| // SPDX-License-Identifier: GPL-2.0-only |
| /* |
| * Copyright (c) 2008-2009 Patrick McHardy <kaber@trash.net> |
| * Copyright (c) 2016 Pablo Neira Ayuso <pablo@netfilter.org> |
| * |
| * Development of this code funded by Astaro AG (http://www.astaro.com/) |
| */ |
| |
| #include <linux/kernel.h> |
| #include <linux/init.h> |
| #include <linux/module.h> |
| #include <linux/netlink.h> |
| #include <linux/netfilter.h> |
| #include <linux/netfilter/nf_tables.h> |
| #include <net/netfilter/nf_tables.h> |
| #include <net/netfilter/nf_conntrack.h> |
| #include <net/netfilter/nf_conntrack_acct.h> |
| #include <net/netfilter/nf_conntrack_tuple.h> |
| #include <net/netfilter/nf_conntrack_helper.h> |
| #include <net/netfilter/nf_conntrack_ecache.h> |
| #include <net/netfilter/nf_conntrack_labels.h> |
| #include <net/netfilter/nf_conntrack_timeout.h> |
| #include <net/netfilter/nf_conntrack_l4proto.h> |
| #include <net/netfilter/nf_conntrack_expect.h> |
| |
| struct nft_ct { |
| enum nft_ct_keys key:8; |
| enum ip_conntrack_dir dir:8; |
| union { |
| u8 dreg; |
| u8 sreg; |
| }; |
| }; |
| |
| struct nft_ct_helper_obj { |
| struct nf_conntrack_helper *helper4; |
| struct nf_conntrack_helper *helper6; |
| u8 l4proto; |
| }; |
| |
| #ifdef CONFIG_NF_CONNTRACK_ZONES |
| static DEFINE_PER_CPU(struct nf_conn *, nft_ct_pcpu_template); |
| static unsigned int nft_ct_pcpu_template_refcnt __read_mostly; |
| static DEFINE_MUTEX(nft_ct_pcpu_mutex); |
| #endif |
| |
| static u64 nft_ct_get_eval_counter(const struct nf_conn_counter *c, |
| enum nft_ct_keys k, |
| enum ip_conntrack_dir d) |
| { |
| if (d < IP_CT_DIR_MAX) |
| return k == NFT_CT_BYTES ? atomic64_read(&c[d].bytes) : |
| atomic64_read(&c[d].packets); |
| |
| return nft_ct_get_eval_counter(c, k, IP_CT_DIR_ORIGINAL) + |
| nft_ct_get_eval_counter(c, k, IP_CT_DIR_REPLY); |
| } |
| |
| static void nft_ct_get_eval(const struct nft_expr *expr, |
| struct nft_regs *regs, |
| const struct nft_pktinfo *pkt) |
| { |
| const struct nft_ct *priv = nft_expr_priv(expr); |
| u32 *dest = ®s->data[priv->dreg]; |
| enum ip_conntrack_info ctinfo; |
| const struct nf_conn *ct; |
| const struct nf_conn_help *help; |
| const struct nf_conntrack_tuple *tuple; |
| const struct nf_conntrack_helper *helper; |
| unsigned int state; |
| |
| ct = nf_ct_get(pkt->skb, &ctinfo); |
| |
| switch (priv->key) { |
| case NFT_CT_STATE: |
| if (ct) |
| state = NF_CT_STATE_BIT(ctinfo); |
| else if (ctinfo == IP_CT_UNTRACKED) |
| state = NF_CT_STATE_UNTRACKED_BIT; |
| else |
| state = NF_CT_STATE_INVALID_BIT; |
| *dest = state; |
| return; |
| default: |
| break; |
| } |
| |
| if (ct == NULL) |
| goto err; |
| |
| switch (priv->key) { |
| case NFT_CT_DIRECTION: |
| nft_reg_store8(dest, CTINFO2DIR(ctinfo)); |
| return; |
| case NFT_CT_STATUS: |
| *dest = ct->status; |
| return; |
| #ifdef CONFIG_NF_CONNTRACK_MARK |
| case NFT_CT_MARK: |
| *dest = ct->mark; |
| return; |
| #endif |
| #ifdef CONFIG_NF_CONNTRACK_SECMARK |
| case NFT_CT_SECMARK: |
| *dest = ct->secmark; |
| return; |
| #endif |
| case NFT_CT_EXPIRATION: |
| *dest = jiffies_to_msecs(nf_ct_expires(ct)); |
| return; |
| case NFT_CT_HELPER: |
| if (ct->master == NULL) |
| goto err; |
| help = nfct_help(ct->master); |
| if (help == NULL) |
| goto err; |
| helper = rcu_dereference(help->helper); |
| if (helper == NULL) |
| goto err; |
| strncpy((char *)dest, helper->name, NF_CT_HELPER_NAME_LEN); |
| return; |
| #ifdef CONFIG_NF_CONNTRACK_LABELS |
| case NFT_CT_LABELS: { |
| struct nf_conn_labels *labels = nf_ct_labels_find(ct); |
| |
| if (labels) |
| memcpy(dest, labels->bits, NF_CT_LABELS_MAX_SIZE); |
| else |
| memset(dest, 0, NF_CT_LABELS_MAX_SIZE); |
| return; |
| } |
| #endif |
| case NFT_CT_BYTES: |
| case NFT_CT_PKTS: { |
| const struct nf_conn_acct *acct = nf_conn_acct_find(ct); |
| u64 count = 0; |
| |
| if (acct) |
| count = nft_ct_get_eval_counter(acct->counter, |
| priv->key, priv->dir); |
| memcpy(dest, &count, sizeof(count)); |
| return; |
| } |
| case NFT_CT_AVGPKT: { |
| const struct nf_conn_acct *acct = nf_conn_acct_find(ct); |
| u64 avgcnt = 0, bcnt = 0, pcnt = 0; |
| |
| if (acct) { |
| pcnt = nft_ct_get_eval_counter(acct->counter, |
| NFT_CT_PKTS, priv->dir); |
| bcnt = nft_ct_get_eval_counter(acct->counter, |
| NFT_CT_BYTES, priv->dir); |
| if (pcnt != 0) |
| avgcnt = div64_u64(bcnt, pcnt); |
| } |
| |
| memcpy(dest, &avgcnt, sizeof(avgcnt)); |
| return; |
| } |
| case NFT_CT_L3PROTOCOL: |
| nft_reg_store8(dest, nf_ct_l3num(ct)); |
| return; |
| case NFT_CT_PROTOCOL: |
| nft_reg_store8(dest, nf_ct_protonum(ct)); |
| return; |
| #ifdef CONFIG_NF_CONNTRACK_ZONES |
| case NFT_CT_ZONE: { |
| const struct nf_conntrack_zone *zone = nf_ct_zone(ct); |
| u16 zoneid; |
| |
| if (priv->dir < IP_CT_DIR_MAX) |
| zoneid = nf_ct_zone_id(zone, priv->dir); |
| else |
| zoneid = zone->id; |
| |
| nft_reg_store16(dest, zoneid); |
| return; |
| } |
| #endif |
| case NFT_CT_ID: |
| *dest = nf_ct_get_id(ct); |
| return; |
| default: |
| break; |
| } |
| |
| tuple = &ct->tuplehash[priv->dir].tuple; |
| switch (priv->key) { |
| case NFT_CT_SRC: |
| memcpy(dest, tuple->src.u3.all, |
| nf_ct_l3num(ct) == NFPROTO_IPV4 ? 4 : 16); |
| return; |
| case NFT_CT_DST: |
| memcpy(dest, tuple->dst.u3.all, |
| nf_ct_l3num(ct) == NFPROTO_IPV4 ? 4 : 16); |
| return; |
| case NFT_CT_PROTO_SRC: |
| nft_reg_store16(dest, (__force u16)tuple->src.u.all); |
| return; |
| case NFT_CT_PROTO_DST: |
| nft_reg_store16(dest, (__force u16)tuple->dst.u.all); |
| return; |
| case NFT_CT_SRC_IP: |
| if (nf_ct_l3num(ct) != NFPROTO_IPV4) |
| goto err; |
| *dest = tuple->src.u3.ip; |
| return; |
| case NFT_CT_DST_IP: |
| if (nf_ct_l3num(ct) != NFPROTO_IPV4) |
| goto err; |
| *dest = tuple->dst.u3.ip; |
| return; |
| case NFT_CT_SRC_IP6: |
| if (nf_ct_l3num(ct) != NFPROTO_IPV6) |
| goto err; |
| memcpy(dest, tuple->src.u3.ip6, sizeof(struct in6_addr)); |
| return; |
| case NFT_CT_DST_IP6: |
| if (nf_ct_l3num(ct) != NFPROTO_IPV6) |
| goto err; |
| memcpy(dest, tuple->dst.u3.ip6, sizeof(struct in6_addr)); |
| return; |
| default: |
| break; |
| } |
| return; |
| err: |
| regs->verdict.code = NFT_BREAK; |
| } |
| |
| #ifdef CONFIG_NF_CONNTRACK_ZONES |
| static void nft_ct_set_zone_eval(const struct nft_expr *expr, |
| struct nft_regs *regs, |
| const struct nft_pktinfo *pkt) |
| { |
| struct nf_conntrack_zone zone = { .dir = NF_CT_DEFAULT_ZONE_DIR }; |
| const struct nft_ct *priv = nft_expr_priv(expr); |
| struct sk_buff *skb = pkt->skb; |
| enum ip_conntrack_info ctinfo; |
| u16 value = nft_reg_load16(®s->data[priv->sreg]); |
| struct nf_conn *ct; |
| |
| ct = nf_ct_get(skb, &ctinfo); |
| if (ct) /* already tracked */ |
| return; |
| |
| zone.id = value; |
| |
| switch (priv->dir) { |
| case IP_CT_DIR_ORIGINAL: |
| zone.dir = NF_CT_ZONE_DIR_ORIG; |
| break; |
| case IP_CT_DIR_REPLY: |
| zone.dir = NF_CT_ZONE_DIR_REPL; |
| break; |
| default: |
| break; |
| } |
| |
| ct = this_cpu_read(nft_ct_pcpu_template); |
| |
| if (likely(atomic_read(&ct->ct_general.use) == 1)) { |
| nf_ct_zone_add(ct, &zone); |
| } else { |
| /* previous skb got queued to userspace */ |
| ct = nf_ct_tmpl_alloc(nft_net(pkt), &zone, GFP_ATOMIC); |
| if (!ct) { |
| regs->verdict.code = NF_DROP; |
| return; |
| } |
| } |
| |
| atomic_inc(&ct->ct_general.use); |
| nf_ct_set(skb, ct, IP_CT_NEW); |
| } |
| #endif |
| |
| static void nft_ct_set_eval(const struct nft_expr *expr, |
| struct nft_regs *regs, |
| const struct nft_pktinfo *pkt) |
| { |
| const struct nft_ct *priv = nft_expr_priv(expr); |
| struct sk_buff *skb = pkt->skb; |
| #if defined(CONFIG_NF_CONNTRACK_MARK) || defined(CONFIG_NF_CONNTRACK_SECMARK) |
| u32 value = regs->data[priv->sreg]; |
| #endif |
| enum ip_conntrack_info ctinfo; |
| struct nf_conn *ct; |
| |
| ct = nf_ct_get(skb, &ctinfo); |
| if (ct == NULL || nf_ct_is_template(ct)) |
| return; |
| |
| switch (priv->key) { |
| #ifdef CONFIG_NF_CONNTRACK_MARK |
| case NFT_CT_MARK: |
| if (ct->mark != value) { |
| ct->mark = value; |
| nf_conntrack_event_cache(IPCT_MARK, ct); |
| } |
| break; |
| #endif |
| #ifdef CONFIG_NF_CONNTRACK_SECMARK |
| case NFT_CT_SECMARK: |
| if (ct->secmark != value) { |
| ct->secmark = value; |
| nf_conntrack_event_cache(IPCT_SECMARK, ct); |
| } |
| break; |
| #endif |
| #ifdef CONFIG_NF_CONNTRACK_LABELS |
| case NFT_CT_LABELS: |
| nf_connlabels_replace(ct, |
| ®s->data[priv->sreg], |
| ®s->data[priv->sreg], |
| NF_CT_LABELS_MAX_SIZE / sizeof(u32)); |
| break; |
| #endif |
| #ifdef CONFIG_NF_CONNTRACK_EVENTS |
| case NFT_CT_EVENTMASK: { |
| struct nf_conntrack_ecache *e = nf_ct_ecache_find(ct); |
| u32 ctmask = regs->data[priv->sreg]; |
| |
| if (e) { |
| if (e->ctmask != ctmask) |
| e->ctmask = ctmask; |
| break; |
| } |
| |
| if (ctmask && !nf_ct_is_confirmed(ct)) |
| nf_ct_ecache_ext_add(ct, ctmask, 0, GFP_ATOMIC); |
| break; |
| } |
| #endif |
| default: |
| break; |
| } |
| } |
| |
| static const struct nla_policy nft_ct_policy[NFTA_CT_MAX + 1] = { |
| [NFTA_CT_DREG] = { .type = NLA_U32 }, |
| [NFTA_CT_KEY] = { .type = NLA_U32 }, |
| [NFTA_CT_DIRECTION] = { .type = NLA_U8 }, |
| [NFTA_CT_SREG] = { .type = NLA_U32 }, |
| }; |
| |
| #ifdef CONFIG_NF_CONNTRACK_ZONES |
| static void nft_ct_tmpl_put_pcpu(void) |
| { |
| struct nf_conn *ct; |
| int cpu; |
| |
| for_each_possible_cpu(cpu) { |
| ct = per_cpu(nft_ct_pcpu_template, cpu); |
| if (!ct) |
| break; |
| nf_ct_put(ct); |
| per_cpu(nft_ct_pcpu_template, cpu) = NULL; |
| } |
| } |
| |
| static bool nft_ct_tmpl_alloc_pcpu(void) |
| { |
| struct nf_conntrack_zone zone = { .id = 0 }; |
| struct nf_conn *tmp; |
| int cpu; |
| |
| if (nft_ct_pcpu_template_refcnt) |
| return true; |
| |
| for_each_possible_cpu(cpu) { |
| tmp = nf_ct_tmpl_alloc(&init_net, &zone, GFP_KERNEL); |
| if (!tmp) { |
| nft_ct_tmpl_put_pcpu(); |
| return false; |
| } |
| |
| atomic_set(&tmp->ct_general.use, 1); |
| per_cpu(nft_ct_pcpu_template, cpu) = tmp; |
| } |
| |
| return true; |
| } |
| #endif |
| |
| static int nft_ct_get_init(const struct nft_ctx *ctx, |
| const struct nft_expr *expr, |
| const struct nlattr * const tb[]) |
| { |
| struct nft_ct *priv = nft_expr_priv(expr); |
| unsigned int len; |
| int err; |
| |
| priv->key = ntohl(nla_get_be32(tb[NFTA_CT_KEY])); |
| priv->dir = IP_CT_DIR_MAX; |
| switch (priv->key) { |
| case NFT_CT_DIRECTION: |
| if (tb[NFTA_CT_DIRECTION] != NULL) |
| return -EINVAL; |
| len = sizeof(u8); |
| break; |
| case NFT_CT_STATE: |
| case NFT_CT_STATUS: |
| #ifdef CONFIG_NF_CONNTRACK_MARK |
| case NFT_CT_MARK: |
| #endif |
| #ifdef CONFIG_NF_CONNTRACK_SECMARK |
| case NFT_CT_SECMARK: |
| #endif |
| case NFT_CT_EXPIRATION: |
| if (tb[NFTA_CT_DIRECTION] != NULL) |
| return -EINVAL; |
| len = sizeof(u32); |
| break; |
| #ifdef CONFIG_NF_CONNTRACK_LABELS |
| case NFT_CT_LABELS: |
| if (tb[NFTA_CT_DIRECTION] != NULL) |
| return -EINVAL; |
| len = NF_CT_LABELS_MAX_SIZE; |
| break; |
| #endif |
| case NFT_CT_HELPER: |
| if (tb[NFTA_CT_DIRECTION] != NULL) |
| return -EINVAL; |
| len = NF_CT_HELPER_NAME_LEN; |
| break; |
| |
| case NFT_CT_L3PROTOCOL: |
| case NFT_CT_PROTOCOL: |
| /* For compatibility, do not report error if NFTA_CT_DIRECTION |
| * attribute is specified. |
| */ |
| len = sizeof(u8); |
| break; |
| case NFT_CT_SRC: |
| case NFT_CT_DST: |
| if (tb[NFTA_CT_DIRECTION] == NULL) |
| return -EINVAL; |
| |
| switch (ctx->family) { |
| case NFPROTO_IPV4: |
| len = sizeof_field(struct nf_conntrack_tuple, |
| src.u3.ip); |
| break; |
| case NFPROTO_IPV6: |
| case NFPROTO_INET: |
| len = sizeof_field(struct nf_conntrack_tuple, |
| src.u3.ip6); |
| break; |
| default: |
| return -EAFNOSUPPORT; |
| } |
| break; |
| case NFT_CT_SRC_IP: |
| case NFT_CT_DST_IP: |
| if (tb[NFTA_CT_DIRECTION] == NULL) |
| return -EINVAL; |
| |
| len = sizeof_field(struct nf_conntrack_tuple, src.u3.ip); |
| break; |
| case NFT_CT_SRC_IP6: |
| case NFT_CT_DST_IP6: |
| if (tb[NFTA_CT_DIRECTION] == NULL) |
| return -EINVAL; |
| |
| len = sizeof_field(struct nf_conntrack_tuple, src.u3.ip6); |
| break; |
| case NFT_CT_PROTO_SRC: |
| case NFT_CT_PROTO_DST: |
| if (tb[NFTA_CT_DIRECTION] == NULL) |
| return -EINVAL; |
| len = sizeof_field(struct nf_conntrack_tuple, src.u.all); |
| break; |
| case NFT_CT_BYTES: |
| case NFT_CT_PKTS: |
| case NFT_CT_AVGPKT: |
| len = sizeof(u64); |
| break; |
| #ifdef CONFIG_NF_CONNTRACK_ZONES |
| case NFT_CT_ZONE: |
| len = sizeof(u16); |
| break; |
| #endif |
| case NFT_CT_ID: |
| len = sizeof(u32); |
| break; |
| default: |
| return -EOPNOTSUPP; |
| } |
| |
| if (tb[NFTA_CT_DIRECTION] != NULL) { |
| priv->dir = nla_get_u8(tb[NFTA_CT_DIRECTION]); |
| switch (priv->dir) { |
| case IP_CT_DIR_ORIGINAL: |
| case IP_CT_DIR_REPLY: |
| break; |
| default: |
| return -EINVAL; |
| } |
| } |
| |
| err = nft_parse_register_store(ctx, tb[NFTA_CT_DREG], &priv->dreg, NULL, |
| NFT_DATA_VALUE, len); |
| if (err < 0) |
| return err; |
| |
| err = nf_ct_netns_get(ctx->net, ctx->family); |
| if (err < 0) |
| return err; |
| |
| if (priv->key == NFT_CT_BYTES || |
| priv->key == NFT_CT_PKTS || |
| priv->key == NFT_CT_AVGPKT) |
| nf_ct_set_acct(ctx->net, true); |
| |
| return 0; |
| } |
| |
| static void __nft_ct_set_destroy(const struct nft_ctx *ctx, struct nft_ct *priv) |
| { |
| switch (priv->key) { |
| #ifdef CONFIG_NF_CONNTRACK_LABELS |
| case NFT_CT_LABELS: |
| nf_connlabels_put(ctx->net); |
| break; |
| #endif |
| #ifdef CONFIG_NF_CONNTRACK_ZONES |
| case NFT_CT_ZONE: |
| mutex_lock(&nft_ct_pcpu_mutex); |
| if (--nft_ct_pcpu_template_refcnt == 0) |
| nft_ct_tmpl_put_pcpu(); |
| mutex_unlock(&nft_ct_pcpu_mutex); |
| break; |
| #endif |
| default: |
| break; |
| } |
| } |
| |
| static int nft_ct_set_init(const struct nft_ctx *ctx, |
| const struct nft_expr *expr, |
| const struct nlattr * const tb[]) |
| { |
| struct nft_ct *priv = nft_expr_priv(expr); |
| unsigned int len; |
| int err; |
| |
| priv->dir = IP_CT_DIR_MAX; |
| priv->key = ntohl(nla_get_be32(tb[NFTA_CT_KEY])); |
| switch (priv->key) { |
| #ifdef CONFIG_NF_CONNTRACK_MARK |
| case NFT_CT_MARK: |
| if (tb[NFTA_CT_DIRECTION]) |
| return -EINVAL; |
| len = sizeof_field(struct nf_conn, mark); |
| break; |
| #endif |
| #ifdef CONFIG_NF_CONNTRACK_LABELS |
| case NFT_CT_LABELS: |
| if (tb[NFTA_CT_DIRECTION]) |
| return -EINVAL; |
| len = NF_CT_LABELS_MAX_SIZE; |
| err = nf_connlabels_get(ctx->net, (len * BITS_PER_BYTE) - 1); |
| if (err) |
| return err; |
| break; |
| #endif |
| #ifdef CONFIG_NF_CONNTRACK_ZONES |
| case NFT_CT_ZONE: |
| mutex_lock(&nft_ct_pcpu_mutex); |
| if (!nft_ct_tmpl_alloc_pcpu()) { |
| mutex_unlock(&nft_ct_pcpu_mutex); |
| return -ENOMEM; |
| } |
| nft_ct_pcpu_template_refcnt++; |
| mutex_unlock(&nft_ct_pcpu_mutex); |
| len = sizeof(u16); |
| break; |
| #endif |
| #ifdef CONFIG_NF_CONNTRACK_EVENTS |
| case NFT_CT_EVENTMASK: |
| if (tb[NFTA_CT_DIRECTION]) |
| return -EINVAL; |
| len = sizeof(u32); |
| break; |
| #endif |
| #ifdef CONFIG_NF_CONNTRACK_SECMARK |
| case NFT_CT_SECMARK: |
| if (tb[NFTA_CT_DIRECTION]) |
| return -EINVAL; |
| len = sizeof(u32); |
| break; |
| #endif |
| default: |
| return -EOPNOTSUPP; |
| } |
| |
| if (tb[NFTA_CT_DIRECTION]) { |
| priv->dir = nla_get_u8(tb[NFTA_CT_DIRECTION]); |
| switch (priv->dir) { |
| case IP_CT_DIR_ORIGINAL: |
| case IP_CT_DIR_REPLY: |
| break; |
| default: |
| err = -EINVAL; |
| goto err1; |
| } |
| } |
| |
| err = nft_parse_register_load(tb[NFTA_CT_SREG], &priv->sreg, len); |
| if (err < 0) |
| goto err1; |
| |
| err = nf_ct_netns_get(ctx->net, ctx->family); |
| if (err < 0) |
| goto err1; |
| |
| return 0; |
| |
| err1: |
| __nft_ct_set_destroy(ctx, priv); |
| return err; |
| } |
| |
| static void nft_ct_get_destroy(const struct nft_ctx *ctx, |
| const struct nft_expr *expr) |
| { |
| nf_ct_netns_put(ctx->net, ctx->family); |
| } |
| |
| static void nft_ct_set_destroy(const struct nft_ctx *ctx, |
| const struct nft_expr *expr) |
| { |
| struct nft_ct *priv = nft_expr_priv(expr); |
| |
| __nft_ct_set_destroy(ctx, priv); |
| nf_ct_netns_put(ctx->net, ctx->family); |
| } |
| |
| static int nft_ct_get_dump(struct sk_buff *skb, const struct nft_expr *expr) |
| { |
| const struct nft_ct *priv = nft_expr_priv(expr); |
| |
| if (nft_dump_register(skb, NFTA_CT_DREG, priv->dreg)) |
| goto nla_put_failure; |
| if (nla_put_be32(skb, NFTA_CT_KEY, htonl(priv->key))) |
| goto nla_put_failure; |
| |
| switch (priv->key) { |
| case NFT_CT_SRC: |
| case NFT_CT_DST: |
| case NFT_CT_SRC_IP: |
| case NFT_CT_DST_IP: |
| case NFT_CT_SRC_IP6: |
| case NFT_CT_DST_IP6: |
| case NFT_CT_PROTO_SRC: |
| case NFT_CT_PROTO_DST: |
| if (nla_put_u8(skb, NFTA_CT_DIRECTION, priv->dir)) |
| goto nla_put_failure; |
| break; |
| case NFT_CT_BYTES: |
| case NFT_CT_PKTS: |
| case NFT_CT_AVGPKT: |
| case NFT_CT_ZONE: |
| if (priv->dir < IP_CT_DIR_MAX && |
| nla_put_u8(skb, NFTA_CT_DIRECTION, priv->dir)) |
| goto nla_put_failure; |
| break; |
| default: |
| break; |
| } |
| |
| return 0; |
| |
| nla_put_failure: |
| return -1; |
| } |
| |
| static int nft_ct_set_dump(struct sk_buff *skb, const struct nft_expr *expr) |
| { |
| const struct nft_ct *priv = nft_expr_priv(expr); |
| |
| if (nft_dump_register(skb, NFTA_CT_SREG, priv->sreg)) |
| goto nla_put_failure; |
| if (nla_put_be32(skb, NFTA_CT_KEY, htonl(priv->key))) |
| goto nla_put_failure; |
| |
| switch (priv->key) { |
| case NFT_CT_ZONE: |
| if (priv->dir < IP_CT_DIR_MAX && |
| nla_put_u8(skb, NFTA_CT_DIRECTION, priv->dir)) |
| goto nla_put_failure; |
| break; |
| default: |
| break; |
| } |
| |
| return 0; |
| |
| nla_put_failure: |
| return -1; |
| } |
| |
| static struct nft_expr_type nft_ct_type; |
| static const struct nft_expr_ops nft_ct_get_ops = { |
| .type = &nft_ct_type, |
| .size = NFT_EXPR_SIZE(sizeof(struct nft_ct)), |
| .eval = nft_ct_get_eval, |
| .init = nft_ct_get_init, |
| .destroy = nft_ct_get_destroy, |
| .dump = nft_ct_get_dump, |
| }; |
| |
| static const struct nft_expr_ops nft_ct_set_ops = { |
| .type = &nft_ct_type, |
| .size = NFT_EXPR_SIZE(sizeof(struct nft_ct)), |
| .eval = nft_ct_set_eval, |
| .init = nft_ct_set_init, |
| .destroy = nft_ct_set_destroy, |
| .dump = nft_ct_set_dump, |
| }; |
| |
| #ifdef CONFIG_NF_CONNTRACK_ZONES |
| static const struct nft_expr_ops nft_ct_set_zone_ops = { |
| .type = &nft_ct_type, |
| .size = NFT_EXPR_SIZE(sizeof(struct nft_ct)), |
| .eval = nft_ct_set_zone_eval, |
| .init = nft_ct_set_init, |
| .destroy = nft_ct_set_destroy, |
| .dump = nft_ct_set_dump, |
| }; |
| #endif |
| |
| static const struct nft_expr_ops * |
| nft_ct_select_ops(const struct nft_ctx *ctx, |
| const struct nlattr * const tb[]) |
| { |
| if (tb[NFTA_CT_KEY] == NULL) |
| return ERR_PTR(-EINVAL); |
| |
| if (tb[NFTA_CT_DREG] && tb[NFTA_CT_SREG]) |
| return ERR_PTR(-EINVAL); |
| |
| if (tb[NFTA_CT_DREG]) |
| return &nft_ct_get_ops; |
| |
| if (tb[NFTA_CT_SREG]) { |
| #ifdef CONFIG_NF_CONNTRACK_ZONES |
| if (nla_get_be32(tb[NFTA_CT_KEY]) == htonl(NFT_CT_ZONE)) |
| return &nft_ct_set_zone_ops; |
| #endif |
| return &nft_ct_set_ops; |
| } |
| |
| return ERR_PTR(-EINVAL); |
| } |
| |
| static struct nft_expr_type nft_ct_type __read_mostly = { |
| .name = "ct", |
| .select_ops = nft_ct_select_ops, |
| .policy = nft_ct_policy, |
| .maxattr = NFTA_CT_MAX, |
| .owner = THIS_MODULE, |
| }; |
| |
| static void nft_notrack_eval(const struct nft_expr *expr, |
| struct nft_regs *regs, |
| const struct nft_pktinfo *pkt) |
| { |
| struct sk_buff *skb = pkt->skb; |
| enum ip_conntrack_info ctinfo; |
| struct nf_conn *ct; |
| |
| ct = nf_ct_get(pkt->skb, &ctinfo); |
| /* Previously seen (loopback or untracked)? Ignore. */ |
| if (ct || ctinfo == IP_CT_UNTRACKED) |
| return; |
| |
| nf_ct_set(skb, ct, IP_CT_UNTRACKED); |
| } |
| |
| static struct nft_expr_type nft_notrack_type; |
| static const struct nft_expr_ops nft_notrack_ops = { |
| .type = &nft_notrack_type, |
| .size = NFT_EXPR_SIZE(0), |
| .eval = nft_notrack_eval, |
| }; |
| |
| static struct nft_expr_type nft_notrack_type __read_mostly = { |
| .name = "notrack", |
| .ops = &nft_notrack_ops, |
| .owner = THIS_MODULE, |
| }; |
| |
| #ifdef CONFIG_NF_CONNTRACK_TIMEOUT |
| static int |
| nft_ct_timeout_parse_policy(void *timeouts, |
| const struct nf_conntrack_l4proto *l4proto, |
| struct net *net, const struct nlattr *attr) |
| { |
| struct nlattr **tb; |
| int ret = 0; |
| |
| tb = kcalloc(l4proto->ctnl_timeout.nlattr_max + 1, sizeof(*tb), |
| GFP_KERNEL); |
| |
| if (!tb) |
| return -ENOMEM; |
| |
| ret = nla_parse_nested_deprecated(tb, |
| l4proto->ctnl_timeout.nlattr_max, |
| attr, |
| l4proto->ctnl_timeout.nla_policy, |
| NULL); |
| if (ret < 0) |
| goto err; |
| |
| ret = l4proto->ctnl_timeout.nlattr_to_obj(tb, net, timeouts); |
| |
| err: |
| kfree(tb); |
| return ret; |
| } |
| |
| struct nft_ct_timeout_obj { |
| struct nf_ct_timeout *timeout; |
| u8 l4proto; |
| }; |
| |
| static void nft_ct_timeout_obj_eval(struct nft_object *obj, |
| struct nft_regs *regs, |
| const struct nft_pktinfo *pkt) |
| { |
| const struct nft_ct_timeout_obj *priv = nft_obj_data(obj); |
| struct nf_conn *ct = (struct nf_conn *)skb_nfct(pkt->skb); |
| struct nf_conn_timeout *timeout; |
| const unsigned int *values; |
| |
| if (priv->l4proto != pkt->tprot) |
| return; |
| |
| if (!ct || nf_ct_is_template(ct) || nf_ct_is_confirmed(ct)) |
| return; |
| |
| timeout = nf_ct_timeout_find(ct); |
| if (!timeout) { |
| timeout = nf_ct_timeout_ext_add(ct, priv->timeout, GFP_ATOMIC); |
| if (!timeout) { |
| regs->verdict.code = NF_DROP; |
| return; |
| } |
| } |
| |
| rcu_assign_pointer(timeout->timeout, priv->timeout); |
| |
| /* adjust the timeout as per 'new' state. ct is unconfirmed, |
| * so the current timestamp must not be added. |
| */ |
| values = nf_ct_timeout_data(timeout); |
| if (values) |
| nf_ct_refresh(ct, pkt->skb, values[0]); |
| } |
| |
| static int nft_ct_timeout_obj_init(const struct nft_ctx *ctx, |
| const struct nlattr * const tb[], |
| struct nft_object *obj) |
| { |
| struct nft_ct_timeout_obj *priv = nft_obj_data(obj); |
| const struct nf_conntrack_l4proto *l4proto; |
| struct nf_ct_timeout *timeout; |
| int l3num = ctx->family; |
| __u8 l4num; |
| int ret; |
| |
| if (!tb[NFTA_CT_TIMEOUT_L4PROTO] || |
| !tb[NFTA_CT_TIMEOUT_DATA]) |
| return -EINVAL; |
| |
| if (tb[NFTA_CT_TIMEOUT_L3PROTO]) |
| l3num = ntohs(nla_get_be16(tb[NFTA_CT_TIMEOUT_L3PROTO])); |
| |
| l4num = nla_get_u8(tb[NFTA_CT_TIMEOUT_L4PROTO]); |
| priv->l4proto = l4num; |
| |
| l4proto = nf_ct_l4proto_find(l4num); |
| |
| if (l4proto->l4proto != l4num) { |
| ret = -EOPNOTSUPP; |
| goto err_proto_put; |
| } |
| |
| timeout = kzalloc(sizeof(struct nf_ct_timeout) + |
| l4proto->ctnl_timeout.obj_size, GFP_KERNEL); |
| if (timeout == NULL) { |
| ret = -ENOMEM; |
| goto err_proto_put; |
| } |
| |
| ret = nft_ct_timeout_parse_policy(&timeout->data, l4proto, ctx->net, |
| tb[NFTA_CT_TIMEOUT_DATA]); |
| if (ret < 0) |
| goto err_free_timeout; |
| |
| timeout->l3num = l3num; |
| timeout->l4proto = l4proto; |
| |
| ret = nf_ct_netns_get(ctx->net, ctx->family); |
| if (ret < 0) |
| goto err_free_timeout; |
| |
| priv->timeout = timeout; |
| return 0; |
| |
| err_free_timeout: |
| kfree(timeout); |
| err_proto_put: |
| return ret; |
| } |
| |
| static void nft_ct_timeout_obj_destroy(const struct nft_ctx *ctx, |
| struct nft_object *obj) |
| { |
| struct nft_ct_timeout_obj *priv = nft_obj_data(obj); |
| struct nf_ct_timeout *timeout = priv->timeout; |
| |
| nf_ct_untimeout(ctx->net, timeout); |
| nf_ct_netns_put(ctx->net, ctx->family); |
| kfree(priv->timeout); |
| } |
| |
| static int nft_ct_timeout_obj_dump(struct sk_buff *skb, |
| struct nft_object *obj, bool reset) |
| { |
| const struct nft_ct_timeout_obj *priv = nft_obj_data(obj); |
| const struct nf_ct_timeout *timeout = priv->timeout; |
| struct nlattr *nest_params; |
| int ret; |
| |
| if (nla_put_u8(skb, NFTA_CT_TIMEOUT_L4PROTO, timeout->l4proto->l4proto) || |
| nla_put_be16(skb, NFTA_CT_TIMEOUT_L3PROTO, htons(timeout->l3num))) |
| return -1; |
| |
| nest_params = nla_nest_start(skb, NFTA_CT_TIMEOUT_DATA); |
| if (!nest_params) |
| return -1; |
| |
| ret = timeout->l4proto->ctnl_timeout.obj_to_nlattr(skb, &timeout->data); |
| if (ret < 0) |
| return -1; |
| nla_nest_end(skb, nest_params); |
| return 0; |
| } |
| |
| static const struct nla_policy nft_ct_timeout_policy[NFTA_CT_TIMEOUT_MAX + 1] = { |
| [NFTA_CT_TIMEOUT_L3PROTO] = {.type = NLA_U16 }, |
| [NFTA_CT_TIMEOUT_L4PROTO] = {.type = NLA_U8 }, |
| [NFTA_CT_TIMEOUT_DATA] = {.type = NLA_NESTED }, |
| }; |
| |
| static struct nft_object_type nft_ct_timeout_obj_type; |
| |
| static const struct nft_object_ops nft_ct_timeout_obj_ops = { |
| .type = &nft_ct_timeout_obj_type, |
| .size = sizeof(struct nft_ct_timeout_obj), |
| .eval = nft_ct_timeout_obj_eval, |
| .init = nft_ct_timeout_obj_init, |
| .destroy = nft_ct_timeout_obj_destroy, |
| .dump = nft_ct_timeout_obj_dump, |
| }; |
| |
| static struct nft_object_type nft_ct_timeout_obj_type __read_mostly = { |
| .type = NFT_OBJECT_CT_TIMEOUT, |
| .ops = &nft_ct_timeout_obj_ops, |
| .maxattr = NFTA_CT_TIMEOUT_MAX, |
| .policy = nft_ct_timeout_policy, |
| .owner = THIS_MODULE, |
| }; |
| #endif /* CONFIG_NF_CONNTRACK_TIMEOUT */ |
| |
| static int nft_ct_helper_obj_init(const struct nft_ctx *ctx, |
| const struct nlattr * const tb[], |
| struct nft_object *obj) |
| { |
| struct nft_ct_helper_obj *priv = nft_obj_data(obj); |
| struct nf_conntrack_helper *help4, *help6; |
| char name[NF_CT_HELPER_NAME_LEN]; |
| int family = ctx->family; |
| int err; |
| |
| if (!tb[NFTA_CT_HELPER_NAME] || !tb[NFTA_CT_HELPER_L4PROTO]) |
| return -EINVAL; |
| |
| priv->l4proto = nla_get_u8(tb[NFTA_CT_HELPER_L4PROTO]); |
| if (!priv->l4proto) |
| return -ENOENT; |
| |
| nla_strscpy(name, tb[NFTA_CT_HELPER_NAME], sizeof(name)); |
| |
| if (tb[NFTA_CT_HELPER_L3PROTO]) |
| family = ntohs(nla_get_be16(tb[NFTA_CT_HELPER_L3PROTO])); |
| |
| help4 = NULL; |
| help6 = NULL; |
| |
| switch (family) { |
| case NFPROTO_IPV4: |
| if (ctx->family == NFPROTO_IPV6) |
| return -EINVAL; |
| |
| help4 = nf_conntrack_helper_try_module_get(name, family, |
| priv->l4proto); |
| break; |
| case NFPROTO_IPV6: |
| if (ctx->family == NFPROTO_IPV4) |
| return -EINVAL; |
| |
| help6 = nf_conntrack_helper_try_module_get(name, family, |
| priv->l4proto); |
| break; |
| case NFPROTO_NETDEV: |
| case NFPROTO_BRIDGE: |
| case NFPROTO_INET: |
| help4 = nf_conntrack_helper_try_module_get(name, NFPROTO_IPV4, |
| priv->l4proto); |
| help6 = nf_conntrack_helper_try_module_get(name, NFPROTO_IPV6, |
| priv->l4proto); |
| break; |
| default: |
| return -EAFNOSUPPORT; |
| } |
| |
| /* && is intentional; only error if INET found neither ipv4 or ipv6 */ |
| if (!help4 && !help6) |
| return -ENOENT; |
| |
| priv->helper4 = help4; |
| priv->helper6 = help6; |
| |
| err = nf_ct_netns_get(ctx->net, ctx->family); |
| if (err < 0) |
| goto err_put_helper; |
| |
| return 0; |
| |
| err_put_helper: |
| if (priv->helper4) |
| nf_conntrack_helper_put(priv->helper4); |
| if (priv->helper6) |
| nf_conntrack_helper_put(priv->helper6); |
| return err; |
| } |
| |
| static void nft_ct_helper_obj_destroy(const struct nft_ctx *ctx, |
| struct nft_object *obj) |
| { |
| struct nft_ct_helper_obj *priv = nft_obj_data(obj); |
| |
| if (priv->helper4) |
| nf_conntrack_helper_put(priv->helper4); |
| if (priv->helper6) |
| nf_conntrack_helper_put(priv->helper6); |
| |
| nf_ct_netns_put(ctx->net, ctx->family); |
| } |
| |
| static void nft_ct_helper_obj_eval(struct nft_object *obj, |
| struct nft_regs *regs, |
| const struct nft_pktinfo *pkt) |
| { |
| const struct nft_ct_helper_obj *priv = nft_obj_data(obj); |
| struct nf_conn *ct = (struct nf_conn *)skb_nfct(pkt->skb); |
| struct nf_conntrack_helper *to_assign = NULL; |
| struct nf_conn_help *help; |
| |
| if (!ct || |
| nf_ct_is_confirmed(ct) || |
| nf_ct_is_template(ct) || |
| priv->l4proto != nf_ct_protonum(ct)) |
| return; |
| |
| switch (nf_ct_l3num(ct)) { |
| case NFPROTO_IPV4: |
| to_assign = priv->helper4; |
| break; |
| case NFPROTO_IPV6: |
| to_assign = priv->helper6; |
| break; |
| default: |
| WARN_ON_ONCE(1); |
| return; |
| } |
| |
| if (!to_assign) |
| return; |
| |
| if (test_bit(IPS_HELPER_BIT, &ct->status)) |
| return; |
| |
| help = nf_ct_helper_ext_add(ct, GFP_ATOMIC); |
| if (help) { |
| rcu_assign_pointer(help->helper, to_assign); |
| set_bit(IPS_HELPER_BIT, &ct->status); |
| } |
| } |
| |
| static int nft_ct_helper_obj_dump(struct sk_buff *skb, |
| struct nft_object *obj, bool reset) |
| { |
| const struct nft_ct_helper_obj *priv = nft_obj_data(obj); |
| const struct nf_conntrack_helper *helper; |
| u16 family; |
| |
| if (priv->helper4 && priv->helper6) { |
| family = NFPROTO_INET; |
| helper = priv->helper4; |
| } else if (priv->helper6) { |
| family = NFPROTO_IPV6; |
| helper = priv->helper6; |
| } else { |
| family = NFPROTO_IPV4; |
| helper = priv->helper4; |
| } |
| |
| if (nla_put_string(skb, NFTA_CT_HELPER_NAME, helper->name)) |
| return -1; |
| |
| if (nla_put_u8(skb, NFTA_CT_HELPER_L4PROTO, priv->l4proto)) |
| return -1; |
| |
| if (nla_put_be16(skb, NFTA_CT_HELPER_L3PROTO, htons(family))) |
| return -1; |
| |
| return 0; |
| } |
| |
| static const struct nla_policy nft_ct_helper_policy[NFTA_CT_HELPER_MAX + 1] = { |
| [NFTA_CT_HELPER_NAME] = { .type = NLA_STRING, |
| .len = NF_CT_HELPER_NAME_LEN - 1 }, |
| [NFTA_CT_HELPER_L3PROTO] = { .type = NLA_U16 }, |
| [NFTA_CT_HELPER_L4PROTO] = { .type = NLA_U8 }, |
| }; |
| |
| static struct nft_object_type nft_ct_helper_obj_type; |
| static const struct nft_object_ops nft_ct_helper_obj_ops = { |
| .type = &nft_ct_helper_obj_type, |
| .size = sizeof(struct nft_ct_helper_obj), |
| .eval = nft_ct_helper_obj_eval, |
| .init = nft_ct_helper_obj_init, |
| .destroy = nft_ct_helper_obj_destroy, |
| .dump = nft_ct_helper_obj_dump, |
| }; |
| |
| static struct nft_object_type nft_ct_helper_obj_type __read_mostly = { |
| .type = NFT_OBJECT_CT_HELPER, |
| .ops = &nft_ct_helper_obj_ops, |
| .maxattr = NFTA_CT_HELPER_MAX, |
| .policy = nft_ct_helper_policy, |
| .owner = THIS_MODULE, |
| }; |
| |
| struct nft_ct_expect_obj { |
| u16 l3num; |
| __be16 dport; |
| u8 l4proto; |
| u8 size; |
| u32 timeout; |
| }; |
| |
| static int nft_ct_expect_obj_init(const struct nft_ctx *ctx, |
| const struct nlattr * const tb[], |
| struct nft_object *obj) |
| { |
| struct nft_ct_expect_obj *priv = nft_obj_data(obj); |
| |
| if (!tb[NFTA_CT_EXPECT_L4PROTO] || |
| !tb[NFTA_CT_EXPECT_DPORT] || |
| !tb[NFTA_CT_EXPECT_TIMEOUT] || |
| !tb[NFTA_CT_EXPECT_SIZE]) |
| return -EINVAL; |
| |
| priv->l3num = ctx->family; |
| if (tb[NFTA_CT_EXPECT_L3PROTO]) |
| priv->l3num = ntohs(nla_get_be16(tb[NFTA_CT_EXPECT_L3PROTO])); |
| |
| priv->l4proto = nla_get_u8(tb[NFTA_CT_EXPECT_L4PROTO]); |
| priv->dport = nla_get_be16(tb[NFTA_CT_EXPECT_DPORT]); |
| priv->timeout = nla_get_u32(tb[NFTA_CT_EXPECT_TIMEOUT]); |
| priv->size = nla_get_u8(tb[NFTA_CT_EXPECT_SIZE]); |
| |
| return nf_ct_netns_get(ctx->net, ctx->family); |
| } |
| |
| static void nft_ct_expect_obj_destroy(const struct nft_ctx *ctx, |
| struct nft_object *obj) |
| { |
| nf_ct_netns_put(ctx->net, ctx->family); |
| } |
| |
| static int nft_ct_expect_obj_dump(struct sk_buff *skb, |
| struct nft_object *obj, bool reset) |
| { |
| const struct nft_ct_expect_obj *priv = nft_obj_data(obj); |
| |
| if (nla_put_be16(skb, NFTA_CT_EXPECT_L3PROTO, htons(priv->l3num)) || |
| nla_put_u8(skb, NFTA_CT_EXPECT_L4PROTO, priv->l4proto) || |
| nla_put_be16(skb, NFTA_CT_EXPECT_DPORT, priv->dport) || |
| nla_put_u32(skb, NFTA_CT_EXPECT_TIMEOUT, priv->timeout) || |
| nla_put_u8(skb, NFTA_CT_EXPECT_SIZE, priv->size)) |
| return -1; |
| |
| return 0; |
| } |
| |
| static void nft_ct_expect_obj_eval(struct nft_object *obj, |
| struct nft_regs *regs, |
| const struct nft_pktinfo *pkt) |
| { |
| const struct nft_ct_expect_obj *priv = nft_obj_data(obj); |
| struct nf_conntrack_expect *exp; |
| enum ip_conntrack_info ctinfo; |
| struct nf_conn_help *help; |
| enum ip_conntrack_dir dir; |
| u16 l3num = priv->l3num; |
| struct nf_conn *ct; |
| |
| ct = nf_ct_get(pkt->skb, &ctinfo); |
| if (!ct || nf_ct_is_confirmed(ct) || nf_ct_is_template(ct)) { |
| regs->verdict.code = NFT_BREAK; |
| return; |
| } |
| dir = CTINFO2DIR(ctinfo); |
| |
| help = nfct_help(ct); |
| if (!help) |
| help = nf_ct_helper_ext_add(ct, GFP_ATOMIC); |
| if (!help) { |
| regs->verdict.code = NF_DROP; |
| return; |
| } |
| |
| if (help->expecting[NF_CT_EXPECT_CLASS_DEFAULT] >= priv->size) { |
| regs->verdict.code = NFT_BREAK; |
| return; |
| } |
| if (l3num == NFPROTO_INET) |
| l3num = nf_ct_l3num(ct); |
| |
| exp = nf_ct_expect_alloc(ct); |
| if (exp == NULL) { |
| regs->verdict.code = NF_DROP; |
| return; |
| } |
| nf_ct_expect_init(exp, NF_CT_EXPECT_CLASS_DEFAULT, l3num, |
| &ct->tuplehash[!dir].tuple.src.u3, |
| &ct->tuplehash[!dir].tuple.dst.u3, |
| priv->l4proto, NULL, &priv->dport); |
| exp->timeout.expires = jiffies + priv->timeout * HZ; |
| |
| if (nf_ct_expect_related(exp, 0) != 0) |
| regs->verdict.code = NF_DROP; |
| } |
| |
| static const struct nla_policy nft_ct_expect_policy[NFTA_CT_EXPECT_MAX + 1] = { |
| [NFTA_CT_EXPECT_L3PROTO] = { .type = NLA_U16 }, |
| [NFTA_CT_EXPECT_L4PROTO] = { .type = NLA_U8 }, |
| [NFTA_CT_EXPECT_DPORT] = { .type = NLA_U16 }, |
| [NFTA_CT_EXPECT_TIMEOUT] = { .type = NLA_U32 }, |
| [NFTA_CT_EXPECT_SIZE] = { .type = NLA_U8 }, |
| }; |
| |
| static struct nft_object_type nft_ct_expect_obj_type; |
| |
| static const struct nft_object_ops nft_ct_expect_obj_ops = { |
| .type = &nft_ct_expect_obj_type, |
| .size = sizeof(struct nft_ct_expect_obj), |
| .eval = nft_ct_expect_obj_eval, |
| .init = nft_ct_expect_obj_init, |
| .destroy = nft_ct_expect_obj_destroy, |
| .dump = nft_ct_expect_obj_dump, |
| }; |
| |
| static struct nft_object_type nft_ct_expect_obj_type __read_mostly = { |
| .type = NFT_OBJECT_CT_EXPECT, |
| .ops = &nft_ct_expect_obj_ops, |
| .maxattr = NFTA_CT_EXPECT_MAX, |
| .policy = nft_ct_expect_policy, |
| .owner = THIS_MODULE, |
| }; |
| |
| static int __init nft_ct_module_init(void) |
| { |
| int err; |
| |
| BUILD_BUG_ON(NF_CT_LABELS_MAX_SIZE > NFT_REG_SIZE); |
| |
| err = nft_register_expr(&nft_ct_type); |
| if (err < 0) |
| return err; |
| |
| err = nft_register_expr(&nft_notrack_type); |
| if (err < 0) |
| goto err1; |
| |
| err = nft_register_obj(&nft_ct_helper_obj_type); |
| if (err < 0) |
| goto err2; |
| |
| err = nft_register_obj(&nft_ct_expect_obj_type); |
| if (err < 0) |
| goto err3; |
| #ifdef CONFIG_NF_CONNTRACK_TIMEOUT |
| err = nft_register_obj(&nft_ct_timeout_obj_type); |
| if (err < 0) |
| goto err4; |
| #endif |
| return 0; |
| |
| #ifdef CONFIG_NF_CONNTRACK_TIMEOUT |
| err4: |
| nft_unregister_obj(&nft_ct_expect_obj_type); |
| #endif |
| err3: |
| nft_unregister_obj(&nft_ct_helper_obj_type); |
| err2: |
| nft_unregister_expr(&nft_notrack_type); |
| err1: |
| nft_unregister_expr(&nft_ct_type); |
| return err; |
| } |
| |
| static void __exit nft_ct_module_exit(void) |
| { |
| #ifdef CONFIG_NF_CONNTRACK_TIMEOUT |
| nft_unregister_obj(&nft_ct_timeout_obj_type); |
| #endif |
| nft_unregister_obj(&nft_ct_expect_obj_type); |
| nft_unregister_obj(&nft_ct_helper_obj_type); |
| nft_unregister_expr(&nft_notrack_type); |
| nft_unregister_expr(&nft_ct_type); |
| } |
| |
| module_init(nft_ct_module_init); |
| module_exit(nft_ct_module_exit); |
| |
| MODULE_LICENSE("GPL"); |
| MODULE_AUTHOR("Patrick McHardy <kaber@trash.net>"); |
| MODULE_ALIAS_NFT_EXPR("ct"); |
| MODULE_ALIAS_NFT_EXPR("notrack"); |
| MODULE_ALIAS_NFT_OBJ(NFT_OBJECT_CT_HELPER); |
| MODULE_ALIAS_NFT_OBJ(NFT_OBJECT_CT_TIMEOUT); |
| MODULE_ALIAS_NFT_OBJ(NFT_OBJECT_CT_EXPECT); |
| MODULE_DESCRIPTION("Netfilter nf_tables conntrack module"); |