nft_ct.c 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539
  1. /*
  2. * Copyright (c) 2008-2009 Patrick McHardy <kaber@trash.net>
  3. *
  4. * This program is free software; you can redistribute it and/or modify
  5. * it under the terms of the GNU General Public License version 2 as
  6. * published by the Free Software Foundation.
  7. *
  8. * Development of this code funded by Astaro AG (http://www.astaro.com/)
  9. */
  10. #include <linux/kernel.h>
  11. #include <linux/init.h>
  12. #include <linux/module.h>
  13. #include <linux/netlink.h>
  14. #include <linux/netfilter.h>
  15. #include <linux/netfilter/nf_tables.h>
  16. #include <net/netfilter/nf_tables.h>
  17. #include <net/netfilter/nf_conntrack.h>
  18. #include <net/netfilter/nf_conntrack_acct.h>
  19. #include <net/netfilter/nf_conntrack_tuple.h>
  20. #include <net/netfilter/nf_conntrack_helper.h>
  21. #include <net/netfilter/nf_conntrack_ecache.h>
  22. #include <net/netfilter/nf_conntrack_labels.h>
  23. struct nft_ct {
  24. enum nft_ct_keys key:8;
  25. enum ip_conntrack_dir dir:8;
  26. union {
  27. enum nft_registers dreg:8;
  28. enum nft_registers sreg:8;
  29. };
  30. };
  31. static u64 nft_ct_get_eval_counter(const struct nf_conn_counter *c,
  32. enum nft_ct_keys k,
  33. enum ip_conntrack_dir d)
  34. {
  35. if (d < IP_CT_DIR_MAX)
  36. return k == NFT_CT_BYTES ? atomic64_read(&c[d].bytes) :
  37. atomic64_read(&c[d].packets);
  38. return nft_ct_get_eval_counter(c, k, IP_CT_DIR_ORIGINAL) +
  39. nft_ct_get_eval_counter(c, k, IP_CT_DIR_REPLY);
  40. }
  41. static void nft_ct_get_eval(const struct nft_expr *expr,
  42. struct nft_regs *regs,
  43. const struct nft_pktinfo *pkt)
  44. {
  45. const struct nft_ct *priv = nft_expr_priv(expr);
  46. u32 *dest = &regs->data[priv->dreg];
  47. enum ip_conntrack_info ctinfo;
  48. const struct nf_conn *ct;
  49. const struct nf_conn_help *help;
  50. const struct nf_conntrack_tuple *tuple;
  51. const struct nf_conntrack_helper *helper;
  52. unsigned int state;
  53. ct = nf_ct_get(pkt->skb, &ctinfo);
  54. switch (priv->key) {
  55. case NFT_CT_STATE:
  56. if (ct == NULL)
  57. state = NF_CT_STATE_INVALID_BIT;
  58. else if (nf_ct_is_untracked(ct))
  59. state = NF_CT_STATE_UNTRACKED_BIT;
  60. else
  61. state = NF_CT_STATE_BIT(ctinfo);
  62. *dest = state;
  63. return;
  64. default:
  65. break;
  66. }
  67. if (ct == NULL)
  68. goto err;
  69. switch (priv->key) {
  70. case NFT_CT_DIRECTION:
  71. nft_reg_store8(dest, CTINFO2DIR(ctinfo));
  72. return;
  73. case NFT_CT_STATUS:
  74. *dest = ct->status;
  75. return;
  76. #ifdef CONFIG_NF_CONNTRACK_MARK
  77. case NFT_CT_MARK:
  78. *dest = ct->mark;
  79. return;
  80. #endif
  81. #ifdef CONFIG_NF_CONNTRACK_SECMARK
  82. case NFT_CT_SECMARK:
  83. *dest = ct->secmark;
  84. return;
  85. #endif
  86. case NFT_CT_EXPIRATION:
  87. *dest = jiffies_to_msecs(nf_ct_expires(ct));
  88. return;
  89. case NFT_CT_HELPER:
  90. if (ct->master == NULL)
  91. goto err;
  92. help = nfct_help(ct->master);
  93. if (help == NULL)
  94. goto err;
  95. helper = rcu_dereference(help->helper);
  96. if (helper == NULL)
  97. goto err;
  98. strncpy((char *)dest, helper->name, NF_CT_HELPER_NAME_LEN);
  99. return;
  100. #ifdef CONFIG_NF_CONNTRACK_LABELS
  101. case NFT_CT_LABELS: {
  102. struct nf_conn_labels *labels = nf_ct_labels_find(ct);
  103. if (labels)
  104. memcpy(dest, labels->bits, NF_CT_LABELS_MAX_SIZE);
  105. else
  106. memset(dest, 0, NF_CT_LABELS_MAX_SIZE);
  107. return;
  108. }
  109. #endif
  110. case NFT_CT_BYTES: /* fallthrough */
  111. case NFT_CT_PKTS: {
  112. const struct nf_conn_acct *acct = nf_conn_acct_find(ct);
  113. u64 count = 0;
  114. if (acct)
  115. count = nft_ct_get_eval_counter(acct->counter,
  116. priv->key, priv->dir);
  117. memcpy(dest, &count, sizeof(count));
  118. return;
  119. }
  120. case NFT_CT_L3PROTOCOL:
  121. nft_reg_store8(dest, nf_ct_l3num(ct));
  122. return;
  123. case NFT_CT_PROTOCOL:
  124. nft_reg_store8(dest, nf_ct_protonum(ct));
  125. return;
  126. default:
  127. break;
  128. }
  129. tuple = &ct->tuplehash[priv->dir].tuple;
  130. switch (priv->key) {
  131. case NFT_CT_SRC:
  132. memcpy(dest, tuple->src.u3.all,
  133. nf_ct_l3num(ct) == NFPROTO_IPV4 ? 4 : 16);
  134. return;
  135. case NFT_CT_DST:
  136. memcpy(dest, tuple->dst.u3.all,
  137. nf_ct_l3num(ct) == NFPROTO_IPV4 ? 4 : 16);
  138. return;
  139. case NFT_CT_PROTO_SRC:
  140. nft_reg_store16(dest, (__force u16)tuple->src.u.all);
  141. return;
  142. case NFT_CT_PROTO_DST:
  143. nft_reg_store16(dest, (__force u16)tuple->dst.u.all);
  144. return;
  145. default:
  146. break;
  147. }
  148. return;
  149. err:
  150. regs->verdict.code = NFT_BREAK;
  151. }
  152. static void nft_ct_set_eval(const struct nft_expr *expr,
  153. struct nft_regs *regs,
  154. const struct nft_pktinfo *pkt)
  155. {
  156. const struct nft_ct *priv = nft_expr_priv(expr);
  157. struct sk_buff *skb = pkt->skb;
  158. #ifdef CONFIG_NF_CONNTRACK_MARK
  159. u32 value = regs->data[priv->sreg];
  160. #endif
  161. enum ip_conntrack_info ctinfo;
  162. struct nf_conn *ct;
  163. ct = nf_ct_get(skb, &ctinfo);
  164. if (ct == NULL)
  165. return;
  166. switch (priv->key) {
  167. #ifdef CONFIG_NF_CONNTRACK_MARK
  168. case NFT_CT_MARK:
  169. if (ct->mark != value) {
  170. ct->mark = value;
  171. nf_conntrack_event_cache(IPCT_MARK, ct);
  172. }
  173. break;
  174. #endif
  175. #ifdef CONFIG_NF_CONNTRACK_LABELS
  176. case NFT_CT_LABELS:
  177. nf_connlabels_replace(ct,
  178. &regs->data[priv->sreg],
  179. &regs->data[priv->sreg],
  180. NF_CT_LABELS_MAX_SIZE / sizeof(u32));
  181. break;
  182. #endif
  183. default:
  184. break;
  185. }
  186. }
  187. static const struct nla_policy nft_ct_policy[NFTA_CT_MAX + 1] = {
  188. [NFTA_CT_DREG] = { .type = NLA_U32 },
  189. [NFTA_CT_KEY] = { .type = NLA_U32 },
  190. [NFTA_CT_DIRECTION] = { .type = NLA_U8 },
  191. [NFTA_CT_SREG] = { .type = NLA_U32 },
  192. };
  193. static int nft_ct_l3proto_try_module_get(uint8_t family)
  194. {
  195. int err;
  196. if (family == NFPROTO_INET) {
  197. err = nf_ct_l3proto_try_module_get(NFPROTO_IPV4);
  198. if (err < 0)
  199. goto err1;
  200. err = nf_ct_l3proto_try_module_get(NFPROTO_IPV6);
  201. if (err < 0)
  202. goto err2;
  203. } else {
  204. err = nf_ct_l3proto_try_module_get(family);
  205. if (err < 0)
  206. goto err1;
  207. }
  208. return 0;
  209. err2:
  210. nf_ct_l3proto_module_put(NFPROTO_IPV4);
  211. err1:
  212. return err;
  213. }
  214. static void nft_ct_l3proto_module_put(uint8_t family)
  215. {
  216. if (family == NFPROTO_INET) {
  217. nf_ct_l3proto_module_put(NFPROTO_IPV4);
  218. nf_ct_l3proto_module_put(NFPROTO_IPV6);
  219. } else
  220. nf_ct_l3proto_module_put(family);
  221. }
  222. static int nft_ct_get_init(const struct nft_ctx *ctx,
  223. const struct nft_expr *expr,
  224. const struct nlattr * const tb[])
  225. {
  226. struct nft_ct *priv = nft_expr_priv(expr);
  227. unsigned int len;
  228. int err;
  229. priv->key = ntohl(nla_get_be32(tb[NFTA_CT_KEY]));
  230. switch (priv->key) {
  231. case NFT_CT_DIRECTION:
  232. if (tb[NFTA_CT_DIRECTION] != NULL)
  233. return -EINVAL;
  234. len = sizeof(u8);
  235. break;
  236. case NFT_CT_STATE:
  237. case NFT_CT_STATUS:
  238. #ifdef CONFIG_NF_CONNTRACK_MARK
  239. case NFT_CT_MARK:
  240. #endif
  241. #ifdef CONFIG_NF_CONNTRACK_SECMARK
  242. case NFT_CT_SECMARK:
  243. #endif
  244. case NFT_CT_EXPIRATION:
  245. if (tb[NFTA_CT_DIRECTION] != NULL)
  246. return -EINVAL;
  247. len = sizeof(u32);
  248. break;
  249. #ifdef CONFIG_NF_CONNTRACK_LABELS
  250. case NFT_CT_LABELS:
  251. if (tb[NFTA_CT_DIRECTION] != NULL)
  252. return -EINVAL;
  253. len = NF_CT_LABELS_MAX_SIZE;
  254. break;
  255. #endif
  256. case NFT_CT_HELPER:
  257. if (tb[NFTA_CT_DIRECTION] != NULL)
  258. return -EINVAL;
  259. len = NF_CT_HELPER_NAME_LEN;
  260. break;
  261. case NFT_CT_L3PROTOCOL:
  262. case NFT_CT_PROTOCOL:
  263. /* For compatibility, do not report error if NFTA_CT_DIRECTION
  264. * attribute is specified.
  265. */
  266. len = sizeof(u8);
  267. break;
  268. case NFT_CT_SRC:
  269. case NFT_CT_DST:
  270. if (tb[NFTA_CT_DIRECTION] == NULL)
  271. return -EINVAL;
  272. switch (ctx->afi->family) {
  273. case NFPROTO_IPV4:
  274. len = FIELD_SIZEOF(struct nf_conntrack_tuple,
  275. src.u3.ip);
  276. break;
  277. case NFPROTO_IPV6:
  278. case NFPROTO_INET:
  279. len = FIELD_SIZEOF(struct nf_conntrack_tuple,
  280. src.u3.ip6);
  281. break;
  282. default:
  283. return -EAFNOSUPPORT;
  284. }
  285. break;
  286. case NFT_CT_PROTO_SRC:
  287. case NFT_CT_PROTO_DST:
  288. if (tb[NFTA_CT_DIRECTION] == NULL)
  289. return -EINVAL;
  290. len = FIELD_SIZEOF(struct nf_conntrack_tuple, src.u.all);
  291. break;
  292. case NFT_CT_BYTES:
  293. case NFT_CT_PKTS:
  294. /* no direction? return sum of original + reply */
  295. if (tb[NFTA_CT_DIRECTION] == NULL)
  296. priv->dir = IP_CT_DIR_MAX;
  297. len = sizeof(u64);
  298. break;
  299. default:
  300. return -EOPNOTSUPP;
  301. }
  302. if (tb[NFTA_CT_DIRECTION] != NULL) {
  303. priv->dir = nla_get_u8(tb[NFTA_CT_DIRECTION]);
  304. switch (priv->dir) {
  305. case IP_CT_DIR_ORIGINAL:
  306. case IP_CT_DIR_REPLY:
  307. break;
  308. default:
  309. return -EINVAL;
  310. }
  311. }
  312. priv->dreg = nft_parse_register(tb[NFTA_CT_DREG]);
  313. err = nft_validate_register_store(ctx, priv->dreg, NULL,
  314. NFT_DATA_VALUE, len);
  315. if (err < 0)
  316. return err;
  317. err = nft_ct_l3proto_try_module_get(ctx->afi->family);
  318. if (err < 0)
  319. return err;
  320. if (priv->key == NFT_CT_BYTES || priv->key == NFT_CT_PKTS)
  321. nf_ct_set_acct(ctx->net, true);
  322. return 0;
  323. }
  324. static int nft_ct_set_init(const struct nft_ctx *ctx,
  325. const struct nft_expr *expr,
  326. const struct nlattr * const tb[])
  327. {
  328. struct nft_ct *priv = nft_expr_priv(expr);
  329. bool label_got = false;
  330. unsigned int len;
  331. int err;
  332. priv->key = ntohl(nla_get_be32(tb[NFTA_CT_KEY]));
  333. switch (priv->key) {
  334. #ifdef CONFIG_NF_CONNTRACK_MARK
  335. case NFT_CT_MARK:
  336. if (tb[NFTA_CT_DIRECTION])
  337. return -EINVAL;
  338. len = FIELD_SIZEOF(struct nf_conn, mark);
  339. break;
  340. #endif
  341. #ifdef CONFIG_NF_CONNTRACK_LABELS
  342. case NFT_CT_LABELS:
  343. if (tb[NFTA_CT_DIRECTION])
  344. return -EINVAL;
  345. len = NF_CT_LABELS_MAX_SIZE;
  346. err = nf_connlabels_get(ctx->net, (len * BITS_PER_BYTE) - 1);
  347. if (err)
  348. return err;
  349. label_got = true;
  350. break;
  351. #endif
  352. default:
  353. return -EOPNOTSUPP;
  354. }
  355. priv->sreg = nft_parse_register(tb[NFTA_CT_SREG]);
  356. err = nft_validate_register_load(priv->sreg, len);
  357. if (err < 0)
  358. goto err1;
  359. err = nft_ct_l3proto_try_module_get(ctx->afi->family);
  360. if (err < 0)
  361. goto err1;
  362. return 0;
  363. err1:
  364. if (label_got)
  365. nf_connlabels_put(ctx->net);
  366. return err;
  367. }
  368. static void nft_ct_get_destroy(const struct nft_ctx *ctx,
  369. const struct nft_expr *expr)
  370. {
  371. nft_ct_l3proto_module_put(ctx->afi->family);
  372. }
  373. static void nft_ct_set_destroy(const struct nft_ctx *ctx,
  374. const struct nft_expr *expr)
  375. {
  376. struct nft_ct *priv = nft_expr_priv(expr);
  377. switch (priv->key) {
  378. #ifdef CONFIG_NF_CONNTRACK_LABELS
  379. case NFT_CT_LABELS:
  380. nf_connlabels_put(ctx->net);
  381. break;
  382. #endif
  383. default:
  384. break;
  385. }
  386. nft_ct_l3proto_module_put(ctx->afi->family);
  387. }
  388. static int nft_ct_get_dump(struct sk_buff *skb, const struct nft_expr *expr)
  389. {
  390. const struct nft_ct *priv = nft_expr_priv(expr);
  391. if (nft_dump_register(skb, NFTA_CT_DREG, priv->dreg))
  392. goto nla_put_failure;
  393. if (nla_put_be32(skb, NFTA_CT_KEY, htonl(priv->key)))
  394. goto nla_put_failure;
  395. switch (priv->key) {
  396. case NFT_CT_SRC:
  397. case NFT_CT_DST:
  398. case NFT_CT_PROTO_SRC:
  399. case NFT_CT_PROTO_DST:
  400. if (nla_put_u8(skb, NFTA_CT_DIRECTION, priv->dir))
  401. goto nla_put_failure;
  402. break;
  403. case NFT_CT_BYTES:
  404. case NFT_CT_PKTS:
  405. if (priv->dir < IP_CT_DIR_MAX &&
  406. nla_put_u8(skb, NFTA_CT_DIRECTION, priv->dir))
  407. goto nla_put_failure;
  408. break;
  409. default:
  410. break;
  411. }
  412. return 0;
  413. nla_put_failure:
  414. return -1;
  415. }
  416. static int nft_ct_set_dump(struct sk_buff *skb, const struct nft_expr *expr)
  417. {
  418. const struct nft_ct *priv = nft_expr_priv(expr);
  419. if (nft_dump_register(skb, NFTA_CT_SREG, priv->sreg))
  420. goto nla_put_failure;
  421. if (nla_put_be32(skb, NFTA_CT_KEY, htonl(priv->key)))
  422. goto nla_put_failure;
  423. return 0;
  424. nla_put_failure:
  425. return -1;
  426. }
  427. static struct nft_expr_type nft_ct_type;
  428. static const struct nft_expr_ops nft_ct_get_ops = {
  429. .type = &nft_ct_type,
  430. .size = NFT_EXPR_SIZE(sizeof(struct nft_ct)),
  431. .eval = nft_ct_get_eval,
  432. .init = nft_ct_get_init,
  433. .destroy = nft_ct_get_destroy,
  434. .dump = nft_ct_get_dump,
  435. };
  436. static const struct nft_expr_ops nft_ct_set_ops = {
  437. .type = &nft_ct_type,
  438. .size = NFT_EXPR_SIZE(sizeof(struct nft_ct)),
  439. .eval = nft_ct_set_eval,
  440. .init = nft_ct_set_init,
  441. .destroy = nft_ct_set_destroy,
  442. .dump = nft_ct_set_dump,
  443. };
  444. static const struct nft_expr_ops *
  445. nft_ct_select_ops(const struct nft_ctx *ctx,
  446. const struct nlattr * const tb[])
  447. {
  448. if (tb[NFTA_CT_KEY] == NULL)
  449. return ERR_PTR(-EINVAL);
  450. if (tb[NFTA_CT_DREG] && tb[NFTA_CT_SREG])
  451. return ERR_PTR(-EINVAL);
  452. if (tb[NFTA_CT_DREG])
  453. return &nft_ct_get_ops;
  454. if (tb[NFTA_CT_SREG])
  455. return &nft_ct_set_ops;
  456. return ERR_PTR(-EINVAL);
  457. }
  458. static struct nft_expr_type nft_ct_type __read_mostly = {
  459. .name = "ct",
  460. .select_ops = &nft_ct_select_ops,
  461. .policy = nft_ct_policy,
  462. .maxattr = NFTA_CT_MAX,
  463. .owner = THIS_MODULE,
  464. };
  465. static int __init nft_ct_module_init(void)
  466. {
  467. BUILD_BUG_ON(NF_CT_LABELS_MAX_SIZE > NFT_REG_SIZE);
  468. return nft_register_expr(&nft_ct_type);
  469. }
  470. static void __exit nft_ct_module_exit(void)
  471. {
  472. nft_unregister_expr(&nft_ct_type);
  473. }
  474. module_init(nft_ct_module_init);
  475. module_exit(nft_ct_module_exit);
  476. MODULE_LICENSE("GPL");
  477. MODULE_AUTHOR("Patrick McHardy <kaber@trash.net>");
  478. MODULE_ALIAS_NFT_EXPR("ct");