netfilter: nf_tables: fix issue with verdict support
[deliverable/linux.git] / net / netfilter / xt_NFQUEUE.c
CommitLineData
2e4e6a17
HW
1/* iptables module for using new netfilter netlink queue
2 *
3 * (C) 2005 by Harald Welte <laforge@netfilter.org>
4 *
5 * This program is free software; you can redistribute it and/or modify
601e68e1 6 * it under the terms of the GNU General Public License version 2 as
2e4e6a17 7 * published by the Free Software Foundation.
601e68e1 8 *
2e4e6a17
HW
9 */
10
11#include <linux/module.h>
12#include <linux/skbuff.h>
13
10662aa3
FW
14#include <linux/ip.h>
15#include <linux/ipv6.h>
16#include <linux/jhash.h>
17
2e4e6a17
HW
18#include <linux/netfilter.h>
19#include <linux/netfilter_arp.h>
20#include <linux/netfilter/x_tables.h>
21#include <linux/netfilter/xt_NFQUEUE.h>
22
23MODULE_AUTHOR("Harald Welte <laforge@netfilter.org>");
2ae15b64 24MODULE_DESCRIPTION("Xtables: packet forwarding to netlink");
2e4e6a17
HW
25MODULE_LICENSE("GPL");
26MODULE_ALIAS("ipt_NFQUEUE");
27MODULE_ALIAS("ip6t_NFQUEUE");
28MODULE_ALIAS("arpt_NFQUEUE");
29
10662aa3 30static u32 jhash_initval __read_mostly;
5191d501 31static bool rnd_inited __read_mostly;
10662aa3 32
2e4e6a17 33static unsigned int
4b560b44 34nfqueue_tg(struct sk_buff *skb, const struct xt_action_param *par)
2e4e6a17 35{
7eb35586 36 const struct xt_NFQ_info *tinfo = par->targinfo;
2e4e6a17
HW
37
38 return NF_QUEUE_NR(tinfo->queuenum);
39}
40
10662aa3
FW
41static u32 hash_v4(const struct sk_buff *skb)
42{
43 const struct iphdr *iph = ip_hdr(skb);
10662aa3
FW
44
45 /* packets in either direction go into same queue */
fe31d1a8 46 if ((__force u32)iph->saddr < (__force u32)iph->daddr)
1da6dd07
FW
47 return jhash_3words((__force u32)iph->saddr,
48 (__force u32)iph->daddr, iph->protocol, jhash_initval);
10662aa3 49
1da6dd07
FW
50 return jhash_3words((__force u32)iph->daddr,
51 (__force u32)iph->saddr, iph->protocol, jhash_initval);
10662aa3
FW
52}
53
c0cd1156 54#if IS_ENABLED(CONFIG_IP6_NF_IPTABLES)
10662aa3
FW
55static u32 hash_v6(const struct sk_buff *skb)
56{
57 const struct ipv6hdr *ip6h = ipv6_hdr(skb);
1da6dd07 58 u32 a, b, c;
10662aa3 59
fe31d1a8
PM
60 if ((__force u32)ip6h->saddr.s6_addr32[3] <
61 (__force u32)ip6h->daddr.s6_addr32[3]) {
1da6dd07
FW
62 a = (__force u32) ip6h->saddr.s6_addr32[3];
63 b = (__force u32) ip6h->daddr.s6_addr32[3];
64 } else {
65 b = (__force u32) ip6h->saddr.s6_addr32[3];
66 a = (__force u32) ip6h->daddr.s6_addr32[3];
67 }
10662aa3 68
fe31d1a8
PM
69 if ((__force u32)ip6h->saddr.s6_addr32[1] <
70 (__force u32)ip6h->daddr.s6_addr32[1])
1da6dd07
FW
71 c = (__force u32) ip6h->saddr.s6_addr32[1];
72 else
73 c = (__force u32) ip6h->daddr.s6_addr32[1];
74
75 return jhash_3words(a, b, c, jhash_initval);
10662aa3 76}
f76a47c8 77#endif
10662aa3 78
5c33448c 79static u32
80nfqueue_hash(const struct sk_buff *skb, const struct xt_action_param *par)
10662aa3
FW
81{
82 const struct xt_NFQ_info_v1 *info = par->targinfo;
83 u32 queue = info->queuenum;
84
5c33448c 85 if (par->family == NFPROTO_IPV4)
86 queue += ((u64) hash_v4(skb) * info->queues_total) >> 32;
c0cd1156 87#if IS_ENABLED(CONFIG_IP6_NF_IPTABLES)
5c33448c 88 else if (par->family == NFPROTO_IPV6)
89 queue += ((u64) hash_v6(skb) * info->queues_total) >> 32;
f76a47c8 90#endif
5c33448c 91
92 return queue;
93}
94
95static unsigned int
96nfqueue_tg_v1(struct sk_buff *skb, const struct xt_action_param *par)
97{
98 const struct xt_NFQ_info_v1 *info = par->targinfo;
99 u32 queue = info->queuenum;
100
101 if (info->queues_total > 1)
102 queue = nfqueue_hash(skb, par);
103
10662aa3
FW
104 return NF_QUEUE_NR(queue);
105}
10662aa3 106
94b27cc3
FW
107static unsigned int
108nfqueue_tg_v2(struct sk_buff *skb, const struct xt_action_param *par)
10662aa3 109{
94b27cc3
FW
110 const struct xt_NFQ_info_v2 *info = par->targinfo;
111 unsigned int ret = nfqueue_tg_v1(skb, par);
112
113 if (info->bypass)
114 ret |= NF_VERDICT_FLAG_QUEUE_BYPASS;
115 return ret;
116}
117
118static int nfqueue_tg_check(const struct xt_tgchk_param *par)
119{
8746ddcf 120 const struct xt_NFQ_info_v3 *info = par->targinfo;
10662aa3
FW
121 u32 maxid;
122
5191d501
JE
123 if (unlikely(!rnd_inited)) {
124 get_random_bytes(&jhash_initval, sizeof(jhash_initval));
125 rnd_inited = true;
126 }
10662aa3
FW
127 if (info->queues_total == 0) {
128 pr_err("NFQUEUE: number of total queues is 0\n");
d6b00a53 129 return -EINVAL;
10662aa3
FW
130 }
131 maxid = info->queues_total - 1 + info->queuenum;
132 if (maxid > 0xffff) {
133 pr_err("NFQUEUE: number of queues (%u) out of range (got %u)\n",
134 info->queues_total, maxid);
4a5a5c73 135 return -ERANGE;
10662aa3 136 }
8746ddcf 137 if (par->target->revision == 2 && info->flags > 1)
138 return -EINVAL;
139 if (par->target->revision == 3 && info->flags & ~NFQ_FLAG_MASK)
94b27cc3 140 return -EINVAL;
8746ddcf 141
d6b00a53 142 return 0;
10662aa3
FW
143}
144
8746ddcf 145static unsigned int
146nfqueue_tg_v3(struct sk_buff *skb, const struct xt_action_param *par)
147{
148 const struct xt_NFQ_info_v3 *info = par->targinfo;
149 u32 queue = info->queuenum;
d9547773 150 int ret;
8746ddcf 151
152 if (info->queues_total > 1) {
153 if (info->flags & NFQ_FLAG_CPU_FANOUT) {
154 int cpu = smp_processor_id();
155
156 queue = info->queuenum + cpu % info->queues_total;
5c33448c 157 } else
158 queue = nfqueue_hash(skb, par);
8746ddcf 159 }
5c33448c 160
d9547773
HE
161 ret = NF_QUEUE_NR(queue);
162 if (info->flags & NFQ_FLAG_BYPASS)
163 ret |= NF_VERDICT_FLAG_QUEUE_BYPASS;
164
165 return ret;
8746ddcf 166}
167
d3c5ee6d 168static struct xt_target nfqueue_tg_reg[] __read_mostly = {
4470bbc7
PM
169 {
170 .name = "NFQUEUE",
61f5abca 171 .family = NFPROTO_UNSPEC,
d3c5ee6d 172 .target = nfqueue_tg,
4470bbc7
PM
173 .targetsize = sizeof(struct xt_NFQ_info),
174 .me = THIS_MODULE,
175 },
10662aa3
FW
176 {
177 .name = "NFQUEUE",
178 .revision = 1,
f76a47c8 179 .family = NFPROTO_UNSPEC,
94b27cc3 180 .checkentry = nfqueue_tg_check,
f76a47c8 181 .target = nfqueue_tg_v1,
10662aa3
FW
182 .targetsize = sizeof(struct xt_NFQ_info_v1),
183 .me = THIS_MODULE,
184 },
94b27cc3
FW
185 {
186 .name = "NFQUEUE",
187 .revision = 2,
188 .family = NFPROTO_UNSPEC,
189 .checkentry = nfqueue_tg_check,
190 .target = nfqueue_tg_v2,
191 .targetsize = sizeof(struct xt_NFQ_info_v2),
192 .me = THIS_MODULE,
193 },
8746ddcf 194 {
195 .name = "NFQUEUE",
196 .revision = 3,
197 .family = NFPROTO_UNSPEC,
198 .checkentry = nfqueue_tg_check,
199 .target = nfqueue_tg_v3,
200 .targetsize = sizeof(struct xt_NFQ_info_v3),
201 .me = THIS_MODULE,
202 },
2e4e6a17
HW
203};
204
d3c5ee6d 205static int __init nfqueue_tg_init(void)
2e4e6a17 206{
d3c5ee6d 207 return xt_register_targets(nfqueue_tg_reg, ARRAY_SIZE(nfqueue_tg_reg));
2e4e6a17
HW
208}
209
d3c5ee6d 210static void __exit nfqueue_tg_exit(void)
2e4e6a17 211{
d3c5ee6d 212 xt_unregister_targets(nfqueue_tg_reg, ARRAY_SIZE(nfqueue_tg_reg));
2e4e6a17
HW
213}
214
d3c5ee6d
JE
215module_init(nfqueue_tg_init);
216module_exit(nfqueue_tg_exit);
This page took 0.585922 seconds and 5 git commands to generate.