ip_fw_eaction.c revision 317043
1/*- 2 * Copyright (c) 2016-2017 Yandex LLC 3 * Copyright (c) 2016-2017 Andrey V. Elsukov <ae@FreeBSD.org> 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 15 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 16 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 17 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 18 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 19 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 20 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 22 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 23 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 24 * SUCH DAMAGE. 25 */ 26 27#include <sys/cdefs.h> 28__FBSDID("$FreeBSD: stable/11/sys/netpfil/ipfw/ip_fw_eaction.c 317043 2017-04-17 09:36:35Z ae $"); 29 30#include <sys/param.h> 31#include <sys/systm.h> 32#include <sys/malloc.h> 33#include <sys/kernel.h> 34#include <sys/hash.h> 35#include <sys/lock.h> 36#include <sys/rwlock.h> 37#include <sys/rmlock.h> 38#include <sys/socket.h> 39#include <sys/socketvar.h> 40#include <sys/queue.h> 41#include <net/pfil.h> 42 43#include <net/if.h> /* ip_fw.h requires IFNAMSIZ */ 44#include <netinet/in.h> 45#include <netinet/ip_var.h> /* struct ipfw_rule_ref */ 46#include <netinet/ip_fw.h> 47 48#include <netpfil/ipfw/ip_fw_private.h> 49 50#include "opt_ipfw.h" 51 52/* 53 * External actions support for ipfw. 54 * 55 * This code provides KPI for implementing loadable modules, that 56 * can provide handlers for external action opcodes in the ipfw's 57 * rules. 58 * Module should implement opcode handler with type ipfw_eaction_t. 59 * This handler will be called by ipfw_chk() function when 60 * O_EXTERNAL_ACTION opcode is matched. The handler must return 61 * value used as return value in ipfw_chk(), i.e. IP_FW_PASS, 62 * IP_FW_DENY (see ip_fw_private.h). 63 * Also the last argument must be set by handler. If it is zero, 64 * the search continues to the next rule. If it has non zero value, 65 * the search terminates. 66 * 67 * The module that implements external action should register its 68 * handler and name with ipfw_add_eaction() function. 69 * This function will return eaction_id, that can be used by module. 70 * 71 * It is possible to pass some additional information to external 72 * action handler using O_EXTERNAL_INSTANCE and O_EXTERNAL_DATA opcodes. 73 * Such opcodes should be next after the O_EXTERNAL_ACTION opcode. 74 * For the O_EXTERNAL_INSTANCE opcode the cmd->arg1 contains index of named 75 * object related to an instance of external action. 76 * For the O_EXTERNAL_DATA opcode the cmd contains the data that can be used 77 * by external action handler without needing to create named instance. 78 * 79 * In case when eaction module uses named instances, it should register 80 * opcode rewriting routines for O_EXTERNAL_INSTANCE opcode. The 81 * classifier callback can look back into O_EXTERNAL_ACTION opcode (it 82 * must be in the (ipfw_insn *)(cmd - 1)). By arg1 from O_EXTERNAL_ACTION 83 * it can deteremine eaction_id and compare it with its own. 84 * The macro IPFW_TLV_EACTION_NAME(eaction_id) can be used to deteremine 85 * the type of named_object related to external action instance. 86 * 87 * On module unload handler should be deregistered with ipfw_del_eaction() 88 * function using known eaction_id. 89 */ 90 91struct eaction_obj { 92 struct named_object no; 93 ipfw_eaction_t *handler; 94 char name[64]; 95}; 96 97#define EACTION_OBJ(ch, cmd) \ 98 ((struct eaction_obj *)SRV_OBJECT((ch), (cmd)->arg1)) 99 100#if 0 101#define EACTION_DEBUG(fmt, ...) do { \ 102 printf("%s: " fmt "\n", __func__, ## __VA_ARGS__); \ 103} while (0) 104#else 105#define EACTION_DEBUG(fmt, ...) 106#endif 107 108const char *default_eaction_typename = "drop"; 109static int 110default_eaction(struct ip_fw_chain *ch, struct ip_fw_args *args, 111 ipfw_insn *cmd, int *done) 112{ 113 114 *done = 1; /* terminate the search */ 115 return (IP_FW_DENY); 116} 117 118/* 119 * Opcode rewriting callbacks. 120 */ 121static int 122eaction_classify(ipfw_insn *cmd, uint16_t *puidx, uint8_t *ptype) 123{ 124 125 EACTION_DEBUG("opcode %d, arg1 %d", cmd->opcode, cmd->arg1); 126 *puidx = cmd->arg1; 127 *ptype = 0; 128 return (0); 129} 130 131static void 132eaction_update(ipfw_insn *cmd, uint16_t idx) 133{ 134 135 cmd->arg1 = idx; 136 EACTION_DEBUG("opcode %d, arg1 -> %d", cmd->opcode, cmd->arg1); 137} 138 139static int 140eaction_findbyname(struct ip_fw_chain *ch, struct tid_info *ti, 141 struct named_object **pno) 142{ 143 ipfw_obj_ntlv *ntlv; 144 145 if (ti->tlvs == NULL) 146 return (EINVAL); 147 148 /* Search ntlv in the buffer provided by user */ 149 ntlv = ipfw_find_name_tlv_type(ti->tlvs, ti->tlen, ti->uidx, 150 IPFW_TLV_EACTION); 151 if (ntlv == NULL) 152 return (EINVAL); 153 EACTION_DEBUG("name %s, uidx %u, type %u", ntlv->name, 154 ti->uidx, ti->type); 155 /* 156 * Search named object with corresponding name. 157 * Since eaction objects are global - ignore the set value 158 * and use zero instead. 159 */ 160 *pno = ipfw_objhash_lookup_name_type(CHAIN_TO_SRV(ch), 161 0, IPFW_TLV_EACTION, ntlv->name); 162 if (*pno == NULL) 163 return (ESRCH); 164 return (0); 165} 166 167static struct named_object * 168eaction_findbykidx(struct ip_fw_chain *ch, uint16_t idx) 169{ 170 171 EACTION_DEBUG("kidx %u", idx); 172 return (ipfw_objhash_lookup_kidx(CHAIN_TO_SRV(ch), idx)); 173} 174 175static struct opcode_obj_rewrite eaction_opcodes[] = { 176 { 177 .opcode = O_EXTERNAL_ACTION, 178 .etlv = IPFW_TLV_EACTION, 179 .classifier = eaction_classify, 180 .update = eaction_update, 181 .find_byname = eaction_findbyname, 182 .find_bykidx = eaction_findbykidx, 183 }, 184}; 185 186static int 187create_eaction_obj(struct ip_fw_chain *ch, ipfw_eaction_t handler, 188 const char *name, uint16_t *eaction_id) 189{ 190 struct namedobj_instance *ni; 191 struct eaction_obj *obj; 192 193 IPFW_UH_UNLOCK_ASSERT(ch); 194 195 ni = CHAIN_TO_SRV(ch); 196 obj = malloc(sizeof(*obj), M_IPFW, M_WAITOK | M_ZERO); 197 obj->no.name = obj->name; 198 obj->no.etlv = IPFW_TLV_EACTION; 199 obj->handler = handler; 200 strlcpy(obj->name, name, sizeof(obj->name)); 201 202 IPFW_UH_WLOCK(ch); 203 if (ipfw_objhash_lookup_name_type(ni, 0, IPFW_TLV_EACTION, 204 name) != NULL) { 205 /* 206 * Object is already created. 207 * We don't allow eactions with the same name. 208 */ 209 IPFW_UH_WUNLOCK(ch); 210 free(obj, M_IPFW); 211 EACTION_DEBUG("External action with typename " 212 "'%s' already exists", name); 213 return (EEXIST); 214 } 215 if (ipfw_objhash_alloc_idx(ni, &obj->no.kidx) != 0) { 216 IPFW_UH_WUNLOCK(ch); 217 free(obj, M_IPFW); 218 EACTION_DEBUG("alloc_idx failed"); 219 return (ENOSPC); 220 } 221 ipfw_objhash_add(ni, &obj->no); 222 IPFW_WLOCK(ch); 223 SRV_OBJECT(ch, obj->no.kidx) = obj; 224 IPFW_WUNLOCK(ch); 225 obj->no.refcnt++; 226 IPFW_UH_WUNLOCK(ch); 227 228 if (eaction_id != NULL) 229 *eaction_id = obj->no.kidx; 230 return (0); 231} 232 233static void 234destroy_eaction_obj(struct ip_fw_chain *ch, struct named_object *no) 235{ 236 struct namedobj_instance *ni; 237 struct eaction_obj *obj; 238 239 IPFW_UH_WLOCK_ASSERT(ch); 240 241 ni = CHAIN_TO_SRV(ch); 242 IPFW_WLOCK(ch); 243 obj = SRV_OBJECT(ch, no->kidx); 244 SRV_OBJECT(ch, no->kidx) = NULL; 245 IPFW_WUNLOCK(ch); 246 ipfw_objhash_del(ni, no); 247 ipfw_objhash_free_idx(ni, no->kidx); 248 free(obj, M_IPFW); 249} 250 251/* 252 * Resets all eaction opcodes to default handlers. 253 */ 254static void 255reset_eaction_obj(struct ip_fw_chain *ch, uint16_t eaction_id) 256{ 257 struct named_object *no; 258 struct ip_fw *rule; 259 ipfw_insn *cmd; 260 int i; 261 262 IPFW_UH_WLOCK_ASSERT(ch); 263 264 no = ipfw_objhash_lookup_name_type(CHAIN_TO_SRV(ch), 0, 265 IPFW_TLV_EACTION, default_eaction_typename); 266 if (no == NULL) 267 panic("Default external action handler is not found"); 268 if (eaction_id == no->kidx) 269 panic("Wrong eaction_id"); 270 EACTION_DEBUG("replace id %u with %u", eaction_id, no->kidx); 271 IPFW_WLOCK(ch); 272 for (i = 0; i < ch->n_rules; i++) { 273 rule = ch->map[i]; 274 cmd = ACTION_PTR(rule); 275 if (cmd->opcode != O_EXTERNAL_ACTION) 276 continue; 277 if (cmd->arg1 != eaction_id) 278 continue; 279 cmd->arg1 = no->kidx; /* Set to default id */ 280 /* 281 * XXX: we only bump refcount on default_eaction. 282 * Refcount on the original object will be just 283 * ignored on destroy. But on default_eaction it 284 * will be decremented on rule deletion. 285 */ 286 no->refcnt++; 287 /* 288 * Since named_object related to this instance will be 289 * also destroyed, truncate the chain of opcodes to 290 * remove the rest of cmd chain just after O_EXTERNAL_ACTION 291 * opcode. 292 */ 293 if (rule->act_ofs < rule->cmd_len - 1) { 294 EACTION_DEBUG("truncate rule %d: len %u -> %u", 295 rule->rulenum, rule->cmd_len, rule->act_ofs + 1); 296 rule->cmd_len = rule->act_ofs + 1; 297 } 298 } 299 IPFW_WUNLOCK(ch); 300} 301 302/* 303 * Initialize external actions framework. 304 * Create object with default eaction handler "drop". 305 */ 306int 307ipfw_eaction_init(struct ip_fw_chain *ch, int first) 308{ 309 int error; 310 311 error = create_eaction_obj(ch, default_eaction, 312 default_eaction_typename, NULL); 313 if (error != 0) 314 return (error); 315 IPFW_ADD_OBJ_REWRITER(first, eaction_opcodes); 316 EACTION_DEBUG("External actions support initialized"); 317 return (0); 318} 319 320void 321ipfw_eaction_uninit(struct ip_fw_chain *ch, int last) 322{ 323 struct namedobj_instance *ni; 324 struct named_object *no; 325 326 ni = CHAIN_TO_SRV(ch); 327 328 IPFW_UH_WLOCK(ch); 329 no = ipfw_objhash_lookup_name_type(ni, 0, IPFW_TLV_EACTION, 330 default_eaction_typename); 331 if (no != NULL) 332 destroy_eaction_obj(ch, no); 333 IPFW_UH_WUNLOCK(ch); 334 IPFW_DEL_OBJ_REWRITER(last, eaction_opcodes); 335 EACTION_DEBUG("External actions support uninitialized"); 336} 337 338/* 339 * Registers external action handler to the global array. 340 * On success it returns eaction id, otherwise - zero. 341 */ 342uint16_t 343ipfw_add_eaction(struct ip_fw_chain *ch, ipfw_eaction_t handler, 344 const char *name) 345{ 346 uint16_t eaction_id; 347 348 eaction_id = 0; 349 if (ipfw_check_object_name_generic(name) == 0) { 350 create_eaction_obj(ch, handler, name, &eaction_id); 351 EACTION_DEBUG("Registered external action '%s' with id %u", 352 name, eaction_id); 353 } 354 return (eaction_id); 355} 356 357/* 358 * Deregisters external action handler with id eaction_id. 359 */ 360int 361ipfw_del_eaction(struct ip_fw_chain *ch, uint16_t eaction_id) 362{ 363 struct named_object *no; 364 365 IPFW_UH_WLOCK(ch); 366 no = ipfw_objhash_lookup_kidx(CHAIN_TO_SRV(ch), eaction_id); 367 if (no == NULL || no->etlv != IPFW_TLV_EACTION) { 368 IPFW_UH_WUNLOCK(ch); 369 return (EINVAL); 370 } 371 if (no->refcnt > 1) 372 reset_eaction_obj(ch, eaction_id); 373 EACTION_DEBUG("External action '%s' with id %u unregistered", 374 no->name, eaction_id); 375 destroy_eaction_obj(ch, no); 376 IPFW_UH_WUNLOCK(ch); 377 return (0); 378} 379 380int 381ipfw_run_eaction(struct ip_fw_chain *ch, struct ip_fw_args *args, 382 ipfw_insn *cmd, int *done) 383{ 384 385 return (EACTION_OBJ(ch, cmd)->handler(ch, args, cmd, done)); 386} 387