + }
> +
> + if (EXT4_XATTR_INODE_GET_PARENT(ea_inode) != parent->i_ino ||
> + ea_inode->i_generation != parent->i_generation) {
> + ext4_error(parent->i_sb, "Backpointer from EA inode %lu "
> + "to parent invalid.", ea_ino);
> + *err = -EINVAL;
> + goto error;
> + }
> +
> + if (!(EXT4_I(ea_inode)->i_flags & EXT4_EA_INODE_FL)) {
> + ext4_error(parent->i_sb, "EA inode %lu does not have "
> + "EXT4_EA_INODE_FL flag set.\n", ea_ino);
> + *err = -EINVAL;
> + goto error;
> + }
> +
> + *err = 0;
> + return ea_inode;
> +
> +error:
> + iput(ea_inode);
> + return NULL;
> +}
> +
> +/*
> + * Read the value from the EA inode.
> + */
> +static int
> +ext4_xattr_inode_get(struct inode *inode, unsigned long ea_ino, void *buffer,
> + size_t *size)
> +{
> + struct inode *ea_inode = NULL;
> + int err;
> +
> + ea_inode = ext4_xattr_inode_iget(inode, ea_ino, &err);
> + if (err)
> + return err;
> +
> + err = ext4_xattr_inode_read(ea_inode, buffer, size);
> + iput(ea_inode);
> +
> + return err;
> +}
> +
> static int
> ext4_xattr_block_get(struct inode *inode, int name_index, const char *name,
> void *buffer, size_t buffer_size)
> @@ -327,7 +426,8 @@ static void ext4_xattr_block_csum_set(struct inode *inode,
> }
> ext4_xattr_cache_insert(ext4_mb_cache, bh);
> entry = BFIRST(bh);
> - error = ext4_xattr_find_entry(&entry, name_index, name, bh->b_size, 1);
> + error = ext4_xattr_find_entry(&entry, name_index, name, bh->b_size, 1,
> + inode);
> if (error == -EFSCORRUPTED)
> goto bad_block;
> if (error)
> @@ -337,8 +437,16 @@ static void ext4_xattr_block_csum_set(struct inode *inode,
> error = -ERANGE;
> if (size > buffer_size)
> goto cleanup;
> - memcpy(buffer, bh->b_data + le16_to_cpu(entry->e_value_offs),
> - size);
> + if (entry->e_value_inum) {
> + error = ext4_xattr_inode_get(inode,
> + le32_to_cpu(entry->e_value_inum),
> + buffer, &size);
> + if (error)
> + goto cleanup;
> + } else {
> + memcpy(buffer, bh->b_data +
> + le16_to_cpu(entry->e_value_offs), size);
> + }
> }
> error = size;
>
> @@ -372,7 +480,7 @@ static void ext4_xattr_block_csum_set(struct inode *inode,
> if (error)
> goto cleanup;
> error = ext4_xattr_find_entry(&entry, name_index, name,
> - end - (void *)entry, 0);
> + end - (void *)entry, 0, inode);
> if (error)
> goto cleanup;
> size = le32_to_cpu(entry->e_value_size);
> @@ -380,8 +488,16 @@ static void ext4_xattr_block_csum_set(struct inode *inode,
> error = -ERANGE;
> if (size > buffer_size)
> goto cleanup;
> - memcpy(buffer, (void *)IFIRST(header) +
> - le16_to_cpu(entry->e_value_offs), size);
> + if (entry->e_value_inum) {
> + error = ext4_xattr_inode_get(inode,
> + le32_to_cpu(entry->e_value_inum),
> + buffer, &size);
> + if (error)
> + goto cleanup;
> + } else {
> + memcpy(buffer, (void *)IFIRST(header) +
> + le16_to_cpu(entry->e_value_offs), size);
> + }
> }
> error = size;
>
> @@ -648,7 +764,7 @@ static size_t ext4_xattr_free_space(struct ext4_xattr_entry *last,
> size_t *min_offs, void *base, int *total)
> {
> for (; !IS_LAST_ENTRY(last); last = EXT4_XATTR_NEXT(last)) {
> - if (last->e_value_size) {
> + if (!last->e_value_inum && last->e_value_size) {
> size_t offs = le16_to_cpu(last->e_value_offs);
> if (offs < *min_offs)
> *min_offs = offs;
> @@ -659,16 +775,172 @@ static size_t ext4_xattr_free_space(struct ext4_xattr_entry *last,
> return (*min_offs - ((void *)last - base) - sizeof(__u32));
> }
>
> -static int
> -ext4_xattr_set_entry(struct ext4_xattr_info *i, struct ext4_xattr_search *s)
> +/*
> + * Write the value of the EA in an inode.
> + */
> +static int ext4_xattr_inode_write(handle_t *handle, struct inode *ea_inode,
> + const void *buf, int bufsize)
> +{
> + struct buffer_head *bh = NULL;
> + unsigned long block = 0;
> + unsigned blocksize = ea_inode->i_sb->s_blocksize;
> + unsigned max_blocks = (bufsize + blocksize - 1) >> ea_inode->i_blkbits;
> + int csize, wsize = 0;
> + int ret = 0;
> + int retries = 0;
> +
> +retry:
> + while (ret >= 0 && ret < max_blocks) {
> + struct ext4_map_blocks map;
> + map.m_lblk = block += ret;
> + map.m_len = max_blocks -= ret;
> +
> + ret = ext4_map_blocks(handle, ea_inode, &map,
> + EXT4_GET_BLOCKS_CREATE);
> + if (ret <= 0) {
> + ext4_mark_inode_dirty(handle, ea_inode);
> + if (ret == -ENOSPC &&
> + ext4_should_retry_alloc(ea_inode->i_sb, &retries)) {
> + ret = 0;
> + goto retry;
> + }
> + break;
> + }
> + }
> +
> + if (ret < 0)
> + return ret;
> +
> + block = 0;
> + while (wsize < bufsize) {
> + if (bh != NULL)
> + brelse(bh);
> + csize = (bufsize - wsize) > blocksize ? blocksize :
> + bufsize - wsize;
> + bh = ext4_getblk(handle, ea_inode, block, 0);
> + if (IS_ERR(bh)) {
> + ret = PTR_ERR(bh);
> + goto out;
> + }
> + ret = ext4_journal_get_write_access(handle, bh);
> + if (ret)
> + goto out;
> +
> + memcpy(bh->b_data, buf, csize);
> + set_buffer_uptodate(bh);
> + ext4_handle_dirty_metadata(handle, ea_inode, bh);
> +
> + buf += csize;
> + wsize += csize;
> + block += 1;
> + }
> +
> + mutex_lock(&ea_inode->i_mutex);
> + i_size_write(ea_inode, wsize);
> + ext4_update_i_disksize(ea_inode, wsize);
> + mutex_unlock(&ea_inode->i_mutex);
> +
> + ext4_mark_inode_dirty(handle, ea_inode);
> +
> +out:
> + brelse(bh);
> +
> + return ret;
> +}
> +
> +/*
> + * Create an inode to store the value of a large EA.
> + */
> +static struct inode *ext4_xattr_inode_create(handle_t *handle,
> + struct inode *inode)
> +{
> + struct inode *ea_inode = NULL;
> +
> + /*
> + * Let the next inode be the goal, so we try and allocate the EA inode
> + * in the same group, or nearby one.
> + */
> + ea_inode = ext4_new_inode(handle, inode->i_sb->s_root->d_inode,
> + S_IFREG | 0600, NULL, inode->i_ino + 1, NULL);
> + if (!IS_ERR(ea_inode)) {
> + ea_inode->i_op = &ext4_file_inode_operations;
> + ea_inode->i_fop = &ext4_file_operations;
> + ext4_set_aops(ea_inode);
> + ea_inode->i_generation = inode->i_generation;
> + EXT4_I(ea_inode)->i_flags |= EXT4_EA_INODE_FL;
> +
> + /*
> + * A back-pointer from EA inode to parent inode will be useful
> + * for e2fsck.
> + */
> + EXT4_XATTR_INODE_SET_PARENT(ea_inode, inode->i_ino);
> + unlock_new_inode(ea_inode);
> + }
> +
> + return ea_inode;
> +}
> +
> +/*
> + * Unlink the inode storing the value of the EA.
> + */
> +int ext4_xattr_inode_unlink(struct inode *inode, unsigned long ea_ino)
> +{
> + struct inode *ea_inode = NULL;
> + int err;
> +
> + ea_inode = ext4_xattr_inode_iget(inode, ea_ino, &err);
> + if (err)
> + return err;
> +
> + clear_nlink(ea_inode);
> + iput(ea_inode);
> +
> + return 0;
> +}
> +
> +/*
> + * Add value of the EA in an inode.
> + */
> +static int ext4_xattr_inode_set(handle_t *handle, struct inode *inode,
> + unsigned long *ea_ino, const void *value,
> + size_t value_len)
> +{
> + struct inode *ea_inode;
> + int err;
> +
> + /* Create an inode for the EA value */
> + ea_inode = ext4_xattr_inode_create(handle, inode);
> + if (IS_ERR(ea_inode))
> + return PTR_ERR(ea_inode);
> +
> + err = ext4_xattr_inode_write(handle, ea_inode, value, value_len);
> + if (err)
> + clear_nlink(ea_inode);
> + else
> + *ea_ino = ea_inode->i_ino;
> +
> + iput(ea_inode);
> +
> + return err;
> +}
> +
> +static int ext4_xattr_set_entry(struct ext4_xattr_info *i,
> + struct ext4_xattr_search *s,
> + handle_t *handle, struct inode *inode)
> {
> struct ext4_xattr_entry *last;
> size_t free, min_offs = s->end - s->base, name_len = strlen(i->name);
> + int in_inode = i->in_inode;
> +
> + if (ext4_feature_incompat(inode->i_sb, EA_INODE) &&
> + (EXT4_XATTR_SIZE(i->value_len) >
> + EXT4_XATTR_MIN_LARGE_EA_SIZE(inode->i_sb->s_blocksize)))
> + in_inode = 1;
>
> /* Compute min_offs and last. */
> last = s->first;
> for (; !IS_LAST_ENTRY(last); last = EXT4_XATTR_NEXT(last)) {
> - if (last->e_value_size) {
> + if (!last->e_value_inum && last->e_value_size) {
> size_t offs = le16_to_cpu(last->e_value_offs);
> if (offs < min_offs)
> min_offs = offs;
> @@ -676,15 +948,20 @@ static size_t ext4_xattr_free_space(struct ext4_xattr_entry *last,
> }
> free = min_offs - ((void *)last - s->base) - sizeof(__u32);
> if (!s->not_found) {
> - if (s->here->e_value_size) {
> + if (!in_inode &&
> + !s->here->e_value_inum && s->here->e_value_size) {
> size_t size = le32_to_cpu(s->here->e_value_size);
> free += EXT4_XATTR_SIZE(size);
> }
> free += EXT4_XATTR_LEN(name_len);
> }
> if (i->value) {
> - if (free < EXT4_XATTR_LEN(name_len) +
> - EXT4_XATTR_SIZE(i->value_len))
> + size_t value_len = EXT4_XATTR_SIZE(i->value_len);
> +
> + if (in_inode)
> + value_len = 0;
> +
> + if (free < EXT4_XATTR_LEN(name_len) + value_len)
> return -ENOSPC;
> }
>
> @@ -698,7 +975,8 @@ static size_t ext4_xattr_free_space(struct ext4_xattr_entry *last,
> s->here->e_name_len = name_len;
> memcpy(s->here->e_name, i->name, name_len);
> } else {
> - if (s->here->e_value_size) {
> + if (!s->here->e_value_inum && s->here->e_value_size &&
> + s->here->e_value_offs > 0) {
> void *first_val = s->base + min_offs;
> size_t offs = le16_to_cpu(s->here->e_value_offs);
> void *val = s->base + offs;
> @@ -732,12 +1010,18 @@ static size_t ext4_xattr_free_space(struct ext4_xattr_entry *last,
> last = s->first;
> while (!IS_LAST_ENTRY(last)) {
> size_t o = le16_to_cpu(last->e_value_offs);
> - if (last->e_value_size && o < offs)
> + if (!last->e_value_inum &&
> + last->e_value_size && o < offs)
> last->e_value_offs =
> cpu_to_le16(o + size);
> last = EXT4_XATTR_NEXT(last);
> }
> }
> + if (s->here->e_value_inum) {
> + ext4_xattr_inode_unlink(inode,
> + le32_to_cpu(s->here->e_value_inum);
> + s->here->e_value_inum = 0;
> + }
> if (!i->value) {
> /* Remove the old name. */
> size_t size = EXT4_XATTR_LEN(name_len);
> @@ -750,11 +1034,20 @@ static size_t ext4_xattr_free_space(struct ext4_xattr_entry *last,
>
> if (i->value) {
> /* Insert the new value. */
> - s->here->e_value_size = cpu_to_le32(i->value_len);
> - if (i->value_len) {
> + if (in_inode) {
> + unsigned long ea_ino =
> + le32_to_cpu(s->here->e_value_inum);
> + rc = ext4_xattr_inode_set(handle, inode, &ea_ino,
> + i->value, i->value_len);
> + if (rc)
> + goto out;
> + s->here->e_value_inum = cpu_to_le32(ea_ino);
> + s->here->e_value_offs = 0;
> + } else if (i->value_len) {
> size_t size = EXT4_XATTR_SIZE(i->value_len);
> void *val = s->base + min_offs - size;
> s->here->e_value_offs = cpu_to_le16(min_offs - size);
> + s->here->e_value_inum = 0;
> if (i->value == EXT4_ZERO_XATTR_VALUE) {
> memset(val, 0, size);
> } else {
> @@ -764,8 +1057,11 @@ static size_t ext4_xattr_free_space(struct ext4_xattr_entry *last,
> memcpy(val, i->value, i->value_len);
> }
> }
> + s->here->e_value_size = cpu_to_le32(i->value_len);
> }
> - return 0;
> +
> +out:
> + return rc;
> }
>
> struct ext4_xattr_block_find {
> @@ -804,7 +1100,7 @@ struct ext4_xattr_block_find {
> bs->s.end = bs->bh->b_data + bs->bh->b_size;
> bs->s.here = bs->s.first;
> error = ext4_xattr_find_entry(&bs->s.here, i->name_index,
> - i->name, bs->bh->b_size, 1);
> + i->name, bs->bh->b_size, 1, inode);
> if (error && error != -ENODATA)
> goto cleanup;
> bs->s.not_found = error;
> @@ -829,8 +1125,6 @@ struct ext4_xattr_block_find {
>
> #define header(x) ((struct ext4_xattr_header *)(x))
>
> - if (i->value && i->value_len > sb->s_blocksize)
> - return -ENOSPC;
> if (s->base) {
> BUFFER_TRACE(bs->bh, "get_write_access");
> error = ext4_journal_get_write_access(handle, bs->bh);
> @@ -849,7 +1143,7 @@ struct ext4_xattr_block_find {
> mb_cache_entry_delete_block(ext4_mb_cache, hash,
> bs->bh->b_blocknr);
> ea_bdebug(bs->bh, "modifying in-place");
> - error = ext4_xattr_set_entry(i, s);
> + error = ext4_xattr_set_entry(i, s, handle, inode);
> if (!error) {
> if (!IS_LAST_ENTRY(s->first))
> ext4_xattr_rehash(header(s->base),
> @@ -898,7 +1192,7 @@ struct ext4_xattr_block_find {
> s->end = s->base + sb->s_blocksize;
> }
>
> - error = ext4_xattr_set_entry(i, s);
> + error = ext4_xattr_set_entry(i, s, handle, inode);
> if (error == -EFSCORRUPTED)
> goto bad_block;
> if (error)
> @@ -1077,7 +1371,7 @@ int ext4_xattr_ibody_find(struct inode *inode, struct ext4_xattr_info *i,
> /* Find the named attribute. */
> error = ext4_xattr_find_entry(&is->s.here, i->name_index,
> i->name, is->s.end -
> - (void *)is->s.base, 0);
> + (void *)is->s.base, 0, inode);
> if (error && error != -ENODATA)
> return error;
> is->s.not_found = error;
> @@ -1095,7 +1389,7 @@ int ext4_xattr_ibody_inline_set(handle_t *handle, struct inode *inode,
>
> if (EXT4_I(inode)->i_extra_isize == 0)
> return -ENOSPC;
> - error = ext4_xattr_set_entry(i, s);
> + error = ext4_xattr_set_entry(i, s, handle, inode);
> if (error) {
> if (error == -ENOSPC &&
> ext4_has_inline_data(inode)) {
> @@ -1107,7 +1401,7 @@ int ext4_xattr_ibody_inline_set(handle_t *handle, struct inode *inode,
> error = ext4_xattr_ibody_find(inode, i, is);
> if (error)
> return error;
> - error = ext4_xattr_set_entry(i, s);
> + error = ext4_xattr_set_entry(i, s, handle, inode);
> }
> if (error)
> return error;
> @@ -1133,7 +1427,7 @@ static int ext4_xattr_ibody_set(struct inode *inode,
>
> if (EXT4_I(inode)->i_extra_isize == 0)
> return -ENOSPC;
> - error = ext4_xattr_set_entry(i, s);
> + error = ext4_xattr_set_entry(i, s, handle, inode);
> if (error)
> return error;
> header = IHDR(inode, ext4_raw_inode(&is->iloc));
> @@ -1180,7 +1474,7 @@ static int ext4_xattr_value_same(struct ext4_xattr_search *s,
> .name = name,
> .value = value,
> .value_len = value_len,
> -
> + .in_inode = 0,
> };
> struct ext4_xattr_ibody_find is = {
> .s = { .not_found = -ENODATA, },
> @@ -1250,6 +1544,15 @@ static int ext4_xattr_value_same(struct ext4_xattr_search *s,
> goto cleanup;
> }
> error = ext4_xattr_block_set(handle, inode, &i, &bs);
> + if (EXT4_HAS_INCOMPAT_FEATURE(inode->i_sb,
> + EXT4_FEATURE_INCOMPAT_EA_INODE) &&
> + error == -ENOSPC) {
> + /* xattr not fit to block, store at external
> + * inode */
> + i.in_inode = 1;
> + error = ext4_xattr_ibody_set(handle, inode,
> + &i, &is);
> + }
> if (error)
> goto cleanup;
> if (!is.s.not_found) {
> @@ -1293,9 +1596,22 @@ static int ext4_xattr_value_same(struct ext4_xattr_search *s,
> const void *value, size_t value_len, int flags)
> {
> handle_t *handle;
> + struct super_block *sb = inode->i_sb;
> int error, retries = 0;
> int credits = ext4_jbd2_credits_xattr(inode);
>
> + if ((value_len >= EXT4_XATTR_MIN_LARGE_EA_SIZE(sb->s_blocksize)) &&
> + EXT4_HAS_INCOMPAT_FEATURE(sb, EXT4_FEATURE_INCOMPAT_EA_INODE)) {
> + int nrblocks = (value_len + sb->s_blocksize - 1) >>
> + sb->s_blocksize_bits;
> +
> + /* For new inode */
> + credits += EXT4_SINGLEDATA_TRANS_BLOCKS(sb) + 3;
> +
> + /* For data blocks of EA inode */
> + credits += ext4_meta_trans_blocks(inode, nrblocks, 0);
> + }
> +
> retry:
> handle = ext4_journal_start(inode, EXT4_HT_XATTR, credits);
> if (IS_ERR(handle)) {
> @@ -1307,7 +1623,7 @@ static int ext4_xattr_value_same(struct ext4_xattr_search *s,
> value, value_len, flags);
> error2 = ext4_journal_stop(handle);
> if (error == -ENOSPC &&
> - ext4_should_retry_alloc(inode->i_sb, &retries))
> + ext4_should_retry_alloc(sb, &retries))
> goto retry;
> if (error == 0)
> error = error2;
> @@ -1332,7 +1648,7 @@ static void ext4_xattr_shift_entries(struct ext4_xattr_entry *entry,
>
> /* Adjust the value offsets of the entries */
> for (; !IS_LAST_ENTRY(last); last = EXT4_XATTR_NEXT(last)) {
> - if (last->e_value_size) {
> + if (!last->e_value_inum && last->e_value_size) {
> new_offs = le16_to_cpu(last->e_value_offs) +
> value_offs_shift;
> last->e_value_offs = cpu_to_le16(new_offs);
> @@ -1593,21 +1909,135 @@ int ext4_expand_extra_isize_ea(struct inode *inode, int new_extra_isize,
> }
>
>
> +#define EIA_INCR 16 /* must be 2^n */
> +#define EIA_MASK (EIA_INCR - 1)
> +/* Add the large xattr @ino into @lea_ino_array for later deletion.
> + * If @lea_ino_array is new or full it will be grown and the old
> + * contents copied over.
> + */
> +static int
> +ext4_expand_ino_array(struct ext4_xattr_ino_array **lea_ino_array, __u32 ino)
> +{
> + if (*lea_ino_array == NULL) {
> + /*
> + * Start with 15 inodes, so it fits into a power-of-two size.
> + * If *lea_ino_array is NULL, this is essentially offsetof()
> + */
> + (*lea_ino_array) =
> + kmalloc(offsetof(struct ext4_xattr_ino_array,
> + xia_inodes[EIA_MASK]),
> + GFP_NOFS);
> + if (*lea_ino_array == NULL)
> + return -ENOMEM;
> + (*lea_ino_array)->xia_count = 0;
> + } else if (((*lea_ino_array)->xia_count & EIA_MASK) == EIA_MASK) {
> + /* expand the array once all 15 + n * 16 slots are full */
> + struct ext4_xattr_ino_array *new_array = NULL;
> + int count = (*lea_ino_array)->xia_count;
> +
> + /* if new_array is NULL, this is essentially offsetof() */
> + new_array = kmalloc(
> + offsetof(struct ext4_xattr_ino_array,
> + xia_inodes[count + EIA_INCR]),
> + GFP_NOFS);
> + if (new_array == NULL)
> + return -ENOMEM;
> + memcpy(new_array, *lea_ino_array,
> + offsetof(struct ext4_xattr_ino_array,
> + xia_inodes[count]));
> + kfree(*lea_ino_array);
> + *lea_ino_array = new_array;
> + }
> + (*lea_ino_array)->xia_inodes[(*lea_ino_array)->xia_count++] = ino;
> + return 0;
> +}
> +
> +/**
> + * Add xattr inode to orphan list
> + */
> +static int
> +ext4_xattr_inode_orphan_add(handle_t *handle, struct inode *inode,
> + int credits, struct ext4_xattr_ino_array *lea_ino_array)
> +{
> + struct inode *ea_inode = NULL;
> + int idx = 0, error = 0;
> +
> + if (lea_ino_array == NULL)
> + return 0;
> +
> + for (; idx < lea_ino_array->xia_count; ++idx) {
> + if (!ext4_handle_has_enough_credits(handle, credits)) {
> + error = ext4_journal_extend(handle, credits);
> + if (error > 0)
> + error = ext4_journal_restart(handle, credits);
> +
> + if (error != 0) {
> + ext4_warning(inode->i_sb,
> + "couldn't extend journal "
> + "(err %d)", error);
> + return error;
> + }
> + }
> + ea_inode = ext4_xattr_inode_iget(inode,
> + lea_ino_array->xia_inodes[idx], &error);
> + if (error)
> + continue;
> + ext4_orphan_add(handle, ea_inode);
> + /* the inode's i_count will be released by caller */
> + }
> +
> + return 0;
> +}
>
> /*
> * ext4_xattr_delete_inode()
> *
> - * Free extended attribute resources associated with this inode. This
> + * Free extended attribute resources associated with this inode. Traverse
> + * all entries and unlink any xattr inodes associated with this inode. This
> * is called immediately before an inode is freed. We have exclusive
> - * access to the inode.
> + * access to the inode. If an orphan inode is deleted it will also delete any
> + * xattr block and all xattr inodes. They are checked by ext4_xattr_inode_iget()
> + * to ensure they belong to the parent inode and were not deleted already.
> */
> -void
> -ext4_xattr_delete_inode(handle_t *handle, struct inode *inode)
> +int
> +ext4_xattr_delete_inode(handle_t *handle, struct inode *inode,
> + struct ext4_xattr_ino_array **lea_ino_array)
> {
> struct buffer_head *bh = NULL;
> + struct ext4_xattr_ibody_header *header;
> + struct ext4_inode *raw_inode;
> + struct ext4_iloc iloc;
> + struct ext4_xattr_entry *entry;
> + int credits = 3, error = 0;
>
> - if (!EXT4_I(inode)->i_file_acl)
> + if (!ext4_test_inode_state(inode, EXT4_STATE_XATTR))
> + goto delete_external_ea;
> +
> + error = ext4_get_inode_loc(inode, &iloc);
> + if (error)
> + goto cleanup;
> + raw_inode = ext4_raw_inode(&iloc);
> + header = IHDR(inode, raw_inode);
> + for (entry = IFIRST(header); !IS_LAST_ENTRY(entry);
> + entry = EXT4_XATTR_NEXT(entry)) {
> + if (!entry->e_value_inum)
> + continue;
> + if (ext4_expand_ino_array(lea_ino_array,
> + entry->e_value_inum) != 0) {
> + brelse(iloc.bh);
> + goto cleanup;
> + }
> + entry->e_value_inum = 0;
> + }
> + brelse(iloc.bh);
> +
> +delete_external_ea:
> + if (!EXT4_I(inode)->i_file_acl) {
> + /* add xattr inode to orphan list */
> + ext4_xattr_inode_orphan_add(handle, inode, credits,
> + *lea_ino_array);
> goto cleanup;
> + }
> bh = sb_bread(inode->i_sb, EXT4_I(inode)->i_file_acl);
> if (!bh) {
> EXT4_ERROR_INODE(inode, "block %llu read error",
> @@ -1620,11 +2050,69 @@ int ext4_expand_extra_isize_ea(struct inode *inode, int new_extra_isize,
> EXT4_I(inode)->i_file_acl);
> goto cleanup;
> }
> +
> + for (entry = BFIRST(bh); !IS_LAST_ENTRY(entry);
> + entry = EXT4_XATTR_NEXT(entry)) {
> + if (!entry->e_value_inum)
> + continue;
> + if (ext4_expand_ino_array(lea_ino_array,
> + entry->e_value_inum) != 0)
> + goto cleanup;
> + entry->e_value_inum = 0;
> + }
> +
> + /* add xattr inode to orphan list */
> + error = ext4_xattr_inode_orphan_add(handle, inode, credits,
> + *lea_ino_array);
> + if (error != 0)
> + goto cleanup;
> +
> + if (!IS_NOQUOTA(inode))
> + credits += 2 * EXT4_QUOTA_DEL_BLOCKS(inode->i_sb);
> +
> + if (!ext4_handle_has_enough_credits(handle, credits)) {
> + error = ext4_journal_extend(handle, credits);
> + if (error > 0)
> + error = ext4_journal_restart(handle, credits);
> + if (error != 0) {
> + ext4_warning(inode->i_sb,
> + "couldn't extend journal (err %d)", error);
> + goto cleanup;
> + }
> + }
> +
> ext4_xattr_release_block(handle, inode, bh);
> EXT4_I(inode)->i_file_acl = 0;
>
> cleanup:
> brelse(bh);
> +
> + return error;
> +}
> +
> +void
> +ext4_xattr_inode_array_free(struct inode *inode,
> + struct ext4_xattr_ino_array *lea_ino_array)
> +{
> + struct inode *ea_inode = NULL;
> + int idx = 0;
> + int err;
> +
> + if (lea_ino_array == NULL)
> + return;
> +
> + for (; idx < lea_ino_array->xia_count; ++idx) {
> + ea_inode = ext4_xattr_inode_iget(inode,
> + lea_ino_array->xia_inodes[idx], &err);
> + if (err)
> + continue;
> + /* for inode's i_count get from ext4_xattr_delete_inode */
> + if (!list_empty(&EXT4_I(ea_inode)->i_orphan))
> + iput(ea_inode);
> + clear_nlink(ea_inode);
> + iput(ea_inode);
> + }
> + kfree(lea_ino_array);
> }
>
> /*
> @@ -1676,10 +2164,9 @@ int ext4_expand_extra_isize_ea(struct inode *inode, int new_extra_isize,
> entry1->e_name_index != entry2->e_name_index ||
> entry1->e_name_len != entry2->e_name_len ||
> entry1->e_value_size != entry2->e_value_size ||
> + entry1->e_value_inum != entry2->e_value_inum ||
> memcmp(entry1->e_name, entry2->e_name, entry1->e_name_len))
> return 1;
> - if (entry1->e_value_block != 0 || entry2->e_value_block != 0)
> - return -EFSCORRUPTED;
> if (memcmp((char *)header1 + le16_to_cpu(entry1->e_value_offs),
> (char *)header2 + le16_to_cpu(entry2->e_value_offs),
> le32_to_cpu(entry1->e_value_size)))
> @@ -1751,7 +2238,7 @@ static inline void ext4_xattr_hash_entry(struct ext4_xattr_header *header,
> *name++;
> }
>
> - if (entry->e_value_size != 0) {
> + if (!entry->e_value_inum && entry->e_value_size) {
> __le32 *value = (__le32 *)((char *)header +
> le16_to_cpu(entry->e_value_offs));
> for (n = (le32_to_cpu(entry->e_value_size) +
> diff --git a/fs/ext4/xattr.h b/fs/ext4/xattr.h
> index 099c8b6..6e10ff9 100644
> --- a/fs/ext4/xattr.h
> +++ b/fs/ext4/xattr.h
> @@ -44,7 +44,7 @@ struct ext4_xattr_entry {
> __u8 e_name_len; /* length of name */
> __u8 e_name_index; /* attribute name index */
> __le16 e_value_offs; /* offset in disk block of value */
> - __le32 e_value_block; /* disk block attribute is stored on (n/i) */
> + __le32 e_value_inum; /* inode in which the value is stored */
> __le32 e_value_size; /* size of attribute value */
> __le32 e_hash; /* hash value of name and value */
> char e_name[0]; /* attribute name */
> @@ -69,6 +69,26 @@ struct ext4_xattr_entry {
> EXT4_I(inode)->i_extra_isize))
> #define IFIRST(hdr) ((struct ext4_xattr_entry *)((hdr)+1))
>
> +/*
> + * Link EA inode back to parent one using i_mtime field.
> + * Extra integer type conversion added to ignore higher
> + * bits in i_mtime.tv_sec which might be set by ext4_get()
> + */
> +#define EXT4_XATTR_INODE_SET_PARENT(inode, inum) \
> +do { \
> + (inode)->i_mtime.tv_sec = inum; \
> +} while(0)
> +
> +#define EXT4_XATTR_INODE_GET_PARENT(inode) \
> +((__u32)(inode)->i_mtime.tv_sec)
> +
> +/*
> + * The minimum size of EA value when you start storing it in an external inode
> + * size of block - size of header - size of 1 entry - 4 null bytes
> +*/
> +#define EXT4_XATTR_MIN_LARGE_EA_SIZE(b) \
> + ((b) - EXT4_XATTR_LEN(3) - sizeof(struct ext4_xattr_header) - 4)
> +
> #define BHDR(bh) ((struct ext4_xattr_header *)((bh)->b_data))
> #define ENTRY(ptr) ((struct ext4_xattr_entry *)(ptr))
> #define BFIRST(bh) ENTRY(BHDR(bh)+1)
> @@ -77,10 +97,11 @@ struct ext4_xattr_entry {
> #define EXT4_ZERO_XATTR_VALUE ((void *)-1)
>
> struct ext4_xattr_info {
> - int name_index;
> const char *name;
> const void *value;
> size_t value_len;
> + int name_index;
> + int in_inode;
> };
>
> struct ext4_xattr_search {
> @@ -140,7 +161,13 @@ static inline void ext4_write_unlock_xattr(struct inode *inode, int *save)
> extern int ext4_xattr_set(struct inode *, int, const char *, const void *, size_t, int);
> extern int ext4_xattr_set_handle(handle_t *, struct inode *, int, const char *, const void *, size_t, int);
>
> -extern void ext4_xattr_delete_inode(handle_t *, struct inode *);
> +extern struct inode *ext4_xattr_inode_iget(struct inode *parent, unsigned long ea_ino,
> + int *err);
> +extern int ext4_xattr_inode_unlink(struct inode *inode, unsigned long ea_ino);
> +extern int ext4_xattr_delete_inode(handle_t *handle, struct inode *inode,
> + struct ext4_xattr_ino_array **array);
> +extern void ext4_xattr_inode_array_free(struct inode *inode,
> + struct ext4_xattr_ino_array *array);
>
> extern int ext4_expand_extra_isize_ea(struct inode *inode, int new_extra_isize,
> struct ext4_inode *raw_inode, handle_t *handle);
> diff --git a/include/uapi/linux/netfilter/xt_CONNMARK.h b/include/uapi/linux/netfilter/xt_CONNMARK.h
> index 2f2e48e..efc17a8 100644
> --- a/include/uapi/linux/netfilter/xt_CONNMARK.h
> +++ b/include/uapi/linux/netfilter/xt_CONNMARK.h
> @@ -1,6 +1,31 @@
> -#ifndef _XT_CONNMARK_H_target
> -#define _XT_CONNMARK_H_target
> +#ifndef _XT_CONNMARK_H
> +#define _XT_CONNMARK_H
>
> -#include <linux/netfilter/xt_connmark.h>
> +#include <linux/types.h>
>
> -#endif /*_XT_CONNMARK_H_target*/
> +/* Copyright (C) 2002,2004 MARA Systems AB <http://www.marasystems.com>
> + * by Henrik Nordstrom <hno@...asystems.com>
> + *
> + * This program is free software; you can redistribute it and/or modify
> + * it under the terms of the GNU General Public License as published by
> + * the Free Software Foundation; either version 2 of the License, or
> + * (at your option) any later version.
> + */
> +
> +enum {
> + XT_CONNMARK_SET = 0,
> + XT_CONNMARK_SAVE,
> + XT_CONNMARK_RESTORE
> +};
> +
> +struct xt_connmark_tginfo1 {
> + __u32 ctmark, ctmask, nfmask;
> + __u8 mode;
> +};
> +
> +struct xt_connmark_mtinfo1 {
> + __u32 mark, mask;
> + __u8 invert;
> +};
> +
> +#endif /*_XT_CONNMARK_H*/
> diff --git a/include/uapi/linux/netfilter/xt_DSCP.h b/include/uapi/linux/netfilter/xt_DSCP.h
> index 648e0b3..15f8932 100644
> --- a/include/uapi/linux/netfilter/xt_DSCP.h
> +++ b/include/uapi/linux/netfilter/xt_DSCP.h
> @@ -1,26 +1,31 @@
> -/* x_tables module for setting the IPv4/IPv6 DSCP field
> +/* x_tables module for matching the IPv4/IPv6 DSCP field
> *
> * (C) 2002 Harald Welte <laforge@...monks.org>
> - * based on ipt_FTOS.c (C) 2000 by Matthew G. Marsh <mgm@...tronix.com>
> * This software is distributed under GNU GPL v2, 1991
> *
> * See RFC2474 for a description of the DSCP field within the IP Header.
> *
> - * xt_DSCP.h,v 1.7 2002/03/14 12:03:13 laforge Exp
> + * xt_dscp.h,v 1.3 2002/08/05 19:00:21 laforge Exp
> */
> -#ifndef _XT_DSCP_TARGET_H
> -#define _XT_DSCP_TARGET_H
> -#include <linux/netfilter/xt_dscp.h>
> +#ifndef _XT_DSCP_H
> +#define _XT_DSCP_H
> +
> #include <linux/types.h>
>
> -/* target info */
> -struct xt_DSCP_info {
> +#define XT_DSCP_MASK 0xfc /* 11111100 */
> +#define XT_DSCP_SHIFT 2
> +#define XT_DSCP_MAX 0x3f /* 00111111 */
> +
> +/* match info */
> +struct xt_dscp_info {
> __u8 dscp;
> + __u8 invert;
> };
>
> -struct xt_tos_target_info {
> - __u8 tos_value;
> +struct xt_tos_match_info {
> __u8 tos_mask;
> + __u8 tos_value;
> + __u8 invert;
> };
>
> -#endif /* _XT_DSCP_TARGET_H */
> +#endif /* _XT_DSCP_H */
> diff --git a/include/uapi/linux/netfilter/xt_MARK.h b/include/uapi/linux/netfilter/xt_MARK.h
> index 41c456d..ecadc40 100644
> --- a/include/uapi/linux/netfilter/xt_MARK.h
> +++ b/include/uapi/linux/netfilter/xt_MARK.h
> @@ -1,6 +1,15 @@
> -#ifndef _XT_MARK_H_target
> -#define _XT_MARK_H_target
> +#ifndef _XT_MARK_H
> +#define _XT_MARK_H
>
> -#include <linux/netfilter/xt_mark.h>
> +#include <linux/types.h>
>
> -#endif /*_XT_MARK_H_target */
> +struct xt_mark_tginfo2 {
> + __u32 mark, mask;
> +};
> +
> +struct xt_mark_mtinfo1 {
> + __u32 mark, mask;
> + __u8 invert;
> +};
> +
> +#endif /*_XT_MARK_H*/
> diff --git a/include/uapi/linux/netfilter/xt_TCPMSS.h b/include/uapi/linux/netfilter/xt_TCPMSS.h
> index 9a6960a..fbac56b 100644
> --- a/include/uapi/linux/netfilter/xt_TCPMSS.h
> +++ b/include/uapi/linux/netfilter/xt_TCPMSS.h
> @@ -1,12 +1,11 @@
> -#ifndef _XT_TCPMSS_H
> -#define _XT_TCPMSS_H
> +#ifndef _XT_TCPMSS_MATCH_H
> +#define _XT_TCPMSS_MATCH_H
>
> #include <linux/types.h>
>
> -struct xt_tcpmss_info {
> - __u16 mss;
> +struct xt_tcpmss_match_info {
> + __u16 mss_min, mss_max;
> + __u8 invert;
> };
>
> -#define XT_TCPMSS_CLAMP_PMTU 0xffff
> -
> -#endif /* _XT_TCPMSS_H */
> +#endif /*_XT_TCPMSS_MATCH_H*/
> diff --git a/include/uapi/linux/netfilter/xt_rateest.h b/include/uapi/linux/netfilter/xt_rateest.h
> index 13fe50d..ec1b570 100644
> --- a/include/uapi/linux/netfilter/xt_rateest.h
> +++ b/include/uapi/linux/netfilter/xt_rateest.h
> @@ -1,38 +1,16 @@
> -#ifndef _XT_RATEEST_MATCH_H
> -#define _XT_RATEEST_MATCH_H
> +#ifndef _XT_RATEEST_TARGET_H
> +#define _XT_RATEEST_TARGET_H
>
> #include <linux/types.h>
> #include <linux/if.h>
>
> -enum xt_rateest_match_flags {
> - XT_RATEEST_MATCH_INVERT = 1<<0,
> - XT_RATEEST_MATCH_ABS = 1<<1,
> - XT_RATEEST_MATCH_REL = 1<<2,
> - XT_RATEEST_MATCH_DELTA = 1<<3,
> - XT_RATEEST_MATCH_BPS = 1<<4,
> - XT_RATEEST_MATCH_PPS = 1<<5,
> -};
> -
> -enum xt_rateest_match_mode {
> - XT_RATEEST_MATCH_NONE,
> - XT_RATEEST_MATCH_EQ,
> - XT_RATEEST_MATCH_LT,
> - XT_RATEEST_MATCH_GT,
> -};
> -
> -struct xt_rateest_match_info {
> - char name1[IFNAMSIZ];
> - char name2[IFNAMSIZ];
> - __u16 flags;
> - __u16 mode;
> - __u32 bps1;
> - __u32 pps1;
> - __u32 bps2;
> - __u32 pps2;
> +struct xt_rateest_target_info {
> + char name[IFNAMSIZ];
> + __s8 interval;
> + __u8 ewma_log;
>
> /* Used internally by the kernel */
> - struct xt_rateest *est1 __attribute__((aligned(8)));
> - struct xt_rateest *est2 __attribute__((aligned(8)));
> + struct xt_rateest *est __attribute__((aligned(8)));
> };
>
> -#endif /* _XT_RATEEST_MATCH_H */
> +#endif /* _XT_RATEEST_TARGET_H */
> diff --git a/include/uapi/linux/netfilter_ipv4/ipt_ECN.h b/include/uapi/linux/netfilter_ipv4/ipt_ECN.h
> index bb88d53..0e0c063 100644
> --- a/include/uapi/linux/netfilter_ipv4/ipt_ECN.h
> +++ b/include/uapi/linux/netfilter_ipv4/ipt_ECN.h
> @@ -1,33 +1,15 @@
> -/* Header file for iptables ipt_ECN target
> - *
> - * (C) 2002 by Harald Welte <laforge@...monks.org>
> - *
> - * This software is distributed under GNU GPL v2, 1991
> - *
> - * ipt_ECN.h,v 1.3 2002/05/29 12:17:40 laforge Exp
> -*/
> -#ifndef _IPT_ECN_TARGET_H
> -#define _IPT_ECN_TARGET_H
> -
> -#include <linux/types.h>
> -#include <linux/netfilter/xt_DSCP.h>
> -
> -#define IPT_ECN_IP_MASK (~XT_DSCP_MASK)
> -
> -#define IPT_ECN_OP_SET_IP 0x01 /* set ECN bits of IPv4 header */
> -#define IPT_ECN_OP_SET_ECE 0x10 /* set ECE bit of TCP header */
> -#define IPT_ECN_OP_SET_CWR 0x20 /* set CWR bit of TCP header */
> -
> -#define IPT_ECN_OP_MASK 0xce
> -
> -struct ipt_ECN_info {
> - __u8 operation; /* bitset of operations */
> - __u8 ip_ect; /* ECT codepoint of IPv4 header, pre-shifted */
> - union {
> - struct {
> - __u8 ece:1, cwr:1; /* TCP ECT bits */
> - } tcp;
> - } proto;
> +#ifndef _IPT_ECN_H
> +#define _IPT_ECN_H
> +
> +#include <linux/netfilter/xt_ecn.h>
> +#define ipt_ecn_info xt_ecn_info
> +
> +enum {
> + IPT_ECN_IP_MASK = XT_ECN_IP_MASK,
> + IPT_ECN_OP_MATCH_IP = XT_ECN_OP_MATCH_IP,
> + IPT_ECN_OP_MATCH_ECE = XT_ECN_OP_MATCH_ECE,
> + IPT_ECN_OP_MATCH_CWR = XT_ECN_OP_MATCH_CWR,
> + IPT_ECN_OP_MATCH_MASK = XT_ECN_OP_MATCH_MASK,
> };
>
> -#endif /* _IPT_ECN_TARGET_H */
> +#endif /* IPT_ECN_H */
> diff --git a/include/uapi/linux/netfilter_ipv4/ipt_TTL.h b/include/uapi/linux/netfilter_ipv4/ipt_TTL.h
> index f6ac169..37bee44 100644
> --- a/include/uapi/linux/netfilter_ipv4/ipt_TTL.h
> +++ b/include/uapi/linux/netfilter_ipv4/ipt_TTL.h
> @@ -1,5 +1,5 @@
> -/* TTL modification module for IP tables
> - * (C) 2000 by Harald Welte <laforge@...filter.org> */
> +/* IP tables module for matching the value of the TTL
> + * (C) 2000 by Harald Welte <laforge@...monks.org> */
>
> #ifndef _IPT_TTL_H
> #define _IPT_TTL_H
> @@ -7,14 +7,14 @@
> #include <linux/types.h>
>
> enum {
> - IPT_TTL_SET = 0,
> - IPT_TTL_INC,
> - IPT_TTL_DEC
> + IPT_TTL_EQ = 0, /* equals */
> + IPT_TTL_NE, /* not equals */
> + IPT_TTL_LT, /* less than */
> + IPT_TTL_GT, /* greater than */
> };
>
> -#define IPT_TTL_MAXMODE IPT_TTL_DEC
>
> -struct ipt_TTL_info {
> +struct ipt_ttl_info {
> __u8 mode;
> __u8 ttl;
> };
> diff --git a/include/uapi/linux/netfilter_ipv6/ip6t_HL.h b/include/uapi/linux/netfilter_ipv6/ip6t_HL.h
> index ebd8ead..6e76dbc 100644
> --- a/include/uapi/linux/netfilter_ipv6/ip6t_HL.h
> +++ b/include/uapi/linux/netfilter_ipv6/ip6t_HL.h
> @@ -1,6 +1,6 @@
> -/* Hop Limit modification module for ip6tables
> +/* ip6tables module for matching the Hop Limit value
> * Maciej Soltysiak <solt@....toxicfilms.tv>
> - * Based on HW's TTL module */
> + * Based on HW's ttl module */
>
> #ifndef _IP6T_HL_H
> #define _IP6T_HL_H
> @@ -8,14 +8,14 @@
> #include <linux/types.h>
>
> enum {
> - IP6T_HL_SET = 0,
> - IP6T_HL_INC,
> - IP6T_HL_DEC
> + IP6T_HL_EQ = 0, /* equals */
> + IP6T_HL_NE, /* not equals */
> + IP6T_HL_LT, /* less than */
> + IP6T_HL_GT, /* greater than */
> };
>
> -#define IP6T_HL_MAXMODE IP6T_HL_DEC
>
> -struct ip6t_HL_info {
> +struct ip6t_hl_info {
> __u8 mode;
> __u8 hop_limit;
> };
> diff --git a/net/netfilter/xt_RATEEST.c b/net/netfilter/xt_RATEEST.c
> index 498b54f..755d2f6 100644
> --- a/net/netfilter/xt_RATEEST.c
> +++ b/net/netfilter/xt_RATEEST.c
> @@ -8,184 +8,149 @@
> #include <linux/module.h>
> #include <linux/skbuff.h>
> #include <linux/gen_stats.h>
> -#include <linux/jhash.h>
> -#include <linux/rtnetlink.h>
> -#include <linux/random.h>
> -#include <linux/slab.h>
> -#include <net/gen_stats.h>
> -#include <net/netlink.h>
>
> #include <linux/netfilter/x_tables.h>
> -#include <linux/netfilter/xt_RATEEST.h>
> +#include <linux/netfilter/xt_rateest.h>
> #include <net/netfilter/xt_rateest.h>
>
> -static DEFINE_MUTEX(xt_rateest_mutex);
>
> -#define RATEEST_HSIZE 16
> -static struct hlist_head rateest_hash[RATEEST_HSIZE] __read_mostly;
> -static unsigned int jhash_rnd __read_mostly;
> -
> -static unsigned int xt_rateest_hash(const char *name)
> -{
> - return jhash(name, FIELD_SIZEOF(struct xt_rateest, name), jhash_rnd) &
> - (RATEEST_HSIZE - 1);
> -}
> -
> -static void xt_rateest_hash_insert(struct xt_rateest *est)
> +static bool
> +xt_rateest_mt(const struct sk_buff *skb, struct xt_action_param *par)
> {
> - unsigned int h;
> -
> - h = xt_rateest_hash(est->name);
> - hlist_add_head(&est->list, &rateest_hash[h]);
> -}
> + const struct xt_rateest_match_info *info = par->matchinfo;
> + struct gnet_stats_rate_est64 sample = {0};
> + u_int32_t bps1, bps2, pps1, pps2;
> + bool ret = true;
> +
> + gen_estimator_read(&info->est1->rate_est, &sample);
> +
> + if (info->flags & XT_RATEEST_MATCH_DELTA) {
> + bps1 = info->bps1 >= sample.bps ? info->bps1 - sample.bps : 0;
> + pps1 = info->pps1 >= sample.pps ? info->pps1 - sample.pps : 0;
> + } else {
> + bps1 = sample.bps;
> + pps1 = sample.pps;
> + }
>
> -struct xt_rateest *xt_rateest_lookup(const char *name)
> -{
> - struct xt_rateest *est;
> - unsigned int h;
> -
> - h = xt_rateest_hash(name);
> - mutex_lock(&xt_rateest_mutex);
> - hlist_for_each_entry(est, &rateest_hash[h], list) {
> - if (strcmp(est->name, name) == 0) {
> - est->refcnt++;
> - mutex_unlock(&xt_rateest_mutex);
> - return est;
> + if (info->flags & XT_RATEEST_MATCH_ABS) {
> + bps2 = info->bps2;
> + pps2 = info->pps2;
> + } else {
> + gen_estimator_read(&info->est2->rate_est, &sample);
> +
> + if (info->flags & XT_RATEEST_MATCH_DELTA) {
> + bps2 = info->bps2 >= sample.bps ? info->bps2 - sample.bps : 0;
> + pps2 = info->pps2 >= sample.pps ? info->pps2 - sample.pps : 0;
> + } else {
> + bps2 = sample.bps;
> + pps2 = sample.pps;
> }
> }
> - mutex_unlock(&xt_rateest_mutex);
> - return NULL;
> -}
> -EXPORT_SYMBOL_GPL(xt_rateest_lookup);
>
> -void xt_rateest_put(struct xt_rateest *est)
> -{
> - mutex_lock(&xt_rateest_mutex);
> - if (--est->refcnt == 0) {
> - hlist_del(&est->list);
> - gen_kill_estimator(&est->rate_est);
> - /*
> - * gen_estimator est_timer() might access est->lock or bstats,
> - * wait a RCU grace period before freeing 'est'
> - */
> - kfree_rcu(est, rcu);
> + switch (info->mode) {
> + case XT_RATEEST_MATCH_LT:
> + if (info->flags & XT_RATEEST_MATCH_BPS)
> + ret &= bps1 < bps2;
> + if (info->flags & XT_RATEEST_MATCH_PPS)
> + ret &= pps1 < pps2;
> + break;
> + case XT_RATEEST_MATCH_GT:
> + if (info->flags & XT_RATEEST_MATCH_BPS)
> + ret &= bps1 > bps2;
> + if (info->flags & XT_RATEEST_MATCH_PPS)
> + ret &= pps1 > pps2;
> + break;
> + case XT_RATEEST_MATCH_EQ:
> + if (info->flags & XT_RATEEST_MATCH_BPS)
> + ret &= bps1 == bps2;
> + if (info->flags & XT_RATEEST_MATCH_PPS)
> + ret &= pps1 == pps2;
> + break;
> }
> - mutex_unlock(&xt_rateest_mutex);
> +
> + ret ^= info->flags & XT_RATEEST_MATCH_INVERT ? true : false;
> + return ret;
> }
> -EXPORT_SYMBOL_GPL(xt_rateest_put);
>
> -static unsigned int
> -xt_rateest_tg(struct sk_buff *skb, const struct xt_action_param *par)
> +static int xt_rateest_mt_checkentry(const struct xt_mtchk_param *par)
> {
> - const struct xt_rateest_target_info *info = par->targinfo;
> - struct gnet_stats_basic_packed *stats = &info->est->bstats;
> + struct xt_rateest_match_info *info = par->matchinfo;
> + struct xt_rateest *est1, *est2;
> + int ret = -EINVAL;
>
> - spin_lock_bh(&info->est->lock);
> - stats->bytes += skb->len;
> - stats->packets++;
> - spin_unlock_bh(&info->est->lock);
> + if (hweight32(info->flags & (XT_RATEEST_MATCH_ABS |
> + XT_RATEEST_MATCH_REL)) != 1)
> + goto err1;
>
> - return XT_CONTINUE;
> -}
> + if (!(info->flags & (XT_RATEEST_MATCH_BPS | XT_RATEEST_MATCH_PPS)))
> + goto err1;
>
> -static int xt_rateest_tg_checkentry(const struct xt_tgchk_param *par)
> -{
> - struct xt_rateest_target_info *info = par->targinfo;
> - struct xt_rateest *est;
> - struct {
> - struct nlattr opt;
> - struct gnet_estimator est;
> - } cfg;
> - int ret;
> -
> - net_get_random_once(&jhash_rnd, sizeof(jhash_rnd));
> -
> - est = xt_rateest_lookup(info->name);
> - if (est) {
> - /*
> - * If estimator parameters are specified, they must match the
> - * existing estimator.
> - */
> - if ((!info->interval && !info->ewma_log) ||
> - (info->interval != est->params.interval ||
> - info->ewma_log != est->params.ewma_log)) {
> - xt_rateest_put(est);
> - return -EINVAL;
> - }
> - info->est = est;
> - return 0;
> + switch (info->mode) {
> + case XT_RATEEST_MATCH_EQ:
> + case XT_RATEEST_MATCH_LT:
> + case XT_RATEEST_MATCH_GT:
> + break;
> + default:
> + goto err1;
> }
>
> - ret = -ENOMEM;
> - est = kzalloc(sizeof(*est), GFP_KERNEL);
> - if (!est)
> + ret = -ENOENT;
> + est1 = xt_rateest_lookup(info->name1);
> + if (!est1)
> goto err1;
>
> - strlcpy(est->name, info->name, sizeof(est->name));
> - spin_lock_init(&est->lock);
> - est->refcnt = 1;
> - est->params.interval = info->interval;
> - est->params.ewma_log = info->ewma_log;
> -
> - cfg.opt.nla_len = nla_attr_size(sizeof(cfg.est));
> - cfg.opt.nla_type = TCA_STATS_RATE_EST;
> - cfg.est.interval = info->interval;
> - cfg.est.ewma_log = info->ewma_log;
> -
> - ret = gen_new_estimator(&est->bstats, NULL, &est->rate_est,
> - &est->lock, NULL, &cfg.opt);
> - if (ret < 0)
> - goto err2;
> + est2 = NULL;
> + if (info->flags & XT_RATEEST_MATCH_REL) {
> + est2 = xt_rateest_lookup(info->name2);
> + if (!est2)
> + goto err2;
> + }
>
> - info->est = est;
> - xt_rateest_hash_insert(est);
> + info->est1 = est1;
> + info->est2 = est2;
> return 0;
>
> err2:
> - kfree(est);
> + xt_rateest_put(est1);
> err1:
> return ret;
> }
>
> -static void xt_rateest_tg_destroy(const struct xt_tgdtor_param *par)
> +static void xt_rateest_mt_destroy(const struct xt_mtdtor_param *par)
> {
> - struct xt_rateest_target_info *info = par->targinfo;
> + struct xt_rateest_match_info *info = par->matchinfo;
>
> - xt_rateest_put(info->est);
> + xt_rateest_put(info->est1);
> + if (info->est2)
> + xt_rateest_put(info->est2);
> }
>
> -static struct xt_target xt_rateest_tg_reg __read_mostly = {
> - .name = "RATEEST",
> +static struct xt_match xt_rateest_mt_reg __read_mostly = {
> + .name = "rateest",
> .revision = 0,
> .family = NFPROTO_UNSPEC,
> - .target = xt_rateest_tg,
> - .checkentry = xt_rateest_tg_checkentry,
> - .destroy = xt_rateest_tg_destroy,
> - .targetsize = sizeof(struct xt_rateest_target_info),
> - .usersize = offsetof(struct xt_rateest_target_info, est),
> + .match = xt_rateest_mt,
> + .checkentry = xt_rateest_mt_checkentry,
> + .destroy = xt_rateest_mt_destroy,
> + .matchsize = sizeof(struct xt_rateest_match_info),
> + .usersize = offsetof(struct xt_rateest_match_info, est1),
> .me = THIS_MODULE,
> };
>
> -static int __init xt_rateest_tg_init(void)
> +static int __init xt_rateest_mt_init(void)
> {
> - unsigned int i;
> -
> - for (i = 0; i < ARRAY_SIZE(rateest_hash); i++)
> - INIT_HLIST_HEAD(&rateest_hash[i]);
> -
> - return xt_register_target(&xt_rateest_tg_reg);
> + return xt_register_match(&xt_rateest_mt_reg);
> }
>
> -static void __exit xt_rateest_tg_fini(void)
> +static void __exit xt_rateest_mt_fini(void)
> {
> - xt_unregister_target(&xt_rateest_tg_reg);
> + xt_unregister_match(&xt_rateest_mt_reg);
> }
>
> -
> MODULE_AUTHOR("Patrick McHardy <kaber@...sh.net>");
> MODULE_LICENSE("GPL");
> -MODULE_DESCRIPTION("Xtables: packet rate estimator");
> -MODULE_ALIAS("ipt_RATEEST");
> -MODULE_ALIAS("ip6t_RATEEST");
> -module_init(xt_rateest_tg_init);
> -module_exit(xt_rateest_tg_fini);
> +MODULE_DESCRIPTION("xtables rate estimator match");
> +MODULE_ALIAS("ipt_rateest");
> +MODULE_ALIAS("ip6t_rateest");
> +module_init(xt_rateest_mt_init);
> +module_exit(xt_rateest_mt_fini);
> diff --git a/net/netfilter/xt_TCPMSS.c b/net/netfilter/xt_TCPMSS.c
> index 27241a7..c53d4d1 100644
> --- a/net/netfilter/xt_TCPMSS.c
> +++ b/net/netfilter/xt_TCPMSS.c
> @@ -1,351 +1,110 @@
> -/*
> - * This is a module which is used for setting the MSS option in TCP packets.
> - *
> - * Copyright (C) 2000 Marc Boucher <marc@...i.ca>
> - * Copyright (C) 2007 Patrick McHardy <kaber@...sh.net>
> +/* Kernel module to match TCP MSS values. */
> +
> +/* Copyright (C) 2000 Marc Boucher <marc@...i.ca>
> + * Portions (C) 2005 by Harald Welte <laforge@...filter.org>
> *
> * This program is free software; you can redistribute it and/or modify
> * it under the terms of the GNU General Public License version 2 as
> * published by the Free Software Foundation.
> */
> -#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
> +
> #include <linux/module.h>
> #include <linux/skbuff.h>
> -#include <linux/ip.h>
> -#include <linux/gfp.h>
> -#include <linux/ipv6.h>
> -#include <linux/tcp.h>
> -#include <net/dst.h>
> -#include <net/flow.h>
> -#include <net/ipv6.h>
> -#include <net/route.h>
> #include <net/tcp.h>
>
> +#include <linux/netfilter/xt_tcpmss.h>
> +#include <linux/netfilter/x_tables.h>
> +
> #include <linux/netfilter_ipv4/ip_tables.h>
> #include <linux/netfilter_ipv6/ip6_tables.h>
> -#include <linux/netfilter/x_tables.h>
> -#include <linux/netfilter/xt_tcpudp.h>
> -#include <linux/netfilter/xt_TCPMSS.h>
>
> MODULE_LICENSE("GPL");
> MODULE_AUTHOR("Marc Boucher <marc@...i.ca>");
> -MODULE_DESCRIPTION("Xtables: TCP Maximum Segment Size (MSS) adjustment");
> -MODULE_ALIAS("ipt_TCPMSS");
> -MODULE_ALIAS("ip6t_TCPMSS");
> -
> -static inline unsigned int
> -optlen(const u_int8_t *opt, unsigned int offset)
> -{
> - /* Beware zero-length options: make finite progress */
> - if (opt[offset] <= TCPOPT_NOP || opt[offset+1] == 0)
> - return 1;
> - else
> - return opt[offset+1];
> -}
> -
> -static u_int32_t tcpmss_reverse_mtu(struct net *net,
> - const struct sk_buff *skb,
> - unsigned int family)
> -{
> - struct flowi fl;
> - const struct nf_afinfo *ai;
> - struct rtable *rt = NULL;
> - u_int32_t mtu = ~0U;
> -
> - if (family == PF_INET) {
> - struct flowi4 *fl4 = &fl.u.ip4;
> - memset(fl4, 0, sizeof(*fl4));
> - fl4->daddr = ip_hdr(skb)->saddr;
> - } else {
> - struct flowi6 *fl6 = &fl.u.ip6;
> -
> - memset(fl6, 0, sizeof(*fl6));
> - fl6->daddr = ipv6_hdr(skb)->saddr;
> - }
> - rcu_read_lock();
> - ai = nf_get_afinfo(family);
> - if (ai != NULL)
> - ai->route(net, (struct dst_entry **)&rt, &fl, false);
> - rcu_read_unlock();
> -
> - if (rt != NULL) {
> - mtu = dst_mtu(&rt->dst);
> - dst_release(&rt->dst);
> - }
> - return mtu;
> -}
> +MODULE_DESCRIPTION("Xtables: TCP MSS match");
> +MODULE_ALIAS("ipt_tcpmss");
> +MODULE_ALIAS("ip6t_tcpmss");
>
> -static int
> -tcpmss_mangle_packet(struct sk_buff *skb,
> - const struct xt_action_param *par,
> - unsigned int family,
> - unsigned int tcphoff,
> - unsigned int minlen)
> +static bool
> +tcpmss_mt(const struct sk_buff *skb, struct xt_action_param *par)
> {
> - const struct xt_tcpmss_info *info = par->targinfo;
> - struct tcphdr *tcph;
> - int len, tcp_hdrlen;
> - unsigned int i;
> - __be16 oldval;
> - u16 newmss;
> - u8 *opt;
> -
> - /* This is a fragment, no TCP header is available */
> - if (par->fragoff != 0)
> - return 0;
> -
> - if (!skb_make_writable(skb, skb->len))
> - return -1;
> -
> - len = skb->len - tcphoff;
> - if (len < (int)sizeof(struct tcphdr))
> - return -1;
> -
> - tcph = (struct tcphdr *)(skb_network_header(skb) + tcphoff);
> - tcp_hdrlen = tcph->doff * 4;
> -
> - if (len < tcp_hdrlen)
> - return -1;
> -
> - if (info->mss == XT_TCPMSS_CLAMP_PMTU) {
> - struct net *net = xt_net(par);
> - unsigned int in_mtu = tcpmss_reverse_mtu(net, skb, family);
> - unsigned int min_mtu = min(dst_mtu(skb_dst(skb)), in_mtu);
> -
> - if (min_mtu <= minlen) {
> - net_err_ratelimited("unknown or invalid path-MTU (%u)\n",
> - min_mtu);
> - return -1;
> - }
> - newmss = min_mtu - minlen;
> - } else
> - newmss = info->mss;
> -
> - opt = (u_int8_t *)tcph;
> - for (i = sizeof(struct tcphdr); i <= tcp_hdrlen - TCPOLEN_MSS; i += optlen(opt, i)) {
> - if (opt[i] == TCPOPT_MSS && opt[i+1] == TCPOLEN_MSS) {
> - u_int16_t oldmss;
> -
> - oldmss = (opt[i+2] << 8) | opt[i+3];
> -
> - /* Never increase MSS, even when setting it, as
> - * doing so results in problems for hosts that rely
> - * on MSS being set correctly.
> - */
> - if (oldmss <= newmss)
> - return 0;
> -
> - opt[i+2] = (newmss & 0xff00) >> 8;
> - opt[i+3] = newmss & 0x00ff;
> -
> - inet_proto_csum_replace2(&tcph->check, skb,
> - htons(oldmss), htons(newmss),
> - false);
> - return 0;
> + const struct xt_tcpmss_match_info *info = par->matchinfo;
> + const struct tcphdr *th;
> + struct tcphdr _tcph;
> + /* tcp.doff is only 4 bits, ie. max 15 * 4 bytes */
> + const u_int8_t *op;
> + u8 _opt[15 * 4 - sizeof(_tcph)];
> + unsigned int i, optlen;
> +
> + /* If we don't have the whole header, drop packet. */
> + th = skb_header_pointer(skb, par->thoff, sizeof(_tcph), &_tcph);
> + if (th == NULL)
> + goto dropit;
> +
> + /* Malformed. */
> + if (th->doff*4 < sizeof(*th))
> + goto dropit;
> +
> + optlen = th->doff*4 - sizeof(*th);
> + if (!optlen)
> + goto out;
> +
> + /* Truncated options. */
> + op = skb_header_pointer(skb, par->thoff + sizeof(*th), optlen, _opt);
> + if (op == NULL)
> + goto dropit;
> +
> + for (i = 0; i < optlen; ) {
> + if (op[i] == TCPOPT_MSS
> + && (optlen - i) >= TCPOLEN_MSS
> + && op[i+1] == TCPOLEN_MSS) {
> + u_int16_t mssval;
> +
> + mssval = (op[i+2] << 8) | op[i+3];
> +
> + return (mssval >= info->mss_min &&
> + mssval <= info->mss_max) ^ info->invert;
> }
> + if (op[i] < 2)
> + i++;
> + else
> + i += op[i+1] ? : 1;
> }
> +out:
> + return info->invert;
>
> - /* There is data after the header so the option can't be added
> - * without moving it, and doing so may make the SYN packet
> - * itself too large. Accept the packet unmodified instead.
> - */
> - if (len > tcp_hdrlen)
> - return 0;
> -
> - /*
> - * MSS Option not found ?! add it..
> - */
> - if (skb_tailroom(skb) < TCPOLEN_MSS) {
> - if (pskb_expand_head(skb, 0,
> - TCPOLEN_MSS - skb_tailroom(skb),
> - GFP_ATOMIC))
> - return -1;
> - tcph = (struct tcphdr *)(skb_network_header(skb) + tcphoff);
> - }
> -
> - skb_put(skb, TCPOLEN_MSS);
> -
> - /*
> - * IPv4: RFC 1122 states "If an MSS option is not received at
> - * connection setup, TCP MUST assume a default send MSS of 536".
> - * IPv6: RFC 2460 states IPv6 has a minimum MTU of 1280 and a minimum
> - * length IPv6 header of 60, ergo the default MSS value is 1220
> - * Since no MSS was provided, we must use the default values
> - */
> - if (xt_family(par) == NFPROTO_IPV4)
> - newmss = min(newmss, (u16)536);
> - else
> - newmss = min(newmss, (u16)1220);
> -
> - opt = (u_int8_t *)tcph + sizeof(struct tcphdr);
> - memmove(opt + TCPOLEN_MSS, opt, len - sizeof(struct tcphdr));
> -
> - inet_proto_csum_replace2(&tcph->check, skb,
> - htons(len), htons(len + TCPOLEN_MSS), true);
> - opt[0] = TCPOPT_MSS;
> - opt[1] = TCPOLEN_MSS;
> - opt[2] = (newmss & 0xff00) >> 8;
> - opt[3] = newmss & 0x00ff;
> -
> - inet_proto_csum_replace4(&tcph->check, skb, 0, *((__be32 *)opt), false);
> -
> - oldval = ((__be16 *)tcph)[6];
> - tcph->doff += TCPOLEN_MSS/4;
> - inet_proto_csum_replace2(&tcph->check, skb,
> - oldval, ((__be16 *)tcph)[6], false);
> - return TCPOLEN_MSS;
> -}
> -
> -static unsigned int
> -tcpmss_tg4(struct sk_buff *skb, const struct xt_action_param *par)
> -{
> - struct iphdr *iph = ip_hdr(skb);
> - __be16 newlen;
> - int ret;
> -
> - ret = tcpmss_mangle_packet(skb, par,
> - PF_INET,
> - iph->ihl * 4,
> - sizeof(*iph) + sizeof(struct tcphdr));
> - if (ret < 0)
> - return NF_DROP;
> - if (ret > 0) {
> - iph = ip_hdr(skb);
> - newlen = htons(ntohs(iph->tot_len) + ret);
> - csum_replace2(&iph->check, iph->tot_len, newlen);
> - iph->tot_len = newlen;
> - }
> - return XT_CONTINUE;
> -}
> -
> -#if IS_ENABLED(CONFIG_IP6_NF_IPTABLES)
> -static unsigned int
> -tcpmss_tg6(struct sk_buff *skb, const struct xt_action_param *par)
> -{
> - struct ipv6hdr *ipv6h = ipv6_hdr(skb);
> - u8 nexthdr;
> - __be16 frag_off, oldlen, newlen;
> - int tcphoff;
> - int ret;
> -
> - nexthdr = ipv6h->nexthdr;
> - tcphoff = ipv6_skip_exthdr(skb, sizeof(*ipv6h), &nexthdr, &frag_off);
> - if (tcphoff < 0)
> - return NF_DROP;
> - ret = tcpmss_mangle_packet(skb, par,
> - PF_INET6,
> - tcphoff,
> - sizeof(*ipv6h) + sizeof(struct tcphdr));
> - if (ret < 0)
> - return NF_DROP;
> - if (ret > 0) {
> - ipv6h = ipv6_hdr(skb);
> - oldlen = ipv6h->payload_len;
> - newlen = htons(ntohs(oldlen) + ret);
> - if (skb->ip_summed == CHECKSUM_COMPLETE)
> - skb->csum = csum_add(csum_sub(skb->csum, oldlen),
> - newlen);
> - ipv6h->payload_len = newlen;
> - }
> - return XT_CONTINUE;
> -}
> -#endif
> -
> -/* Must specify -p tcp --syn */
> -static inline bool find_syn_match(const struct xt_entry_match *m)
> -{
> - const struct xt_tcp *tcpinfo = (const struct xt_tcp *)m->data;
> -
> - if (strcmp(m->u.kernel.match->name, "tcp") == 0 &&
> - tcpinfo->flg_cmp & TCPHDR_SYN &&
> - !(tcpinfo->invflags & XT_TCP_INV_FLAGS))
> - return true;
> -
> +dropit:
> + par->hotdrop = true;
> return false;
> }
>
> -static int tcpmss_tg4_check(const struct xt_tgchk_param *par)
> -{
> - const struct xt_tcpmss_info *info = par->targinfo;
> - const struct ipt_entry *e = par->entryinfo;
> - const struct xt_entry_match *ematch;
> -
> - if (info->mss == XT_TCPMSS_CLAMP_PMTU &&
> - (par->hook_mask & ~((1 << NF_INET_FORWARD) |
> - (1 << NF_INET_LOCAL_OUT) |
> - (1 << NF_INET_POST_ROUTING))) != 0) {
> - pr_info("path-MTU clamping only supported in "
> - "FORWARD, OUTPUT and POSTROUTING hooks\n");
> - return -EINVAL;
> - }
> - if (par->nft_compat)
> - return 0;
> -
> - xt_ematch_foreach(ematch, e)
> - if (find_syn_match(ematch))
> - return 0;
> - pr_info("Only works on TCP SYN packets\n");
> - return -EINVAL;
> -}
> -
> -#if IS_ENABLED(CONFIG_IP6_NF_IPTABLES)
> -static int tcpmss_tg6_check(const struct xt_tgchk_param *par)
> -{
> - const struct xt_tcpmss_info *info = par->targinfo;
> - const struct ip6t_entry *e = par->entryinfo;
> - const struct xt_entry_match *ematch;
> -
> - if (info->mss == XT_TCPMSS_CLAMP_PMTU &&
> - (par->hook_mask & ~((1 << NF_INET_FORWARD) |
> - (1 << NF_INET_LOCAL_OUT) |
> - (1 << NF_INET_POST_ROUTING))) != 0) {
> - pr_info("path-MTU clamping only supported in "
> - "FORWARD, OUTPUT and POSTROUTING hooks\n");
> - return -EINVAL;
> - }
> - if (par->nft_compat)
> - return 0;
> -
> - xt_ematch_foreach(ematch, e)
> - if (find_syn_match(ematch))
> - return 0;
> - pr_info("Only works on TCP SYN packets\n");
> - return -EINVAL;
> -}
> -#endif
> -
> -static struct xt_target tcpmss_tg_reg[] __read_mostly = {
> +static struct xt_match tcpmss_mt_reg[] __read_mostly = {
> {
> + .name = "tcpmss",
> .family = NFPROTO_IPV4,
> - .name = "TCPMSS",
> - .checkentry = tcpmss_tg4_check,
> - .target = tcpmss_tg4,
> - .targetsize = sizeof(struct xt_tcpmss_info),
> + .match = tcpmss_mt,
> + .matchsize = sizeof(struct xt_tcpmss_match_info),
> .proto = IPPROTO_TCP,
> .me = THIS_MODULE,
> },
> -#if IS_ENABLED(CONFIG_IP6_NF_IPTABLES)
> {
> + .name = "tcpmss",
> .family = NFPROTO_IPV6,
> - .name = "TCPMSS",
> - .checkentry = tcpmss_tg6_check,
> - .target = tcpmss_tg6,
> - .targetsize = sizeof(struct xt_tcpmss_info),
> + .match = tcpmss_mt,
> + .matchsize = sizeof(struct xt_tcpmss_match_info),
> .proto = IPPROTO_TCP,
> .me = THIS_MODULE,
> },
> -#endif
> };
>
> -static int __init tcpmss_tg_init(void)
> +static int __init tcpmss_mt_init(void)
> {
> - return xt_register_targets(tcpmss_tg_reg, ARRAY_SIZE(tcpmss_tg_reg));
> + return xt_register_matches(tcpmss_mt_reg, ARRAY_SIZE(tcpmss_mt_reg));
> }
>
> -static void __exit tcpmss_tg_exit(void)
> +static void __exit tcpmss_mt_exit(void)
> {
> - xt_unregister_targets(tcpmss_tg_reg, ARRAY_SIZE(tcpmss_tg_reg));
> + xt_unregister_matches(tcpmss_mt_reg, ARRAY_SIZE(tcpmss_mt_reg));
> }
>
> -module_init(tcpmss_tg_init);
> -module_exit(tcpmss_tg_exit);
> +module_init(tcpmss_mt_init);
> +module_exit(tcpmss_mt_exit);
> diff --git a/net/netfilter/xt_dscp.c b/net/netfilter/xt_dscp.c
> index 236ac80..3f83d38 100644
> --- a/net/netfilter/xt_dscp.c
> +++ b/net/netfilter/xt_dscp.c
> @@ -1,11 +1,14 @@
> -/* IP tables module for matching the value of the IPv4/IPv6 DSCP field
> +/* x_tables module for setting the IPv4/IPv6 DSCP field, Version 1.8
> *
> * (C) 2002 by Harald Welte <laforge@...filter.org>
> + * based on ipt_FTOS.c (C) 2000 by Matthew G. Marsh <mgm@...tronix.com>
> *
> * This program is free software; you can redistribute it and/or modify
> * it under the terms of the GNU General Public License version 2 as
> * published by the Free Software Foundation.
> - */
> + *
> + * See RFC2474 for a description of the DSCP field within the IP Header.
> +*/
> #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
> #include <linux/module.h>
> #include <linux/skbuff.h>
> @@ -14,102 +17,150 @@
> #include <net/dsfield.h>
>
> #include <linux/netfilter/x_tables.h>
> -#include <linux/netfilter/xt_dscp.h>
> +#include <linux/netfilter/xt_DSCP.h>
>
> MODULE_AUTHOR("Harald Welte <laforge@...filter.org>");
> -MODULE_DESCRIPTION("Xtables: DSCP/TOS field match");
> +MODULE_DESCRIPTION("Xtables: DSCP/TOS field modification");
> MODULE_LICENSE("GPL");
> -MODULE_ALIAS("ipt_dscp");
> -MODULE_ALIAS("ip6t_dscp");
> -MODULE_ALIAS("ipt_tos");
> -MODULE_ALIAS("ip6t_tos");
> +MODULE_ALIAS("ipt_DSCP");
> +MODULE_ALIAS("ip6t_DSCP");
> +MODULE_ALIAS("ipt_TOS");
> +MODULE_ALIAS("ip6t_TOS");
>
> -static bool
> -dscp_mt(const struct sk_buff *skb, struct xt_action_param *par)
> +static unsigned int
> +dscp_tg(struct sk_buff *skb, const struct xt_action_param *par)
> {
> - const struct xt_dscp_info *info = par->matchinfo;
> + const struct xt_DSCP_info *dinfo = par->targinfo;
> u_int8_t dscp = ipv4_get_dsfield(ip_hdr(skb)) >> XT_DSCP_SHIFT;
>
> - return (dscp == info->dscp) ^ !!info->invert;
> + if (dscp != dinfo->dscp) {
> + if (!skb_make_writable(skb, sizeof(struct iphdr)))
> + return NF_DROP;
> +
> + ipv4_change_dsfield(ip_hdr(skb),
> + (__force __u8)(~XT_DSCP_MASK),
> + dinfo->dscp << XT_DSCP_SHIFT);
> +
> + }
> + return XT_CONTINUE;
> }
>
> -static bool
> -dscp_mt6(const struct sk_buff *skb, struct xt_action_param *par)
> +static unsigned int
> +dscp_tg6(struct sk_buff *skb, const struct xt_action_param *par)
> {
> - const struct xt_dscp_info *info = par->matchinfo;
> + const struct xt_DSCP_info *dinfo = par->targinfo;
> u_int8_t dscp = ipv6_get_dsfield(ipv6_hdr(skb)) >> XT_DSCP_SHIFT;
>
> - return (dscp == info->dscp) ^ !!info->invert;
> + if (dscp != dinfo->dscp) {
> + if (!skb_make_writable(skb, sizeof(struct ipv6hdr)))
> + return NF_DROP;
> +
> + ipv6_change_dsfield(ipv6_hdr(skb),
> + (__force __u8)(~XT_DSCP_MASK),
> + dinfo->dscp << XT_DSCP_SHIFT);
> + }
> + return XT_CONTINUE;
> }
>
> -static int dscp_mt_check(const struct xt_mtchk_param *par)
> +static int dscp_tg_check(const struct xt_tgchk_param *par)
> {
> - const struct xt_dscp_info *info = par->matchinfo;
> + const struct xt_DSCP_info *info = par->targinfo;
>
> if (info->dscp > XT_DSCP_MAX) {
> pr_info("dscp %x out of range\n", info->dscp);
> return -EDOM;
> }
> -
> return 0;
> }
>
> -static bool tos_mt(const struct sk_buff *skb, struct xt_action_param *par)
> +static unsigned int
> +tos_tg(struct sk_buff *skb, const struct xt_action_param *par)
> +{
> + const struct xt_tos_target_info *info = par->targinfo;
> + struct iphdr *iph = ip_hdr(skb);
> + u_int8_t orig, nv;
> +
> + orig = ipv4_get_dsfield(iph);
> + nv = (orig & ~info->tos_mask) ^ info->tos_value;
> +
> + if (orig != nv) {
> + if (!skb_make_writable(skb, sizeof(struct iphdr)))
> + return NF_DROP;
> + iph = ip_hdr(skb);
> + ipv4_change_dsfield(iph, 0, nv);
> + }
> +
> + return XT_CONTINUE;
> +}
> +
> +static unsigned int
> +tos_tg6(struct sk_buff *skb, const struct xt_action_param *par)
> {
> - const struct xt_tos_match_info *info = par->matchinfo;
> -
> - if (xt_family(par) == NFPROTO_IPV4)
> - return ((ip_hdr(skb)->tos & info->tos_mask) ==
> - info->tos_value) ^ !!info->invert;
> - else
> - return ((ipv6_get_dsfield(ipv6_hdr(skb)) & info->tos_mask) ==
> - info->tos_value) ^ !!info->invert;
> + const struct xt_tos_target_info *info = par->targinfo;
> + struct ipv6hdr *iph = ipv6_hdr(skb);
> + u_int8_t orig, nv;
> +
> + orig = ipv6_get_dsfield(iph);
> + nv = (orig & ~info->tos_mask) ^ info->tos_value;
> +
> + if (orig != nv) {
> + if (!skb_make_writable(skb, sizeof(struct iphdr)))
> + return NF_DROP;
> + iph = ipv6_hdr(skb);
> + ipv6_change_dsfield(iph, 0, nv);
> + }
> +
> + return XT_CONTINUE;
> }
>
> -static struct xt_match dscp_mt_reg[] __read_mostly = {
> +static struct xt_target dscp_tg_reg[] __read_mostly = {
> {
> - .name = "dscp",
> + .name = "DSCP",
> .family = NFPROTO_IPV4,
> - .checkentry = dscp_mt_check,
> - .match = dscp_mt,
> - .matchsize = sizeof(struct xt_dscp_info),
> + .checkentry = dscp_tg_check,
> + .target = dscp_tg,
> + .targetsize = sizeof(struct xt_DSCP_info),
> + .table = "mangle",
> .me = THIS_MODULE,
> },
> {
> - .name = "dscp",
> + .name = "DSCP",
> .family = NFPROTO_IPV6,
> - .checkentry = dscp_mt_check,
> - .match = dscp_mt6,
> - .matchsize = sizeof(struct xt_dscp_info),
> + .checkentry = dscp_tg_check,
> + .target = dscp_tg6,
> + .targetsize = sizeof(struct xt_DSCP_info),
> + .table = "mangle",
> .me = THIS_MODULE,
> },
> {
> - .name = "tos",
> + .name = "TOS",
> .revision = 1,
> .family = NFPROTO_IPV4,
> - .match = tos_mt,
> - .matchsize = sizeof(struct xt_tos_match_info),
> + .table = "mangle",
> + .target = tos_tg,
> + .targetsize = sizeof(struct xt_tos_target_info),
> .me = THIS_MODULE,
> },
> {
> - .name = "tos",
> + .name = "TOS",
> .revision = 1,
> .family = NFPROTO_IPV6,
> - .match = tos_mt,
> - .matchsize = sizeof(struct xt_tos_match_info),
> + .table = "mangle",
> + .target = tos_tg6,
> + .targetsize = sizeof(struct xt_tos_target_info),
> .me = THIS_MODULE,
> },
> };
>
> -static int __init dscp_mt_init(void)
> +static int __init dscp_tg_init(void)
> {
> - return xt_register_matches(dscp_mt_reg, ARRAY_SIZE(dscp_mt_reg));
> + return xt_register_targets(dscp_tg_reg, ARRAY_SIZE(dscp_tg_reg));
> }
>
> -static void __exit dscp_mt_exit(void)
> +static void __exit dscp_tg_exit(void)
> {
> - xt_unregister_matches(dscp_mt_reg, ARRAY_SIZE(dscp_mt_reg));
> + xt_unregister_targets(dscp_tg_reg, ARRAY_SIZE(dscp_tg_reg));
> }
>
> -module_init(dscp_mt_init);
> -module_exit(dscp_mt_exit);
> +module_init(dscp_tg_init);
> +module_exit(dscp_tg_exit);
> diff --git a/net/netfilter/xt_hl.c b/net/netfilter/xt_hl.c
> index 0039511..1535e87 100644
> --- a/net/netfilter/xt_hl.c
> +++ b/net/netfilter/xt_hl.c
> @@ -1,96 +1,169 @@
> /*
> - * IP tables module for matching the value of the TTL
> - * (C) 2000,2001 by Harald Welte <laforge@...filter.org>
> + * TTL modification target for IP tables
> + * (C) 2000,2005 by Harald Welte <laforge@...filter.org>
> *
> - * Hop Limit matching module
> - * (C) 2001-2002 Maciej Soltysiak <solt@....toxicfilms.tv>
> + * Hop Limit modification target for ip6tables
> + * Maciej Soltysiak <solt@....toxicfilms.tv>
> *
> * This program is free software; you can redistribute it and/or modify
> * it under the terms of the GNU General Public License version 2 as
> * published by the Free Software Foundation.
> */
> -
> -#include <linux/ip.h>
> -#include <linux/ipv6.h>
> +#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
> #include <linux/module.h>
> #include <linux/skbuff.h>
> +#include <linux/ip.h>
> +#include <linux/ipv6.h>
> +#include <net/checksum.h>
>
> #include <linux/netfilter/x_tables.h>
> -#include <linux/netfilter_ipv4/ipt_ttl.h>
> -#include <linux/netfilter_ipv6/ip6t_hl.h>
> +#include <linux/netfilter_ipv4/ipt_TTL.h>
> +#include <linux/netfilter_ipv6/ip6t_HL.h>
>
> +MODULE_AUTHOR("Harald Welte <laforge@...filter.org>");
> MODULE_AUTHOR("Maciej Soltysiak <solt@....toxicfilms.tv>");
> -MODULE_DESCRIPTION("Xtables: Hoplimit/TTL field match");
> +MODULE_DESCRIPTION("Xtables: Hoplimit/TTL Limit field modification target");
> MODULE_LICENSE("GPL");
> -MODULE_ALIAS("ipt_ttl");
> -MODULE_ALIAS("ip6t_hl");
>
> -static bool ttl_mt(const struct sk_buff *skb, struct xt_action_param *par)
> +static unsigned int
> +ttl_tg(struct sk_buff *skb, const struct xt_action_param *par)
> {
> - const struct ipt_ttl_info *info = par->matchinfo;
> - const u8 ttl = ip_hdr(skb)->ttl;
> + struct iphdr *iph;
> + const struct ipt_TTL_info *info = par->targinfo;
> + int new_ttl;
> +
> + if (!skb_make_writable(skb, skb->len))
> + return NF_DROP;
> +
> + iph = ip_hdr(skb);
>
> switch (info->mode) {
> - case IPT_TTL_EQ:
> - return ttl == info->ttl;
> - case IPT_TTL_NE:
> - return ttl != info->ttl;
> - case IPT_TTL_LT:
> - return ttl < info->ttl;
> - case IPT_TTL_GT:
> - return ttl > info->ttl;
> + case IPT_TTL_SET:
> + new_ttl = info->ttl;
> + break;
> + case IPT_TTL_INC:
> + new_ttl = iph->ttl + info->ttl;
> + if (new_ttl > 255)
> + new_ttl = 255;
> + break;
> + case IPT_TTL_DEC:
> + new_ttl = iph->ttl - info->ttl;
> + if (new_ttl < 0)
> + new_ttl = 0;
> + break;
> + default:
> + new_ttl = iph->ttl;
> + break;
> + }
> +
> + if (new_ttl != iph->ttl) {
> + csum_replace2(&iph->check, htons(iph->ttl << 8),
> + htons(new_ttl << 8));
> + iph->ttl = new_ttl;
> }
>
> - return false;
> + return XT_CONTINUE;
> }
>
> -static bool hl_mt6(const struct sk_buff *skb, struct xt_action_param *par)
> +static unsigned int
> +hl_tg6(struct sk_buff *skb, const struct xt_action_param *par)
> {
> - const struct ip6t_hl_info *info = par->matchinfo;
> - const struct ipv6hdr *ip6h = ipv6_hdr(skb);
> + struct ipv6hdr *ip6h;
> + const struct ip6t_HL_info *info = par->targinfo;
> + int new_hl;
> +
> + if (!skb_make_writable(skb, skb->len))
> + return NF_DROP;
> +
> + ip6h = ipv6_hdr(skb);
>
> switch (info->mode) {
> - case IP6T_HL_EQ:
> - return ip6h->hop_limit == info->hop_limit;
> - case IP6T_HL_NE:
> - return ip6h->hop_limit != info->hop_limit;
> - case IP6T_HL_LT:
> - return ip6h->hop_limit < info->hop_limit;
> - case IP6T_HL_GT:
> - return ip6h->hop_limit > info->hop_limit;
> + case IP6T_HL_SET:
> + new_hl = info->hop_limit;
> + break;
> + case IP6T_HL_INC:
> + new_hl = ip6h->hop_limit + info->hop_limit;
> + if (new_hl > 255)
> + new_hl = 255;
> + break;
> + case IP6T_HL_DEC:
> + new_hl = ip6h->hop_limit - info->hop_limit;
> + if (new_hl < 0)
> + new_hl = 0;
> + break;
> + default:
> + new_hl = ip6h->hop_limit;
> + break;
> }
>
> - return false;
> + ip6h->hop_limit = new_hl;
> +
> + return XT_CONTINUE;
> +}
> +
> +static int ttl_tg_check(const struct xt_tgchk_param *par)
> +{
> + const struct ipt_TTL_info *info = par->targinfo;
> +
> + if (info->mode > IPT_TTL_MAXMODE) {
> + pr_info("TTL: invalid or unknown mode %u\n", info->mode);
> + return -EINVAL;
> + }
> + if (info->mode != IPT_TTL_SET && info->ttl == 0)
> + return -EINVAL;
> + return 0;
> +}
> +
> +static int hl_tg6_check(const struct xt_tgchk_param *par)
> +{
> + const struct ip6t_HL_info *info = par->targinfo;
> +
> + if (info->mode > IP6T_HL_MAXMODE) {
> + pr_info("invalid or unknown mode %u\n", info->mode);
> + return -EINVAL;
> + }
> + if (info->mode != IP6T_HL_SET && info->hop_limit == 0) {
> + pr_info("increment/decrement does not "
> + "make sense with value 0\n");
> + return -EINVAL;
> + }
> + return 0;
> }
>
> -static struct xt_match hl_mt_reg[] __read_mostly = {
> +static struct xt_target hl_tg_reg[] __read_mostly = {
> {
> - .name = "ttl",
> + .name = "TTL",
> .revision = 0,
> .family = NFPROTO_IPV4,
> - .match = ttl_mt,
> - .matchsize = sizeof(struct ipt_ttl_info),
> + .target = ttl_tg,
> + .targetsize = sizeof(struct ipt_TTL_info),
> + .table = "mangle",
> + .checkentry = ttl_tg_check,
> .me = THIS_MODULE,
> },
> {
> - .name = "hl",
> + .name = "HL",
> .revision = 0,
> .family = NFPROTO_IPV6,
> - .match = hl_mt6,
> - .matchsize = sizeof(struct ip6t_hl_info),
> + .target = hl_tg6,
> + .targetsize = sizeof(struct ip6t_HL_info),
> + .table = "mangle",
> + .checkentry = hl_tg6_check,
> .me = THIS_MODULE,
> },
> };
>
> -static int __init hl_mt_init(void)
> +static int __init hl_tg_init(void)
> {
> - return xt_register_matches(hl_mt_reg, ARRAY_SIZE(hl_mt_reg));
> + return xt_register_targets(hl_tg_reg, ARRAY_SIZE(hl_tg_reg));
> }
>
> -static void __exit hl_mt_exit(void)
> +static void __exit hl_tg_exit(void)
> {
> - xt_unregister_matches(hl_mt_reg, ARRAY_SIZE(hl_mt_reg));
> + xt_unregister_targets(hl_tg_reg, ARRAY_SIZE(hl_tg_reg));
> }
>
> -module_init(hl_mt_init);
> -module_exit(hl_mt_exit);
> +module_init(hl_tg_init);
> +module_exit(hl_tg_exit);
> +MODULE_ALIAS("ipt_TTL");
> +MODULE_ALIAS("ip6t_HL");
>
>
>
>
Powered by blists - more mailing lists