Blame iptables/nft-ipv6.c

Packit 7b22a4
/*
Packit 7b22a4
 * (C) 2012-2014 by Pablo Neira Ayuso <pablo@netfilter.org>
Packit 7b22a4
 * (C) 2013 by Tomasz Bursztyka <tomasz.bursztyka@linux.intel.com>
Packit 7b22a4
 *
Packit 7b22a4
 * This program is free software; you can redistribute it and/or modify
Packit 7b22a4
 * it under the terms of the GNU General Public License as published by
Packit 7b22a4
 * the Free Software Foundation; either version 2 of the License, or
Packit 7b22a4
 * (at your option) any later version.
Packit 7b22a4
 *
Packit 7b22a4
 * This code has been sponsored by Sophos Astaro <http://www.sophos.com>
Packit 7b22a4
 */
Packit 7b22a4
Packit 7b22a4
#include <string.h>
Packit 7b22a4
#include <stdio.h>
Packit 7b22a4
Packit 7b22a4
#include <sys/types.h>
Packit 7b22a4
#include <sys/socket.h>
Packit 7b22a4
#include <arpa/inet.h>
Packit 7b22a4
#include <netinet/ip6.h>
Packit 7b22a4
#include <netdb.h>
Packit 7b22a4
Packit 7b22a4
#include <xtables.h>
Packit 7b22a4
Packit 7b22a4
#include <linux/netfilter/nf_tables.h>
Packit 7b22a4
#include "nft.h"
Packit 7b22a4
#include "nft-shared.h"
Packit 7b22a4
Packit 7b22a4
static int nft_ipv6_add(struct nft_handle *h, struct nftnl_rule *r, void *data)
Packit 7b22a4
{
Packit 7b22a4
	struct iptables_command_state *cs = data;
Packit 7b22a4
	struct xtables_rule_match *matchp;
Packit 7b22a4
	uint32_t op;
Packit 7b22a4
	int ret;
Packit 7b22a4
Packit 7b22a4
	if (cs->fw6.ipv6.iniface[0] != '\0') {
Packit 7b22a4
		op = nft_invflags2cmp(cs->fw6.ipv6.invflags, IPT_INV_VIA_IN);
Packit 7b22a4
		add_iniface(r, cs->fw6.ipv6.iniface, op);
Packit 7b22a4
	}
Packit 7b22a4
Packit 7b22a4
	if (cs->fw6.ipv6.outiface[0] != '\0') {
Packit 7b22a4
		op = nft_invflags2cmp(cs->fw6.ipv6.invflags, IPT_INV_VIA_OUT);
Packit 7b22a4
		add_outiface(r, cs->fw6.ipv6.outiface, op);
Packit 7b22a4
	}
Packit 7b22a4
Packit 7b22a4
	if (cs->fw6.ipv6.proto != 0) {
Packit 7b22a4
		op = nft_invflags2cmp(cs->fw6.ipv6.invflags, XT_INV_PROTO);
Packit 7b22a4
		add_l4proto(r, cs->fw6.ipv6.proto, op);
Packit 7b22a4
	}
Packit 7b22a4
Packit 7b22a4
	if (!IN6_IS_ADDR_UNSPECIFIED(&cs->fw6.ipv6.src) ||
Packit 7b22a4
	    !IN6_IS_ADDR_UNSPECIFIED(&cs->fw6.ipv6.smsk) ||
Packit 7b22a4
	    (cs->fw6.ipv6.invflags & IPT_INV_SRCIP)) {
Packit 7b22a4
		op = nft_invflags2cmp(cs->fw6.ipv6.invflags, IPT_INV_SRCIP);
Packit Service bfea89
		add_addr(r, NFT_PAYLOAD_NETWORK_HEADER,
Packit Service bfea89
			 offsetof(struct ip6_hdr, ip6_src),
Packit 7b22a4
			 &cs->fw6.ipv6.src, &cs->fw6.ipv6.smsk,
Packit 7b22a4
			 sizeof(struct in6_addr), op);
Packit 7b22a4
	}
Packit 7b22a4
	if (!IN6_IS_ADDR_UNSPECIFIED(&cs->fw6.ipv6.dst) ||
Packit 7b22a4
	    !IN6_IS_ADDR_UNSPECIFIED(&cs->fw6.ipv6.dmsk) ||
Packit 7b22a4
	    (cs->fw6.ipv6.invflags & IPT_INV_DSTIP)) {
Packit 7b22a4
		op = nft_invflags2cmp(cs->fw6.ipv6.invflags, IPT_INV_DSTIP);
Packit Service bfea89
		add_addr(r, NFT_PAYLOAD_NETWORK_HEADER,
Packit Service bfea89
			 offsetof(struct ip6_hdr, ip6_dst),
Packit 7b22a4
			 &cs->fw6.ipv6.dst, &cs->fw6.ipv6.dmsk,
Packit 7b22a4
			 sizeof(struct in6_addr), op);
Packit 7b22a4
	}
Packit 7b22a4
	add_compat(r, cs->fw6.ipv6.proto, cs->fw6.ipv6.invflags & XT_INV_PROTO);
Packit 7b22a4
Packit 7b22a4
	for (matchp = cs->matches; matchp; matchp = matchp->next) {
Packit 7b22a4
		ret = add_match(h, r, matchp->match->m);
Packit 7b22a4
		if (ret < 0)
Packit 7b22a4
			return ret;
Packit 7b22a4
	}
Packit 7b22a4
Packit 7b22a4
	/* Counters need to me added before the target, otherwise they are
Packit 7b22a4
	 * increased for each rule because of the way nf_tables works.
Packit 7b22a4
	 */
Packit 7b22a4
	if (add_counters(r, cs->counters.pcnt, cs->counters.bcnt) < 0)
Packit 7b22a4
		return -1;
Packit 7b22a4
Packit 7b22a4
	return add_action(r, cs, !!(cs->fw6.ipv6.flags & IP6T_F_GOTO));
Packit 7b22a4
}
Packit 7b22a4
Packit 7b22a4
static bool nft_ipv6_is_same(const void *data_a,
Packit 7b22a4
			     const void *data_b)
Packit 7b22a4
{
Packit 7b22a4
	const struct iptables_command_state *a = data_a;
Packit 7b22a4
	const struct iptables_command_state *b = data_b;
Packit 7b22a4
Packit 7b22a4
	if (memcmp(a->fw6.ipv6.src.s6_addr, b->fw6.ipv6.src.s6_addr,
Packit 7b22a4
		   sizeof(struct in6_addr)) != 0
Packit 7b22a4
	    || memcmp(a->fw6.ipv6.dst.s6_addr, b->fw6.ipv6.dst.s6_addr,
Packit 7b22a4
		    sizeof(struct in6_addr)) != 0
Packit 7b22a4
	    || a->fw6.ipv6.proto != b->fw6.ipv6.proto
Packit 7b22a4
	    || a->fw6.ipv6.flags != b->fw6.ipv6.flags
Packit 7b22a4
	    || a->fw6.ipv6.invflags != b->fw6.ipv6.invflags) {
Packit 7b22a4
		DEBUGP("different src/dst/proto/flags/invflags\n");
Packit 7b22a4
		return false;
Packit 7b22a4
	}
Packit 7b22a4
Packit 7b22a4
	return is_same_interfaces(a->fw6.ipv6.iniface, a->fw6.ipv6.outiface,
Packit 7b22a4
				  a->fw6.ipv6.iniface_mask,
Packit 7b22a4
				  a->fw6.ipv6.outiface_mask,
Packit 7b22a4
				  b->fw6.ipv6.iniface, b->fw6.ipv6.outiface,
Packit 7b22a4
				  b->fw6.ipv6.iniface_mask,
Packit 7b22a4
				  b->fw6.ipv6.outiface_mask);
Packit 7b22a4
}
Packit 7b22a4
Packit 7b22a4
static void nft_ipv6_parse_meta(struct nft_xt_ctx *ctx, struct nftnl_expr *e,
Packit 7b22a4
				void *data)
Packit 7b22a4
{
Packit 7b22a4
	struct iptables_command_state *cs = data;
Packit 7b22a4
Packit 7b22a4
	switch (ctx->meta.key) {
Packit 7b22a4
	case NFT_META_L4PROTO:
Packit 7b22a4
		cs->fw6.ipv6.proto = nftnl_expr_get_u8(e, NFTNL_EXPR_CMP_DATA);
Packit 7b22a4
		if (nftnl_expr_get_u32(e, NFTNL_EXPR_CMP_OP) == NFT_CMP_NEQ)
Packit 7b22a4
			cs->fw6.ipv6.invflags |= XT_INV_PROTO;
Packit 7b22a4
		return;
Packit 7b22a4
	default:
Packit 7b22a4
		break;
Packit 7b22a4
	}
Packit 7b22a4
Packit 7b22a4
	parse_meta(e, ctx->meta.key, cs->fw6.ipv6.iniface,
Packit 7b22a4
		   cs->fw6.ipv6.iniface_mask, cs->fw6.ipv6.outiface,
Packit 7b22a4
		   cs->fw6.ipv6.outiface_mask, &cs->fw6.ipv6.invflags);
Packit 7b22a4
}
Packit 7b22a4
Packit 7b22a4
static void parse_mask_ipv6(struct nft_xt_ctx *ctx, struct in6_addr *mask)
Packit 7b22a4
{
Packit 7b22a4
	memcpy(mask, ctx->bitwise.mask, sizeof(struct in6_addr));
Packit 7b22a4
}
Packit 7b22a4
Packit 7b22a4
static void nft_ipv6_parse_payload(struct nft_xt_ctx *ctx,
Packit 7b22a4
				   struct nftnl_expr *e, void *data)
Packit 7b22a4
{
Packit 7b22a4
	struct iptables_command_state *cs = data;
Packit 7b22a4
	struct in6_addr addr;
Packit 7b22a4
	uint8_t proto;
Packit 7b22a4
	bool inv;
Packit 7b22a4
Packit 7b22a4
	switch (ctx->payload.offset) {
Packit 7b22a4
	case offsetof(struct ip6_hdr, ip6_src):
Packit 7b22a4
		get_cmp_data(e, &addr, sizeof(addr), &inv;;
Packit 7b22a4
		memcpy(cs->fw6.ipv6.src.s6_addr, &addr, sizeof(addr));
Packit 7b22a4
		if (ctx->flags & NFT_XT_CTX_BITWISE) {
Packit 7b22a4
			parse_mask_ipv6(ctx, &cs->fw6.ipv6.smsk);
Packit 7b22a4
			ctx->flags &= ~NFT_XT_CTX_BITWISE;
Packit 7b22a4
		} else {
Packit Service a6c5f4
			memset(&cs->fw6.ipv6.smsk, 0xff,
Packit Service a6c5f4
			       min(ctx->payload.len, sizeof(struct in6_addr)));
Packit 7b22a4
		}
Packit 7b22a4
Packit 7b22a4
		if (inv)
Packit 7b22a4
			cs->fw6.ipv6.invflags |= IP6T_INV_SRCIP;
Packit 7b22a4
		break;
Packit 7b22a4
	case offsetof(struct ip6_hdr, ip6_dst):
Packit 7b22a4
		get_cmp_data(e, &addr, sizeof(addr), &inv;;
Packit 7b22a4
		memcpy(cs->fw6.ipv6.dst.s6_addr, &addr, sizeof(addr));
Packit 7b22a4
		if (ctx->flags & NFT_XT_CTX_BITWISE) {
Packit 7b22a4
			parse_mask_ipv6(ctx, &cs->fw6.ipv6.dmsk);
Packit 7b22a4
			ctx->flags &= ~NFT_XT_CTX_BITWISE;
Packit 7b22a4
		} else {
Packit Service a6c5f4
			memset(&cs->fw6.ipv6.dmsk, 0xff,
Packit Service a6c5f4
			       min(ctx->payload.len, sizeof(struct in6_addr)));
Packit 7b22a4
		}
Packit 7b22a4
Packit 7b22a4
		if (inv)
Packit 7b22a4
			cs->fw6.ipv6.invflags |= IP6T_INV_DSTIP;
Packit 7b22a4
		break;
Packit 7b22a4
	case offsetof(struct ip6_hdr, ip6_nxt):
Packit 7b22a4
		get_cmp_data(e, &proto, sizeof(proto), &inv;;
Packit 7b22a4
		cs->fw6.ipv6.proto = proto;
Packit 7b22a4
		if (inv)
Packit 7b22a4
			cs->fw6.ipv6.invflags |= IP6T_INV_PROTO;
Packit 7b22a4
	default:
Packit 7b22a4
		DEBUGP("unknown payload offset %d\n", ctx->payload.offset);
Packit 7b22a4
		break;
Packit 7b22a4
	}
Packit 7b22a4
}
Packit 7b22a4
Packit 7b22a4
static void nft_ipv6_parse_immediate(const char *jumpto, bool nft_goto,
Packit 7b22a4
				     void *data)
Packit 7b22a4
{
Packit 7b22a4
	struct iptables_command_state *cs = data;
Packit 7b22a4
Packit 7b22a4
	cs->jumpto = jumpto;
Packit 7b22a4
Packit 7b22a4
	if (nft_goto)
Packit 7b22a4
		cs->fw6.ipv6.flags |= IP6T_F_GOTO;
Packit 7b22a4
}
Packit 7b22a4
Packit 7b22a4
static void nft_ipv6_print_rule(struct nft_handle *h, struct nftnl_rule *r,
Packit 7b22a4
				unsigned int num, unsigned int format)
Packit 7b22a4
{
Packit 7b22a4
	struct iptables_command_state cs = {};
Packit 7b22a4
Packit 7b22a4
	nft_rule_to_iptables_command_state(h, r, &cs);
Packit 7b22a4
Packit 7b22a4
	print_rule_details(&cs, cs.jumpto, cs.fw6.ipv6.flags,
Packit 7b22a4
			   cs.fw6.ipv6.invflags, cs.fw6.ipv6.proto,
Packit 7b22a4
			   num, format);
Packit 7b22a4
	if (format & FMT_OPTIONS) {
Packit 7b22a4
		if (format & FMT_NOTABLE)
Packit 7b22a4
			fputs("opt ", stdout);
Packit 7b22a4
		fputs("   ", stdout);
Packit 7b22a4
	}
Packit 7b22a4
	print_ifaces(cs.fw6.ipv6.iniface, cs.fw6.ipv6.outiface,
Packit 7b22a4
		     cs.fw6.ipv6.invflags, format);
Packit 7b22a4
	print_ipv6_addresses(&cs.fw6, format);
Packit 7b22a4
Packit 7b22a4
	if (format & FMT_NOTABLE)
Packit 7b22a4
		fputs("  ", stdout);
Packit 7b22a4
Packit 7b22a4
	if (cs.fw6.ipv6.flags & IP6T_F_GOTO)
Packit 7b22a4
		printf("[goto] ");
Packit 7b22a4
Packit 7b22a4
	print_matches_and_target(&cs, format);
Packit 7b22a4
Packit 7b22a4
	if (!(format & FMT_NONEWLINE))
Packit 7b22a4
		fputc('\n', stdout);
Packit 7b22a4
Packit 7b22a4
	xtables_rule_matches_free(&cs.matches);
Packit 7b22a4
}
Packit 7b22a4
Packit 7b22a4
static void save_ipv6_addr(char letter, const struct in6_addr *addr,
Packit 7b22a4
			   const struct in6_addr *mask,
Packit 7b22a4
			   int invert)
Packit 7b22a4
{
Packit 7b22a4
	char addr_str[INET6_ADDRSTRLEN];
Packit 7b22a4
	int l = xtables_ip6mask_to_cidr(mask);
Packit 7b22a4
Packit 7b22a4
	if (!invert && l == 0)
Packit 7b22a4
		return;
Packit 7b22a4
Packit 7b22a4
	printf("%s-%c %s",
Packit 7b22a4
		invert ? "! " : "", letter,
Packit 7b22a4
		inet_ntop(AF_INET6, addr, addr_str, sizeof(addr_str)));
Packit 7b22a4
Packit 7b22a4
	if (l == -1)
Packit 7b22a4
		printf("/%s ", inet_ntop(AF_INET6, mask, addr_str, sizeof(addr_str)));
Packit 7b22a4
	else
Packit 7b22a4
		printf("/%d ", l);
Packit 7b22a4
}
Packit 7b22a4
Packit 7b22a4
static void nft_ipv6_save_rule(const void *data, unsigned int format)
Packit 7b22a4
{
Packit 7b22a4
	const struct iptables_command_state *cs = data;
Packit 7b22a4
Packit 7b22a4
	save_ipv6_addr('s', &cs->fw6.ipv6.src, &cs->fw6.ipv6.smsk,
Packit 7b22a4
		       cs->fw6.ipv6.invflags & IP6T_INV_SRCIP);
Packit 7b22a4
	save_ipv6_addr('d', &cs->fw6.ipv6.dst, &cs->fw6.ipv6.dmsk,
Packit 7b22a4
		       cs->fw6.ipv6.invflags & IP6T_INV_DSTIP);
Packit 7b22a4
Packit 7b22a4
	save_rule_details(cs, cs->fw6.ipv6.invflags, cs->fw6.ipv6.proto,
Packit 7b22a4
			  cs->fw6.ipv6.iniface, cs->fw6.ipv6.iniface_mask,
Packit 7b22a4
			  cs->fw6.ipv6.outiface, cs->fw6.ipv6.outiface_mask);
Packit 7b22a4
Packit 7b22a4
	save_matches_and_target(cs, cs->fw6.ipv6.flags & IP6T_F_GOTO,
Packit 7b22a4
				&cs->fw6, format);
Packit 7b22a4
}
Packit 7b22a4
Packit 7b22a4
/* These are invalid numbers as upper layer protocol */
Packit 7b22a4
static int is_exthdr(uint16_t proto)
Packit 7b22a4
{
Packit 7b22a4
	return (proto == IPPROTO_ROUTING ||
Packit 7b22a4
		proto == IPPROTO_FRAGMENT ||
Packit 7b22a4
		proto == IPPROTO_AH ||
Packit 7b22a4
		proto == IPPROTO_DSTOPTS);
Packit 7b22a4
}
Packit 7b22a4
Packit 7b22a4
static void nft_ipv6_proto_parse(struct iptables_command_state *cs,
Packit 7b22a4
				 struct xtables_args *args)
Packit 7b22a4
{
Packit 7b22a4
	cs->fw6.ipv6.proto = args->proto;
Packit 7b22a4
	cs->fw6.ipv6.invflags = args->invflags;
Packit 7b22a4
Packit 7b22a4
	if (is_exthdr(cs->fw6.ipv6.proto)
Packit 7b22a4
	    && (cs->fw6.ipv6.invflags & XT_INV_PROTO) == 0)
Packit 7b22a4
		fprintf(stderr,
Packit 7b22a4
			"Warning: never matched protocol: %s. "
Packit 7b22a4
			"use extension match instead.\n",
Packit 7b22a4
			cs->protocol);
Packit 7b22a4
}
Packit 7b22a4
Packit 7b22a4
static void nft_ipv6_post_parse(int command, struct iptables_command_state *cs,
Packit 7b22a4
				struct xtables_args *args)
Packit 7b22a4
{
Packit 7b22a4
	cs->fw6.ipv6.flags = args->flags;
Packit 7b22a4
	/* We already set invflags in proto_parse, but we need to refresh it
Packit 7b22a4
	 * to include new parsed options.
Packit 7b22a4
	 */
Packit 7b22a4
	cs->fw6.ipv6.invflags = args->invflags;
Packit 7b22a4
Packit 7b22a4
	strncpy(cs->fw6.ipv6.iniface, args->iniface, IFNAMSIZ);
Packit 7b22a4
	memcpy(cs->fw6.ipv6.iniface_mask,
Packit 7b22a4
	       args->iniface_mask, IFNAMSIZ*sizeof(unsigned char));
Packit 7b22a4
Packit 7b22a4
	strncpy(cs->fw6.ipv6.outiface, args->outiface, IFNAMSIZ);
Packit 7b22a4
	memcpy(cs->fw6.ipv6.outiface_mask,
Packit 7b22a4
	       args->outiface_mask, IFNAMSIZ*sizeof(unsigned char));
Packit 7b22a4
Packit 7b22a4
	if (args->goto_set)
Packit 7b22a4
		cs->fw6.ipv6.flags |= IP6T_F_GOTO;
Packit 7b22a4
Packit 7b22a4
	cs->fw6.counters.pcnt = args->pcnt_cnt;
Packit 7b22a4
	cs->fw6.counters.bcnt = args->bcnt_cnt;
Packit 7b22a4
Packit 7b22a4
	if (command & (CMD_REPLACE | CMD_INSERT |
Packit 7b22a4
			CMD_DELETE | CMD_APPEND | CMD_CHECK)) {
Packit 7b22a4
		if (!(cs->options & OPT_DESTINATION))
Packit 7b22a4
			args->dhostnetworkmask = "::0/0";
Packit 7b22a4
		if (!(cs->options & OPT_SOURCE))
Packit 7b22a4
			args->shostnetworkmask = "::0/0";
Packit 7b22a4
	}
Packit 7b22a4
Packit 7b22a4
	if (args->shostnetworkmask)
Packit 7b22a4
		xtables_ip6parse_multiple(args->shostnetworkmask,
Packit 7b22a4
					  &args->s.addr.v6,
Packit 7b22a4
					  &args->s.mask.v6,
Packit 7b22a4
					  &args->s.naddrs);
Packit 7b22a4
	if (args->dhostnetworkmask)
Packit 7b22a4
		xtables_ip6parse_multiple(args->dhostnetworkmask,
Packit 7b22a4
					  &args->d.addr.v6,
Packit 7b22a4
					  &args->d.mask.v6,
Packit 7b22a4
					  &args->d.naddrs);
Packit 7b22a4
Packit 7b22a4
	if ((args->s.naddrs > 1 || args->d.naddrs > 1) &&
Packit 7b22a4
	    (cs->fw6.ipv6.invflags & (IP6T_INV_SRCIP | IP6T_INV_DSTIP)))
Packit 7b22a4
		xtables_error(PARAMETER_PROBLEM,
Packit 7b22a4
			      "! not allowed with multiple"
Packit 7b22a4
			      " source or destination IP addresses");
Packit 7b22a4
}
Packit 7b22a4
Packit 7b22a4
static void xlate_ipv6_addr(const char *selector, const struct in6_addr *addr,
Packit 7b22a4
			    const struct in6_addr *mask,
Packit 7b22a4
			    int invert, struct xt_xlate *xl)
Packit 7b22a4
{
Packit 7b22a4
	char addr_str[INET6_ADDRSTRLEN];
Packit 7b22a4
Packit 7b22a4
	if (!invert && IN6_IS_ADDR_UNSPECIFIED(addr))
Packit 7b22a4
		return;
Packit 7b22a4
Packit 7b22a4
	inet_ntop(AF_INET6, addr, addr_str, INET6_ADDRSTRLEN);
Packit 7b22a4
	xt_xlate_add(xl, "%s %s%s%s ", selector, invert ? "!= " : "", addr_str,
Packit 7b22a4
			xtables_ip6mask_to_numeric(mask));
Packit 7b22a4
}
Packit 7b22a4
Packit 7b22a4
static int nft_ipv6_xlate(const void *data, struct xt_xlate *xl)
Packit 7b22a4
{
Packit 7b22a4
	const struct iptables_command_state *cs = data;
Packit 7b22a4
	const char *comment;
Packit 7b22a4
	int ret;
Packit 7b22a4
Packit 7b22a4
	xlate_ifname(xl, "iifname", cs->fw6.ipv6.iniface,
Packit 7b22a4
		     cs->fw6.ipv6.invflags & IP6T_INV_VIA_IN);
Packit 7b22a4
	xlate_ifname(xl, "oifname", cs->fw6.ipv6.outiface,
Packit 7b22a4
		     cs->fw6.ipv6.invflags & IP6T_INV_VIA_OUT);
Packit 7b22a4
Packit 7b22a4
	if (cs->fw6.ipv6.proto != 0) {
Packit 7b22a4
		const struct protoent *pent =
Packit 7b22a4
			getprotobynumber(cs->fw6.ipv6.proto);
Packit 7b22a4
		char protonum[sizeof("65535")];
Packit 7b22a4
		const char *name = protonum;
Packit 7b22a4
Packit 7b22a4
		snprintf(protonum, sizeof(protonum), "%u",
Packit 7b22a4
			 cs->fw6.ipv6.proto);
Packit 7b22a4
Packit 7b22a4
		if (!pent || !xlate_find_match(cs, pent->p_name)) {
Packit 7b22a4
			if (pent)
Packit 7b22a4
				name = pent->p_name;
Packit 7b22a4
			xt_xlate_add(xl, "meta l4proto %s%s ",
Packit 7b22a4
				   cs->fw6.ipv6.invflags & IP6T_INV_PROTO ?
Packit 7b22a4
					"!= " : "", name);
Packit 7b22a4
		}
Packit 7b22a4
Packit 7b22a4
	}
Packit 7b22a4
Packit 7b22a4
	xlate_ipv6_addr("ip6 saddr", &cs->fw6.ipv6.src, &cs->fw6.ipv6.smsk,
Packit 7b22a4
			cs->fw6.ipv6.invflags & IP6T_INV_SRCIP, xl);
Packit 7b22a4
	xlate_ipv6_addr("ip6 daddr", &cs->fw6.ipv6.dst, &cs->fw6.ipv6.dmsk,
Packit 7b22a4
			cs->fw6.ipv6.invflags & IP6T_INV_DSTIP, xl);
Packit 7b22a4
Packit 7b22a4
	ret = xlate_matches(cs, xl);
Packit 7b22a4
	if (!ret)
Packit 7b22a4
		return ret;
Packit 7b22a4
Packit 7b22a4
	/* Always add counters per rule, as in iptables */
Packit 7b22a4
	xt_xlate_add(xl, "counter");
Packit 7b22a4
	ret = xlate_action(cs, !!(cs->fw6.ipv6.flags & IP6T_F_GOTO), xl);
Packit 7b22a4
Packit 7b22a4
	comment = xt_xlate_get_comment(xl);
Packit 7b22a4
	if (comment)
Packit 7b22a4
		xt_xlate_add(xl, " comment %s", comment);
Packit 7b22a4
Packit 7b22a4
	return ret;
Packit 7b22a4
}
Packit 7b22a4
Packit 7b22a4
struct nft_family_ops nft_family_ops_ipv6 = {
Packit 7b22a4
	.add			= nft_ipv6_add,
Packit 7b22a4
	.is_same		= nft_ipv6_is_same,
Packit 7b22a4
	.parse_meta		= nft_ipv6_parse_meta,
Packit 7b22a4
	.parse_payload		= nft_ipv6_parse_payload,
Packit 7b22a4
	.parse_immediate	= nft_ipv6_parse_immediate,
Packit 7b22a4
	.print_header		= print_header,
Packit 7b22a4
	.print_rule		= nft_ipv6_print_rule,
Packit 7b22a4
	.save_rule		= nft_ipv6_save_rule,
Packit 7b22a4
	.save_counters		= save_counters,
Packit 7b22a4
	.save_chain		= nft_ipv46_save_chain,
Packit 7b22a4
	.proto_parse		= nft_ipv6_proto_parse,
Packit 7b22a4
	.post_parse		= nft_ipv6_post_parse,
Packit 7b22a4
	.parse_target		= nft_ipv46_parse_target,
Packit 7b22a4
	.rule_to_cs		= nft_rule_to_iptables_command_state,
Packit 7b22a4
	.clear_cs		= nft_clear_iptables_command_state,
Packit 7b22a4
	.rule_find		= nft_ipv46_rule_find,
Packit 7b22a4
	.xlate			= nft_ipv6_xlate,
Packit 7b22a4
};