1 // SPDX-License-Identifier: GPL-2.0-only
2 /*
3  * Copyright (c) 2008 Patrick McHardy <[email protected]>
4  *
5  * Development of this code funded by Astaro AG (http://www.astaro.com/)
6  */
7 
8 #include <linux/kernel.h>
9 #include <linux/module.h>
10 #include <linux/init.h>
11 #include <linux/list.h>
12 #include <linux/rculist.h>
13 #include <linux/skbuff.h>
14 #include <linux/netlink.h>
15 #include <linux/netfilter.h>
16 #include <linux/static_key.h>
17 #include <linux/netfilter/nfnetlink.h>
18 #include <linux/netfilter/nf_tables.h>
19 #include <net/netfilter/nf_tables_core.h>
20 #include <net/netfilter/nf_tables.h>
21 #include <net/netfilter/nf_log.h>
22 #include <net/netfilter/nft_meta.h>
23 
24 #ifdef CONFIG_MITIGATION_RETPOLINE
25 static struct static_key_false nf_tables_skip_direct_calls;
26 
nf_skip_indirect_calls(void)27 static inline bool nf_skip_indirect_calls(void)
28 {
29 	return static_branch_likely(&nf_tables_skip_direct_calls);
30 }
31 
nf_skip_indirect_calls_enable(void)32 static inline void __init nf_skip_indirect_calls_enable(void)
33 {
34 	if (!cpu_feature_enabled(X86_FEATURE_RETPOLINE))
35 		static_branch_enable(&nf_tables_skip_direct_calls);
36 }
37 #else
nf_skip_indirect_calls_enable(void)38 static inline void nf_skip_indirect_calls_enable(void) { }
39 #endif /* CONFIG_MITIGATION_RETPOLINE */
40 
__nft_trace_packet(const struct nft_pktinfo * pkt,const struct nft_verdict * verdict,const struct nft_rule_dp * rule,struct nft_traceinfo * info,enum nft_trace_types type)41 static noinline void __nft_trace_packet(const struct nft_pktinfo *pkt,
42 					const struct nft_verdict *verdict,
43 					const struct nft_rule_dp *rule,
44 					struct nft_traceinfo *info,
45 					enum nft_trace_types type)
46 {
47 	if (!info->trace || !info->nf_trace)
48 		return;
49 
50 	info->type = type;
51 
52 	nft_trace_notify(pkt, verdict, rule, info);
53 }
54 
nft_trace_packet(const struct nft_pktinfo * pkt,struct nft_verdict * verdict,struct nft_traceinfo * info,const struct nft_rule_dp * rule,enum nft_trace_types type)55 static inline void nft_trace_packet(const struct nft_pktinfo *pkt,
56 				    struct nft_verdict *verdict,
57 				    struct nft_traceinfo *info,
58 				    const struct nft_rule_dp *rule,
59 				    enum nft_trace_types type)
60 {
61 	if (static_branch_unlikely(&nft_trace_enabled)) {
62 		info->nf_trace = pkt->skb->nf_trace;
63 		__nft_trace_packet(pkt, verdict, rule, info, type);
64 	}
65 }
66 
nft_trace_copy_nftrace(const struct nft_pktinfo * pkt,struct nft_traceinfo * info)67 static inline void nft_trace_copy_nftrace(const struct nft_pktinfo *pkt,
68 					  struct nft_traceinfo *info)
69 {
70 	if (static_branch_unlikely(&nft_trace_enabled))
71 		info->nf_trace = pkt->skb->nf_trace;
72 }
73 
nft_bitwise_fast_eval(const struct nft_expr * expr,struct nft_regs * regs)74 static void nft_bitwise_fast_eval(const struct nft_expr *expr,
75 				  struct nft_regs *regs)
76 {
77 	const struct nft_bitwise_fast_expr *priv = nft_expr_priv(expr);
78 	u32 *src = &regs->data[priv->sreg];
79 	u32 *dst = &regs->data[priv->dreg];
80 
81 	*dst = (*src & priv->mask) ^ priv->xor;
82 }
83 
nft_cmp_fast_eval(const struct nft_expr * expr,struct nft_regs * regs)84 static void nft_cmp_fast_eval(const struct nft_expr *expr,
85 			      struct nft_regs *regs)
86 {
87 	const struct nft_cmp_fast_expr *priv = nft_expr_priv(expr);
88 
89 	if (((regs->data[priv->sreg] & priv->mask) == priv->data) ^ priv->inv)
90 		return;
91 	regs->verdict.code = NFT_BREAK;
92 }
93 
nft_cmp16_fast_eval(const struct nft_expr * expr,struct nft_regs * regs)94 static void nft_cmp16_fast_eval(const struct nft_expr *expr,
95 				struct nft_regs *regs)
96 {
97 	const struct nft_cmp16_fast_expr *priv = nft_expr_priv(expr);
98 	const u64 *reg_data = (const u64 *)&regs->data[priv->sreg];
99 	const u64 *mask = (const u64 *)&priv->mask;
100 	const u64 *data = (const u64 *)&priv->data;
101 
102 	if (((reg_data[0] & mask[0]) == data[0] &&
103 	    ((reg_data[1] & mask[1]) == data[1])) ^ priv->inv)
104 		return;
105 	regs->verdict.code = NFT_BREAK;
106 }
107 
__nft_trace_verdict(const struct nft_pktinfo * pkt,struct nft_traceinfo * info,const struct nft_rule_dp * rule,const struct nft_regs * regs)108 static noinline void __nft_trace_verdict(const struct nft_pktinfo *pkt,
109 					 struct nft_traceinfo *info,
110 					 const struct nft_rule_dp *rule,
111 					 const struct nft_regs *regs)
112 {
113 	enum nft_trace_types type;
114 
115 	switch (regs->verdict.code & NF_VERDICT_MASK) {
116 	case NFT_CONTINUE:
117 	case NFT_RETURN:
118 		type = NFT_TRACETYPE_RETURN;
119 		break;
120 	case NF_STOLEN:
121 		type = NFT_TRACETYPE_RULE;
122 		/* can't access skb->nf_trace; use copy */
123 		break;
124 	default:
125 		type = NFT_TRACETYPE_RULE;
126 
127 		if (info->trace)
128 			info->nf_trace = pkt->skb->nf_trace;
129 		break;
130 	}
131 
132 	__nft_trace_packet(pkt, &regs->verdict, rule, info, type);
133 }
134 
nft_trace_verdict(const struct nft_pktinfo * pkt,struct nft_traceinfo * info,const struct nft_rule_dp * rule,const struct nft_regs * regs)135 static inline void nft_trace_verdict(const struct nft_pktinfo *pkt,
136 				     struct nft_traceinfo *info,
137 				     const struct nft_rule_dp *rule,
138 				     const struct nft_regs *regs)
139 {
140 	if (static_branch_unlikely(&nft_trace_enabled))
141 		__nft_trace_verdict(pkt, info, rule, regs);
142 }
143 
nft_payload_fast_eval(const struct nft_expr * expr,struct nft_regs * regs,const struct nft_pktinfo * pkt)144 static bool nft_payload_fast_eval(const struct nft_expr *expr,
145 				  struct nft_regs *regs,
146 				  const struct nft_pktinfo *pkt)
147 {
148 	const struct nft_payload *priv = nft_expr_priv(expr);
149 	const struct sk_buff *skb = pkt->skb;
150 	u32 *dest = &regs->data[priv->dreg];
151 	unsigned char *ptr;
152 
153 	if (priv->base == NFT_PAYLOAD_NETWORK_HEADER)
154 		ptr = skb_network_header(skb);
155 	else {
156 		if (!(pkt->flags & NFT_PKTINFO_L4PROTO))
157 			return false;
158 		ptr = skb->data + nft_thoff(pkt);
159 	}
160 
161 	ptr += priv->offset;
162 
163 	if (unlikely(ptr + priv->len > skb_tail_pointer(skb)))
164 		return false;
165 
166 	*dest = 0;
167 	if (priv->len == 2)
168 		*(u16 *)dest = *(u16 *)ptr;
169 	else if (priv->len == 4)
170 		*(u32 *)dest = *(u32 *)ptr;
171 	else
172 		*(u8 *)dest = *(u8 *)ptr;
173 	return true;
174 }
175 
176 DEFINE_STATIC_KEY_FALSE(nft_counters_enabled);
177 
nft_update_chain_stats(const struct nft_chain * chain,const struct nft_pktinfo * pkt)178 static noinline void nft_update_chain_stats(const struct nft_chain *chain,
179 					    const struct nft_pktinfo *pkt)
180 {
181 	struct nft_base_chain *base_chain;
182 	struct nft_stats __percpu *pstats;
183 	struct nft_stats *stats;
184 
185 	base_chain = nft_base_chain(chain);
186 
187 	pstats = READ_ONCE(base_chain->stats);
188 	if (pstats) {
189 		local_bh_disable();
190 		stats = this_cpu_ptr(pstats);
191 		u64_stats_update_begin(&stats->syncp);
192 		stats->pkts++;
193 		stats->bytes += pkt->skb->len;
194 		u64_stats_update_end(&stats->syncp);
195 		local_bh_enable();
196 	}
197 }
198 
199 struct nft_jumpstack {
200 	const struct nft_rule_dp *rule;
201 };
202 
expr_call_ops_eval(const struct nft_expr * expr,struct nft_regs * regs,struct nft_pktinfo * pkt)203 static void expr_call_ops_eval(const struct nft_expr *expr,
204 			       struct nft_regs *regs,
205 			       struct nft_pktinfo *pkt)
206 {
207 #ifdef CONFIG_MITIGATION_RETPOLINE
208 	unsigned long e;
209 
210 	if (nf_skip_indirect_calls())
211 		goto indirect_call;
212 
213 	e = (unsigned long)expr->ops->eval;
214 #define X(e, fun) \
215 	do { if ((e) == (unsigned long)(fun)) \
216 		return fun(expr, regs, pkt); } while (0)
217 
218 	X(e, nft_payload_eval);
219 	X(e, nft_cmp_eval);
220 	X(e, nft_counter_eval);
221 	X(e, nft_meta_get_eval);
222 	X(e, nft_lookup_eval);
223 #if IS_ENABLED(CONFIG_NFT_CT)
224 	X(e, nft_ct_get_fast_eval);
225 #endif
226 	X(e, nft_range_eval);
227 	X(e, nft_immediate_eval);
228 	X(e, nft_byteorder_eval);
229 	X(e, nft_dynset_eval);
230 	X(e, nft_rt_get_eval);
231 	X(e, nft_bitwise_eval);
232 	X(e, nft_objref_eval);
233 	X(e, nft_objref_map_eval);
234 #undef  X
235 indirect_call:
236 #endif /* CONFIG_MITIGATION_RETPOLINE */
237 	expr->ops->eval(expr, regs, pkt);
238 }
239 
240 #define nft_rule_expr_first(rule)	(struct nft_expr *)&rule->data[0]
241 #define nft_rule_expr_next(expr)	((void *)expr) + expr->ops->size
242 #define nft_rule_expr_last(rule)	(struct nft_expr *)&rule->data[rule->dlen]
243 
244 #define nft_rule_dp_for_each_expr(expr, last, rule) \
245         for ((expr) = nft_rule_expr_first(rule), (last) = nft_rule_expr_last(rule); \
246              (expr) != (last); \
247              (expr) = nft_rule_expr_next(expr))
248 
249 unsigned int
nft_do_chain(struct nft_pktinfo * pkt,void * priv)250 nft_do_chain(struct nft_pktinfo *pkt, void *priv)
251 {
252 	const struct nft_chain *chain = priv, *basechain = chain;
253 	const struct net *net = nft_net(pkt);
254 	const struct nft_expr *expr, *last;
255 	const struct nft_rule_dp *rule;
256 	struct nft_regs regs;
257 	unsigned int stackptr = 0;
258 	struct nft_jumpstack jumpstack[NFT_JUMP_STACK_SIZE];
259 	bool genbit = READ_ONCE(net->nft.gencursor);
260 	struct nft_rule_blob *blob;
261 	struct nft_traceinfo info;
262 
263 	info.trace = false;
264 	if (static_branch_unlikely(&nft_trace_enabled))
265 		nft_trace_init(&info, pkt, basechain);
266 do_chain:
267 	if (genbit)
268 		blob = rcu_dereference(chain->blob_gen_1);
269 	else
270 		blob = rcu_dereference(chain->blob_gen_0);
271 
272 	rule = (struct nft_rule_dp *)blob->data;
273 next_rule:
274 	regs.verdict.code = NFT_CONTINUE;
275 	for (; !rule->is_last ; rule = nft_rule_next(rule)) {
276 		nft_rule_dp_for_each_expr(expr, last, rule) {
277 			if (expr->ops == &nft_cmp_fast_ops)
278 				nft_cmp_fast_eval(expr, &regs);
279 			else if (expr->ops == &nft_cmp16_fast_ops)
280 				nft_cmp16_fast_eval(expr, &regs);
281 			else if (expr->ops == &nft_bitwise_fast_ops)
282 				nft_bitwise_fast_eval(expr, &regs);
283 			else if (expr->ops != &nft_payload_fast_ops ||
284 				 !nft_payload_fast_eval(expr, &regs, pkt))
285 				expr_call_ops_eval(expr, &regs, pkt);
286 
287 			if (regs.verdict.code != NFT_CONTINUE)
288 				break;
289 		}
290 
291 		switch (regs.verdict.code) {
292 		case NFT_BREAK:
293 			regs.verdict.code = NFT_CONTINUE;
294 			nft_trace_copy_nftrace(pkt, &info);
295 			continue;
296 		case NFT_CONTINUE:
297 			nft_trace_packet(pkt, &regs.verdict,  &info, rule,
298 					 NFT_TRACETYPE_RULE);
299 			continue;
300 		}
301 		break;
302 	}
303 
304 	nft_trace_verdict(pkt, &info, rule, &regs);
305 
306 	switch (regs.verdict.code & NF_VERDICT_MASK) {
307 	case NF_ACCEPT:
308 	case NF_QUEUE:
309 	case NF_STOLEN:
310 		return regs.verdict.code;
311 	case NF_DROP:
312 		return NF_DROP_REASON(pkt->skb, SKB_DROP_REASON_NETFILTER_DROP, EPERM);
313 	}
314 
315 	switch (regs.verdict.code) {
316 	case NFT_JUMP:
317 		if (WARN_ON_ONCE(stackptr >= NFT_JUMP_STACK_SIZE))
318 			return NF_DROP;
319 		jumpstack[stackptr].rule = nft_rule_next(rule);
320 		stackptr++;
321 		fallthrough;
322 	case NFT_GOTO:
323 		chain = regs.verdict.chain;
324 		goto do_chain;
325 	case NFT_CONTINUE:
326 	case NFT_RETURN:
327 		break;
328 	default:
329 		WARN_ON_ONCE(1);
330 	}
331 
332 	if (stackptr > 0) {
333 		stackptr--;
334 		rule = jumpstack[stackptr].rule;
335 		goto next_rule;
336 	}
337 
338 	nft_trace_packet(pkt, &regs.verdict, &info, NULL, NFT_TRACETYPE_POLICY);
339 
340 	if (static_branch_unlikely(&nft_counters_enabled))
341 		nft_update_chain_stats(basechain, pkt);
342 
343 	if (nft_base_chain(basechain)->policy == NF_DROP)
344 		return NF_DROP_REASON(pkt->skb, SKB_DROP_REASON_NETFILTER_DROP, EPERM);
345 
346 	return nft_base_chain(basechain)->policy;
347 }
348 EXPORT_SYMBOL_GPL(nft_do_chain);
349 
350 static struct nft_expr_type *nft_basic_types[] = {
351 	&nft_imm_type,
352 	&nft_cmp_type,
353 	&nft_lookup_type,
354 	&nft_bitwise_type,
355 	&nft_byteorder_type,
356 	&nft_payload_type,
357 	&nft_dynset_type,
358 	&nft_range_type,
359 	&nft_meta_type,
360 	&nft_rt_type,
361 	&nft_exthdr_type,
362 	&nft_last_type,
363 	&nft_counter_type,
364 	&nft_objref_type,
365 	&nft_inner_type,
366 };
367 
368 static struct nft_object_type *nft_basic_objects[] = {
369 #ifdef CONFIG_NETWORK_SECMARK
370 	&nft_secmark_obj_type,
371 #endif
372 	&nft_counter_obj_type,
373 };
374 
nf_tables_core_module_init(void)375 int __init nf_tables_core_module_init(void)
376 {
377 	int err, i, j = 0;
378 
379 	nft_counter_init_seqcount();
380 
381 	for (i = 0; i < ARRAY_SIZE(nft_basic_objects); i++) {
382 		err = nft_register_obj(nft_basic_objects[i]);
383 		if (err)
384 			goto err;
385 	}
386 
387 	for (j = 0; j < ARRAY_SIZE(nft_basic_types); j++) {
388 		err = nft_register_expr(nft_basic_types[j]);
389 		if (err)
390 			goto err;
391 	}
392 
393 	nf_skip_indirect_calls_enable();
394 
395 	return 0;
396 
397 err:
398 	while (j-- > 0)
399 		nft_unregister_expr(nft_basic_types[j]);
400 
401 	while (i-- > 0)
402 		nft_unregister_obj(nft_basic_objects[i]);
403 
404 	return err;
405 }
406 
nf_tables_core_module_exit(void)407 void nf_tables_core_module_exit(void)
408 {
409 	int i;
410 
411 	i = ARRAY_SIZE(nft_basic_types);
412 	while (i-- > 0)
413 		nft_unregister_expr(nft_basic_types[i]);
414 
415 	i = ARRAY_SIZE(nft_basic_objects);
416 	while (i-- > 0)
417 		nft_unregister_obj(nft_basic_objects[i]);
418 }
419