blob: 4429008fe99dbaf692dccb22b6c3ff3c4eb7093b [file] [log] [blame]
Patrick McHardy96518512013-10-14 11:00:02 +02001/*
2 * Copyright (c) 2008 Patrick McHardy <kaber@trash.net>
3 *
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License version 2 as
6 * published by the Free Software Foundation.
7 *
8 * Development of this code funded by Astaro AG (http://www.astaro.com/)
9 */
10
Joe Perchesa81b2ce2015-03-23 11:50:10 -070011#include <linux/kernel.h>
Patrick McHardy96518512013-10-14 11:00:02 +020012#include <linux/module.h>
13#include <linux/init.h>
14#include <linux/list.h>
15#include <linux/rculist.h>
16#include <linux/skbuff.h>
17#include <linux/netlink.h>
18#include <linux/netfilter.h>
19#include <linux/netfilter/nfnetlink.h>
20#include <linux/netfilter/nf_tables.h>
21#include <net/netfilter/nf_tables_core.h>
22#include <net/netfilter/nf_tables.h>
Pablo Neira Ayusob5bc89b2013-10-10 16:49:19 +020023#include <net/netfilter/nf_log.h>
Patrick McHardy96518512013-10-14 11:00:02 +020024
Patrick McHardy01ef16c2015-03-03 20:10:04 +000025enum nft_trace {
26 NFT_TRACE_RULE,
27 NFT_TRACE_RETURN,
28 NFT_TRACE_POLICY,
29};
30
31static const char *const comments[] = {
32 [NFT_TRACE_RULE] = "rule",
33 [NFT_TRACE_RETURN] = "return",
34 [NFT_TRACE_POLICY] = "policy",
35};
36
37static struct nf_loginfo trace_loginfo = {
38 .type = NF_LOG_TYPE_LOG,
39 .u = {
40 .log = {
Joe Perchesa81b2ce2015-03-23 11:50:10 -070041 .level = LOGLEVEL_WARNING,
Patrick McHardy01ef16c2015-03-03 20:10:04 +000042 .logflags = NF_LOG_MASK,
43 },
44 },
45};
46
47static void __nft_trace_packet(const struct nft_pktinfo *pkt,
48 const struct nft_chain *chain,
49 int rulenum, enum nft_trace type)
50{
51 struct net *net = dev_net(pkt->in ? pkt->in : pkt->out);
52
Pablo Neira Ayusofce15282015-03-24 10:55:38 +010053 nf_log_trace(net, pkt->xt.family, pkt->ops->hooknum, pkt->skb, pkt->in,
54 pkt->out, &trace_loginfo, "TRACE: %s:%s:%s:%u ",
55 chain->table->name, chain->name, comments[type],
56 rulenum);
Patrick McHardy01ef16c2015-03-03 20:10:04 +000057}
58
59static inline void nft_trace_packet(const struct nft_pktinfo *pkt,
60 const struct nft_chain *chain,
61 int rulenum, enum nft_trace type)
62{
63 if (unlikely(pkt->skb->nf_trace))
64 __nft_trace_packet(pkt, chain, rulenum, type);
65}
66
Patrick McHardycb7dbfd2013-10-10 23:35:40 +020067static void nft_cmp_fast_eval(const struct nft_expr *expr,
68 struct nft_data data[NFT_REG_MAX + 1])
69{
70 const struct nft_cmp_fast_expr *priv = nft_expr_priv(expr);
Patrick McHardyb855d412014-04-12 13:17:57 +020071 u32 mask = nft_cmp_fast_mask(priv->len);
Patrick McHardycb7dbfd2013-10-10 23:35:40 +020072
Patrick McHardycb7dbfd2013-10-10 23:35:40 +020073 if ((data[priv->sreg].data[0] & mask) == priv->data)
74 return;
75 data[NFT_REG_VERDICT].verdict = NFT_BREAK;
76}
77
Patrick McHardyc29b72e2013-10-10 11:06:41 +020078static bool nft_payload_fast_eval(const struct nft_expr *expr,
79 struct nft_data data[NFT_REG_MAX + 1],
80 const struct nft_pktinfo *pkt)
81{
82 const struct nft_payload *priv = nft_expr_priv(expr);
83 const struct sk_buff *skb = pkt->skb;
84 struct nft_data *dest = &data[priv->dreg];
85 unsigned char *ptr;
86
87 if (priv->base == NFT_PAYLOAD_NETWORK_HEADER)
88 ptr = skb_network_header(skb);
89 else
Pablo Neira Ayusoc54032e2013-10-11 10:00:22 +020090 ptr = skb_network_header(skb) + pkt->xt.thoff;
Patrick McHardyc29b72e2013-10-10 11:06:41 +020091
92 ptr += priv->offset;
93
94 if (unlikely(ptr + priv->len >= skb_tail_pointer(skb)))
95 return false;
96
97 if (priv->len == 2)
98 *(u16 *)dest->data = *(u16 *)ptr;
99 else if (priv->len == 4)
100 *(u32 *)dest->data = *(u32 *)ptr;
101 else
102 *(u8 *)dest->data = *(u8 *)ptr;
103 return true;
104}
105
Pablo Neira Ayuso0ca743a2013-10-14 00:06:06 +0200106struct nft_jumpstack {
107 const struct nft_chain *chain;
108 const struct nft_rule *rule;
Pablo Neira Ayusob5bc89b2013-10-10 16:49:19 +0200109 int rulenum;
Pablo Neira Ayuso0ca743a2013-10-14 00:06:06 +0200110};
111
Pablo Neira Ayuso0ca743a2013-10-14 00:06:06 +0200112unsigned int
Patrick McHardy3876d222014-01-09 18:42:43 +0000113nft_do_chain(struct nft_pktinfo *pkt, const struct nf_hook_ops *ops)
Patrick McHardy96518512013-10-14 11:00:02 +0200114{
Pablo Neira Ayuso5467a512014-05-10 18:33:11 +0200115 const struct nft_chain *chain = ops->priv, *basechain = chain;
Patrick McHardy5ebb3352015-03-21 15:19:15 +0000116 const struct net *net = read_pnet(&nft_base_chain(basechain)->pnet);
Patrick McHardy96518512013-10-14 11:00:02 +0200117 const struct nft_rule *rule;
118 const struct nft_expr *expr, *last;
119 struct nft_data data[NFT_REG_MAX + 1];
Patrick McHardy96518512013-10-14 11:00:02 +0200120 unsigned int stackptr = 0;
Pablo Neira Ayuso0ca743a2013-10-14 00:06:06 +0200121 struct nft_jumpstack jumpstack[NFT_JUMP_STACK_SIZE];
Eric Dumazetce355e22014-07-09 15:14:06 +0200122 struct nft_stats *stats;
Pablo Neira Ayusod088be82014-05-10 13:39:21 +0200123 int rulenum;
Pablo Neira Ayuso0628b122013-10-14 11:05:33 +0200124 /*
125 * Cache cursor to avoid problems in case that the cursor is updated
126 * while traversing the ruleset.
127 */
Patrick McHardy5ebb3352015-03-21 15:19:15 +0000128 unsigned int gencursor = ACCESS_ONCE(net->nft.gencursor);
Patrick McHardy96518512013-10-14 11:00:02 +0200129
130do_chain:
Pablo Neira Ayusod088be82014-05-10 13:39:21 +0200131 rulenum = 0;
Patrick McHardy96518512013-10-14 11:00:02 +0200132 rule = list_entry(&chain->rules, struct nft_rule, list);
133next_rule:
134 data[NFT_REG_VERDICT].verdict = NFT_CONTINUE;
135 list_for_each_entry_continue_rcu(rule, &chain->rules, list) {
Pablo Neira Ayuso0628b122013-10-14 11:05:33 +0200136
137 /* This rule is not active, skip. */
138 if (unlikely(rule->genmask & (1 << gencursor)))
139 continue;
140
Pablo Neira Ayusob5bc89b2013-10-10 16:49:19 +0200141 rulenum++;
142
Patrick McHardy96518512013-10-14 11:00:02 +0200143 nft_rule_for_each_expr(expr, last, rule) {
Patrick McHardycb7dbfd2013-10-10 23:35:40 +0200144 if (expr->ops == &nft_cmp_fast_ops)
145 nft_cmp_fast_eval(expr, data);
Patrick McHardyc29b72e2013-10-10 11:06:41 +0200146 else if (expr->ops != &nft_payload_fast_ops ||
Pablo Neira Ayuso0ca743a2013-10-14 00:06:06 +0200147 !nft_payload_fast_eval(expr, data, pkt))
148 expr->ops->eval(expr, data, pkt);
Patrick McHardycb7dbfd2013-10-10 23:35:40 +0200149
Patrick McHardy96518512013-10-14 11:00:02 +0200150 if (data[NFT_REG_VERDICT].verdict != NFT_CONTINUE)
151 break;
152 }
153
154 switch (data[NFT_REG_VERDICT].verdict) {
155 case NFT_BREAK:
156 data[NFT_REG_VERDICT].verdict = NFT_CONTINUE;
Pablo Neira Ayuso3b084e92014-05-15 17:18:26 +0200157 continue;
Patrick McHardy96518512013-10-14 11:00:02 +0200158 case NFT_CONTINUE:
Patrick McHardy01ef16c2015-03-03 20:10:04 +0000159 nft_trace_packet(pkt, chain, rulenum, NFT_TRACE_RULE);
Patrick McHardy96518512013-10-14 11:00:02 +0200160 continue;
161 }
162 break;
163 }
164
Eric Leblonde569bda2013-11-30 11:56:17 +0100165 switch (data[NFT_REG_VERDICT].verdict & NF_VERDICT_MASK) {
Patrick McHardy96518512013-10-14 11:00:02 +0200166 case NF_ACCEPT:
167 case NF_DROP:
168 case NF_QUEUE:
Patrick McHardy01ef16c2015-03-03 20:10:04 +0000169 nft_trace_packet(pkt, chain, rulenum, NFT_TRACE_RULE);
Patrick McHardy96518512013-10-14 11:00:02 +0200170 return data[NFT_REG_VERDICT].verdict;
Eric Leblonde569bda2013-11-30 11:56:17 +0100171 }
172
173 switch (data[NFT_REG_VERDICT].verdict) {
Patrick McHardy96518512013-10-14 11:00:02 +0200174 case NFT_JUMP:
175 BUG_ON(stackptr >= NFT_JUMP_STACK_SIZE);
176 jumpstack[stackptr].chain = chain;
177 jumpstack[stackptr].rule = rule;
Pablo Neira Ayusob5bc89b2013-10-10 16:49:19 +0200178 jumpstack[stackptr].rulenum = rulenum;
Patrick McHardy96518512013-10-14 11:00:02 +0200179 stackptr++;
Patrick McHardy354bf5a2015-03-03 20:10:05 +0000180 /* fall through */
Patrick McHardy96518512013-10-14 11:00:02 +0200181 case NFT_GOTO:
Patrick McHardy01ef16c2015-03-03 20:10:04 +0000182 nft_trace_packet(pkt, chain, rulenum, NFT_TRACE_RULE);
Pablo Neira Ayuso7b9d5ef2014-05-10 18:42:57 +0200183
Patrick McHardy96518512013-10-14 11:00:02 +0200184 chain = data[NFT_REG_VERDICT].chain;
185 goto do_chain;
Patrick McHardy354bf5a2015-03-03 20:10:05 +0000186 case NFT_CONTINUE:
187 rulenum++;
188 /* fall through */
Patrick McHardy96518512013-10-14 11:00:02 +0200189 case NFT_RETURN:
Patrick McHardy01ef16c2015-03-03 20:10:04 +0000190 nft_trace_packet(pkt, chain, rulenum, NFT_TRACE_RETURN);
Pablo Neira Ayuso7e9bc102014-05-11 17:14:49 +0200191 break;
Patrick McHardy96518512013-10-14 11:00:02 +0200192 default:
193 WARN_ON(1);
194 }
195
196 if (stackptr > 0) {
197 stackptr--;
198 chain = jumpstack[stackptr].chain;
199 rule = jumpstack[stackptr].rule;
Pablo Neira Ayusob5bc89b2013-10-10 16:49:19 +0200200 rulenum = jumpstack[stackptr].rulenum;
Patrick McHardy96518512013-10-14 11:00:02 +0200201 goto next_rule;
202 }
203
Patrick McHardy01ef16c2015-03-03 20:10:04 +0000204 nft_trace_packet(pkt, basechain, -1, NFT_TRACE_POLICY);
Pablo Neira Ayusob5bc89b2013-10-10 16:49:19 +0200205
Pablo Neira Ayuso5467a512014-05-10 18:33:11 +0200206 rcu_read_lock_bh();
Eric Dumazetce355e22014-07-09 15:14:06 +0200207 stats = this_cpu_ptr(rcu_dereference(nft_base_chain(basechain)->stats));
208 u64_stats_update_begin(&stats->syncp);
209 stats->pkts++;
210 stats->bytes += pkt->skb->len;
211 u64_stats_update_end(&stats->syncp);
Pablo Neira Ayuso5467a512014-05-10 18:33:11 +0200212 rcu_read_unlock_bh();
213
214 return nft_base_chain(basechain)->policy;
Patrick McHardy96518512013-10-14 11:00:02 +0200215}
Patrick McHardy3876d222014-01-09 18:42:43 +0000216EXPORT_SYMBOL_GPL(nft_do_chain);
Patrick McHardy96518512013-10-14 11:00:02 +0200217
218int __init nf_tables_core_module_init(void)
219{
220 int err;
221
222 err = nft_immediate_module_init();
223 if (err < 0)
224 goto err1;
225
226 err = nft_cmp_module_init();
227 if (err < 0)
228 goto err2;
229
230 err = nft_lookup_module_init();
231 if (err < 0)
232 goto err3;
233
234 err = nft_bitwise_module_init();
235 if (err < 0)
236 goto err4;
237
238 err = nft_byteorder_module_init();
239 if (err < 0)
240 goto err5;
241
242 err = nft_payload_module_init();
243 if (err < 0)
244 goto err6;
245
246 return 0;
247
248err6:
249 nft_byteorder_module_exit();
250err5:
251 nft_bitwise_module_exit();
252err4:
253 nft_lookup_module_exit();
254err3:
255 nft_cmp_module_exit();
256err2:
257 nft_immediate_module_exit();
258err1:
259 return err;
260}
261
262void nf_tables_core_module_exit(void)
263{
264 nft_payload_module_exit();
265 nft_byteorder_module_exit();
266 nft_bitwise_module_exit();
267 nft_lookup_module_exit();
268 nft_cmp_module_exit();
269 nft_immediate_module_exit();
270}