Commit | Line | Data |
---|---|---|
96518518 PM |
1 | /* |
2 | * Copyright (c) 2008 Patrick McHardy <kaber@trash.net> | |
3 | * | |
4 | * This program is free software; you can redistribute it and/or modify | |
5 | * it under the terms of the GNU General Public License version 2 as | |
6 | * published by the Free Software Foundation. | |
7 | * | |
8 | * Development of this code funded by Astaro AG (http://www.astaro.com/) | |
9 | */ | |
10 | ||
a81b2ce8 | 11 | #include <linux/kernel.h> |
96518518 PM |
12 | #include <linux/module.h> |
13 | #include <linux/init.h> | |
14 | #include <linux/list.h> | |
15 | #include <linux/rculist.h> | |
16 | #include <linux/skbuff.h> | |
17 | #include <linux/netlink.h> | |
18 | #include <linux/netfilter.h> | |
19 | #include <linux/netfilter/nfnetlink.h> | |
20 | #include <linux/netfilter/nf_tables.h> | |
21 | #include <net/netfilter/nf_tables_core.h> | |
22 | #include <net/netfilter/nf_tables.h> | |
b5bc89bf | 23 | #include <net/netfilter/nf_log.h> |
96518518 | 24 | |
01ef16c2 PM |
25 | enum nft_trace { |
26 | NFT_TRACE_RULE, | |
27 | NFT_TRACE_RETURN, | |
28 | NFT_TRACE_POLICY, | |
29 | }; | |
30 | ||
31 | static const char *const comments[] = { | |
32 | [NFT_TRACE_RULE] = "rule", | |
33 | [NFT_TRACE_RETURN] = "return", | |
34 | [NFT_TRACE_POLICY] = "policy", | |
35 | }; | |
36 | ||
37 | static struct nf_loginfo trace_loginfo = { | |
38 | .type = NF_LOG_TYPE_LOG, | |
39 | .u = { | |
40 | .log = { | |
a81b2ce8 | 41 | .level = LOGLEVEL_WARNING, |
01ef16c2 PM |
42 | .logflags = NF_LOG_MASK, |
43 | }, | |
44 | }, | |
45 | }; | |
46 | ||
47 | static void __nft_trace_packet(const struct nft_pktinfo *pkt, | |
48 | const struct nft_chain *chain, | |
49 | int rulenum, enum nft_trace type) | |
50 | { | |
51 | struct net *net = dev_net(pkt->in ? pkt->in : pkt->out); | |
52 | ||
fce1528e PNA |
53 | nf_log_trace(net, pkt->xt.family, pkt->ops->hooknum, pkt->skb, pkt->in, |
54 | pkt->out, &trace_loginfo, "TRACE: %s:%s:%s:%u ", | |
55 | chain->table->name, chain->name, comments[type], | |
56 | rulenum); | |
01ef16c2 PM |
57 | } |
58 | ||
59 | static inline void nft_trace_packet(const struct nft_pktinfo *pkt, | |
60 | const struct nft_chain *chain, | |
61 | int rulenum, enum nft_trace type) | |
62 | { | |
63 | if (unlikely(pkt->skb->nf_trace)) | |
64 | __nft_trace_packet(pkt, chain, rulenum, type); | |
65 | } | |
66 | ||
cb7dbfd0 | 67 | static void nft_cmp_fast_eval(const struct nft_expr *expr, |
a55e22e9 | 68 | struct nft_regs *regs) |
cb7dbfd0 PM |
69 | { |
70 | const struct nft_cmp_fast_expr *priv = nft_expr_priv(expr); | |
b855d416 | 71 | u32 mask = nft_cmp_fast_mask(priv->len); |
cb7dbfd0 | 72 | |
49499c3e | 73 | if ((regs->data[priv->sreg] & mask) == priv->data) |
cb7dbfd0 | 74 | return; |
a55e22e9 | 75 | regs->verdict.code = NFT_BREAK; |
cb7dbfd0 PM |
76 | } |
77 | ||
c29b72e0 | 78 | static bool nft_payload_fast_eval(const struct nft_expr *expr, |
a55e22e9 | 79 | struct nft_regs *regs, |
c29b72e0 PM |
80 | const struct nft_pktinfo *pkt) |
81 | { | |
82 | const struct nft_payload *priv = nft_expr_priv(expr); | |
83 | const struct sk_buff *skb = pkt->skb; | |
49499c3e | 84 | u32 *dest = ®s->data[priv->dreg]; |
c29b72e0 PM |
85 | unsigned char *ptr; |
86 | ||
87 | if (priv->base == NFT_PAYLOAD_NETWORK_HEADER) | |
88 | ptr = skb_network_header(skb); | |
89 | else | |
c54032e0 | 90 | ptr = skb_network_header(skb) + pkt->xt.thoff; |
c29b72e0 PM |
91 | |
92 | ptr += priv->offset; | |
93 | ||
94 | if (unlikely(ptr + priv->len >= skb_tail_pointer(skb))) | |
95 | return false; | |
96 | ||
49499c3e | 97 | *dest = 0; |
c29b72e0 | 98 | if (priv->len == 2) |
fad136ea | 99 | *(u16 *)dest = *(u16 *)ptr; |
c29b72e0 | 100 | else if (priv->len == 4) |
fad136ea | 101 | *(u32 *)dest = *(u32 *)ptr; |
c29b72e0 | 102 | else |
fad136ea | 103 | *(u8 *)dest = *(u8 *)ptr; |
c29b72e0 PM |
104 | return true; |
105 | } | |
106 | ||
0ca743a5 PNA |
107 | struct nft_jumpstack { |
108 | const struct nft_chain *chain; | |
109 | const struct nft_rule *rule; | |
b5bc89bf | 110 | int rulenum; |
0ca743a5 PNA |
111 | }; |
112 | ||
0ca743a5 | 113 | unsigned int |
3876d22d | 114 | nft_do_chain(struct nft_pktinfo *pkt, const struct nf_hook_ops *ops) |
96518518 | 115 | { |
5467a512 | 116 | const struct nft_chain *chain = ops->priv, *basechain = chain; |
fdab6a4c EB |
117 | const struct net *chain_net = read_pnet(&nft_base_chain(basechain)->pnet); |
118 | const struct net *net = dev_net(pkt->in ? pkt->in : pkt->out); | |
96518518 PM |
119 | const struct nft_rule *rule; |
120 | const struct nft_expr *expr, *last; | |
a55e22e9 | 121 | struct nft_regs regs; |
96518518 | 122 | unsigned int stackptr = 0; |
0ca743a5 | 123 | struct nft_jumpstack jumpstack[NFT_JUMP_STACK_SIZE]; |
ce355e20 | 124 | struct nft_stats *stats; |
d088be80 | 125 | int rulenum; |
ea4bd995 | 126 | unsigned int gencursor = nft_genmask_cur(net); |
96518518 | 127 | |
fdab6a4c EB |
128 | /* Ignore chains that are not for the current network namespace */ |
129 | if (!net_eq(net, chain_net)) | |
130 | return NF_ACCEPT; | |
131 | ||
96518518 | 132 | do_chain: |
d088be80 | 133 | rulenum = 0; |
96518518 PM |
134 | rule = list_entry(&chain->rules, struct nft_rule, list); |
135 | next_rule: | |
a55e22e9 | 136 | regs.verdict.code = NFT_CONTINUE; |
96518518 | 137 | list_for_each_entry_continue_rcu(rule, &chain->rules, list) { |
0628b123 PNA |
138 | |
139 | /* This rule is not active, skip. */ | |
140 | if (unlikely(rule->genmask & (1 << gencursor))) | |
141 | continue; | |
142 | ||
b5bc89bf PNA |
143 | rulenum++; |
144 | ||
96518518 | 145 | nft_rule_for_each_expr(expr, last, rule) { |
cb7dbfd0 | 146 | if (expr->ops == &nft_cmp_fast_ops) |
a55e22e9 | 147 | nft_cmp_fast_eval(expr, ®s); |
c29b72e0 | 148 | else if (expr->ops != &nft_payload_fast_ops || |
a55e22e9 PM |
149 | !nft_payload_fast_eval(expr, ®s, pkt)) |
150 | expr->ops->eval(expr, ®s, pkt); | |
cb7dbfd0 | 151 | |
a55e22e9 | 152 | if (regs.verdict.code != NFT_CONTINUE) |
96518518 PM |
153 | break; |
154 | } | |
155 | ||
a55e22e9 | 156 | switch (regs.verdict.code) { |
96518518 | 157 | case NFT_BREAK: |
a55e22e9 | 158 | regs.verdict.code = NFT_CONTINUE; |
3b084e99 | 159 | continue; |
96518518 | 160 | case NFT_CONTINUE: |
01ef16c2 | 161 | nft_trace_packet(pkt, chain, rulenum, NFT_TRACE_RULE); |
96518518 PM |
162 | continue; |
163 | } | |
164 | break; | |
165 | } | |
166 | ||
a55e22e9 | 167 | switch (regs.verdict.code & NF_VERDICT_MASK) { |
96518518 PM |
168 | case NF_ACCEPT: |
169 | case NF_DROP: | |
170 | case NF_QUEUE: | |
01ef16c2 | 171 | nft_trace_packet(pkt, chain, rulenum, NFT_TRACE_RULE); |
a55e22e9 | 172 | return regs.verdict.code; |
e569bdab EL |
173 | } |
174 | ||
a55e22e9 | 175 | switch (regs.verdict.code) { |
96518518 PM |
176 | case NFT_JUMP: |
177 | BUG_ON(stackptr >= NFT_JUMP_STACK_SIZE); | |
178 | jumpstack[stackptr].chain = chain; | |
179 | jumpstack[stackptr].rule = rule; | |
b5bc89bf | 180 | jumpstack[stackptr].rulenum = rulenum; |
96518518 | 181 | stackptr++; |
354bf5a0 | 182 | /* fall through */ |
96518518 | 183 | case NFT_GOTO: |
01ef16c2 | 184 | nft_trace_packet(pkt, chain, rulenum, NFT_TRACE_RULE); |
7b9d5ef9 | 185 | |
a55e22e9 | 186 | chain = regs.verdict.chain; |
96518518 | 187 | goto do_chain; |
354bf5a0 PM |
188 | case NFT_CONTINUE: |
189 | rulenum++; | |
190 | /* fall through */ | |
96518518 | 191 | case NFT_RETURN: |
01ef16c2 | 192 | nft_trace_packet(pkt, chain, rulenum, NFT_TRACE_RETURN); |
7e9bc10d | 193 | break; |
96518518 PM |
194 | default: |
195 | WARN_ON(1); | |
196 | } | |
197 | ||
198 | if (stackptr > 0) { | |
199 | stackptr--; | |
200 | chain = jumpstack[stackptr].chain; | |
201 | rule = jumpstack[stackptr].rule; | |
b5bc89bf | 202 | rulenum = jumpstack[stackptr].rulenum; |
96518518 PM |
203 | goto next_rule; |
204 | } | |
205 | ||
01ef16c2 | 206 | nft_trace_packet(pkt, basechain, -1, NFT_TRACE_POLICY); |
5467a512 PNA |
207 | |
208 | rcu_read_lock_bh(); | |
ce355e20 ED |
209 | stats = this_cpu_ptr(rcu_dereference(nft_base_chain(basechain)->stats)); |
210 | u64_stats_update_begin(&stats->syncp); | |
211 | stats->pkts++; | |
212 | stats->bytes += pkt->skb->len; | |
213 | u64_stats_update_end(&stats->syncp); | |
5467a512 | 214 | rcu_read_unlock_bh(); |
b5bc89bf | 215 | |
5467a512 | 216 | return nft_base_chain(basechain)->policy; |
96518518 | 217 | } |
3876d22d | 218 | EXPORT_SYMBOL_GPL(nft_do_chain); |
96518518 PM |
219 | |
220 | int __init nf_tables_core_module_init(void) | |
221 | { | |
222 | int err; | |
223 | ||
224 | err = nft_immediate_module_init(); | |
225 | if (err < 0) | |
226 | goto err1; | |
227 | ||
228 | err = nft_cmp_module_init(); | |
229 | if (err < 0) | |
230 | goto err2; | |
231 | ||
232 | err = nft_lookup_module_init(); | |
233 | if (err < 0) | |
234 | goto err3; | |
235 | ||
236 | err = nft_bitwise_module_init(); | |
237 | if (err < 0) | |
238 | goto err4; | |
239 | ||
240 | err = nft_byteorder_module_init(); | |
241 | if (err < 0) | |
242 | goto err5; | |
243 | ||
244 | err = nft_payload_module_init(); | |
245 | if (err < 0) | |
246 | goto err6; | |
247 | ||
22fe54d5 PM |
248 | err = nft_dynset_module_init(); |
249 | if (err < 0) | |
250 | goto err7; | |
251 | ||
96518518 PM |
252 | return 0; |
253 | ||
22fe54d5 PM |
254 | err7: |
255 | nft_payload_module_exit(); | |
96518518 PM |
256 | err6: |
257 | nft_byteorder_module_exit(); | |
258 | err5: | |
259 | nft_bitwise_module_exit(); | |
260 | err4: | |
261 | nft_lookup_module_exit(); | |
262 | err3: | |
263 | nft_cmp_module_exit(); | |
264 | err2: | |
265 | nft_immediate_module_exit(); | |
266 | err1: | |
267 | return err; | |
268 | } | |
269 | ||
270 | void nf_tables_core_module_exit(void) | |
271 | { | |
22fe54d5 | 272 | nft_dynset_module_exit(); |
96518518 PM |
273 | nft_payload_module_exit(); |
274 | nft_byteorder_module_exit(); | |
275 | nft_bitwise_module_exit(); | |
276 | nft_lookup_module_exit(); | |
277 | nft_cmp_module_exit(); | |
278 | nft_immediate_module_exit(); | |
279 | } |