1 // SPDX-License-Identifier: GPL-2.0-only
3 * Copyright (c) 2008-2009 Patrick McHardy <kaber@trash.net>
4 * Copyright (c) 2014 Intel Corporation
5 * Author: Tomasz Bursztyka <tomasz.bursztyka@linux.intel.com>
7 * Development of this code funded by Astaro AG (http://www.astaro.com/)
10 #include <linux/kernel.h>
11 #include <linux/netlink.h>
12 #include <linux/netfilter.h>
13 #include <linux/netfilter/nf_tables.h>
16 #include <linux/ipv6.h>
17 #include <linux/smp.h>
18 #include <linux/static_key.h>
21 #include <net/tcp_states.h> /* for TCP_TIME_WAIT */
22 #include <net/netfilter/nf_tables.h>
23 #include <net/netfilter/nf_tables_core.h>
24 #include <net/netfilter/nft_meta.h>
26 #include <uapi/linux/netfilter_bridge.h> /* NF_BR_PRE_ROUTING */
28 static DEFINE_PER_CPU(struct rnd_state, nft_prandom_state);
30 void nft_meta_get_eval(const struct nft_expr *expr,
31 struct nft_regs *regs,
32 const struct nft_pktinfo *pkt)
34 const struct nft_meta *priv = nft_expr_priv(expr);
35 const struct sk_buff *skb = pkt->skb;
36 const struct net_device *in = nft_in(pkt), *out = nft_out(pkt);
38 u32 *dest = ®s->data[priv->dreg];
44 case NFT_META_PROTOCOL:
45 nft_reg_store16(dest, (__force u16)skb->protocol);
47 case NFT_META_NFPROTO:
48 nft_reg_store8(dest, nft_pf(pkt));
50 case NFT_META_L4PROTO:
53 nft_reg_store8(dest, pkt->tprot);
55 case NFT_META_PRIORITY:
56 *dest = skb->priority;
71 case NFT_META_IIFNAME:
74 strncpy((char *)dest, in->name, IFNAMSIZ);
76 case NFT_META_OIFNAME:
79 strncpy((char *)dest, out->name, IFNAMSIZ);
81 case NFT_META_IIFTYPE:
84 nft_reg_store16(dest, in->type);
86 case NFT_META_OIFTYPE:
89 nft_reg_store16(dest, out->type);
92 sk = skb_to_full_sk(skb);
93 if (!sk || !sk_fullsock(sk) ||
94 !net_eq(nft_net(pkt), sock_net(sk)))
97 read_lock_bh(&sk->sk_callback_lock);
98 if (sk->sk_socket == NULL ||
99 sk->sk_socket->file == NULL) {
100 read_unlock_bh(&sk->sk_callback_lock);
104 *dest = from_kuid_munged(&init_user_ns,
105 sk->sk_socket->file->f_cred->fsuid);
106 read_unlock_bh(&sk->sk_callback_lock);
109 sk = skb_to_full_sk(skb);
110 if (!sk || !sk_fullsock(sk) ||
111 !net_eq(nft_net(pkt), sock_net(sk)))
114 read_lock_bh(&sk->sk_callback_lock);
115 if (sk->sk_socket == NULL ||
116 sk->sk_socket->file == NULL) {
117 read_unlock_bh(&sk->sk_callback_lock);
120 *dest = from_kgid_munged(&init_user_ns,
121 sk->sk_socket->file->f_cred->fsgid);
122 read_unlock_bh(&sk->sk_callback_lock);
124 #ifdef CONFIG_IP_ROUTE_CLASSID
125 case NFT_META_RTCLASSID: {
126 const struct dst_entry *dst = skb_dst(skb);
130 *dest = dst->tclassid;
134 #ifdef CONFIG_NETWORK_SECMARK
135 case NFT_META_SECMARK:
136 *dest = skb->secmark;
139 case NFT_META_PKTTYPE:
140 if (skb->pkt_type != PACKET_LOOPBACK) {
141 nft_reg_store8(dest, skb->pkt_type);
145 switch (nft_pf(pkt)) {
147 if (ipv4_is_multicast(ip_hdr(skb)->daddr))
148 nft_reg_store8(dest, PACKET_MULTICAST);
150 nft_reg_store8(dest, PACKET_BROADCAST);
153 nft_reg_store8(dest, PACKET_MULTICAST);
156 switch (skb->protocol) {
157 case htons(ETH_P_IP): {
158 int noff = skb_network_offset(skb);
159 struct iphdr *iph, _iph;
161 iph = skb_header_pointer(skb, noff,
162 sizeof(_iph), &_iph);
166 if (ipv4_is_multicast(iph->daddr))
167 nft_reg_store8(dest, PACKET_MULTICAST);
169 nft_reg_store8(dest, PACKET_BROADCAST);
173 case htons(ETH_P_IPV6):
174 nft_reg_store8(dest, PACKET_MULTICAST);
187 *dest = raw_smp_processor_id();
189 case NFT_META_IIFGROUP:
194 case NFT_META_OIFGROUP:
199 #ifdef CONFIG_CGROUP_NET_CLASSID
200 case NFT_META_CGROUP:
201 sk = skb_to_full_sk(skb);
202 if (!sk || !sk_fullsock(sk) ||
203 !net_eq(nft_net(pkt), sock_net(sk)))
205 *dest = sock_cgroup_classid(&sk->sk_cgrp_data);
208 case NFT_META_PRANDOM: {
209 struct rnd_state *state = this_cpu_ptr(&nft_prandom_state);
210 *dest = prandom_u32_state(state);
214 case NFT_META_SECPATH:
215 nft_reg_store8(dest, secpath_exists(skb));
218 case NFT_META_IIFKIND:
219 if (in == NULL || in->rtnl_link_ops == NULL)
221 strncpy((char *)dest, in->rtnl_link_ops->kind, IFNAMSIZ);
223 case NFT_META_OIFKIND:
224 if (out == NULL || out->rtnl_link_ops == NULL)
226 strncpy((char *)dest, out->rtnl_link_ops->kind, IFNAMSIZ);
235 regs->verdict.code = NFT_BREAK;
237 EXPORT_SYMBOL_GPL(nft_meta_get_eval);
239 void nft_meta_set_eval(const struct nft_expr *expr,
240 struct nft_regs *regs,
241 const struct nft_pktinfo *pkt)
243 const struct nft_meta *meta = nft_expr_priv(expr);
244 struct sk_buff *skb = pkt->skb;
245 u32 *sreg = ®s->data[meta->sreg];
253 case NFT_META_PRIORITY:
254 skb->priority = value;
256 case NFT_META_PKTTYPE:
257 value8 = nft_reg_load8(sreg);
259 if (skb->pkt_type != value8 &&
260 skb_pkt_type_ok(value8) &&
261 skb_pkt_type_ok(skb->pkt_type))
262 skb->pkt_type = value8;
264 case NFT_META_NFTRACE:
265 value8 = nft_reg_load8(sreg);
267 skb->nf_trace = !!value8;
269 #ifdef CONFIG_NETWORK_SECMARK
270 case NFT_META_SECMARK:
271 skb->secmark = value;
278 EXPORT_SYMBOL_GPL(nft_meta_set_eval);
280 const struct nla_policy nft_meta_policy[NFTA_META_MAX + 1] = {
281 [NFTA_META_DREG] = { .type = NLA_U32 },
282 [NFTA_META_KEY] = { .type = NLA_U32 },
283 [NFTA_META_SREG] = { .type = NLA_U32 },
285 EXPORT_SYMBOL_GPL(nft_meta_policy);
287 int nft_meta_get_init(const struct nft_ctx *ctx,
288 const struct nft_expr *expr,
289 const struct nlattr * const tb[])
291 struct nft_meta *priv = nft_expr_priv(expr);
294 priv->key = ntohl(nla_get_be32(tb[NFTA_META_KEY]));
296 case NFT_META_PROTOCOL:
297 case NFT_META_IIFTYPE:
298 case NFT_META_OIFTYPE:
301 case NFT_META_NFPROTO:
302 case NFT_META_L4PROTO:
304 case NFT_META_PRIORITY:
310 #ifdef CONFIG_IP_ROUTE_CLASSID
311 case NFT_META_RTCLASSID:
313 #ifdef CONFIG_NETWORK_SECMARK
314 case NFT_META_SECMARK:
316 case NFT_META_PKTTYPE:
318 case NFT_META_IIFGROUP:
319 case NFT_META_OIFGROUP:
320 #ifdef CONFIG_CGROUP_NET_CLASSID
321 case NFT_META_CGROUP:
325 case NFT_META_IIFNAME:
326 case NFT_META_OIFNAME:
327 case NFT_META_IIFKIND:
328 case NFT_META_OIFKIND:
331 case NFT_META_PRANDOM:
332 prandom_init_once(&nft_prandom_state);
336 case NFT_META_SECPATH:
344 priv->dreg = nft_parse_register(tb[NFTA_META_DREG]);
345 return nft_validate_register_store(ctx, priv->dreg, NULL,
346 NFT_DATA_VALUE, len);
348 EXPORT_SYMBOL_GPL(nft_meta_get_init);
350 static int nft_meta_get_validate(const struct nft_ctx *ctx,
351 const struct nft_expr *expr,
352 const struct nft_data **data)
355 const struct nft_meta *priv = nft_expr_priv(expr);
358 if (priv->key != NFT_META_SECPATH)
361 switch (ctx->family) {
363 hooks = 1 << NF_NETDEV_INGRESS;
368 hooks = (1 << NF_INET_PRE_ROUTING) |
369 (1 << NF_INET_LOCAL_IN) |
370 (1 << NF_INET_FORWARD);
376 return nft_chain_validate_hooks(ctx->chain, hooks);
382 int nft_meta_set_validate(const struct nft_ctx *ctx,
383 const struct nft_expr *expr,
384 const struct nft_data **data)
386 struct nft_meta *priv = nft_expr_priv(expr);
389 if (priv->key != NFT_META_PKTTYPE)
392 switch (ctx->family) {
394 hooks = 1 << NF_BR_PRE_ROUTING;
397 hooks = 1 << NF_NETDEV_INGRESS;
402 hooks = 1 << NF_INET_PRE_ROUTING;
408 return nft_chain_validate_hooks(ctx->chain, hooks);
410 EXPORT_SYMBOL_GPL(nft_meta_set_validate);
412 int nft_meta_set_init(const struct nft_ctx *ctx,
413 const struct nft_expr *expr,
414 const struct nlattr * const tb[])
416 struct nft_meta *priv = nft_expr_priv(expr);
420 priv->key = ntohl(nla_get_be32(tb[NFTA_META_KEY]));
423 case NFT_META_PRIORITY:
424 #ifdef CONFIG_NETWORK_SECMARK
425 case NFT_META_SECMARK:
429 case NFT_META_NFTRACE:
432 case NFT_META_PKTTYPE:
439 priv->sreg = nft_parse_register(tb[NFTA_META_SREG]);
440 err = nft_validate_register_load(priv->sreg, len);
444 if (priv->key == NFT_META_NFTRACE)
445 static_branch_inc(&nft_trace_enabled);
449 EXPORT_SYMBOL_GPL(nft_meta_set_init);
451 int nft_meta_get_dump(struct sk_buff *skb,
452 const struct nft_expr *expr)
454 const struct nft_meta *priv = nft_expr_priv(expr);
456 if (nla_put_be32(skb, NFTA_META_KEY, htonl(priv->key)))
457 goto nla_put_failure;
458 if (nft_dump_register(skb, NFTA_META_DREG, priv->dreg))
459 goto nla_put_failure;
465 EXPORT_SYMBOL_GPL(nft_meta_get_dump);
467 int nft_meta_set_dump(struct sk_buff *skb, const struct nft_expr *expr)
469 const struct nft_meta *priv = nft_expr_priv(expr);
471 if (nla_put_be32(skb, NFTA_META_KEY, htonl(priv->key)))
472 goto nla_put_failure;
473 if (nft_dump_register(skb, NFTA_META_SREG, priv->sreg))
474 goto nla_put_failure;
481 EXPORT_SYMBOL_GPL(nft_meta_set_dump);
483 void nft_meta_set_destroy(const struct nft_ctx *ctx,
484 const struct nft_expr *expr)
486 const struct nft_meta *priv = nft_expr_priv(expr);
488 if (priv->key == NFT_META_NFTRACE)
489 static_branch_dec(&nft_trace_enabled);
491 EXPORT_SYMBOL_GPL(nft_meta_set_destroy);
493 static const struct nft_expr_ops nft_meta_get_ops = {
494 .type = &nft_meta_type,
495 .size = NFT_EXPR_SIZE(sizeof(struct nft_meta)),
496 .eval = nft_meta_get_eval,
497 .init = nft_meta_get_init,
498 .dump = nft_meta_get_dump,
499 .validate = nft_meta_get_validate,
502 static const struct nft_expr_ops nft_meta_set_ops = {
503 .type = &nft_meta_type,
504 .size = NFT_EXPR_SIZE(sizeof(struct nft_meta)),
505 .eval = nft_meta_set_eval,
506 .init = nft_meta_set_init,
507 .destroy = nft_meta_set_destroy,
508 .dump = nft_meta_set_dump,
509 .validate = nft_meta_set_validate,
512 static const struct nft_expr_ops *
513 nft_meta_select_ops(const struct nft_ctx *ctx,
514 const struct nlattr * const tb[])
516 if (tb[NFTA_META_KEY] == NULL)
517 return ERR_PTR(-EINVAL);
519 if (tb[NFTA_META_DREG] && tb[NFTA_META_SREG])
520 return ERR_PTR(-EINVAL);
522 #ifdef CONFIG_NF_TABLES_BRIDGE
523 if (ctx->family == NFPROTO_BRIDGE)
524 return ERR_PTR(-EAGAIN);
526 if (tb[NFTA_META_DREG])
527 return &nft_meta_get_ops;
529 if (tb[NFTA_META_SREG])
530 return &nft_meta_set_ops;
532 return ERR_PTR(-EINVAL);
535 struct nft_expr_type nft_meta_type __read_mostly = {
537 .select_ops = nft_meta_select_ops,
538 .policy = nft_meta_policy,
539 .maxattr = NFTA_META_MAX,
540 .owner = THIS_MODULE,
543 #ifdef CONFIG_NETWORK_SECMARK
549 static const struct nla_policy nft_secmark_policy[NFTA_SECMARK_MAX + 1] = {
550 [NFTA_SECMARK_CTX] = { .type = NLA_STRING, .len = NFT_SECMARK_CTX_MAXLEN },
553 static int nft_secmark_compute_secid(struct nft_secmark *priv)
558 err = security_secctx_to_secid(priv->ctx, strlen(priv->ctx), &tmp_secid);
565 err = security_secmark_relabel_packet(tmp_secid);
569 priv->secid = tmp_secid;
573 static void nft_secmark_obj_eval(struct nft_object *obj, struct nft_regs *regs,
574 const struct nft_pktinfo *pkt)
576 const struct nft_secmark *priv = nft_obj_data(obj);
577 struct sk_buff *skb = pkt->skb;
579 skb->secmark = priv->secid;
582 static int nft_secmark_obj_init(const struct nft_ctx *ctx,
583 const struct nlattr * const tb[],
584 struct nft_object *obj)
586 struct nft_secmark *priv = nft_obj_data(obj);
589 if (tb[NFTA_SECMARK_CTX] == NULL)
592 priv->ctx = nla_strdup(tb[NFTA_SECMARK_CTX], GFP_KERNEL);
596 err = nft_secmark_compute_secid(priv);
602 security_secmark_refcount_inc();
607 static int nft_secmark_obj_dump(struct sk_buff *skb, struct nft_object *obj,
610 struct nft_secmark *priv = nft_obj_data(obj);
613 if (nla_put_string(skb, NFTA_SECMARK_CTX, priv->ctx))
617 err = nft_secmark_compute_secid(priv);
625 static void nft_secmark_obj_destroy(const struct nft_ctx *ctx, struct nft_object *obj)
627 struct nft_secmark *priv = nft_obj_data(obj);
629 security_secmark_refcount_dec();
634 static const struct nft_object_ops nft_secmark_obj_ops = {
635 .type = &nft_secmark_obj_type,
636 .size = sizeof(struct nft_secmark),
637 .init = nft_secmark_obj_init,
638 .eval = nft_secmark_obj_eval,
639 .dump = nft_secmark_obj_dump,
640 .destroy = nft_secmark_obj_destroy,
642 struct nft_object_type nft_secmark_obj_type __read_mostly = {
643 .type = NFT_OBJECT_SECMARK,
644 .ops = &nft_secmark_obj_ops,
645 .maxattr = NFTA_SECMARK_MAX,
646 .policy = nft_secmark_policy,
647 .owner = THIS_MODULE,
649 #endif /* CONFIG_NETWORK_SECMARK */