blob: 345acfb1720b14f00aae0e5937ab07bfb90e9482 [file] [log] [blame]
Patrick McHardy96518512013-10-14 11:00:02 +02001/*
2 * Copyright (c) 2008 Patrick McHardy <kaber@trash.net>
3 *
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License version 2 as
6 * published by the Free Software Foundation.
7 *
8 * Development of this code funded by Astaro AG (http://www.astaro.com/)
9 */
10
11#include <linux/module.h>
12#include <linux/init.h>
13#include <linux/list.h>
14#include <linux/rculist.h>
15#include <linux/skbuff.h>
16#include <linux/netlink.h>
17#include <linux/netfilter.h>
18#include <linux/netfilter/nfnetlink.h>
19#include <linux/netfilter/nf_tables.h>
20#include <net/netfilter/nf_tables_core.h>
21#include <net/netfilter/nf_tables.h>
Pablo Neira Ayusob5bc89b2013-10-10 16:49:19 +020022#include <net/netfilter/nf_log.h>
Patrick McHardy96518512013-10-14 11:00:02 +020023
Patrick McHardycb7dbfd2013-10-10 23:35:40 +020024static void nft_cmp_fast_eval(const struct nft_expr *expr,
25 struct nft_data data[NFT_REG_MAX + 1])
26{
27 const struct nft_cmp_fast_expr *priv = nft_expr_priv(expr);
Patrick McHardyb855d412014-04-12 13:17:57 +020028 u32 mask = nft_cmp_fast_mask(priv->len);
Patrick McHardycb7dbfd2013-10-10 23:35:40 +020029
Patrick McHardycb7dbfd2013-10-10 23:35:40 +020030 if ((data[priv->sreg].data[0] & mask) == priv->data)
31 return;
32 data[NFT_REG_VERDICT].verdict = NFT_BREAK;
33}
34
Patrick McHardyc29b72e2013-10-10 11:06:41 +020035static bool nft_payload_fast_eval(const struct nft_expr *expr,
36 struct nft_data data[NFT_REG_MAX + 1],
37 const struct nft_pktinfo *pkt)
38{
39 const struct nft_payload *priv = nft_expr_priv(expr);
40 const struct sk_buff *skb = pkt->skb;
41 struct nft_data *dest = &data[priv->dreg];
42 unsigned char *ptr;
43
44 if (priv->base == NFT_PAYLOAD_NETWORK_HEADER)
45 ptr = skb_network_header(skb);
46 else
Pablo Neira Ayusoc54032e2013-10-11 10:00:22 +020047 ptr = skb_network_header(skb) + pkt->xt.thoff;
Patrick McHardyc29b72e2013-10-10 11:06:41 +020048
49 ptr += priv->offset;
50
51 if (unlikely(ptr + priv->len >= skb_tail_pointer(skb)))
52 return false;
53
54 if (priv->len == 2)
55 *(u16 *)dest->data = *(u16 *)ptr;
56 else if (priv->len == 4)
57 *(u32 *)dest->data = *(u32 *)ptr;
58 else
59 *(u8 *)dest->data = *(u8 *)ptr;
60 return true;
61}
62
Pablo Neira Ayuso0ca743a2013-10-14 00:06:06 +020063struct nft_jumpstack {
64 const struct nft_chain *chain;
65 const struct nft_rule *rule;
Pablo Neira Ayusob5bc89b2013-10-10 16:49:19 +020066 int rulenum;
Pablo Neira Ayuso0ca743a2013-10-14 00:06:06 +020067};
68
Pablo Neira Ayusob5bc89b2013-10-10 16:49:19 +020069enum nft_trace {
70 NFT_TRACE_RULE,
71 NFT_TRACE_RETURN,
72 NFT_TRACE_POLICY,
73};
74
75static const char *const comments[] = {
76 [NFT_TRACE_RULE] = "rule",
77 [NFT_TRACE_RETURN] = "return",
78 [NFT_TRACE_POLICY] = "policy",
79};
80
81static struct nf_loginfo trace_loginfo = {
82 .type = NF_LOG_TYPE_LOG,
83 .u = {
84 .log = {
85 .level = 4,
86 .logflags = NF_LOG_MASK,
87 },
88 },
89};
90
Patrick McHardy6d8c00d2014-01-09 18:42:42 +000091static void nft_trace_packet(const struct nft_pktinfo *pkt,
92 const struct nft_chain *chain,
93 int rulenum, enum nft_trace type)
Pablo Neira Ayusob5bc89b2013-10-10 16:49:19 +020094{
95 struct net *net = dev_net(pkt->in ? pkt->in : pkt->out);
96
Patrick McHardyc9484872014-01-03 12:16:14 +000097 nf_log_packet(net, pkt->xt.family, pkt->ops->hooknum, pkt->skb, pkt->in,
Pablo Neira Ayusob5bc89b2013-10-10 16:49:19 +020098 pkt->out, &trace_loginfo, "TRACE: %s:%s:%s:%u ",
99 chain->table->name, chain->name, comments[type],
100 rulenum);
101}
102
Pablo Neira Ayuso0ca743a2013-10-14 00:06:06 +0200103unsigned int
Patrick McHardy3876d222014-01-09 18:42:43 +0000104nft_do_chain(struct nft_pktinfo *pkt, const struct nf_hook_ops *ops)
Patrick McHardy96518512013-10-14 11:00:02 +0200105{
Pablo Neira Ayuso5467a512014-05-10 18:33:11 +0200106 const struct nft_chain *chain = ops->priv, *basechain = chain;
Patrick McHardy96518512013-10-14 11:00:02 +0200107 const struct nft_rule *rule;
108 const struct nft_expr *expr, *last;
109 struct nft_data data[NFT_REG_MAX + 1];
Patrick McHardy96518512013-10-14 11:00:02 +0200110 unsigned int stackptr = 0;
Pablo Neira Ayuso0ca743a2013-10-14 00:06:06 +0200111 struct nft_jumpstack jumpstack[NFT_JUMP_STACK_SIZE];
Pablo Neira Ayuso5467a512014-05-10 18:33:11 +0200112 struct nft_stats __percpu *stats;
Pablo Neira Ayusod088be82014-05-10 13:39:21 +0200113 int rulenum;
Pablo Neira Ayuso0628b122013-10-14 11:05:33 +0200114 /*
115 * Cache cursor to avoid problems in case that the cursor is updated
116 * while traversing the ruleset.
117 */
118 unsigned int gencursor = ACCESS_ONCE(chain->net->nft.gencursor);
Patrick McHardy96518512013-10-14 11:00:02 +0200119
120do_chain:
Pablo Neira Ayusod088be82014-05-10 13:39:21 +0200121 rulenum = 0;
Patrick McHardy96518512013-10-14 11:00:02 +0200122 rule = list_entry(&chain->rules, struct nft_rule, list);
123next_rule:
124 data[NFT_REG_VERDICT].verdict = NFT_CONTINUE;
125 list_for_each_entry_continue_rcu(rule, &chain->rules, list) {
Pablo Neira Ayuso0628b122013-10-14 11:05:33 +0200126
127 /* This rule is not active, skip. */
128 if (unlikely(rule->genmask & (1 << gencursor)))
129 continue;
130
Pablo Neira Ayusob5bc89b2013-10-10 16:49:19 +0200131 rulenum++;
132
Patrick McHardy96518512013-10-14 11:00:02 +0200133 nft_rule_for_each_expr(expr, last, rule) {
Patrick McHardycb7dbfd2013-10-10 23:35:40 +0200134 if (expr->ops == &nft_cmp_fast_ops)
135 nft_cmp_fast_eval(expr, data);
Patrick McHardyc29b72e2013-10-10 11:06:41 +0200136 else if (expr->ops != &nft_payload_fast_ops ||
Pablo Neira Ayuso0ca743a2013-10-14 00:06:06 +0200137 !nft_payload_fast_eval(expr, data, pkt))
138 expr->ops->eval(expr, data, pkt);
Patrick McHardycb7dbfd2013-10-10 23:35:40 +0200139
Patrick McHardy96518512013-10-14 11:00:02 +0200140 if (data[NFT_REG_VERDICT].verdict != NFT_CONTINUE)
141 break;
142 }
143
144 switch (data[NFT_REG_VERDICT].verdict) {
145 case NFT_BREAK:
146 data[NFT_REG_VERDICT].verdict = NFT_CONTINUE;
Pablo Neira Ayuso3b084e92014-05-15 17:18:26 +0200147 continue;
Patrick McHardy96518512013-10-14 11:00:02 +0200148 case NFT_CONTINUE:
Pablo Neira Ayuso3b084e92014-05-15 17:18:26 +0200149 if (unlikely(pkt->skb->nf_trace))
150 nft_trace_packet(pkt, chain, rulenum, NFT_TRACE_RULE);
Patrick McHardy96518512013-10-14 11:00:02 +0200151 continue;
152 }
153 break;
154 }
155
Eric Leblonde569bda2013-11-30 11:56:17 +0100156 switch (data[NFT_REG_VERDICT].verdict & NF_VERDICT_MASK) {
Patrick McHardy96518512013-10-14 11:00:02 +0200157 case NF_ACCEPT:
158 case NF_DROP:
159 case NF_QUEUE:
Pablo Neira Ayusob5bc89b2013-10-10 16:49:19 +0200160 if (unlikely(pkt->skb->nf_trace))
161 nft_trace_packet(pkt, chain, rulenum, NFT_TRACE_RULE);
162
Patrick McHardy96518512013-10-14 11:00:02 +0200163 return data[NFT_REG_VERDICT].verdict;
Eric Leblonde569bda2013-11-30 11:56:17 +0100164 }
165
166 switch (data[NFT_REG_VERDICT].verdict) {
Patrick McHardy96518512013-10-14 11:00:02 +0200167 case NFT_JUMP:
Pablo Neira Ayusob5bc89b2013-10-10 16:49:19 +0200168 if (unlikely(pkt->skb->nf_trace))
169 nft_trace_packet(pkt, chain, rulenum, NFT_TRACE_RULE);
170
Patrick McHardy96518512013-10-14 11:00:02 +0200171 BUG_ON(stackptr >= NFT_JUMP_STACK_SIZE);
172 jumpstack[stackptr].chain = chain;
173 jumpstack[stackptr].rule = rule;
Pablo Neira Ayusob5bc89b2013-10-10 16:49:19 +0200174 jumpstack[stackptr].rulenum = rulenum;
Patrick McHardy96518512013-10-14 11:00:02 +0200175 stackptr++;
Pablo Neira Ayuso7b9d5ef2014-05-10 18:42:57 +0200176 chain = data[NFT_REG_VERDICT].chain;
177 goto do_chain;
Patrick McHardy96518512013-10-14 11:00:02 +0200178 case NFT_GOTO:
Pablo Neira Ayuso7b9d5ef2014-05-10 18:42:57 +0200179 if (unlikely(pkt->skb->nf_trace))
180 nft_trace_packet(pkt, chain, rulenum, NFT_TRACE_RULE);
181
Patrick McHardy96518512013-10-14 11:00:02 +0200182 chain = data[NFT_REG_VERDICT].chain;
183 goto do_chain;
184 case NFT_RETURN:
Pablo Neira Ayusob5bc89b2013-10-10 16:49:19 +0200185 if (unlikely(pkt->skb->nf_trace))
186 nft_trace_packet(pkt, chain, rulenum, NFT_TRACE_RETURN);
Pablo Neira Ayuso7e9bc102014-05-11 17:14:49 +0200187 break;
Patrick McHardy96518512013-10-14 11:00:02 +0200188 case NFT_CONTINUE:
Pablo Neira Ayuso7e9bc102014-05-11 17:14:49 +0200189 if (unlikely(pkt->skb->nf_trace && !(chain->flags & NFT_BASE_CHAIN)))
190 nft_trace_packet(pkt, chain, ++rulenum, NFT_TRACE_RETURN);
Patrick McHardy96518512013-10-14 11:00:02 +0200191 break;
192 default:
193 WARN_ON(1);
194 }
195
196 if (stackptr > 0) {
197 stackptr--;
198 chain = jumpstack[stackptr].chain;
199 rule = jumpstack[stackptr].rule;
Pablo Neira Ayusob5bc89b2013-10-10 16:49:19 +0200200 rulenum = jumpstack[stackptr].rulenum;
Patrick McHardy96518512013-10-14 11:00:02 +0200201 goto next_rule;
202 }
203
Pablo Neira Ayusob5bc89b2013-10-10 16:49:19 +0200204 if (unlikely(pkt->skb->nf_trace))
Pablo Neira Ayusof7e7e392014-05-10 18:46:02 +0200205 nft_trace_packet(pkt, basechain, -1, NFT_TRACE_POLICY);
Pablo Neira Ayusob5bc89b2013-10-10 16:49:19 +0200206
Pablo Neira Ayuso5467a512014-05-10 18:33:11 +0200207 rcu_read_lock_bh();
208 stats = rcu_dereference(nft_base_chain(basechain)->stats);
209 __this_cpu_inc(stats->pkts);
210 __this_cpu_add(stats->bytes, pkt->skb->len);
211 rcu_read_unlock_bh();
212
213 return nft_base_chain(basechain)->policy;
Patrick McHardy96518512013-10-14 11:00:02 +0200214}
Patrick McHardy3876d222014-01-09 18:42:43 +0000215EXPORT_SYMBOL_GPL(nft_do_chain);
Patrick McHardy96518512013-10-14 11:00:02 +0200216
217int __init nf_tables_core_module_init(void)
218{
219 int err;
220
221 err = nft_immediate_module_init();
222 if (err < 0)
223 goto err1;
224
225 err = nft_cmp_module_init();
226 if (err < 0)
227 goto err2;
228
229 err = nft_lookup_module_init();
230 if (err < 0)
231 goto err3;
232
233 err = nft_bitwise_module_init();
234 if (err < 0)
235 goto err4;
236
237 err = nft_byteorder_module_init();
238 if (err < 0)
239 goto err5;
240
241 err = nft_payload_module_init();
242 if (err < 0)
243 goto err6;
244
245 return 0;
246
247err6:
248 nft_byteorder_module_exit();
249err5:
250 nft_bitwise_module_exit();
251err4:
252 nft_lookup_module_exit();
253err3:
254 nft_cmp_module_exit();
255err2:
256 nft_immediate_module_exit();
257err1:
258 return err;
259}
260
261void nf_tables_core_module_exit(void)
262{
263 nft_payload_module_exit();
264 nft_byteorder_module_exit();
265 nft_bitwise_module_exit();
266 nft_lookup_module_exit();
267 nft_cmp_module_exit();
268 nft_immediate_module_exit();
269}