1 /*- 2 * Copyright (c) 2016-2017 Yandex LLC 3 * Copyright (c) 2016-2017 Andrey V. Elsukov <ae@FreeBSD.org> 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 15 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 16 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 17 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 18 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 19 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 20 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 22 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 23 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 24 * SUCH DAMAGE. 25 */ 26 27 #include <sys/cdefs.h> 28 __FBSDID("$FreeBSD$"); 29 30 #include <sys/param.h> 31 #include <sys/systm.h> 32 #include <sys/malloc.h> 33 #include <sys/kernel.h> 34 #include <sys/hash.h> 35 #include <sys/lock.h> 36 #include <sys/rwlock.h> 37 #include <sys/rmlock.h> 38 #include <sys/socket.h> 39 #include <sys/socketvar.h> 40 #include <sys/queue.h> 41 #include <net/pfil.h> 42 43 #include <net/if.h> /* ip_fw.h requires IFNAMSIZ */ 44 #include <netinet/in.h> 45 #include <netinet/ip_var.h> /* struct ipfw_rule_ref */ 46 #include <netinet/ip_fw.h> 47 48 #include <netpfil/ipfw/ip_fw_private.h> 49 50 #include "opt_ipfw.h" 51 52 /* 53 * External actions support for ipfw. 54 * 55 * This code provides KPI for implementing loadable modules, that 56 * can provide handlers for external action opcodes in the ipfw's 57 * rules. 58 * Module should implement opcode handler with type ipfw_eaction_t. 59 * This handler will be called by ipfw_chk() function when 60 * O_EXTERNAL_ACTION opcode is matched. The handler must return 61 * value used as return value in ipfw_chk(), i.e. IP_FW_PASS, 62 * IP_FW_DENY (see ip_fw_private.h). 63 * Also the last argument must be set by handler. If it is zero, 64 * the search continues to the next rule. If it has non zero value, 65 * the search terminates. 66 * 67 * The module that implements external action should register its 68 * handler and name with ipfw_add_eaction() function. 69 * This function will return eaction_id, that can be used by module. 70 * 71 * It is possible to pass some additional information to external 72 * action handler using O_EXTERNAL_INSTANCE and O_EXTERNAL_DATA opcodes. 73 * Such opcodes should be next after the O_EXTERNAL_ACTION opcode. 74 * For the O_EXTERNAL_INSTANCE opcode the cmd->arg1 contains index of named 75 * object related to an instance of external action. 76 * For the O_EXTERNAL_DATA opcode the cmd contains the data that can be used 77 * by external action handler without needing to create named instance. 78 * 79 * In case when eaction module uses named instances, it should register 80 * opcode rewriting routines for O_EXTERNAL_INSTANCE opcode. The 81 * classifier callback can look back into O_EXTERNAL_ACTION opcode (it 82 * must be in the (ipfw_insn *)(cmd - 1)). By arg1 from O_EXTERNAL_ACTION 83 * it can deteremine eaction_id and compare it with its own. 84 * The macro IPFW_TLV_EACTION_NAME(eaction_id) can be used to deteremine 85 * the type of named_object related to external action instance. 86 * 87 * On module unload handler should be deregistered with ipfw_del_eaction() 88 * function using known eaction_id. 89 */ 90 91 struct eaction_obj { 92 struct named_object no; 93 ipfw_eaction_t *handler; 94 char name[64]; 95 }; 96 97 #define EACTION_OBJ(ch, cmd) \ 98 ((struct eaction_obj *)SRV_OBJECT((ch), (cmd)->arg1)) 99 100 #if 0 101 #define EACTION_DEBUG(fmt, ...) do { \ 102 printf("%s: " fmt "\n", __func__, ## __VA_ARGS__); \ 103 } while (0) 104 #else 105 #define EACTION_DEBUG(fmt, ...) 106 #endif 107 108 const char *default_eaction_typename = "drop"; 109 static int 110 default_eaction(struct ip_fw_chain *ch, struct ip_fw_args *args, 111 ipfw_insn *cmd, int *done) 112 { 113 114 *done = 1; /* terminate the search */ 115 return (IP_FW_DENY); 116 } 117 118 /* 119 * Opcode rewriting callbacks. 120 */ 121 static int 122 eaction_classify(ipfw_insn *cmd, uint16_t *puidx, uint8_t *ptype) 123 { 124 125 EACTION_DEBUG("opcode %d, arg1 %d", cmd->opcode, cmd->arg1); 126 *puidx = cmd->arg1; 127 *ptype = 0; 128 return (0); 129 } 130 131 static void 132 eaction_update(ipfw_insn *cmd, uint16_t idx) 133 { 134 135 cmd->arg1 = idx; 136 EACTION_DEBUG("opcode %d, arg1 -> %d", cmd->opcode, cmd->arg1); 137 } 138 139 static int 140 eaction_findbyname(struct ip_fw_chain *ch, struct tid_info *ti, 141 struct named_object **pno) 142 { 143 ipfw_obj_ntlv *ntlv; 144 145 if (ti->tlvs == NULL) 146 return (EINVAL); 147 148 /* Search ntlv in the buffer provided by user */ 149 ntlv = ipfw_find_name_tlv_type(ti->tlvs, ti->tlen, ti->uidx, 150 IPFW_TLV_EACTION); 151 if (ntlv == NULL) 152 return (EINVAL); 153 EACTION_DEBUG("name %s, uidx %u, type %u", ntlv->name, 154 ti->uidx, ti->type); 155 /* 156 * Search named object with corresponding name. 157 * Since eaction objects are global - ignore the set value 158 * and use zero instead. 159 */ 160 *pno = ipfw_objhash_lookup_name_type(CHAIN_TO_SRV(ch), 161 0, IPFW_TLV_EACTION, ntlv->name); 162 if (*pno == NULL) 163 return (ESRCH); 164 return (0); 165 } 166 167 static struct named_object * 168 eaction_findbykidx(struct ip_fw_chain *ch, uint16_t idx) 169 { 170 171 EACTION_DEBUG("kidx %u", idx); 172 return (ipfw_objhash_lookup_kidx(CHAIN_TO_SRV(ch), idx)); 173 } 174 175 static struct opcode_obj_rewrite eaction_opcodes[] = { 176 { 177 .opcode = O_EXTERNAL_ACTION, 178 .etlv = IPFW_TLV_EACTION, 179 .classifier = eaction_classify, 180 .update = eaction_update, 181 .find_byname = eaction_findbyname, 182 .find_bykidx = eaction_findbykidx, 183 }, 184 }; 185 186 static int 187 create_eaction_obj(struct ip_fw_chain *ch, ipfw_eaction_t handler, 188 const char *name, uint16_t *eaction_id) 189 { 190 struct namedobj_instance *ni; 191 struct eaction_obj *obj; 192 193 IPFW_UH_UNLOCK_ASSERT(ch); 194 195 ni = CHAIN_TO_SRV(ch); 196 obj = malloc(sizeof(*obj), M_IPFW, M_WAITOK | M_ZERO); 197 obj->no.name = obj->name; 198 obj->no.etlv = IPFW_TLV_EACTION; 199 obj->handler = handler; 200 strlcpy(obj->name, name, sizeof(obj->name)); 201 202 IPFW_UH_WLOCK(ch); 203 if (ipfw_objhash_lookup_name_type(ni, 0, IPFW_TLV_EACTION, 204 name) != NULL) { 205 /* 206 * Object is already created. 207 * We don't allow eactions with the same name. 208 */ 209 IPFW_UH_WUNLOCK(ch); 210 free(obj, M_IPFW); 211 EACTION_DEBUG("External action with typename " 212 "'%s' already exists", name); 213 return (EEXIST); 214 } 215 if (ipfw_objhash_alloc_idx(ni, &obj->no.kidx) != 0) { 216 IPFW_UH_WUNLOCK(ch); 217 free(obj, M_IPFW); 218 EACTION_DEBUG("alloc_idx failed"); 219 return (ENOSPC); 220 } 221 ipfw_objhash_add(ni, &obj->no); 222 IPFW_WLOCK(ch); 223 SRV_OBJECT(ch, obj->no.kidx) = obj; 224 IPFW_WUNLOCK(ch); 225 obj->no.refcnt++; 226 IPFW_UH_WUNLOCK(ch); 227 228 if (eaction_id != NULL) 229 *eaction_id = obj->no.kidx; 230 return (0); 231 } 232 233 static void 234 destroy_eaction_obj(struct ip_fw_chain *ch, struct named_object *no) 235 { 236 struct namedobj_instance *ni; 237 struct eaction_obj *obj; 238 239 IPFW_UH_WLOCK_ASSERT(ch); 240 241 ni = CHAIN_TO_SRV(ch); 242 IPFW_WLOCK(ch); 243 obj = SRV_OBJECT(ch, no->kidx); 244 SRV_OBJECT(ch, no->kidx) = NULL; 245 IPFW_WUNLOCK(ch); 246 ipfw_objhash_del(ni, no); 247 ipfw_objhash_free_idx(ni, no->kidx); 248 free(obj, M_IPFW); 249 } 250 251 /* 252 * Resets all eaction opcodes to default handlers. 253 */ 254 static void 255 reset_eaction_obj(struct ip_fw_chain *ch, uint16_t eaction_id) 256 { 257 struct named_object *no; 258 struct ip_fw *rule; 259 ipfw_insn *cmd; 260 int i; 261 262 IPFW_UH_WLOCK_ASSERT(ch); 263 264 no = ipfw_objhash_lookup_name_type(CHAIN_TO_SRV(ch), 0, 265 IPFW_TLV_EACTION, default_eaction_typename); 266 if (no == NULL) 267 panic("Default external action handler is not found"); 268 if (eaction_id == no->kidx) 269 panic("Wrong eaction_id"); 270 EACTION_DEBUG("replace id %u with %u", eaction_id, no->kidx); 271 IPFW_WLOCK(ch); 272 for (i = 0; i < ch->n_rules; i++) { 273 rule = ch->map[i]; 274 cmd = ACTION_PTR(rule); 275 if (cmd->opcode != O_EXTERNAL_ACTION) 276 continue; 277 if (cmd->arg1 != eaction_id) 278 continue; 279 cmd->arg1 = no->kidx; /* Set to default id */ 280 /* 281 * XXX: we only bump refcount on default_eaction. 282 * Refcount on the original object will be just 283 * ignored on destroy. But on default_eaction it 284 * will be decremented on rule deletion. 285 */ 286 no->refcnt++; 287 /* 288 * Since named_object related to this instance will be 289 * also destroyed, truncate the chain of opcodes to 290 * remove the rest of cmd chain just after O_EXTERNAL_ACTION 291 * opcode. 292 */ 293 if (rule->act_ofs < rule->cmd_len - 1) { 294 EACTION_DEBUG("truncate rule %d: len %u -> %u", 295 rule->rulenum, rule->cmd_len, rule->act_ofs + 1); 296 rule->cmd_len = rule->act_ofs + 1; 297 } 298 } 299 IPFW_WUNLOCK(ch); 300 } 301 302 /* 303 * Initialize external actions framework. 304 * Create object with default eaction handler "drop". 305 */ 306 int 307 ipfw_eaction_init(struct ip_fw_chain *ch, int first) 308 { 309 int error; 310 311 error = create_eaction_obj(ch, default_eaction, 312 default_eaction_typename, NULL); 313 if (error != 0) 314 return (error); 315 IPFW_ADD_OBJ_REWRITER(first, eaction_opcodes); 316 EACTION_DEBUG("External actions support initialized"); 317 return (0); 318 } 319 320 void 321 ipfw_eaction_uninit(struct ip_fw_chain *ch, int last) 322 { 323 struct namedobj_instance *ni; 324 struct named_object *no; 325 326 ni = CHAIN_TO_SRV(ch); 327 328 IPFW_UH_WLOCK(ch); 329 no = ipfw_objhash_lookup_name_type(ni, 0, IPFW_TLV_EACTION, 330 default_eaction_typename); 331 if (no != NULL) 332 destroy_eaction_obj(ch, no); 333 IPFW_UH_WUNLOCK(ch); 334 IPFW_DEL_OBJ_REWRITER(last, eaction_opcodes); 335 EACTION_DEBUG("External actions support uninitialized"); 336 } 337 338 /* 339 * Registers external action handler to the global array. 340 * On success it returns eaction id, otherwise - zero. 341 */ 342 uint16_t 343 ipfw_add_eaction(struct ip_fw_chain *ch, ipfw_eaction_t handler, 344 const char *name) 345 { 346 uint16_t eaction_id; 347 348 eaction_id = 0; 349 if (ipfw_check_object_name_generic(name) == 0) { 350 create_eaction_obj(ch, handler, name, &eaction_id); 351 EACTION_DEBUG("Registered external action '%s' with id %u", 352 name, eaction_id); 353 } 354 return (eaction_id); 355 } 356 357 /* 358 * Deregisters external action handler with id eaction_id. 359 */ 360 int 361 ipfw_del_eaction(struct ip_fw_chain *ch, uint16_t eaction_id) 362 { 363 struct named_object *no; 364 365 IPFW_UH_WLOCK(ch); 366 no = ipfw_objhash_lookup_kidx(CHAIN_TO_SRV(ch), eaction_id); 367 if (no == NULL || no->etlv != IPFW_TLV_EACTION) { 368 IPFW_UH_WUNLOCK(ch); 369 return (EINVAL); 370 } 371 if (no->refcnt > 1) 372 reset_eaction_obj(ch, eaction_id); 373 EACTION_DEBUG("External action '%s' with id %u unregistered", 374 no->name, eaction_id); 375 destroy_eaction_obj(ch, no); 376 IPFW_UH_WUNLOCK(ch); 377 return (0); 378 } 379 380 int 381 ipfw_run_eaction(struct ip_fw_chain *ch, struct ip_fw_args *args, 382 ipfw_insn *cmd, int *done) 383 { 384 385 return (EACTION_OBJ(ch, cmd)->handler(ch, args, cmd, done)); 386 } 387