Loading...
1/*
2 * Copyright (c) 2008-2009 Patrick McHardy <kaber@trash.net>
3 *
4 * This program is free software; you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License version 2 as
6 * published by the Free Software Foundation.
7 *
8 * Development of this code funded by Astaro AG (http://www.astaro.com/)
9 */
10
11#include <linux/kernel.h>
12#include <linux/init.h>
13#include <linux/module.h>
14#include <linux/netlink.h>
15#include <linux/netfilter.h>
16#include <linux/netfilter/nf_tables.h>
17#include <net/netfilter/nf_tables_core.h>
18#include <net/netfilter/nf_tables.h>
19
20struct nft_cmp_expr {
21 struct nft_data data;
22 enum nft_registers sreg:8;
23 u8 len;
24 enum nft_cmp_ops op:8;
25};
26
27static void nft_cmp_eval(const struct nft_expr *expr,
28 struct nft_regs *regs,
29 const struct nft_pktinfo *pkt)
30{
31 const struct nft_cmp_expr *priv = nft_expr_priv(expr);
32 int d;
33
34 d = memcmp(®s->data[priv->sreg], &priv->data, priv->len);
35 switch (priv->op) {
36 case NFT_CMP_EQ:
37 if (d != 0)
38 goto mismatch;
39 break;
40 case NFT_CMP_NEQ:
41 if (d == 0)
42 goto mismatch;
43 break;
44 case NFT_CMP_LT:
45 if (d == 0)
46 goto mismatch;
47 case NFT_CMP_LTE:
48 if (d > 0)
49 goto mismatch;
50 break;
51 case NFT_CMP_GT:
52 if (d == 0)
53 goto mismatch;
54 case NFT_CMP_GTE:
55 if (d < 0)
56 goto mismatch;
57 break;
58 }
59 return;
60
61mismatch:
62 regs->verdict.code = NFT_BREAK;
63}
64
65static const struct nla_policy nft_cmp_policy[NFTA_CMP_MAX + 1] = {
66 [NFTA_CMP_SREG] = { .type = NLA_U32 },
67 [NFTA_CMP_OP] = { .type = NLA_U32 },
68 [NFTA_CMP_DATA] = { .type = NLA_NESTED },
69};
70
71static int nft_cmp_init(const struct nft_ctx *ctx, const struct nft_expr *expr,
72 const struct nlattr * const tb[])
73{
74 struct nft_cmp_expr *priv = nft_expr_priv(expr);
75 struct nft_data_desc desc;
76 int err;
77
78 err = nft_data_init(NULL, &priv->data, sizeof(priv->data), &desc,
79 tb[NFTA_CMP_DATA]);
80 BUG_ON(err < 0);
81
82 priv->sreg = nft_parse_register(tb[NFTA_CMP_SREG]);
83 err = nft_validate_register_load(priv->sreg, desc.len);
84 if (err < 0)
85 return err;
86
87 priv->op = ntohl(nla_get_be32(tb[NFTA_CMP_OP]));
88 priv->len = desc.len;
89 return 0;
90}
91
92static int nft_cmp_dump(struct sk_buff *skb, const struct nft_expr *expr)
93{
94 const struct nft_cmp_expr *priv = nft_expr_priv(expr);
95
96 if (nft_dump_register(skb, NFTA_CMP_SREG, priv->sreg))
97 goto nla_put_failure;
98 if (nla_put_be32(skb, NFTA_CMP_OP, htonl(priv->op)))
99 goto nla_put_failure;
100
101 if (nft_data_dump(skb, NFTA_CMP_DATA, &priv->data,
102 NFT_DATA_VALUE, priv->len) < 0)
103 goto nla_put_failure;
104 return 0;
105
106nla_put_failure:
107 return -1;
108}
109
110static const struct nft_expr_ops nft_cmp_ops = {
111 .type = &nft_cmp_type,
112 .size = NFT_EXPR_SIZE(sizeof(struct nft_cmp_expr)),
113 .eval = nft_cmp_eval,
114 .init = nft_cmp_init,
115 .dump = nft_cmp_dump,
116};
117
118static int nft_cmp_fast_init(const struct nft_ctx *ctx,
119 const struct nft_expr *expr,
120 const struct nlattr * const tb[])
121{
122 struct nft_cmp_fast_expr *priv = nft_expr_priv(expr);
123 struct nft_data_desc desc;
124 struct nft_data data;
125 u32 mask;
126 int err;
127
128 err = nft_data_init(NULL, &data, sizeof(data), &desc,
129 tb[NFTA_CMP_DATA]);
130 BUG_ON(err < 0);
131
132 priv->sreg = nft_parse_register(tb[NFTA_CMP_SREG]);
133 err = nft_validate_register_load(priv->sreg, desc.len);
134 if (err < 0)
135 return err;
136
137 desc.len *= BITS_PER_BYTE;
138 mask = nft_cmp_fast_mask(desc.len);
139
140 priv->data = data.data[0] & mask;
141 priv->len = desc.len;
142 return 0;
143}
144
145static int nft_cmp_fast_dump(struct sk_buff *skb, const struct nft_expr *expr)
146{
147 const struct nft_cmp_fast_expr *priv = nft_expr_priv(expr);
148 struct nft_data data;
149
150 if (nft_dump_register(skb, NFTA_CMP_SREG, priv->sreg))
151 goto nla_put_failure;
152 if (nla_put_be32(skb, NFTA_CMP_OP, htonl(NFT_CMP_EQ)))
153 goto nla_put_failure;
154
155 data.data[0] = priv->data;
156 if (nft_data_dump(skb, NFTA_CMP_DATA, &data,
157 NFT_DATA_VALUE, priv->len / BITS_PER_BYTE) < 0)
158 goto nla_put_failure;
159 return 0;
160
161nla_put_failure:
162 return -1;
163}
164
165const struct nft_expr_ops nft_cmp_fast_ops = {
166 .type = &nft_cmp_type,
167 .size = NFT_EXPR_SIZE(sizeof(struct nft_cmp_fast_expr)),
168 .eval = NULL, /* inlined */
169 .init = nft_cmp_fast_init,
170 .dump = nft_cmp_fast_dump,
171};
172
173static const struct nft_expr_ops *
174nft_cmp_select_ops(const struct nft_ctx *ctx, const struct nlattr * const tb[])
175{
176 struct nft_data_desc desc;
177 struct nft_data data;
178 enum nft_cmp_ops op;
179 int err;
180
181 if (tb[NFTA_CMP_SREG] == NULL ||
182 tb[NFTA_CMP_OP] == NULL ||
183 tb[NFTA_CMP_DATA] == NULL)
184 return ERR_PTR(-EINVAL);
185
186 op = ntohl(nla_get_be32(tb[NFTA_CMP_OP]));
187 switch (op) {
188 case NFT_CMP_EQ:
189 case NFT_CMP_NEQ:
190 case NFT_CMP_LT:
191 case NFT_CMP_LTE:
192 case NFT_CMP_GT:
193 case NFT_CMP_GTE:
194 break;
195 default:
196 return ERR_PTR(-EINVAL);
197 }
198
199 err = nft_data_init(NULL, &data, sizeof(data), &desc,
200 tb[NFTA_CMP_DATA]);
201 if (err < 0)
202 return ERR_PTR(err);
203
204 if (desc.len <= sizeof(u32) && op == NFT_CMP_EQ)
205 return &nft_cmp_fast_ops;
206 else
207 return &nft_cmp_ops;
208}
209
210struct nft_expr_type nft_cmp_type __read_mostly = {
211 .name = "cmp",
212 .select_ops = nft_cmp_select_ops,
213 .policy = nft_cmp_policy,
214 .maxattr = NFTA_CMP_MAX,
215 .owner = THIS_MODULE,
216};
1// SPDX-License-Identifier: GPL-2.0-only
2/*
3 * Copyright (c) 2008-2009 Patrick McHardy <kaber@trash.net>
4 *
5 * Development of this code funded by Astaro AG (http://www.astaro.com/)
6 */
7
8#include <linux/kernel.h>
9#include <linux/init.h>
10#include <linux/module.h>
11#include <linux/netlink.h>
12#include <linux/netfilter.h>
13#include <linux/netfilter/nf_tables.h>
14#include <net/netfilter/nf_tables_core.h>
15#include <net/netfilter/nf_tables_offload.h>
16#include <net/netfilter/nf_tables.h>
17
18struct nft_cmp_expr {
19 struct nft_data data;
20 enum nft_registers sreg:8;
21 u8 len;
22 enum nft_cmp_ops op:8;
23};
24
25void nft_cmp_eval(const struct nft_expr *expr,
26 struct nft_regs *regs,
27 const struct nft_pktinfo *pkt)
28{
29 const struct nft_cmp_expr *priv = nft_expr_priv(expr);
30 int d;
31
32 d = memcmp(®s->data[priv->sreg], &priv->data, priv->len);
33 switch (priv->op) {
34 case NFT_CMP_EQ:
35 if (d != 0)
36 goto mismatch;
37 break;
38 case NFT_CMP_NEQ:
39 if (d == 0)
40 goto mismatch;
41 break;
42 case NFT_CMP_LT:
43 if (d == 0)
44 goto mismatch;
45 /* fall through */
46 case NFT_CMP_LTE:
47 if (d > 0)
48 goto mismatch;
49 break;
50 case NFT_CMP_GT:
51 if (d == 0)
52 goto mismatch;
53 /* fall through */
54 case NFT_CMP_GTE:
55 if (d < 0)
56 goto mismatch;
57 break;
58 }
59 return;
60
61mismatch:
62 regs->verdict.code = NFT_BREAK;
63}
64
65static const struct nla_policy nft_cmp_policy[NFTA_CMP_MAX + 1] = {
66 [NFTA_CMP_SREG] = { .type = NLA_U32 },
67 [NFTA_CMP_OP] = { .type = NLA_U32 },
68 [NFTA_CMP_DATA] = { .type = NLA_NESTED },
69};
70
71static int nft_cmp_init(const struct nft_ctx *ctx, const struct nft_expr *expr,
72 const struct nlattr * const tb[])
73{
74 struct nft_cmp_expr *priv = nft_expr_priv(expr);
75 struct nft_data_desc desc;
76 int err;
77
78 err = nft_data_init(NULL, &priv->data, sizeof(priv->data), &desc,
79 tb[NFTA_CMP_DATA]);
80 if (err < 0)
81 return err;
82
83 priv->sreg = nft_parse_register(tb[NFTA_CMP_SREG]);
84 err = nft_validate_register_load(priv->sreg, desc.len);
85 if (err < 0)
86 return err;
87
88 priv->op = ntohl(nla_get_be32(tb[NFTA_CMP_OP]));
89 priv->len = desc.len;
90 return 0;
91}
92
93static int nft_cmp_dump(struct sk_buff *skb, const struct nft_expr *expr)
94{
95 const struct nft_cmp_expr *priv = nft_expr_priv(expr);
96
97 if (nft_dump_register(skb, NFTA_CMP_SREG, priv->sreg))
98 goto nla_put_failure;
99 if (nla_put_be32(skb, NFTA_CMP_OP, htonl(priv->op)))
100 goto nla_put_failure;
101
102 if (nft_data_dump(skb, NFTA_CMP_DATA, &priv->data,
103 NFT_DATA_VALUE, priv->len) < 0)
104 goto nla_put_failure;
105 return 0;
106
107nla_put_failure:
108 return -1;
109}
110
111static int __nft_cmp_offload(struct nft_offload_ctx *ctx,
112 struct nft_flow_rule *flow,
113 const struct nft_cmp_expr *priv)
114{
115 struct nft_offload_reg *reg = &ctx->regs[priv->sreg];
116 u8 *mask = (u8 *)&flow->match.mask;
117 u8 *key = (u8 *)&flow->match.key;
118
119 if (priv->op != NFT_CMP_EQ || reg->len != priv->len)
120 return -EOPNOTSUPP;
121
122 memcpy(key + reg->offset, &priv->data, priv->len);
123 memcpy(mask + reg->offset, ®->mask, priv->len);
124
125 flow->match.dissector.used_keys |= BIT(reg->key);
126 flow->match.dissector.offset[reg->key] = reg->base_offset;
127
128 nft_offload_update_dependency(ctx, &priv->data, priv->len);
129
130 return 0;
131}
132
133static int nft_cmp_offload(struct nft_offload_ctx *ctx,
134 struct nft_flow_rule *flow,
135 const struct nft_expr *expr)
136{
137 const struct nft_cmp_expr *priv = nft_expr_priv(expr);
138
139 return __nft_cmp_offload(ctx, flow, priv);
140}
141
142static const struct nft_expr_ops nft_cmp_ops = {
143 .type = &nft_cmp_type,
144 .size = NFT_EXPR_SIZE(sizeof(struct nft_cmp_expr)),
145 .eval = nft_cmp_eval,
146 .init = nft_cmp_init,
147 .dump = nft_cmp_dump,
148 .offload = nft_cmp_offload,
149};
150
151static int nft_cmp_fast_init(const struct nft_ctx *ctx,
152 const struct nft_expr *expr,
153 const struct nlattr * const tb[])
154{
155 struct nft_cmp_fast_expr *priv = nft_expr_priv(expr);
156 struct nft_data_desc desc;
157 struct nft_data data;
158 u32 mask;
159 int err;
160
161 err = nft_data_init(NULL, &data, sizeof(data), &desc,
162 tb[NFTA_CMP_DATA]);
163 if (err < 0)
164 return err;
165
166 priv->sreg = nft_parse_register(tb[NFTA_CMP_SREG]);
167 err = nft_validate_register_load(priv->sreg, desc.len);
168 if (err < 0)
169 return err;
170
171 desc.len *= BITS_PER_BYTE;
172 mask = nft_cmp_fast_mask(desc.len);
173
174 priv->data = data.data[0] & mask;
175 priv->len = desc.len;
176 return 0;
177}
178
179static int nft_cmp_fast_offload(struct nft_offload_ctx *ctx,
180 struct nft_flow_rule *flow,
181 const struct nft_expr *expr)
182{
183 const struct nft_cmp_fast_expr *priv = nft_expr_priv(expr);
184 struct nft_cmp_expr cmp = {
185 .data = {
186 .data = {
187 [0] = priv->data,
188 },
189 },
190 .sreg = priv->sreg,
191 .len = priv->len / BITS_PER_BYTE,
192 .op = NFT_CMP_EQ,
193 };
194
195 return __nft_cmp_offload(ctx, flow, &cmp);
196}
197
198static int nft_cmp_fast_dump(struct sk_buff *skb, const struct nft_expr *expr)
199{
200 const struct nft_cmp_fast_expr *priv = nft_expr_priv(expr);
201 struct nft_data data;
202
203 if (nft_dump_register(skb, NFTA_CMP_SREG, priv->sreg))
204 goto nla_put_failure;
205 if (nla_put_be32(skb, NFTA_CMP_OP, htonl(NFT_CMP_EQ)))
206 goto nla_put_failure;
207
208 data.data[0] = priv->data;
209 if (nft_data_dump(skb, NFTA_CMP_DATA, &data,
210 NFT_DATA_VALUE, priv->len / BITS_PER_BYTE) < 0)
211 goto nla_put_failure;
212 return 0;
213
214nla_put_failure:
215 return -1;
216}
217
218const struct nft_expr_ops nft_cmp_fast_ops = {
219 .type = &nft_cmp_type,
220 .size = NFT_EXPR_SIZE(sizeof(struct nft_cmp_fast_expr)),
221 .eval = NULL, /* inlined */
222 .init = nft_cmp_fast_init,
223 .dump = nft_cmp_fast_dump,
224 .offload = nft_cmp_fast_offload,
225};
226
227static const struct nft_expr_ops *
228nft_cmp_select_ops(const struct nft_ctx *ctx, const struct nlattr * const tb[])
229{
230 struct nft_data_desc desc;
231 struct nft_data data;
232 enum nft_cmp_ops op;
233 int err;
234
235 if (tb[NFTA_CMP_SREG] == NULL ||
236 tb[NFTA_CMP_OP] == NULL ||
237 tb[NFTA_CMP_DATA] == NULL)
238 return ERR_PTR(-EINVAL);
239
240 op = ntohl(nla_get_be32(tb[NFTA_CMP_OP]));
241 switch (op) {
242 case NFT_CMP_EQ:
243 case NFT_CMP_NEQ:
244 case NFT_CMP_LT:
245 case NFT_CMP_LTE:
246 case NFT_CMP_GT:
247 case NFT_CMP_GTE:
248 break;
249 default:
250 return ERR_PTR(-EINVAL);
251 }
252
253 err = nft_data_init(NULL, &data, sizeof(data), &desc,
254 tb[NFTA_CMP_DATA]);
255 if (err < 0)
256 return ERR_PTR(err);
257
258 if (desc.type != NFT_DATA_VALUE) {
259 err = -EINVAL;
260 goto err1;
261 }
262
263 if (desc.len <= sizeof(u32) && op == NFT_CMP_EQ)
264 return &nft_cmp_fast_ops;
265
266 return &nft_cmp_ops;
267err1:
268 nft_data_release(&data, desc.type);
269 return ERR_PTR(-EINVAL);
270}
271
272struct nft_expr_type nft_cmp_type __read_mostly = {
273 .name = "cmp",
274 .select_ops = nft_cmp_select_ops,
275 .policy = nft_cmp_policy,
276 .maxattr = NFTA_CMP_MAX,
277 .owner = THIS_MODULE,
278};