GNU Linux-libre 4.19.242-gnu1
[releases.git] / net / netfilter / nfnetlink_queue.c
1 /*
2  * This is a module which is used for queueing packets and communicating with
3  * userspace via nfnetlink.
4  *
5  * (C) 2005 by Harald Welte <laforge@netfilter.org>
6  * (C) 2007 by Patrick McHardy <kaber@trash.net>
7  *
8  * Based on the old ipv4-only ip_queue.c:
9  * (C) 2000-2002 James Morris <jmorris@intercode.com.au>
10  * (C) 2003-2005 Netfilter Core Team <coreteam@netfilter.org>
11  *
12  * This program is free software; you can redistribute it and/or modify
13  * it under the terms of the GNU General Public License version 2 as
14  * published by the Free Software Foundation.
15  *
16  */
17
18 #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
19
20 #include <linux/module.h>
21 #include <linux/skbuff.h>
22 #include <linux/init.h>
23 #include <linux/spinlock.h>
24 #include <linux/slab.h>
25 #include <linux/notifier.h>
26 #include <linux/netdevice.h>
27 #include <linux/netfilter.h>
28 #include <linux/proc_fs.h>
29 #include <linux/netfilter_ipv4.h>
30 #include <linux/netfilter_ipv6.h>
31 #include <linux/netfilter_bridge.h>
32 #include <linux/netfilter/nfnetlink.h>
33 #include <linux/netfilter/nfnetlink_queue.h>
34 #include <linux/netfilter/nf_conntrack_common.h>
35 #include <linux/list.h>
36 #include <net/sock.h>
37 #include <net/tcp_states.h>
38 #include <net/netfilter/nf_queue.h>
39 #include <net/netns/generic.h>
40
41 #include <linux/atomic.h>
42
43 #if IS_ENABLED(CONFIG_BRIDGE_NETFILTER)
44 #include "../bridge/br_private.h"
45 #endif
46
47 #if IS_ENABLED(CONFIG_NF_CONNTRACK)
48 #include <net/netfilter/nf_conntrack.h>
49 #endif
50
51 #define NFQNL_QMAX_DEFAULT 1024
52
53 /* We're using struct nlattr which has 16bit nla_len. Note that nla_len
54  * includes the header length. Thus, the maximum packet length that we
55  * support is 65531 bytes. We send truncated packets if the specified length
56  * is larger than that.  Userspace can check for presence of NFQA_CAP_LEN
57  * attribute to detect truncation.
58  */
59 #define NFQNL_MAX_COPY_RANGE (0xffff - NLA_HDRLEN)
60
61 struct nfqnl_instance {
62         struct hlist_node hlist;                /* global list of queues */
63         struct rcu_head rcu;
64
65         u32 peer_portid;
66         unsigned int queue_maxlen;
67         unsigned int copy_range;
68         unsigned int queue_dropped;
69         unsigned int queue_user_dropped;
70
71
72         u_int16_t queue_num;                    /* number of this queue */
73         u_int8_t copy_mode;
74         u_int32_t flags;                        /* Set using NFQA_CFG_FLAGS */
75 /*
76  * Following fields are dirtied for each queued packet,
77  * keep them in same cache line if possible.
78  */
79         spinlock_t      lock    ____cacheline_aligned_in_smp;
80         unsigned int    queue_total;
81         unsigned int    id_sequence;            /* 'sequence' of pkt ids */
82         struct list_head queue_list;            /* packets in queue */
83 };
84
85 typedef int (*nfqnl_cmpfn)(struct nf_queue_entry *, unsigned long);
86
87 static unsigned int nfnl_queue_net_id __read_mostly;
88
89 #define INSTANCE_BUCKETS        16
90 struct nfnl_queue_net {
91         spinlock_t instances_lock;
92         struct hlist_head instance_table[INSTANCE_BUCKETS];
93 };
94
95 static struct nfnl_queue_net *nfnl_queue_pernet(struct net *net)
96 {
97         return net_generic(net, nfnl_queue_net_id);
98 }
99
100 static inline u_int8_t instance_hashfn(u_int16_t queue_num)
101 {
102         return ((queue_num >> 8) ^ queue_num) % INSTANCE_BUCKETS;
103 }
104
105 static struct nfqnl_instance *
106 instance_lookup(struct nfnl_queue_net *q, u_int16_t queue_num)
107 {
108         struct hlist_head *head;
109         struct nfqnl_instance *inst;
110
111         head = &q->instance_table[instance_hashfn(queue_num)];
112         hlist_for_each_entry_rcu(inst, head, hlist) {
113                 if (inst->queue_num == queue_num)
114                         return inst;
115         }
116         return NULL;
117 }
118
119 static struct nfqnl_instance *
120 instance_create(struct nfnl_queue_net *q, u_int16_t queue_num, u32 portid)
121 {
122         struct nfqnl_instance *inst;
123         unsigned int h;
124         int err;
125
126         spin_lock(&q->instances_lock);
127         if (instance_lookup(q, queue_num)) {
128                 err = -EEXIST;
129                 goto out_unlock;
130         }
131
132         inst = kzalloc(sizeof(*inst), GFP_ATOMIC);
133         if (!inst) {
134                 err = -ENOMEM;
135                 goto out_unlock;
136         }
137
138         inst->queue_num = queue_num;
139         inst->peer_portid = portid;
140         inst->queue_maxlen = NFQNL_QMAX_DEFAULT;
141         inst->copy_range = NFQNL_MAX_COPY_RANGE;
142         inst->copy_mode = NFQNL_COPY_NONE;
143         spin_lock_init(&inst->lock);
144         INIT_LIST_HEAD(&inst->queue_list);
145
146         if (!try_module_get(THIS_MODULE)) {
147                 err = -EAGAIN;
148                 goto out_free;
149         }
150
151         h = instance_hashfn(queue_num);
152         hlist_add_head_rcu(&inst->hlist, &q->instance_table[h]);
153
154         spin_unlock(&q->instances_lock);
155
156         return inst;
157
158 out_free:
159         kfree(inst);
160 out_unlock:
161         spin_unlock(&q->instances_lock);
162         return ERR_PTR(err);
163 }
164
165 static void nfqnl_flush(struct nfqnl_instance *queue, nfqnl_cmpfn cmpfn,
166                         unsigned long data);
167
168 static void
169 instance_destroy_rcu(struct rcu_head *head)
170 {
171         struct nfqnl_instance *inst = container_of(head, struct nfqnl_instance,
172                                                    rcu);
173
174         nfqnl_flush(inst, NULL, 0);
175         kfree(inst);
176         module_put(THIS_MODULE);
177 }
178
179 static void
180 __instance_destroy(struct nfqnl_instance *inst)
181 {
182         hlist_del_rcu(&inst->hlist);
183         call_rcu(&inst->rcu, instance_destroy_rcu);
184 }
185
186 static void
187 instance_destroy(struct nfnl_queue_net *q, struct nfqnl_instance *inst)
188 {
189         spin_lock(&q->instances_lock);
190         __instance_destroy(inst);
191         spin_unlock(&q->instances_lock);
192 }
193
194 static inline void
195 __enqueue_entry(struct nfqnl_instance *queue, struct nf_queue_entry *entry)
196 {
197        list_add_tail(&entry->list, &queue->queue_list);
198        queue->queue_total++;
199 }
200
201 static void
202 __dequeue_entry(struct nfqnl_instance *queue, struct nf_queue_entry *entry)
203 {
204         list_del(&entry->list);
205         queue->queue_total--;
206 }
207
208 static struct nf_queue_entry *
209 find_dequeue_entry(struct nfqnl_instance *queue, unsigned int id)
210 {
211         struct nf_queue_entry *entry = NULL, *i;
212
213         spin_lock_bh(&queue->lock);
214
215         list_for_each_entry(i, &queue->queue_list, list) {
216                 if (i->id == id) {
217                         entry = i;
218                         break;
219                 }
220         }
221
222         if (entry)
223                 __dequeue_entry(queue, entry);
224
225         spin_unlock_bh(&queue->lock);
226
227         return entry;
228 }
229
230 static void nfqnl_reinject(struct nf_queue_entry *entry, unsigned int verdict)
231 {
232         struct nf_ct_hook *ct_hook;
233         int err;
234
235         if (verdict == NF_ACCEPT ||
236             verdict == NF_REPEAT ||
237             verdict == NF_STOP) {
238                 rcu_read_lock();
239                 ct_hook = rcu_dereference(nf_ct_hook);
240                 if (ct_hook) {
241                         err = ct_hook->update(entry->state.net, entry->skb);
242                         if (err < 0)
243                                 verdict = NF_DROP;
244                 }
245                 rcu_read_unlock();
246         }
247         nf_reinject(entry, verdict);
248 }
249
250 static void
251 nfqnl_flush(struct nfqnl_instance *queue, nfqnl_cmpfn cmpfn, unsigned long data)
252 {
253         struct nf_queue_entry *entry, *next;
254
255         spin_lock_bh(&queue->lock);
256         list_for_each_entry_safe(entry, next, &queue->queue_list, list) {
257                 if (!cmpfn || cmpfn(entry, data)) {
258                         list_del(&entry->list);
259                         queue->queue_total--;
260                         nfqnl_reinject(entry, NF_DROP);
261                 }
262         }
263         spin_unlock_bh(&queue->lock);
264 }
265
266 static int
267 nfqnl_put_packet_info(struct sk_buff *nlskb, struct sk_buff *packet,
268                       bool csum_verify)
269 {
270         __u32 flags = 0;
271
272         if (packet->ip_summed == CHECKSUM_PARTIAL)
273                 flags = NFQA_SKB_CSUMNOTREADY;
274         else if (csum_verify)
275                 flags = NFQA_SKB_CSUM_NOTVERIFIED;
276
277         if (skb_is_gso(packet))
278                 flags |= NFQA_SKB_GSO;
279
280         return flags ? nla_put_be32(nlskb, NFQA_SKB_INFO, htonl(flags)) : 0;
281 }
282
283 static int nfqnl_put_sk_uidgid(struct sk_buff *skb, struct sock *sk)
284 {
285         const struct cred *cred;
286
287         if (!sk_fullsock(sk))
288                 return 0;
289
290         read_lock_bh(&sk->sk_callback_lock);
291         if (sk->sk_socket && sk->sk_socket->file) {
292                 cred = sk->sk_socket->file->f_cred;
293                 if (nla_put_be32(skb, NFQA_UID,
294                     htonl(from_kuid_munged(&init_user_ns, cred->fsuid))))
295                         goto nla_put_failure;
296                 if (nla_put_be32(skb, NFQA_GID,
297                     htonl(from_kgid_munged(&init_user_ns, cred->fsgid))))
298                         goto nla_put_failure;
299         }
300         read_unlock_bh(&sk->sk_callback_lock);
301         return 0;
302
303 nla_put_failure:
304         read_unlock_bh(&sk->sk_callback_lock);
305         return -1;
306 }
307
308 static u32 nfqnl_get_sk_secctx(struct sk_buff *skb, char **secdata)
309 {
310         u32 seclen = 0;
311 #if IS_ENABLED(CONFIG_NETWORK_SECMARK)
312         if (!skb || !sk_fullsock(skb->sk))
313                 return 0;
314
315         read_lock_bh(&skb->sk->sk_callback_lock);
316
317         if (skb->secmark)
318                 security_secid_to_secctx(skb->secmark, secdata, &seclen);
319
320         read_unlock_bh(&skb->sk->sk_callback_lock);
321 #endif
322         return seclen;
323 }
324
325 static u32 nfqnl_get_bridge_size(struct nf_queue_entry *entry)
326 {
327         struct sk_buff *entskb = entry->skb;
328         u32 nlalen = 0;
329
330         if (entry->state.pf != PF_BRIDGE || !skb_mac_header_was_set(entskb))
331                 return 0;
332
333         if (skb_vlan_tag_present(entskb))
334                 nlalen += nla_total_size(nla_total_size(sizeof(__be16)) +
335                                          nla_total_size(sizeof(__be16)));
336
337         if (entskb->network_header > entskb->mac_header)
338                 nlalen += nla_total_size((entskb->network_header -
339                                           entskb->mac_header));
340
341         return nlalen;
342 }
343
344 static int nfqnl_put_bridge(struct nf_queue_entry *entry, struct sk_buff *skb)
345 {
346         struct sk_buff *entskb = entry->skb;
347
348         if (entry->state.pf != PF_BRIDGE || !skb_mac_header_was_set(entskb))
349                 return 0;
350
351         if (skb_vlan_tag_present(entskb)) {
352                 struct nlattr *nest;
353
354                 nest = nla_nest_start(skb, NFQA_VLAN | NLA_F_NESTED);
355                 if (!nest)
356                         goto nla_put_failure;
357
358                 if (nla_put_be16(skb, NFQA_VLAN_TCI, htons(entskb->vlan_tci)) ||
359                     nla_put_be16(skb, NFQA_VLAN_PROTO, entskb->vlan_proto))
360                         goto nla_put_failure;
361
362                 nla_nest_end(skb, nest);
363         }
364
365         if (entskb->mac_header < entskb->network_header) {
366                 int len = (int)(entskb->network_header - entskb->mac_header);
367
368                 if (nla_put(skb, NFQA_L2HDR, len, skb_mac_header(entskb)))
369                         goto nla_put_failure;
370         }
371
372         return 0;
373
374 nla_put_failure:
375         return -1;
376 }
377
378 static struct sk_buff *
379 nfqnl_build_packet_message(struct net *net, struct nfqnl_instance *queue,
380                            struct nf_queue_entry *entry,
381                            __be32 **packet_id_ptr)
382 {
383         size_t size;
384         size_t data_len = 0, cap_len = 0;
385         unsigned int hlen = 0;
386         struct sk_buff *skb;
387         struct nlattr *nla;
388         struct nfqnl_msg_packet_hdr *pmsg;
389         struct nlmsghdr *nlh;
390         struct nfgenmsg *nfmsg;
391         struct sk_buff *entskb = entry->skb;
392         struct net_device *indev;
393         struct net_device *outdev;
394         struct nf_conn *ct = NULL;
395         enum ip_conntrack_info uninitialized_var(ctinfo);
396         struct nfnl_ct_hook *nfnl_ct;
397         bool csum_verify;
398         char *secdata = NULL;
399         u32 seclen = 0;
400
401         size =    nlmsg_total_size(sizeof(struct nfgenmsg))
402                 + nla_total_size(sizeof(struct nfqnl_msg_packet_hdr))
403                 + nla_total_size(sizeof(u_int32_t))     /* ifindex */
404                 + nla_total_size(sizeof(u_int32_t))     /* ifindex */
405 #if IS_ENABLED(CONFIG_BRIDGE_NETFILTER)
406                 + nla_total_size(sizeof(u_int32_t))     /* ifindex */
407                 + nla_total_size(sizeof(u_int32_t))     /* ifindex */
408 #endif
409                 + nla_total_size(sizeof(u_int32_t))     /* mark */
410                 + nla_total_size(sizeof(struct nfqnl_msg_packet_hw))
411                 + nla_total_size(sizeof(u_int32_t))     /* skbinfo */
412                 + nla_total_size(sizeof(u_int32_t));    /* cap_len */
413
414         if (entskb->tstamp)
415                 size += nla_total_size(sizeof(struct nfqnl_msg_packet_timestamp));
416
417         size += nfqnl_get_bridge_size(entry);
418
419         if (entry->state.hook <= NF_INET_FORWARD ||
420            (entry->state.hook == NF_INET_POST_ROUTING && entskb->sk == NULL))
421                 csum_verify = !skb_csum_unnecessary(entskb);
422         else
423                 csum_verify = false;
424
425         outdev = entry->state.out;
426
427         switch ((enum nfqnl_config_mode)READ_ONCE(queue->copy_mode)) {
428         case NFQNL_COPY_META:
429         case NFQNL_COPY_NONE:
430                 break;
431
432         case NFQNL_COPY_PACKET:
433                 if (!(queue->flags & NFQA_CFG_F_GSO) &&
434                     entskb->ip_summed == CHECKSUM_PARTIAL &&
435                     skb_checksum_help(entskb))
436                         return NULL;
437
438                 data_len = READ_ONCE(queue->copy_range);
439                 if (data_len > entskb->len)
440                         data_len = entskb->len;
441
442                 hlen = skb_zerocopy_headlen(entskb);
443                 hlen = min_t(unsigned int, hlen, data_len);
444                 size += sizeof(struct nlattr) + hlen;
445                 cap_len = entskb->len;
446                 break;
447         }
448
449         nfnl_ct = rcu_dereference(nfnl_ct_hook);
450
451         if (queue->flags & NFQA_CFG_F_CONNTRACK) {
452                 if (nfnl_ct != NULL) {
453                         ct = nfnl_ct->get_ct(entskb, &ctinfo);
454                         if (ct != NULL)
455                                 size += nfnl_ct->build_size(ct);
456                 }
457         }
458
459         if (queue->flags & NFQA_CFG_F_UID_GID) {
460                 size +=  (nla_total_size(sizeof(u_int32_t))     /* uid */
461                         + nla_total_size(sizeof(u_int32_t)));   /* gid */
462         }
463
464         if ((queue->flags & NFQA_CFG_F_SECCTX) && entskb->sk) {
465                 seclen = nfqnl_get_sk_secctx(entskb, &secdata);
466                 if (seclen)
467                         size += nla_total_size(seclen);
468         }
469
470         skb = alloc_skb(size, GFP_ATOMIC);
471         if (!skb) {
472                 skb_tx_error(entskb);
473                 goto nlmsg_failure;
474         }
475
476         nlh = nlmsg_put(skb, 0, 0,
477                         nfnl_msg_type(NFNL_SUBSYS_QUEUE, NFQNL_MSG_PACKET),
478                         sizeof(struct nfgenmsg), 0);
479         if (!nlh) {
480                 skb_tx_error(entskb);
481                 kfree_skb(skb);
482                 goto nlmsg_failure;
483         }
484         nfmsg = nlmsg_data(nlh);
485         nfmsg->nfgen_family = entry->state.pf;
486         nfmsg->version = NFNETLINK_V0;
487         nfmsg->res_id = htons(queue->queue_num);
488
489         nla = __nla_reserve(skb, NFQA_PACKET_HDR, sizeof(*pmsg));
490         pmsg = nla_data(nla);
491         pmsg->hw_protocol       = entskb->protocol;
492         pmsg->hook              = entry->state.hook;
493         *packet_id_ptr          = &pmsg->packet_id;
494
495         indev = entry->state.in;
496         if (indev) {
497 #if !IS_ENABLED(CONFIG_BRIDGE_NETFILTER)
498                 if (nla_put_be32(skb, NFQA_IFINDEX_INDEV, htonl(indev->ifindex)))
499                         goto nla_put_failure;
500 #else
501                 if (entry->state.pf == PF_BRIDGE) {
502                         /* Case 1: indev is physical input device, we need to
503                          * look for bridge group (when called from
504                          * netfilter_bridge) */
505                         if (nla_put_be32(skb, NFQA_IFINDEX_PHYSINDEV,
506                                          htonl(indev->ifindex)) ||
507                         /* this is the bridge group "brX" */
508                         /* rcu_read_lock()ed by __nf_queue */
509                             nla_put_be32(skb, NFQA_IFINDEX_INDEV,
510                                          htonl(br_port_get_rcu(indev)->br->dev->ifindex)))
511                                 goto nla_put_failure;
512                 } else {
513                         int physinif;
514
515                         /* Case 2: indev is bridge group, we need to look for
516                          * physical device (when called from ipv4) */
517                         if (nla_put_be32(skb, NFQA_IFINDEX_INDEV,
518                                          htonl(indev->ifindex)))
519                                 goto nla_put_failure;
520
521                         physinif = nf_bridge_get_physinif(entskb);
522                         if (physinif &&
523                             nla_put_be32(skb, NFQA_IFINDEX_PHYSINDEV,
524                                          htonl(physinif)))
525                                 goto nla_put_failure;
526                 }
527 #endif
528         }
529
530         if (outdev) {
531 #if !IS_ENABLED(CONFIG_BRIDGE_NETFILTER)
532                 if (nla_put_be32(skb, NFQA_IFINDEX_OUTDEV, htonl(outdev->ifindex)))
533                         goto nla_put_failure;
534 #else
535                 if (entry->state.pf == PF_BRIDGE) {
536                         /* Case 1: outdev is physical output device, we need to
537                          * look for bridge group (when called from
538                          * netfilter_bridge) */
539                         if (nla_put_be32(skb, NFQA_IFINDEX_PHYSOUTDEV,
540                                          htonl(outdev->ifindex)) ||
541                         /* this is the bridge group "brX" */
542                         /* rcu_read_lock()ed by __nf_queue */
543                             nla_put_be32(skb, NFQA_IFINDEX_OUTDEV,
544                                          htonl(br_port_get_rcu(outdev)->br->dev->ifindex)))
545                                 goto nla_put_failure;
546                 } else {
547                         int physoutif;
548
549                         /* Case 2: outdev is bridge group, we need to look for
550                          * physical output device (when called from ipv4) */
551                         if (nla_put_be32(skb, NFQA_IFINDEX_OUTDEV,
552                                          htonl(outdev->ifindex)))
553                                 goto nla_put_failure;
554
555                         physoutif = nf_bridge_get_physoutif(entskb);
556                         if (physoutif &&
557                             nla_put_be32(skb, NFQA_IFINDEX_PHYSOUTDEV,
558                                          htonl(physoutif)))
559                                 goto nla_put_failure;
560                 }
561 #endif
562         }
563
564         if (entskb->mark &&
565             nla_put_be32(skb, NFQA_MARK, htonl(entskb->mark)))
566                 goto nla_put_failure;
567
568         if (indev && entskb->dev &&
569             skb_mac_header_was_set(entskb) &&
570             skb_mac_header_len(entskb) != 0) {
571                 struct nfqnl_msg_packet_hw phw;
572                 int len;
573
574                 memset(&phw, 0, sizeof(phw));
575                 len = dev_parse_header(entskb, phw.hw_addr);
576                 if (len) {
577                         phw.hw_addrlen = htons(len);
578                         if (nla_put(skb, NFQA_HWADDR, sizeof(phw), &phw))
579                                 goto nla_put_failure;
580                 }
581         }
582
583         if (nfqnl_put_bridge(entry, skb) < 0)
584                 goto nla_put_failure;
585
586         if (entskb->tstamp) {
587                 struct nfqnl_msg_packet_timestamp ts;
588                 struct timespec64 kts = ktime_to_timespec64(entskb->tstamp);
589
590                 ts.sec = cpu_to_be64(kts.tv_sec);
591                 ts.usec = cpu_to_be64(kts.tv_nsec / NSEC_PER_USEC);
592
593                 if (nla_put(skb, NFQA_TIMESTAMP, sizeof(ts), &ts))
594                         goto nla_put_failure;
595         }
596
597         if ((queue->flags & NFQA_CFG_F_UID_GID) && entskb->sk &&
598             nfqnl_put_sk_uidgid(skb, entskb->sk) < 0)
599                 goto nla_put_failure;
600
601         if (seclen && nla_put(skb, NFQA_SECCTX, seclen, secdata))
602                 goto nla_put_failure;
603
604         if (ct && nfnl_ct->build(skb, ct, ctinfo, NFQA_CT, NFQA_CT_INFO) < 0)
605                 goto nla_put_failure;
606
607         if (cap_len > data_len &&
608             nla_put_be32(skb, NFQA_CAP_LEN, htonl(cap_len)))
609                 goto nla_put_failure;
610
611         if (nfqnl_put_packet_info(skb, entskb, csum_verify))
612                 goto nla_put_failure;
613
614         if (data_len) {
615                 struct nlattr *nla;
616
617                 if (skb_tailroom(skb) < sizeof(*nla) + hlen)
618                         goto nla_put_failure;
619
620                 nla = skb_put(skb, sizeof(*nla));
621                 nla->nla_type = NFQA_PAYLOAD;
622                 nla->nla_len = nla_attr_size(data_len);
623
624                 if (skb_zerocopy(skb, entskb, data_len, hlen))
625                         goto nla_put_failure;
626         }
627
628         nlh->nlmsg_len = skb->len;
629         if (seclen)
630                 security_release_secctx(secdata, seclen);
631         return skb;
632
633 nla_put_failure:
634         skb_tx_error(entskb);
635         kfree_skb(skb);
636         net_err_ratelimited("nf_queue: error creating packet message\n");
637 nlmsg_failure:
638         if (seclen)
639                 security_release_secctx(secdata, seclen);
640         return NULL;
641 }
642
643 static bool nf_ct_drop_unconfirmed(const struct nf_queue_entry *entry)
644 {
645 #if IS_ENABLED(CONFIG_NF_CONNTRACK)
646         static const unsigned long flags = IPS_CONFIRMED | IPS_DYING;
647         const struct nf_conn *ct = (void *)skb_nfct(entry->skb);
648
649         if (ct && ((ct->status & flags) == IPS_DYING))
650                 return true;
651 #endif
652         return false;
653 }
654
655 static int
656 __nfqnl_enqueue_packet(struct net *net, struct nfqnl_instance *queue,
657                         struct nf_queue_entry *entry)
658 {
659         struct sk_buff *nskb;
660         int err = -ENOBUFS;
661         __be32 *packet_id_ptr;
662         int failopen = 0;
663
664         nskb = nfqnl_build_packet_message(net, queue, entry, &packet_id_ptr);
665         if (nskb == NULL) {
666                 err = -ENOMEM;
667                 goto err_out;
668         }
669         spin_lock_bh(&queue->lock);
670
671         if (nf_ct_drop_unconfirmed(entry))
672                 goto err_out_free_nskb;
673
674         if (queue->queue_total >= queue->queue_maxlen) {
675                 if (queue->flags & NFQA_CFG_F_FAIL_OPEN) {
676                         failopen = 1;
677                         err = 0;
678                 } else {
679                         queue->queue_dropped++;
680                         net_warn_ratelimited("nf_queue: full at %d entries, dropping packets(s)\n",
681                                              queue->queue_total);
682                 }
683                 goto err_out_free_nskb;
684         }
685         entry->id = ++queue->id_sequence;
686         *packet_id_ptr = htonl(entry->id);
687
688         /* nfnetlink_unicast will either free the nskb or add it to a socket */
689         err = nfnetlink_unicast(nskb, net, queue->peer_portid);
690         if (err < 0) {
691                 if (queue->flags & NFQA_CFG_F_FAIL_OPEN) {
692                         failopen = 1;
693                         err = 0;
694                 } else {
695                         queue->queue_user_dropped++;
696                 }
697                 goto err_out_unlock;
698         }
699
700         __enqueue_entry(queue, entry);
701
702         spin_unlock_bh(&queue->lock);
703         return 0;
704
705 err_out_free_nskb:
706         kfree_skb(nskb);
707 err_out_unlock:
708         spin_unlock_bh(&queue->lock);
709         if (failopen)
710                 nfqnl_reinject(entry, NF_ACCEPT);
711 err_out:
712         return err;
713 }
714
715 static struct nf_queue_entry *
716 nf_queue_entry_dup(struct nf_queue_entry *e)
717 {
718         struct nf_queue_entry *entry = kmemdup(e, e->size, GFP_ATOMIC);
719
720         if (!entry)
721                 return NULL;
722
723         if (nf_queue_entry_get_refs(entry))
724                 return entry;
725
726         kfree(entry);
727         return NULL;
728 }
729
730 #if IS_ENABLED(CONFIG_BRIDGE_NETFILTER)
731 /* When called from bridge netfilter, skb->data must point to MAC header
732  * before calling skb_gso_segment(). Else, original MAC header is lost
733  * and segmented skbs will be sent to wrong destination.
734  */
735 static void nf_bridge_adjust_skb_data(struct sk_buff *skb)
736 {
737         if (skb->nf_bridge)
738                 __skb_push(skb, skb->network_header - skb->mac_header);
739 }
740
741 static void nf_bridge_adjust_segmented_data(struct sk_buff *skb)
742 {
743         if (skb->nf_bridge)
744                 __skb_pull(skb, skb->network_header - skb->mac_header);
745 }
746 #else
747 #define nf_bridge_adjust_skb_data(s) do {} while (0)
748 #define nf_bridge_adjust_segmented_data(s) do {} while (0)
749 #endif
750
751 static void free_entry(struct nf_queue_entry *entry)
752 {
753         nf_queue_entry_release_refs(entry);
754         kfree(entry);
755 }
756
757 static int
758 __nfqnl_enqueue_packet_gso(struct net *net, struct nfqnl_instance *queue,
759                            struct sk_buff *skb, struct nf_queue_entry *entry)
760 {
761         int ret = -ENOMEM;
762         struct nf_queue_entry *entry_seg;
763
764         nf_bridge_adjust_segmented_data(skb);
765
766         if (skb->next == NULL) { /* last packet, no need to copy entry */
767                 struct sk_buff *gso_skb = entry->skb;
768                 entry->skb = skb;
769                 ret = __nfqnl_enqueue_packet(net, queue, entry);
770                 if (ret)
771                         entry->skb = gso_skb;
772                 return ret;
773         }
774
775         skb->next = NULL;
776
777         entry_seg = nf_queue_entry_dup(entry);
778         if (entry_seg) {
779                 entry_seg->skb = skb;
780                 ret = __nfqnl_enqueue_packet(net, queue, entry_seg);
781                 if (ret)
782                         free_entry(entry_seg);
783         }
784         return ret;
785 }
786
787 static int
788 nfqnl_enqueue_packet(struct nf_queue_entry *entry, unsigned int queuenum)
789 {
790         unsigned int queued;
791         struct nfqnl_instance *queue;
792         struct sk_buff *skb, *segs;
793         int err = -ENOBUFS;
794         struct net *net = entry->state.net;
795         struct nfnl_queue_net *q = nfnl_queue_pernet(net);
796
797         /* rcu_read_lock()ed by nf_hook_thresh */
798         queue = instance_lookup(q, queuenum);
799         if (!queue)
800                 return -ESRCH;
801
802         if (queue->copy_mode == NFQNL_COPY_NONE)
803                 return -EINVAL;
804
805         skb = entry->skb;
806
807         switch (entry->state.pf) {
808         case NFPROTO_IPV4:
809                 skb->protocol = htons(ETH_P_IP);
810                 break;
811         case NFPROTO_IPV6:
812                 skb->protocol = htons(ETH_P_IPV6);
813                 break;
814         }
815
816         if ((queue->flags & NFQA_CFG_F_GSO) || !skb_is_gso(skb))
817                 return __nfqnl_enqueue_packet(net, queue, entry);
818
819         nf_bridge_adjust_skb_data(skb);
820         segs = skb_gso_segment(skb, 0);
821         /* Does not use PTR_ERR to limit the number of error codes that can be
822          * returned by nf_queue.  For instance, callers rely on -ESRCH to
823          * mean 'ignore this hook'.
824          */
825         if (IS_ERR_OR_NULL(segs))
826                 goto out_err;
827         queued = 0;
828         err = 0;
829         do {
830                 struct sk_buff *nskb = segs->next;
831                 if (err == 0)
832                         err = __nfqnl_enqueue_packet_gso(net, queue,
833                                                         segs, entry);
834                 if (err == 0)
835                         queued++;
836                 else
837                         kfree_skb(segs);
838                 segs = nskb;
839         } while (segs);
840
841         if (queued) {
842                 if (err) /* some segments are already queued */
843                         free_entry(entry);
844                 kfree_skb(skb);
845                 return 0;
846         }
847  out_err:
848         nf_bridge_adjust_segmented_data(skb);
849         return err;
850 }
851
852 static int
853 nfqnl_mangle(void *data, int data_len, struct nf_queue_entry *e, int diff)
854 {
855         struct sk_buff *nskb;
856
857         if (diff < 0) {
858                 if (pskb_trim(e->skb, data_len))
859                         return -ENOMEM;
860         } else if (diff > 0) {
861                 if (data_len > 0xFFFF)
862                         return -EINVAL;
863                 if (diff > skb_tailroom(e->skb)) {
864                         nskb = skb_copy_expand(e->skb, skb_headroom(e->skb),
865                                                diff, GFP_ATOMIC);
866                         if (!nskb)
867                                 return -ENOMEM;
868                         kfree_skb(e->skb);
869                         e->skb = nskb;
870                 }
871                 skb_put(e->skb, diff);
872         }
873         if (!skb_make_writable(e->skb, data_len))
874                 return -ENOMEM;
875         skb_copy_to_linear_data(e->skb, data, data_len);
876         e->skb->ip_summed = CHECKSUM_NONE;
877         return 0;
878 }
879
880 static int
881 nfqnl_set_mode(struct nfqnl_instance *queue,
882                unsigned char mode, unsigned int range)
883 {
884         int status = 0;
885
886         spin_lock_bh(&queue->lock);
887         switch (mode) {
888         case NFQNL_COPY_NONE:
889         case NFQNL_COPY_META:
890                 queue->copy_mode = mode;
891                 queue->copy_range = 0;
892                 break;
893
894         case NFQNL_COPY_PACKET:
895                 queue->copy_mode = mode;
896                 if (range == 0 || range > NFQNL_MAX_COPY_RANGE)
897                         queue->copy_range = NFQNL_MAX_COPY_RANGE;
898                 else
899                         queue->copy_range = range;
900                 break;
901
902         default:
903                 status = -EINVAL;
904
905         }
906         spin_unlock_bh(&queue->lock);
907
908         return status;
909 }
910
911 static int
912 dev_cmp(struct nf_queue_entry *entry, unsigned long ifindex)
913 {
914         if (entry->state.in)
915                 if (entry->state.in->ifindex == ifindex)
916                         return 1;
917         if (entry->state.out)
918                 if (entry->state.out->ifindex == ifindex)
919                         return 1;
920 #if IS_ENABLED(CONFIG_BRIDGE_NETFILTER)
921         if (entry->skb->nf_bridge) {
922                 int physinif, physoutif;
923
924                 physinif = nf_bridge_get_physinif(entry->skb);
925                 physoutif = nf_bridge_get_physoutif(entry->skb);
926
927                 if (physinif == ifindex || physoutif == ifindex)
928                         return 1;
929         }
930 #endif
931         return 0;
932 }
933
934 /* drop all packets with either indev or outdev == ifindex from all queue
935  * instances */
936 static void
937 nfqnl_dev_drop(struct net *net, int ifindex)
938 {
939         int i;
940         struct nfnl_queue_net *q = nfnl_queue_pernet(net);
941
942         rcu_read_lock();
943
944         for (i = 0; i < INSTANCE_BUCKETS; i++) {
945                 struct nfqnl_instance *inst;
946                 struct hlist_head *head = &q->instance_table[i];
947
948                 hlist_for_each_entry_rcu(inst, head, hlist)
949                         nfqnl_flush(inst, dev_cmp, ifindex);
950         }
951
952         rcu_read_unlock();
953 }
954
955 static int
956 nfqnl_rcv_dev_event(struct notifier_block *this,
957                     unsigned long event, void *ptr)
958 {
959         struct net_device *dev = netdev_notifier_info_to_dev(ptr);
960
961         /* Drop any packets associated with the downed device */
962         if (event == NETDEV_DOWN)
963                 nfqnl_dev_drop(dev_net(dev), dev->ifindex);
964         return NOTIFY_DONE;
965 }
966
967 static struct notifier_block nfqnl_dev_notifier = {
968         .notifier_call  = nfqnl_rcv_dev_event,
969 };
970
971 static void nfqnl_nf_hook_drop(struct net *net)
972 {
973         struct nfnl_queue_net *q = nfnl_queue_pernet(net);
974         int i;
975
976         for (i = 0; i < INSTANCE_BUCKETS; i++) {
977                 struct nfqnl_instance *inst;
978                 struct hlist_head *head = &q->instance_table[i];
979
980                 hlist_for_each_entry_rcu(inst, head, hlist)
981                         nfqnl_flush(inst, NULL, 0);
982         }
983 }
984
985 static int
986 nfqnl_rcv_nl_event(struct notifier_block *this,
987                    unsigned long event, void *ptr)
988 {
989         struct netlink_notify *n = ptr;
990         struct nfnl_queue_net *q = nfnl_queue_pernet(n->net);
991
992         if (event == NETLINK_URELEASE && n->protocol == NETLINK_NETFILTER) {
993                 int i;
994
995                 /* destroy all instances for this portid */
996                 spin_lock(&q->instances_lock);
997                 for (i = 0; i < INSTANCE_BUCKETS; i++) {
998                         struct hlist_node *t2;
999                         struct nfqnl_instance *inst;
1000                         struct hlist_head *head = &q->instance_table[i];
1001
1002                         hlist_for_each_entry_safe(inst, t2, head, hlist) {
1003                                 if (n->portid == inst->peer_portid)
1004                                         __instance_destroy(inst);
1005                         }
1006                 }
1007                 spin_unlock(&q->instances_lock);
1008         }
1009         return NOTIFY_DONE;
1010 }
1011
1012 static struct notifier_block nfqnl_rtnl_notifier = {
1013         .notifier_call  = nfqnl_rcv_nl_event,
1014 };
1015
1016 static const struct nla_policy nfqa_vlan_policy[NFQA_VLAN_MAX + 1] = {
1017         [NFQA_VLAN_TCI]         = { .type = NLA_U16},
1018         [NFQA_VLAN_PROTO]       = { .type = NLA_U16},
1019 };
1020
1021 static const struct nla_policy nfqa_verdict_policy[NFQA_MAX+1] = {
1022         [NFQA_VERDICT_HDR]      = { .len = sizeof(struct nfqnl_msg_verdict_hdr) },
1023         [NFQA_MARK]             = { .type = NLA_U32 },
1024         [NFQA_PAYLOAD]          = { .type = NLA_UNSPEC },
1025         [NFQA_CT]               = { .type = NLA_UNSPEC },
1026         [NFQA_EXP]              = { .type = NLA_UNSPEC },
1027         [NFQA_VLAN]             = { .type = NLA_NESTED },
1028 };
1029
1030 static const struct nla_policy nfqa_verdict_batch_policy[NFQA_MAX+1] = {
1031         [NFQA_VERDICT_HDR]      = { .len = sizeof(struct nfqnl_msg_verdict_hdr) },
1032         [NFQA_MARK]             = { .type = NLA_U32 },
1033 };
1034
1035 static struct nfqnl_instance *
1036 verdict_instance_lookup(struct nfnl_queue_net *q, u16 queue_num, u32 nlportid)
1037 {
1038         struct nfqnl_instance *queue;
1039
1040         queue = instance_lookup(q, queue_num);
1041         if (!queue)
1042                 return ERR_PTR(-ENODEV);
1043
1044         if (queue->peer_portid != nlportid)
1045                 return ERR_PTR(-EPERM);
1046
1047         return queue;
1048 }
1049
1050 static struct nfqnl_msg_verdict_hdr*
1051 verdicthdr_get(const struct nlattr * const nfqa[])
1052 {
1053         struct nfqnl_msg_verdict_hdr *vhdr;
1054         unsigned int verdict;
1055
1056         if (!nfqa[NFQA_VERDICT_HDR])
1057                 return NULL;
1058
1059         vhdr = nla_data(nfqa[NFQA_VERDICT_HDR]);
1060         verdict = ntohl(vhdr->verdict) & NF_VERDICT_MASK;
1061         if (verdict > NF_MAX_VERDICT || verdict == NF_STOLEN)
1062                 return NULL;
1063         return vhdr;
1064 }
1065
1066 static int nfq_id_after(unsigned int id, unsigned int max)
1067 {
1068         return (int)(id - max) > 0;
1069 }
1070
1071 static int nfqnl_recv_verdict_batch(struct net *net, struct sock *ctnl,
1072                                     struct sk_buff *skb,
1073                                     const struct nlmsghdr *nlh,
1074                                     const struct nlattr * const nfqa[],
1075                                     struct netlink_ext_ack *extack)
1076 {
1077         struct nfgenmsg *nfmsg = nlmsg_data(nlh);
1078         struct nf_queue_entry *entry, *tmp;
1079         unsigned int verdict, maxid;
1080         struct nfqnl_msg_verdict_hdr *vhdr;
1081         struct nfqnl_instance *queue;
1082         LIST_HEAD(batch_list);
1083         u16 queue_num = ntohs(nfmsg->res_id);
1084         struct nfnl_queue_net *q = nfnl_queue_pernet(net);
1085
1086         queue = verdict_instance_lookup(q, queue_num,
1087                                         NETLINK_CB(skb).portid);
1088         if (IS_ERR(queue))
1089                 return PTR_ERR(queue);
1090
1091         vhdr = verdicthdr_get(nfqa);
1092         if (!vhdr)
1093                 return -EINVAL;
1094
1095         verdict = ntohl(vhdr->verdict);
1096         maxid = ntohl(vhdr->id);
1097
1098         spin_lock_bh(&queue->lock);
1099
1100         list_for_each_entry_safe(entry, tmp, &queue->queue_list, list) {
1101                 if (nfq_id_after(entry->id, maxid))
1102                         break;
1103                 __dequeue_entry(queue, entry);
1104                 list_add_tail(&entry->list, &batch_list);
1105         }
1106
1107         spin_unlock_bh(&queue->lock);
1108
1109         if (list_empty(&batch_list))
1110                 return -ENOENT;
1111
1112         list_for_each_entry_safe(entry, tmp, &batch_list, list) {
1113                 if (nfqa[NFQA_MARK])
1114                         entry->skb->mark = ntohl(nla_get_be32(nfqa[NFQA_MARK]));
1115
1116                 nfqnl_reinject(entry, verdict);
1117         }
1118         return 0;
1119 }
1120
1121 static struct nf_conn *nfqnl_ct_parse(struct nfnl_ct_hook *nfnl_ct,
1122                                       const struct nlmsghdr *nlh,
1123                                       const struct nlattr * const nfqa[],
1124                                       struct nf_queue_entry *entry,
1125                                       enum ip_conntrack_info *ctinfo)
1126 {
1127         struct nf_conn *ct;
1128
1129         ct = nfnl_ct->get_ct(entry->skb, ctinfo);
1130         if (ct == NULL)
1131                 return NULL;
1132
1133         if (nfnl_ct->parse(nfqa[NFQA_CT], ct) < 0)
1134                 return NULL;
1135
1136         if (nfqa[NFQA_EXP])
1137                 nfnl_ct->attach_expect(nfqa[NFQA_EXP], ct,
1138                                       NETLINK_CB(entry->skb).portid,
1139                                       nlmsg_report(nlh));
1140         return ct;
1141 }
1142
1143 static int nfqa_parse_bridge(struct nf_queue_entry *entry,
1144                              const struct nlattr * const nfqa[])
1145 {
1146         if (nfqa[NFQA_VLAN]) {
1147                 struct nlattr *tb[NFQA_VLAN_MAX + 1];
1148                 int err;
1149
1150                 err = nla_parse_nested(tb, NFQA_VLAN_MAX, nfqa[NFQA_VLAN],
1151                                        nfqa_vlan_policy, NULL);
1152                 if (err < 0)
1153                         return err;
1154
1155                 if (!tb[NFQA_VLAN_TCI] || !tb[NFQA_VLAN_PROTO])
1156                         return -EINVAL;
1157
1158                 entry->skb->vlan_tci = ntohs(nla_get_be16(tb[NFQA_VLAN_TCI]));
1159                 entry->skb->vlan_proto = nla_get_be16(tb[NFQA_VLAN_PROTO]);
1160         }
1161
1162         if (nfqa[NFQA_L2HDR]) {
1163                 int mac_header_len = entry->skb->network_header -
1164                         entry->skb->mac_header;
1165
1166                 if (mac_header_len != nla_len(nfqa[NFQA_L2HDR]))
1167                         return -EINVAL;
1168                 else if (mac_header_len > 0)
1169                         memcpy(skb_mac_header(entry->skb),
1170                                nla_data(nfqa[NFQA_L2HDR]),
1171                                mac_header_len);
1172         }
1173
1174         return 0;
1175 }
1176
1177 static int nfqnl_recv_verdict(struct net *net, struct sock *ctnl,
1178                               struct sk_buff *skb,
1179                               const struct nlmsghdr *nlh,
1180                               const struct nlattr * const nfqa[],
1181                               struct netlink_ext_ack *extack)
1182 {
1183         struct nfgenmsg *nfmsg = nlmsg_data(nlh);
1184         u_int16_t queue_num = ntohs(nfmsg->res_id);
1185         struct nfqnl_msg_verdict_hdr *vhdr;
1186         struct nfqnl_instance *queue;
1187         unsigned int verdict;
1188         struct nf_queue_entry *entry;
1189         enum ip_conntrack_info uninitialized_var(ctinfo);
1190         struct nfnl_ct_hook *nfnl_ct;
1191         struct nf_conn *ct = NULL;
1192         struct nfnl_queue_net *q = nfnl_queue_pernet(net);
1193         int err;
1194
1195         queue = verdict_instance_lookup(q, queue_num,
1196                                         NETLINK_CB(skb).portid);
1197         if (IS_ERR(queue))
1198                 return PTR_ERR(queue);
1199
1200         vhdr = verdicthdr_get(nfqa);
1201         if (!vhdr)
1202                 return -EINVAL;
1203
1204         verdict = ntohl(vhdr->verdict);
1205
1206         entry = find_dequeue_entry(queue, ntohl(vhdr->id));
1207         if (entry == NULL)
1208                 return -ENOENT;
1209
1210         /* rcu lock already held from nfnl->call_rcu. */
1211         nfnl_ct = rcu_dereference(nfnl_ct_hook);
1212
1213         if (nfqa[NFQA_CT]) {
1214                 if (nfnl_ct != NULL)
1215                         ct = nfqnl_ct_parse(nfnl_ct, nlh, nfqa, entry, &ctinfo);
1216         }
1217
1218         if (entry->state.pf == PF_BRIDGE) {
1219                 err = nfqa_parse_bridge(entry, nfqa);
1220                 if (err < 0)
1221                         return err;
1222         }
1223
1224         if (nfqa[NFQA_PAYLOAD]) {
1225                 u16 payload_len = nla_len(nfqa[NFQA_PAYLOAD]);
1226                 int diff = payload_len - entry->skb->len;
1227
1228                 if (nfqnl_mangle(nla_data(nfqa[NFQA_PAYLOAD]),
1229                                  payload_len, entry, diff) < 0)
1230                         verdict = NF_DROP;
1231
1232                 if (ct && diff)
1233                         nfnl_ct->seq_adjust(entry->skb, ct, ctinfo, diff);
1234         }
1235
1236         if (nfqa[NFQA_MARK])
1237                 entry->skb->mark = ntohl(nla_get_be32(nfqa[NFQA_MARK]));
1238
1239         nfqnl_reinject(entry, verdict);
1240         return 0;
1241 }
1242
1243 static int nfqnl_recv_unsupp(struct net *net, struct sock *ctnl,
1244                              struct sk_buff *skb, const struct nlmsghdr *nlh,
1245                              const struct nlattr * const nfqa[],
1246                              struct netlink_ext_ack *extack)
1247 {
1248         return -ENOTSUPP;
1249 }
1250
1251 static const struct nla_policy nfqa_cfg_policy[NFQA_CFG_MAX+1] = {
1252         [NFQA_CFG_CMD]          = { .len = sizeof(struct nfqnl_msg_config_cmd) },
1253         [NFQA_CFG_PARAMS]       = { .len = sizeof(struct nfqnl_msg_config_params) },
1254         [NFQA_CFG_QUEUE_MAXLEN] = { .type = NLA_U32 },
1255         [NFQA_CFG_MASK]         = { .type = NLA_U32 },
1256         [NFQA_CFG_FLAGS]        = { .type = NLA_U32 },
1257 };
1258
1259 static const struct nf_queue_handler nfqh = {
1260         .outfn          = nfqnl_enqueue_packet,
1261         .nf_hook_drop   = nfqnl_nf_hook_drop,
1262 };
1263
1264 static int nfqnl_recv_config(struct net *net, struct sock *ctnl,
1265                              struct sk_buff *skb, const struct nlmsghdr *nlh,
1266                              const struct nlattr * const nfqa[],
1267                              struct netlink_ext_ack *extack)
1268 {
1269         struct nfgenmsg *nfmsg = nlmsg_data(nlh);
1270         u_int16_t queue_num = ntohs(nfmsg->res_id);
1271         struct nfqnl_instance *queue;
1272         struct nfqnl_msg_config_cmd *cmd = NULL;
1273         struct nfnl_queue_net *q = nfnl_queue_pernet(net);
1274         __u32 flags = 0, mask = 0;
1275         int ret = 0;
1276
1277         if (nfqa[NFQA_CFG_CMD]) {
1278                 cmd = nla_data(nfqa[NFQA_CFG_CMD]);
1279
1280                 /* Obsolete commands without queue context */
1281                 switch (cmd->command) {
1282                 case NFQNL_CFG_CMD_PF_BIND: return 0;
1283                 case NFQNL_CFG_CMD_PF_UNBIND: return 0;
1284                 }
1285         }
1286
1287         /* Check if we support these flags in first place, dependencies should
1288          * be there too not to break atomicity.
1289          */
1290         if (nfqa[NFQA_CFG_FLAGS]) {
1291                 if (!nfqa[NFQA_CFG_MASK]) {
1292                         /* A mask is needed to specify which flags are being
1293                          * changed.
1294                          */
1295                         return -EINVAL;
1296                 }
1297
1298                 flags = ntohl(nla_get_be32(nfqa[NFQA_CFG_FLAGS]));
1299                 mask = ntohl(nla_get_be32(nfqa[NFQA_CFG_MASK]));
1300
1301                 if (flags >= NFQA_CFG_F_MAX)
1302                         return -EOPNOTSUPP;
1303
1304 #if !IS_ENABLED(CONFIG_NETWORK_SECMARK)
1305                 if (flags & mask & NFQA_CFG_F_SECCTX)
1306                         return -EOPNOTSUPP;
1307 #endif
1308                 if ((flags & mask & NFQA_CFG_F_CONNTRACK) &&
1309                     !rcu_access_pointer(nfnl_ct_hook)) {
1310 #ifdef CONFIG_MODULES
1311                         nfnl_unlock(NFNL_SUBSYS_QUEUE);
1312                         request_module("ip_conntrack_netlink");
1313                         nfnl_lock(NFNL_SUBSYS_QUEUE);
1314                         if (rcu_access_pointer(nfnl_ct_hook))
1315                                 return -EAGAIN;
1316 #endif
1317                         return -EOPNOTSUPP;
1318                 }
1319         }
1320
1321         rcu_read_lock();
1322         queue = instance_lookup(q, queue_num);
1323         if (queue && queue->peer_portid != NETLINK_CB(skb).portid) {
1324                 ret = -EPERM;
1325                 goto err_out_unlock;
1326         }
1327
1328         if (cmd != NULL) {
1329                 switch (cmd->command) {
1330                 case NFQNL_CFG_CMD_BIND:
1331                         if (queue) {
1332                                 ret = -EBUSY;
1333                                 goto err_out_unlock;
1334                         }
1335                         queue = instance_create(q, queue_num,
1336                                                 NETLINK_CB(skb).portid);
1337                         if (IS_ERR(queue)) {
1338                                 ret = PTR_ERR(queue);
1339                                 goto err_out_unlock;
1340                         }
1341                         break;
1342                 case NFQNL_CFG_CMD_UNBIND:
1343                         if (!queue) {
1344                                 ret = -ENODEV;
1345                                 goto err_out_unlock;
1346                         }
1347                         instance_destroy(q, queue);
1348                         goto err_out_unlock;
1349                 case NFQNL_CFG_CMD_PF_BIND:
1350                 case NFQNL_CFG_CMD_PF_UNBIND:
1351                         break;
1352                 default:
1353                         ret = -ENOTSUPP;
1354                         goto err_out_unlock;
1355                 }
1356         }
1357
1358         if (!queue) {
1359                 ret = -ENODEV;
1360                 goto err_out_unlock;
1361         }
1362
1363         if (nfqa[NFQA_CFG_PARAMS]) {
1364                 struct nfqnl_msg_config_params *params =
1365                         nla_data(nfqa[NFQA_CFG_PARAMS]);
1366
1367                 nfqnl_set_mode(queue, params->copy_mode,
1368                                 ntohl(params->copy_range));
1369         }
1370
1371         if (nfqa[NFQA_CFG_QUEUE_MAXLEN]) {
1372                 __be32 *queue_maxlen = nla_data(nfqa[NFQA_CFG_QUEUE_MAXLEN]);
1373
1374                 spin_lock_bh(&queue->lock);
1375                 queue->queue_maxlen = ntohl(*queue_maxlen);
1376                 spin_unlock_bh(&queue->lock);
1377         }
1378
1379         if (nfqa[NFQA_CFG_FLAGS]) {
1380                 spin_lock_bh(&queue->lock);
1381                 queue->flags &= ~mask;
1382                 queue->flags |= flags & mask;
1383                 spin_unlock_bh(&queue->lock);
1384         }
1385
1386 err_out_unlock:
1387         rcu_read_unlock();
1388         return ret;
1389 }
1390
1391 static const struct nfnl_callback nfqnl_cb[NFQNL_MSG_MAX] = {
1392         [NFQNL_MSG_PACKET]      = { .call_rcu = nfqnl_recv_unsupp,
1393                                     .attr_count = NFQA_MAX, },
1394         [NFQNL_MSG_VERDICT]     = { .call_rcu = nfqnl_recv_verdict,
1395                                     .attr_count = NFQA_MAX,
1396                                     .policy = nfqa_verdict_policy },
1397         [NFQNL_MSG_CONFIG]      = { .call = nfqnl_recv_config,
1398                                     .attr_count = NFQA_CFG_MAX,
1399                                     .policy = nfqa_cfg_policy },
1400         [NFQNL_MSG_VERDICT_BATCH]={ .call_rcu = nfqnl_recv_verdict_batch,
1401                                     .attr_count = NFQA_MAX,
1402                                     .policy = nfqa_verdict_batch_policy },
1403 };
1404
1405 static const struct nfnetlink_subsystem nfqnl_subsys = {
1406         .name           = "nf_queue",
1407         .subsys_id      = NFNL_SUBSYS_QUEUE,
1408         .cb_count       = NFQNL_MSG_MAX,
1409         .cb             = nfqnl_cb,
1410 };
1411
1412 #ifdef CONFIG_PROC_FS
1413 struct iter_state {
1414         struct seq_net_private p;
1415         unsigned int bucket;
1416 };
1417
1418 static struct hlist_node *get_first(struct seq_file *seq)
1419 {
1420         struct iter_state *st = seq->private;
1421         struct net *net;
1422         struct nfnl_queue_net *q;
1423
1424         if (!st)
1425                 return NULL;
1426
1427         net = seq_file_net(seq);
1428         q = nfnl_queue_pernet(net);
1429         for (st->bucket = 0; st->bucket < INSTANCE_BUCKETS; st->bucket++) {
1430                 if (!hlist_empty(&q->instance_table[st->bucket]))
1431                         return q->instance_table[st->bucket].first;
1432         }
1433         return NULL;
1434 }
1435
1436 static struct hlist_node *get_next(struct seq_file *seq, struct hlist_node *h)
1437 {
1438         struct iter_state *st = seq->private;
1439         struct net *net = seq_file_net(seq);
1440
1441         h = h->next;
1442         while (!h) {
1443                 struct nfnl_queue_net *q;
1444
1445                 if (++st->bucket >= INSTANCE_BUCKETS)
1446                         return NULL;
1447
1448                 q = nfnl_queue_pernet(net);
1449                 h = q->instance_table[st->bucket].first;
1450         }
1451         return h;
1452 }
1453
1454 static struct hlist_node *get_idx(struct seq_file *seq, loff_t pos)
1455 {
1456         struct hlist_node *head;
1457         head = get_first(seq);
1458
1459         if (head)
1460                 while (pos && (head = get_next(seq, head)))
1461                         pos--;
1462         return pos ? NULL : head;
1463 }
1464
1465 static void *seq_start(struct seq_file *s, loff_t *pos)
1466         __acquires(nfnl_queue_pernet(seq_file_net(s))->instances_lock)
1467 {
1468         spin_lock(&nfnl_queue_pernet(seq_file_net(s))->instances_lock);
1469         return get_idx(s, *pos);
1470 }
1471
1472 static void *seq_next(struct seq_file *s, void *v, loff_t *pos)
1473 {
1474         (*pos)++;
1475         return get_next(s, v);
1476 }
1477
1478 static void seq_stop(struct seq_file *s, void *v)
1479         __releases(nfnl_queue_pernet(seq_file_net(s))->instances_lock)
1480 {
1481         spin_unlock(&nfnl_queue_pernet(seq_file_net(s))->instances_lock);
1482 }
1483
1484 static int seq_show(struct seq_file *s, void *v)
1485 {
1486         const struct nfqnl_instance *inst = v;
1487
1488         seq_printf(s, "%5u %6u %5u %1u %5u %5u %5u %8u %2d\n",
1489                    inst->queue_num,
1490                    inst->peer_portid, inst->queue_total,
1491                    inst->copy_mode, inst->copy_range,
1492                    inst->queue_dropped, inst->queue_user_dropped,
1493                    inst->id_sequence, 1);
1494         return 0;
1495 }
1496
1497 static const struct seq_operations nfqnl_seq_ops = {
1498         .start  = seq_start,
1499         .next   = seq_next,
1500         .stop   = seq_stop,
1501         .show   = seq_show,
1502 };
1503 #endif /* PROC_FS */
1504
1505 static int __net_init nfnl_queue_net_init(struct net *net)
1506 {
1507         unsigned int i;
1508         struct nfnl_queue_net *q = nfnl_queue_pernet(net);
1509
1510         for (i = 0; i < INSTANCE_BUCKETS; i++)
1511                 INIT_HLIST_HEAD(&q->instance_table[i]);
1512
1513         spin_lock_init(&q->instances_lock);
1514
1515 #ifdef CONFIG_PROC_FS
1516         if (!proc_create_net("nfnetlink_queue", 0440, net->nf.proc_netfilter,
1517                         &nfqnl_seq_ops, sizeof(struct iter_state)))
1518                 return -ENOMEM;
1519 #endif
1520         nf_register_queue_handler(net, &nfqh);
1521         return 0;
1522 }
1523
1524 static void __net_exit nfnl_queue_net_exit(struct net *net)
1525 {
1526         struct nfnl_queue_net *q = nfnl_queue_pernet(net);
1527         unsigned int i;
1528
1529         nf_unregister_queue_handler(net);
1530 #ifdef CONFIG_PROC_FS
1531         remove_proc_entry("nfnetlink_queue", net->nf.proc_netfilter);
1532 #endif
1533         for (i = 0; i < INSTANCE_BUCKETS; i++)
1534                 WARN_ON_ONCE(!hlist_empty(&q->instance_table[i]));
1535 }
1536
1537 static void nfnl_queue_net_exit_batch(struct list_head *net_exit_list)
1538 {
1539         synchronize_rcu();
1540 }
1541
1542 static struct pernet_operations nfnl_queue_net_ops = {
1543         .init           = nfnl_queue_net_init,
1544         .exit           = nfnl_queue_net_exit,
1545         .exit_batch     = nfnl_queue_net_exit_batch,
1546         .id             = &nfnl_queue_net_id,
1547         .size           = sizeof(struct nfnl_queue_net),
1548 };
1549
1550 static int __init nfnetlink_queue_init(void)
1551 {
1552         int status;
1553
1554         status = register_pernet_subsys(&nfnl_queue_net_ops);
1555         if (status < 0) {
1556                 pr_err("failed to register pernet ops\n");
1557                 goto out;
1558         }
1559
1560         netlink_register_notifier(&nfqnl_rtnl_notifier);
1561         status = nfnetlink_subsys_register(&nfqnl_subsys);
1562         if (status < 0) {
1563                 pr_err("failed to create netlink socket\n");
1564                 goto cleanup_netlink_notifier;
1565         }
1566
1567         status = register_netdevice_notifier(&nfqnl_dev_notifier);
1568         if (status < 0) {
1569                 pr_err("failed to register netdevice notifier\n");
1570                 goto cleanup_netlink_subsys;
1571         }
1572
1573         return status;
1574
1575 cleanup_netlink_subsys:
1576         nfnetlink_subsys_unregister(&nfqnl_subsys);
1577 cleanup_netlink_notifier:
1578         netlink_unregister_notifier(&nfqnl_rtnl_notifier);
1579         unregister_pernet_subsys(&nfnl_queue_net_ops);
1580 out:
1581         return status;
1582 }
1583
1584 static void __exit nfnetlink_queue_fini(void)
1585 {
1586         unregister_netdevice_notifier(&nfqnl_dev_notifier);
1587         nfnetlink_subsys_unregister(&nfqnl_subsys);
1588         netlink_unregister_notifier(&nfqnl_rtnl_notifier);
1589         unregister_pernet_subsys(&nfnl_queue_net_ops);
1590
1591         rcu_barrier(); /* Wait for completion of call_rcu()'s */
1592 }
1593
1594 MODULE_DESCRIPTION("netfilter packet queue handler");
1595 MODULE_AUTHOR("Harald Welte <laforge@netfilter.org>");
1596 MODULE_LICENSE("GPL");
1597 MODULE_ALIAS_NFNL_SUBSYS(NFNL_SUBSYS_QUEUE);
1598
1599 module_init(nfnetlink_queue_init);
1600 module_exit(nfnetlink_queue_fini);