Commit | Line | Data |
---|---|---|
7e5d03bb MJ |
1 | /* Helper handling for netfilter. */ |
2 | ||
3 | /* (C) 1999-2001 Paul `Rusty' Russell | |
4 | * (C) 2002-2006 Netfilter Core Team <coreteam@netfilter.org> | |
5 | * (C) 2003,2004 USAGI/WIDE Project <http://www.linux-ipv6.org> | |
6 | * | |
7 | * This program is free software; you can redistribute it and/or modify | |
8 | * it under the terms of the GNU General Public License version 2 as | |
9 | * published by the Free Software Foundation. | |
10 | */ | |
11 | ||
12 | #include <linux/types.h> | |
13 | #include <linux/netfilter.h> | |
14 | #include <linux/module.h> | |
15 | #include <linux/skbuff.h> | |
16 | #include <linux/vmalloc.h> | |
17 | #include <linux/stddef.h> | |
7e5d03bb MJ |
18 | #include <linux/random.h> |
19 | #include <linux/err.h> | |
20 | #include <linux/kernel.h> | |
21 | #include <linux/netdevice.h> | |
2ba4cc31 | 22 | #include <linux/rculist.h> |
efb9a8c2 | 23 | #include <linux/rtnetlink.h> |
7e5d03bb | 24 | |
7e5d03bb MJ |
25 | #include <net/netfilter/nf_conntrack.h> |
26 | #include <net/netfilter/nf_conntrack_l3proto.h> | |
605dcad6 | 27 | #include <net/netfilter/nf_conntrack_l4proto.h> |
7e5d03bb MJ |
28 | #include <net/netfilter/nf_conntrack_helper.h> |
29 | #include <net/netfilter/nf_conntrack_core.h> | |
ceceae1b | 30 | #include <net/netfilter/nf_conntrack_extend.h> |
7e5d03bb | 31 | |
58a3c9bb | 32 | static DEFINE_MUTEX(nf_ct_helper_mutex); |
12f7a505 PNA |
33 | struct hlist_head *nf_ct_helper_hash __read_mostly; |
34 | EXPORT_SYMBOL_GPL(nf_ct_helper_hash); | |
35 | unsigned int nf_ct_helper_hsize __read_mostly; | |
36 | EXPORT_SYMBOL_GPL(nf_ct_helper_hsize); | |
b8a7fe6c | 37 | static unsigned int nf_ct_helper_count __read_mostly; |
b8a7fe6c | 38 | |
a9006892 EL |
39 | static bool nf_ct_auto_assign_helper __read_mostly = true; |
40 | module_param_named(nf_conntrack_helper, nf_ct_auto_assign_helper, bool, 0644); | |
41 | MODULE_PARM_DESC(nf_conntrack_helper, | |
42 | "Enable automatic conntrack helper assignment (default 1)"); | |
43 | ||
44 | #ifdef CONFIG_SYSCTL | |
45 | static struct ctl_table helper_sysctl_table[] = { | |
46 | { | |
47 | .procname = "nf_conntrack_helper", | |
48 | .data = &init_net.ct.sysctl_auto_assign_helper, | |
49 | .maxlen = sizeof(unsigned int), | |
50 | .mode = 0644, | |
51 | .proc_handler = proc_dointvec, | |
52 | }, | |
53 | {} | |
54 | }; | |
55 | ||
56 | static int nf_conntrack_helper_init_sysctl(struct net *net) | |
57 | { | |
58 | struct ctl_table *table; | |
59 | ||
60 | table = kmemdup(helper_sysctl_table, sizeof(helper_sysctl_table), | |
61 | GFP_KERNEL); | |
62 | if (!table) | |
63 | goto out; | |
64 | ||
65 | table[0].data = &net->ct.sysctl_auto_assign_helper; | |
66 | ||
67 | net->ct.helper_sysctl_header = | |
68 | register_net_sysctl(net, "net/netfilter", table); | |
69 | ||
70 | if (!net->ct.helper_sysctl_header) { | |
71 | pr_err("nf_conntrack_helper: can't register to sysctl.\n"); | |
72 | goto out_register; | |
73 | } | |
74 | return 0; | |
75 | ||
76 | out_register: | |
77 | kfree(table); | |
78 | out: | |
79 | return -ENOMEM; | |
80 | } | |
81 | ||
82 | static void nf_conntrack_helper_fini_sysctl(struct net *net) | |
83 | { | |
84 | struct ctl_table *table; | |
85 | ||
86 | table = net->ct.helper_sysctl_header->ctl_table_arg; | |
87 | unregister_net_sysctl_table(net->ct.helper_sysctl_header); | |
88 | kfree(table); | |
89 | } | |
90 | #else | |
91 | static int nf_conntrack_helper_init_sysctl(struct net *net) | |
92 | { | |
93 | return 0; | |
94 | } | |
95 | ||
96 | static void nf_conntrack_helper_fini_sysctl(struct net *net) | |
97 | { | |
98 | } | |
99 | #endif /* CONFIG_SYSCTL */ | |
b8a7fe6c PM |
100 | |
101 | /* Stupid hash, but collision free for the default registrations of the | |
102 | * helpers currently in the kernel. */ | |
103 | static unsigned int helper_hash(const struct nf_conntrack_tuple *tuple) | |
104 | { | |
105 | return (((tuple->src.l3num << 8) | tuple->dst.protonum) ^ | |
a34c4589 | 106 | (__force __u16)tuple->src.u.all) % nf_ct_helper_hsize; |
b8a7fe6c | 107 | } |
7e5d03bb | 108 | |
226c0c0e | 109 | static struct nf_conntrack_helper * |
7e5d03bb MJ |
110 | __nf_ct_helper_find(const struct nf_conntrack_tuple *tuple) |
111 | { | |
b8a7fe6c | 112 | struct nf_conntrack_helper *helper; |
d4156e8c | 113 | struct nf_conntrack_tuple_mask mask = { .src.u.all = htons(0xFFFF) }; |
b8a7fe6c PM |
114 | struct hlist_node *n; |
115 | unsigned int h; | |
7e5d03bb | 116 | |
b8a7fe6c PM |
117 | if (!nf_ct_helper_count) |
118 | return NULL; | |
119 | ||
120 | h = helper_hash(tuple); | |
58a3c9bb | 121 | hlist_for_each_entry_rcu(helper, n, &nf_ct_helper_hash[h], hnode) { |
b8a7fe6c PM |
122 | if (nf_ct_tuple_src_mask_cmp(tuple, &helper->tuple, &mask)) |
123 | return helper; | |
7e5d03bb MJ |
124 | } |
125 | return NULL; | |
126 | } | |
7e5d03bb MJ |
127 | |
128 | struct nf_conntrack_helper * | |
794e6871 | 129 | __nf_conntrack_helper_find(const char *name, u16 l3num, u8 protonum) |
7e5d03bb MJ |
130 | { |
131 | struct nf_conntrack_helper *h; | |
b8a7fe6c PM |
132 | struct hlist_node *n; |
133 | unsigned int i; | |
7e5d03bb | 134 | |
b8a7fe6c | 135 | for (i = 0; i < nf_ct_helper_hsize; i++) { |
58a3c9bb | 136 | hlist_for_each_entry_rcu(h, n, &nf_ct_helper_hash[i], hnode) { |
794e6871 PM |
137 | if (!strcmp(h->name, name) && |
138 | h->tuple.src.l3num == l3num && | |
139 | h->tuple.dst.protonum == protonum) | |
b8a7fe6c PM |
140 | return h; |
141 | } | |
7e5d03bb | 142 | } |
7e5d03bb MJ |
143 | return NULL; |
144 | } | |
794e6871 | 145 | EXPORT_SYMBOL_GPL(__nf_conntrack_helper_find); |
7e5d03bb | 146 | |
84f3bb9a PM |
147 | struct nf_conntrack_helper * |
148 | nf_conntrack_helper_try_module_get(const char *name, u16 l3num, u8 protonum) | |
149 | { | |
150 | struct nf_conntrack_helper *h; | |
151 | ||
152 | h = __nf_conntrack_helper_find(name, l3num, protonum); | |
153 | #ifdef CONFIG_MODULES | |
154 | if (h == NULL) { | |
155 | if (request_module("nfct-helper-%s", name) == 0) | |
156 | h = __nf_conntrack_helper_find(name, l3num, protonum); | |
157 | } | |
158 | #endif | |
159 | if (h != NULL && !try_module_get(h->me)) | |
160 | h = NULL; | |
161 | ||
162 | return h; | |
163 | } | |
164 | EXPORT_SYMBOL_GPL(nf_conntrack_helper_try_module_get); | |
165 | ||
1afc5679 PNA |
166 | struct nf_conn_help * |
167 | nf_ct_helper_ext_add(struct nf_conn *ct, | |
168 | struct nf_conntrack_helper *helper, gfp_t gfp) | |
b560580a PM |
169 | { |
170 | struct nf_conn_help *help; | |
171 | ||
1afc5679 PNA |
172 | help = nf_ct_ext_add_length(ct, NF_CT_EXT_HELPER, |
173 | helper->data_len, gfp); | |
b560580a PM |
174 | if (help) |
175 | INIT_HLIST_HEAD(&help->expectations); | |
176 | else | |
177 | pr_debug("failed to add helper extension area"); | |
178 | return help; | |
179 | } | |
180 | EXPORT_SYMBOL_GPL(nf_ct_helper_ext_add); | |
181 | ||
b2a15a60 PM |
182 | int __nf_ct_try_assign_helper(struct nf_conn *ct, struct nf_conn *tmpl, |
183 | gfp_t flags) | |
226c0c0e | 184 | { |
b2a15a60 PM |
185 | struct nf_conntrack_helper *helper = NULL; |
186 | struct nf_conn_help *help; | |
a9006892 | 187 | struct net *net = nf_ct_net(ct); |
226c0c0e | 188 | int ret = 0; |
226c0c0e | 189 | |
6714cf54 PNA |
190 | /* We already got a helper explicitly attached. The function |
191 | * nf_conntrack_alter_reply - in case NAT is in use - asks for looking | |
192 | * the helper up again. Since now the user is in full control of | |
193 | * making consistent helper configurations, skip this automatic | |
194 | * re-lookup, otherwise we'll lose the helper. | |
195 | */ | |
196 | if (test_bit(IPS_HELPER_BIT, &ct->status)) | |
197 | return 0; | |
198 | ||
b2a15a60 PM |
199 | if (tmpl != NULL) { |
200 | help = nfct_help(tmpl); | |
6714cf54 | 201 | if (help != NULL) { |
b2a15a60 | 202 | helper = help->helper; |
6714cf54 PNA |
203 | set_bit(IPS_HELPER_BIT, &ct->status); |
204 | } | |
b2a15a60 PM |
205 | } |
206 | ||
207 | help = nfct_help(ct); | |
a9006892 | 208 | if (net->ct.sysctl_auto_assign_helper && helper == NULL) { |
b2a15a60 | 209 | helper = __nf_ct_helper_find(&ct->tuplehash[IP_CT_DIR_REPLY].tuple); |
a9006892 EL |
210 | if (unlikely(!net->ct.auto_assign_helper_warned && helper)) { |
211 | pr_info("nf_conntrack: automatic helper " | |
212 | "assignment is deprecated and it will " | |
213 | "be removed soon. Use the iptables CT target " | |
214 | "to attach helpers instead.\n"); | |
215 | net->ct.auto_assign_helper_warned = true; | |
216 | } | |
217 | } | |
218 | ||
226c0c0e PNA |
219 | if (helper == NULL) { |
220 | if (help) | |
a9b3cd7f | 221 | RCU_INIT_POINTER(help->helper, NULL); |
226c0c0e PNA |
222 | goto out; |
223 | } | |
224 | ||
225 | if (help == NULL) { | |
1afc5679 | 226 | help = nf_ct_helper_ext_add(ct, helper, flags); |
226c0c0e PNA |
227 | if (help == NULL) { |
228 | ret = -ENOMEM; | |
229 | goto out; | |
230 | } | |
231 | } else { | |
32f53760 PNA |
232 | /* We only allow helper re-assignment of the same sort since |
233 | * we cannot reallocate the helper extension area. | |
234 | */ | |
235 | if (help->helper != helper) { | |
236 | RCU_INIT_POINTER(help->helper, NULL); | |
237 | goto out; | |
238 | } | |
226c0c0e PNA |
239 | } |
240 | ||
cf778b00 | 241 | rcu_assign_pointer(help->helper, helper); |
226c0c0e PNA |
242 | out: |
243 | return ret; | |
244 | } | |
245 | EXPORT_SYMBOL_GPL(__nf_ct_try_assign_helper); | |
246 | ||
7e5d03bb MJ |
247 | static inline int unhelp(struct nf_conntrack_tuple_hash *i, |
248 | const struct nf_conntrack_helper *me) | |
249 | { | |
250 | struct nf_conn *ct = nf_ct_tuplehash_to_ctrack(i); | |
251 | struct nf_conn_help *help = nfct_help(ct); | |
252 | ||
c5d277d2 ED |
253 | if (help && rcu_dereference_protected( |
254 | help->helper, | |
255 | lockdep_is_held(&nf_conntrack_lock) | |
256 | ) == me) { | |
7e5d03bb | 257 | nf_conntrack_event(IPCT_HELPER, ct); |
a9b3cd7f | 258 | RCU_INIT_POINTER(help->helper, NULL); |
7e5d03bb MJ |
259 | } |
260 | return 0; | |
261 | } | |
262 | ||
9858a3ae PNA |
263 | void nf_ct_helper_destroy(struct nf_conn *ct) |
264 | { | |
265 | struct nf_conn_help *help = nfct_help(ct); | |
266 | struct nf_conntrack_helper *helper; | |
267 | ||
268 | if (help) { | |
269 | rcu_read_lock(); | |
270 | helper = rcu_dereference(help->helper); | |
271 | if (helper && helper->destroy) | |
272 | helper->destroy(ct); | |
273 | rcu_read_unlock(); | |
274 | } | |
275 | } | |
276 | ||
544d5c7d PNA |
277 | static LIST_HEAD(nf_ct_helper_expectfn_list); |
278 | ||
279 | void nf_ct_helper_expectfn_register(struct nf_ct_helper_expectfn *n) | |
280 | { | |
281 | spin_lock_bh(&nf_conntrack_lock); | |
282 | list_add_rcu(&n->head, &nf_ct_helper_expectfn_list); | |
283 | spin_unlock_bh(&nf_conntrack_lock); | |
284 | } | |
285 | EXPORT_SYMBOL_GPL(nf_ct_helper_expectfn_register); | |
286 | ||
287 | void nf_ct_helper_expectfn_unregister(struct nf_ct_helper_expectfn *n) | |
288 | { | |
289 | spin_lock_bh(&nf_conntrack_lock); | |
290 | list_del_rcu(&n->head); | |
291 | spin_unlock_bh(&nf_conntrack_lock); | |
292 | } | |
293 | EXPORT_SYMBOL_GPL(nf_ct_helper_expectfn_unregister); | |
294 | ||
295 | struct nf_ct_helper_expectfn * | |
296 | nf_ct_helper_expectfn_find_by_name(const char *name) | |
297 | { | |
298 | struct nf_ct_helper_expectfn *cur; | |
299 | bool found = false; | |
300 | ||
301 | rcu_read_lock(); | |
302 | list_for_each_entry_rcu(cur, &nf_ct_helper_expectfn_list, head) { | |
303 | if (!strcmp(cur->name, name)) { | |
304 | found = true; | |
305 | break; | |
306 | } | |
307 | } | |
308 | rcu_read_unlock(); | |
309 | return found ? cur : NULL; | |
310 | } | |
311 | EXPORT_SYMBOL_GPL(nf_ct_helper_expectfn_find_by_name); | |
312 | ||
313 | struct nf_ct_helper_expectfn * | |
314 | nf_ct_helper_expectfn_find_by_symbol(const void *symbol) | |
315 | { | |
316 | struct nf_ct_helper_expectfn *cur; | |
317 | bool found = false; | |
318 | ||
319 | rcu_read_lock(); | |
320 | list_for_each_entry_rcu(cur, &nf_ct_helper_expectfn_list, head) { | |
321 | if (cur->expectfn == symbol) { | |
322 | found = true; | |
323 | break; | |
324 | } | |
325 | } | |
326 | rcu_read_unlock(); | |
327 | return found ? cur : NULL; | |
328 | } | |
329 | EXPORT_SYMBOL_GPL(nf_ct_helper_expectfn_find_by_symbol); | |
330 | ||
7e5d03bb MJ |
331 | int nf_conntrack_helper_register(struct nf_conntrack_helper *me) |
332 | { | |
12f7a505 PNA |
333 | int ret = 0; |
334 | struct nf_conntrack_helper *cur; | |
335 | struct hlist_node *n; | |
b8a7fe6c PM |
336 | unsigned int h = helper_hash(&me->tuple); |
337 | ||
6002f266 PM |
338 | BUG_ON(me->expect_policy == NULL); |
339 | BUG_ON(me->expect_class_max >= NF_CT_MAX_EXPECT_CLASSES); | |
af9d32ad | 340 | BUG_ON(strlen(me->name) > NF_CT_HELPER_NAME_LEN - 1); |
7e5d03bb | 341 | |
58a3c9bb | 342 | mutex_lock(&nf_ct_helper_mutex); |
12f7a505 PNA |
343 | hlist_for_each_entry(cur, n, &nf_ct_helper_hash[h], hnode) { |
344 | if (strncmp(cur->name, me->name, NF_CT_HELPER_NAME_LEN) == 0 && | |
345 | cur->tuple.src.l3num == me->tuple.src.l3num && | |
346 | cur->tuple.dst.protonum == me->tuple.dst.protonum) { | |
347 | ret = -EEXIST; | |
348 | goto out; | |
349 | } | |
350 | } | |
58a3c9bb | 351 | hlist_add_head_rcu(&me->hnode, &nf_ct_helper_hash[h]); |
b8a7fe6c | 352 | nf_ct_helper_count++; |
12f7a505 | 353 | out: |
58a3c9bb | 354 | mutex_unlock(&nf_ct_helper_mutex); |
12f7a505 | 355 | return ret; |
7e5d03bb | 356 | } |
13b18339 | 357 | EXPORT_SYMBOL_GPL(nf_conntrack_helper_register); |
7e5d03bb | 358 | |
68047937 AD |
359 | static void __nf_conntrack_helper_unregister(struct nf_conntrack_helper *me, |
360 | struct net *net) | |
7e5d03bb | 361 | { |
7e5d03bb | 362 | struct nf_conntrack_tuple_hash *h; |
31f15875 | 363 | struct nf_conntrack_expect *exp; |
58c0fb0d | 364 | const struct hlist_node *n, *next; |
ea781f19 | 365 | const struct hlist_nulls_node *nn; |
31f15875 | 366 | unsigned int i; |
7e5d03bb | 367 | |
7e5d03bb | 368 | /* Get rid of expectations */ |
31f15875 PM |
369 | for (i = 0; i < nf_ct_expect_hsize; i++) { |
370 | hlist_for_each_entry_safe(exp, n, next, | |
68047937 | 371 | &net->ct.expect_hash[i], hnode) { |
31f15875 | 372 | struct nf_conn_help *help = nfct_help(exp->master); |
c5d277d2 ED |
373 | if ((rcu_dereference_protected( |
374 | help->helper, | |
375 | lockdep_is_held(&nf_conntrack_lock) | |
376 | ) == me || exp->helper == me) && | |
31f15875 PM |
377 | del_timer(&exp->timeout)) { |
378 | nf_ct_unlink_expect(exp); | |
379 | nf_ct_expect_put(exp); | |
380 | } | |
7e5d03bb MJ |
381 | } |
382 | } | |
383 | ||
384 | /* Get rid of expecteds, set helpers to NULL. */ | |
38fb0afc | 385 | hlist_nulls_for_each_entry(h, nn, &net->ct.unconfirmed, hnnode) |
7e5d03bb | 386 | unhelp(h, me); |
d696c7bd | 387 | for (i = 0; i < net->ct.htable_size; i++) { |
ea781f19 | 388 | hlist_nulls_for_each_entry(h, nn, &net->ct.hash[i], hnnode) |
7e5d03bb MJ |
389 | unhelp(h, me); |
390 | } | |
68047937 AD |
391 | } |
392 | ||
393 | void nf_conntrack_helper_unregister(struct nf_conntrack_helper *me) | |
394 | { | |
395 | struct net *net; | |
396 | ||
397 | mutex_lock(&nf_ct_helper_mutex); | |
398 | hlist_del_rcu(&me->hnode); | |
399 | nf_ct_helper_count--; | |
400 | mutex_unlock(&nf_ct_helper_mutex); | |
401 | ||
402 | /* Make sure every nothing is still using the helper unless its a | |
403 | * connection in the hash. | |
404 | */ | |
405 | synchronize_rcu(); | |
406 | ||
efb9a8c2 | 407 | rtnl_lock(); |
68047937 AD |
408 | spin_lock_bh(&nf_conntrack_lock); |
409 | for_each_net(net) | |
410 | __nf_conntrack_helper_unregister(me, net); | |
f8ba1aff | 411 | spin_unlock_bh(&nf_conntrack_lock); |
efb9a8c2 | 412 | rtnl_unlock(); |
7e5d03bb | 413 | } |
13b18339 | 414 | EXPORT_SYMBOL_GPL(nf_conntrack_helper_unregister); |
ceceae1b | 415 | |
61eb3107 | 416 | static struct nf_ct_ext_type helper_extend __read_mostly = { |
ceceae1b YK |
417 | .len = sizeof(struct nf_conn_help), |
418 | .align = __alignof__(struct nf_conn_help), | |
419 | .id = NF_CT_EXT_HELPER, | |
420 | }; | |
421 | ||
a9006892 | 422 | int nf_conntrack_helper_init(struct net *net) |
ceceae1b | 423 | { |
b8a7fe6c PM |
424 | int err; |
425 | ||
a9006892 EL |
426 | net->ct.auto_assign_helper_warned = false; |
427 | net->ct.sysctl_auto_assign_helper = nf_ct_auto_assign_helper; | |
b8a7fe6c | 428 | |
a9006892 EL |
429 | if (net_eq(net, &init_net)) { |
430 | nf_ct_helper_hsize = 1; /* gets rounded up to use one page */ | |
431 | nf_ct_helper_hash = | |
432 | nf_ct_alloc_hashtable(&nf_ct_helper_hsize, 0); | |
433 | if (!nf_ct_helper_hash) | |
434 | return -ENOMEM; | |
435 | ||
436 | err = nf_ct_extend_register(&helper_extend); | |
437 | if (err < 0) | |
438 | goto err1; | |
439 | } | |
440 | ||
441 | err = nf_conntrack_helper_init_sysctl(net); | |
b8a7fe6c | 442 | if (err < 0) |
a9006892 | 443 | goto out_sysctl; |
b8a7fe6c PM |
444 | |
445 | return 0; | |
446 | ||
a9006892 EL |
447 | out_sysctl: |
448 | if (net_eq(net, &init_net)) | |
449 | nf_ct_extend_unregister(&helper_extend); | |
b8a7fe6c | 450 | err1: |
d862a662 | 451 | nf_ct_free_hashtable(nf_ct_helper_hash, nf_ct_helper_hsize); |
b8a7fe6c | 452 | return err; |
ceceae1b YK |
453 | } |
454 | ||
a9006892 | 455 | void nf_conntrack_helper_fini(struct net *net) |
ceceae1b | 456 | { |
a9006892 EL |
457 | nf_conntrack_helper_fini_sysctl(net); |
458 | if (net_eq(net, &init_net)) { | |
459 | nf_ct_extend_unregister(&helper_extend); | |
460 | nf_ct_free_hashtable(nf_ct_helper_hash, nf_ct_helper_hsize); | |
461 | } | |
ceceae1b | 462 | } |