]> bbs.cooldavid.org Git - net-next-2.6.git/blame - net/netfilter/nf_queue.c
[NETFILTER]: nfnetlink_queue: don't unregister handler of other subsystem
[net-next-2.6.git] / net / netfilter / nf_queue.c
CommitLineData
f6ebe77f
HW
1#include <linux/kernel.h>
2#include <linux/init.h>
3#include <linux/module.h>
4#include <linux/proc_fs.h>
5#include <linux/skbuff.h>
6#include <linux/netfilter.h>
bbd86b9f 7#include <linux/seq_file.h>
7a11b984 8#include <linux/rcupdate.h>
f6ebe77f
HW
9#include <net/protocol.h>
10
11#include "nf_internals.h"
12
601e68e1 13/*
f6ebe77f
HW
14 * A queue handler may be registered for each protocol. Each is protected by
15 * long term mutex. The handler must provide an an outfn() to accept packets
16 * for queueing and must reinject all packets it receives, no matter what.
17 */
bbd86b9f 18static struct nf_queue_handler *queue_handler[NPROTO];
f6ebe77f
HW
19
20static DEFINE_RWLOCK(queue_handler_lock);
21
d72367b6
HW
22/* return EBUSY when somebody else is registered, return EEXIST if the
23 * same handler is registered, return 0 in case of success. */
bbd86b9f 24int nf_register_queue_handler(int pf, struct nf_queue_handler *qh)
601e68e1 25{
f6ebe77f
HW
26 int ret;
27
28 if (pf >= NPROTO)
29 return -EINVAL;
30
31 write_lock_bh(&queue_handler_lock);
d72367b6
HW
32 if (queue_handler[pf] == qh)
33 ret = -EEXIST;
34 else if (queue_handler[pf])
f6ebe77f
HW
35 ret = -EBUSY;
36 else {
bbd86b9f 37 queue_handler[pf] = qh;
f6ebe77f
HW
38 ret = 0;
39 }
40 write_unlock_bh(&queue_handler_lock);
41
42 return ret;
43}
44EXPORT_SYMBOL(nf_register_queue_handler);
45
46/* The caller must flush their queue before this */
ce7663d8 47int nf_unregister_queue_handler(int pf, struct nf_queue_handler *qh)
f6ebe77f
HW
48{
49 if (pf >= NPROTO)
50 return -EINVAL;
51
52 write_lock_bh(&queue_handler_lock);
ce7663d8
YK
53 if (queue_handler[pf] != qh) {
54 write_unlock_bh(&queue_handler_lock);
55 return -EINVAL;
56 }
57
bbd86b9f 58 queue_handler[pf] = NULL;
f6ebe77f 59 write_unlock_bh(&queue_handler_lock);
601e68e1 60
f6ebe77f
HW
61 return 0;
62}
63EXPORT_SYMBOL(nf_unregister_queue_handler);
64
bbd86b9f 65void nf_unregister_queue_handlers(struct nf_queue_handler *qh)
f6ebe77f
HW
66{
67 int pf;
68
69 write_lock_bh(&queue_handler_lock);
70 for (pf = 0; pf < NPROTO; pf++) {
bbd86b9f
HW
71 if (queue_handler[pf] == qh)
72 queue_handler[pf] = NULL;
f6ebe77f
HW
73 }
74 write_unlock_bh(&queue_handler_lock);
75}
76EXPORT_SYMBOL_GPL(nf_unregister_queue_handlers);
77
601e68e1
YH
78/*
79 * Any packet that leaves via this function must come back
f6ebe77f
HW
80 * through nf_reinject().
81 */
394f545d
PM
82static int __nf_queue(struct sk_buff *skb,
83 struct list_head *elem,
84 int pf, unsigned int hook,
85 struct net_device *indev,
86 struct net_device *outdev,
87 int (*okfn)(struct sk_buff *),
88 unsigned int queuenum)
f6ebe77f
HW
89{
90 int status;
91 struct nf_info *info;
92#ifdef CONFIG_BRIDGE_NETFILTER
93 struct net_device *physindev = NULL;
94 struct net_device *physoutdev = NULL;
95#endif
bce8032e 96 struct nf_afinfo *afinfo;
f6ebe77f
HW
97
98 /* QUEUE == DROP if noone is waiting, to be safe. */
99 read_lock(&queue_handler_lock);
e121e9ec 100 if (!queue_handler[pf]) {
f6ebe77f 101 read_unlock(&queue_handler_lock);
394f545d 102 kfree_skb(skb);
f6ebe77f
HW
103 return 1;
104 }
105
bce8032e
PM
106 afinfo = nf_get_afinfo(pf);
107 if (!afinfo) {
108 read_unlock(&queue_handler_lock);
394f545d 109 kfree_skb(skb);
bce8032e
PM
110 return 1;
111 }
112
113 info = kmalloc(sizeof(*info) + afinfo->route_key_size, GFP_ATOMIC);
f6ebe77f
HW
114 if (!info) {
115 if (net_ratelimit())
116 printk(KERN_ERR "OOM queueing packet %p\n",
394f545d 117 skb);
f6ebe77f 118 read_unlock(&queue_handler_lock);
394f545d 119 kfree_skb(skb);
f6ebe77f
HW
120 return 1;
121 }
122
601e68e1 123 *info = (struct nf_info) {
f6ebe77f
HW
124 (struct nf_hook_ops *)elem, pf, hook, indev, outdev, okfn };
125
126 /* If it's going away, ignore hook. */
127 if (!try_module_get(info->elem->owner)) {
128 read_unlock(&queue_handler_lock);
129 kfree(info);
130 return 0;
131 }
132
133 /* Bump dev refs so they don't vanish while packet is out */
134 if (indev) dev_hold(indev);
135 if (outdev) dev_hold(outdev);
136
137#ifdef CONFIG_BRIDGE_NETFILTER
394f545d
PM
138 if (skb->nf_bridge) {
139 physindev = skb->nf_bridge->physindev;
f6ebe77f 140 if (physindev) dev_hold(physindev);
394f545d 141 physoutdev = skb->nf_bridge->physoutdev;
f6ebe77f
HW
142 if (physoutdev) dev_hold(physoutdev);
143 }
144#endif
394f545d
PM
145 afinfo->saveroute(skb, info);
146 status = queue_handler[pf]->outfn(skb, info, queuenum,
bbd86b9f 147 queue_handler[pf]->data);
f6ebe77f 148
f6ebe77f
HW
149 read_unlock(&queue_handler_lock);
150
151 if (status < 0) {
152 /* James M doesn't say fuck enough. */
153 if (indev) dev_put(indev);
154 if (outdev) dev_put(outdev);
155#ifdef CONFIG_BRIDGE_NETFILTER
156 if (physindev) dev_put(physindev);
157 if (physoutdev) dev_put(physoutdev);
158#endif
159 module_put(info->elem->owner);
160 kfree(info);
394f545d 161 kfree_skb(skb);
f6ebe77f
HW
162
163 return 1;
164 }
165
166 return 1;
167}
168
394f545d
PM
169int nf_queue(struct sk_buff *skb,
170 struct list_head *elem,
171 int pf, unsigned int hook,
172 struct net_device *indev,
173 struct net_device *outdev,
174 int (*okfn)(struct sk_buff *),
175 unsigned int queuenum)
176{
177 struct sk_buff *segs;
178
179 if (!skb_is_gso(skb))
180 return __nf_queue(skb, elem, pf, hook, indev, outdev, okfn,
181 queuenum);
182
183 switch (pf) {
184 case AF_INET:
185 skb->protocol = htons(ETH_P_IP);
186 break;
187 case AF_INET6:
188 skb->protocol = htons(ETH_P_IPV6);
189 break;
190 }
191
192 segs = skb_gso_segment(skb, 0);
193 kfree_skb(skb);
194 if (unlikely(IS_ERR(segs)))
195 return 1;
196
197 do {
198 struct sk_buff *nskb = segs->next;
199
200 segs->next = NULL;
201 if (!__nf_queue(segs, elem, pf, hook, indev, outdev, okfn,
202 queuenum))
203 kfree_skb(segs);
204 segs = nskb;
205 } while (segs);
206 return 1;
207}
208
f6ebe77f
HW
209void nf_reinject(struct sk_buff *skb, struct nf_info *info,
210 unsigned int verdict)
211{
212 struct list_head *elem = &info->elem->list;
213 struct list_head *i;
bce8032e 214 struct nf_afinfo *afinfo;
f6ebe77f
HW
215
216 rcu_read_lock();
217
218 /* Release those devices we held, or Alexey will kill me. */
219 if (info->indev) dev_put(info->indev);
220 if (info->outdev) dev_put(info->outdev);
221#ifdef CONFIG_BRIDGE_NETFILTER
222 if (skb->nf_bridge) {
223 if (skb->nf_bridge->physindev)
224 dev_put(skb->nf_bridge->physindev);
225 if (skb->nf_bridge->physoutdev)
226 dev_put(skb->nf_bridge->physoutdev);
227 }
228#endif
229
230 /* Drop reference to owner of hook which queued us. */
231 module_put(info->elem->owner);
232
233 list_for_each_rcu(i, &nf_hooks[info->pf][info->hook]) {
601e68e1
YH
234 if (i == elem)
235 break;
236 }
237
45fe4dc0 238 if (i == &nf_hooks[info->pf][info->hook]) {
f6ebe77f
HW
239 /* The module which sent it to userspace is gone. */
240 NFDEBUG("%s: module disappeared, dropping packet.\n",
241 __FUNCTION__);
242 verdict = NF_DROP;
243 }
244
245 /* Continue traversal iff userspace said ok... */
246 if (verdict == NF_REPEAT) {
247 elem = elem->prev;
248 verdict = NF_ACCEPT;
249 }
250
7a11b984 251 if (verdict == NF_ACCEPT) {
bce8032e
PM
252 afinfo = nf_get_afinfo(info->pf);
253 if (!afinfo || afinfo->reroute(&skb, info) < 0)
7a11b984
PM
254 verdict = NF_DROP;
255 }
256
f6ebe77f
HW
257 if (verdict == NF_ACCEPT) {
258 next_hook:
259 verdict = nf_iterate(&nf_hooks[info->pf][info->hook],
601e68e1 260 &skb, info->hook,
f6ebe77f
HW
261 info->indev, info->outdev, &elem,
262 info->okfn, INT_MIN);
263 }
264
265 switch (verdict & NF_VERDICT_MASK) {
266 case NF_ACCEPT:
3bc38712 267 case NF_STOP:
f6ebe77f 268 info->okfn(skb);
3bc38712 269 case NF_STOLEN:
f6ebe77f 270 break;
f6ebe77f 271 case NF_QUEUE:
394f545d
PM
272 if (!__nf_queue(skb, elem, info->pf, info->hook,
273 info->indev, info->outdev, info->okfn,
274 verdict >> NF_VERDICT_BITS))
f6ebe77f
HW
275 goto next_hook;
276 break;
3bc38712
PM
277 default:
278 kfree_skb(skb);
f6ebe77f
HW
279 }
280 rcu_read_unlock();
f6ebe77f
HW
281 kfree(info);
282 return;
283}
284EXPORT_SYMBOL(nf_reinject);
285
bbd86b9f
HW
286#ifdef CONFIG_PROC_FS
287static void *seq_start(struct seq_file *seq, loff_t *pos)
288{
289 if (*pos >= NPROTO)
290 return NULL;
291
292 return pos;
293}
294
295static void *seq_next(struct seq_file *s, void *v, loff_t *pos)
296{
297 (*pos)++;
298
299 if (*pos >= NPROTO)
300 return NULL;
301
302 return pos;
303}
304
305static void seq_stop(struct seq_file *s, void *v)
306{
307
308}
309
310static int seq_show(struct seq_file *s, void *v)
311{
312 int ret;
313 loff_t *pos = v;
314 struct nf_queue_handler *qh;
315
316 read_lock_bh(&queue_handler_lock);
317 qh = queue_handler[*pos];
318 if (!qh)
319 ret = seq_printf(s, "%2lld NONE\n", *pos);
320 else
321 ret = seq_printf(s, "%2lld %s\n", *pos, qh->name);
322 read_unlock_bh(&queue_handler_lock);
323
324 return ret;
325}
326
327static struct seq_operations nfqueue_seq_ops = {
328 .start = seq_start,
329 .next = seq_next,
330 .stop = seq_stop,
331 .show = seq_show,
332};
333
334static int nfqueue_open(struct inode *inode, struct file *file)
335{
336 return seq_open(file, &nfqueue_seq_ops);
337}
338
da7071d7 339static const struct file_operations nfqueue_file_ops = {
bbd86b9f
HW
340 .owner = THIS_MODULE,
341 .open = nfqueue_open,
342 .read = seq_read,
343 .llseek = seq_lseek,
344 .release = seq_release,
345};
346#endif /* PROC_FS */
347
348
f6ebe77f
HW
349int __init netfilter_queue_init(void)
350{
bbd86b9f
HW
351#ifdef CONFIG_PROC_FS
352 struct proc_dir_entry *pde;
f6ebe77f 353
bbd86b9f 354 pde = create_proc_entry("nf_queue", S_IRUGO, proc_net_netfilter);
e02f7d16 355 if (!pde)
bbd86b9f 356 return -1;
bbd86b9f
HW
357 pde->proc_fops = &nfqueue_file_ops;
358#endif
f6ebe77f
HW
359 return 0;
360}
361