1 // SPDX-License-Identifier: GPL-2.0-only
3 * Copyright (c) 2008-2009 Patrick McHardy <kaber@trash.net>
4 * Copyright (c) 2012 Pablo Neira Ayuso <pablo@netfilter.org>
5 * Copyright (c) 2012 Intel Corporation
8 #include <linux/module.h>
9 #include <linux/init.h>
10 #include <linux/skbuff.h>
12 #include <linux/string.h>
13 #include <linux/netlink.h>
14 #include <linux/netfilter.h>
15 #include <linux/netfilter_ipv4.h>
16 #include <linux/netfilter/nfnetlink.h>
17 #include <linux/netfilter/nf_tables.h>
18 #include <net/netfilter/nf_conntrack.h>
19 #include <net/netfilter/nf_nat.h>
20 #include <net/netfilter/nf_tables.h>
24 enum nft_registers sreg_addr_min
:8;
25 enum nft_registers sreg_addr_max
:8;
26 enum nft_registers sreg_proto_min
:8;
27 enum nft_registers sreg_proto_max
:8;
28 enum nf_nat_manip_type type
:8;
33 static void nft_nat_setup_addr(struct nf_nat_range2
*range
,
34 const struct nft_regs
*regs
,
35 const struct nft_nat
*priv
)
37 switch (priv
->family
) {
39 range
->min_addr
.ip
= (__force __be32
)
40 regs
->data
[priv
->sreg_addr_min
];
41 range
->max_addr
.ip
= (__force __be32
)
42 regs
->data
[priv
->sreg_addr_max
];
45 memcpy(range
->min_addr
.ip6
, ®s
->data
[priv
->sreg_addr_min
],
46 sizeof(range
->min_addr
.ip6
));
47 memcpy(range
->max_addr
.ip6
, ®s
->data
[priv
->sreg_addr_max
],
48 sizeof(range
->max_addr
.ip6
));
53 static void nft_nat_setup_proto(struct nf_nat_range2
*range
,
54 const struct nft_regs
*regs
,
55 const struct nft_nat
*priv
)
57 range
->min_proto
.all
= (__force __be16
)
58 nft_reg_load16(®s
->data
[priv
->sreg_proto_min
]);
59 range
->max_proto
.all
= (__force __be16
)
60 nft_reg_load16(®s
->data
[priv
->sreg_proto_max
]);
63 static void nft_nat_setup_netmap(struct nf_nat_range2
*range
,
64 const struct nft_pktinfo
*pkt
,
65 const struct nft_nat
*priv
)
67 struct sk_buff
*skb
= pkt
->skb
;
68 union nf_inet_addr new_addr
;
74 if (nft_pf(pkt
) == NFPROTO_IPV4
) {
75 new_addr
.ip
= ip_hdr(skb
)->saddr
;
76 len
= sizeof(struct in_addr
);
78 new_addr
.in6
= ipv6_hdr(skb
)->saddr
;
79 len
= sizeof(struct in6_addr
);
83 if (nft_pf(pkt
) == NFPROTO_IPV4
) {
84 new_addr
.ip
= ip_hdr(skb
)->daddr
;
85 len
= sizeof(struct in_addr
);
87 new_addr
.in6
= ipv6_hdr(skb
)->daddr
;
88 len
= sizeof(struct in6_addr
);
93 for (i
= 0; i
< len
/ sizeof(__be32
); i
++) {
94 netmask
= ~(range
->min_addr
.ip6
[i
] ^ range
->max_addr
.ip6
[i
]);
95 new_addr
.ip6
[i
] &= ~netmask
;
96 new_addr
.ip6
[i
] |= range
->min_addr
.ip6
[i
] & netmask
;
99 range
->min_addr
= new_addr
;
100 range
->max_addr
= new_addr
;
103 static void nft_nat_eval(const struct nft_expr
*expr
,
104 struct nft_regs
*regs
,
105 const struct nft_pktinfo
*pkt
)
107 const struct nft_nat
*priv
= nft_expr_priv(expr
);
108 enum ip_conntrack_info ctinfo
;
109 struct nf_conn
*ct
= nf_ct_get(pkt
->skb
, &ctinfo
);
110 struct nf_nat_range2 range
;
112 memset(&range
, 0, sizeof(range
));
114 if (priv
->sreg_addr_min
) {
115 nft_nat_setup_addr(&range
, regs
, priv
);
116 if (priv
->flags
& NF_NAT_RANGE_NETMAP
)
117 nft_nat_setup_netmap(&range
, pkt
, priv
);
120 if (priv
->sreg_proto_min
)
121 nft_nat_setup_proto(&range
, regs
, priv
);
123 range
.flags
= priv
->flags
;
125 regs
->verdict
.code
= nf_nat_setup_info(ct
, &range
, priv
->type
);
128 static const struct nla_policy nft_nat_policy
[NFTA_NAT_MAX
+ 1] = {
129 [NFTA_NAT_TYPE
] = { .type
= NLA_U32
},
130 [NFTA_NAT_FAMILY
] = { .type
= NLA_U32
},
131 [NFTA_NAT_REG_ADDR_MIN
] = { .type
= NLA_U32
},
132 [NFTA_NAT_REG_ADDR_MAX
] = { .type
= NLA_U32
},
133 [NFTA_NAT_REG_PROTO_MIN
] = { .type
= NLA_U32
},
134 [NFTA_NAT_REG_PROTO_MAX
] = { .type
= NLA_U32
},
135 [NFTA_NAT_FLAGS
] = { .type
= NLA_U32
},
138 static int nft_nat_validate(const struct nft_ctx
*ctx
,
139 const struct nft_expr
*expr
,
140 const struct nft_data
**data
)
142 struct nft_nat
*priv
= nft_expr_priv(expr
);
145 err
= nft_chain_validate_dependency(ctx
->chain
, NFT_CHAIN_T_NAT
);
149 switch (priv
->type
) {
151 err
= nft_chain_validate_hooks(ctx
->chain
,
152 (1 << NF_INET_POST_ROUTING
) |
153 (1 << NF_INET_LOCAL_IN
));
156 err
= nft_chain_validate_hooks(ctx
->chain
,
157 (1 << NF_INET_PRE_ROUTING
) |
158 (1 << NF_INET_LOCAL_OUT
));
165 static int nft_nat_init(const struct nft_ctx
*ctx
, const struct nft_expr
*expr
,
166 const struct nlattr
* const tb
[])
168 struct nft_nat
*priv
= nft_expr_priv(expr
);
169 unsigned int alen
, plen
;
173 if (tb
[NFTA_NAT_TYPE
] == NULL
||
174 (tb
[NFTA_NAT_REG_ADDR_MIN
] == NULL
&&
175 tb
[NFTA_NAT_REG_PROTO_MIN
] == NULL
))
178 switch (ntohl(nla_get_be32(tb
[NFTA_NAT_TYPE
]))) {
180 priv
->type
= NF_NAT_MANIP_SRC
;
183 priv
->type
= NF_NAT_MANIP_DST
;
189 if (tb
[NFTA_NAT_FAMILY
] == NULL
)
192 family
= ntohl(nla_get_be32(tb
[NFTA_NAT_FAMILY
]));
193 if (ctx
->family
!= NFPROTO_INET
&& ctx
->family
!= family
)
198 alen
= sizeof_field(struct nf_nat_range
, min_addr
.ip
);
201 alen
= sizeof_field(struct nf_nat_range
, min_addr
.ip6
);
204 return -EAFNOSUPPORT
;
206 priv
->family
= family
;
208 if (tb
[NFTA_NAT_REG_ADDR_MIN
]) {
209 priv
->sreg_addr_min
=
210 nft_parse_register(tb
[NFTA_NAT_REG_ADDR_MIN
]);
211 err
= nft_validate_register_load(priv
->sreg_addr_min
, alen
);
215 if (tb
[NFTA_NAT_REG_ADDR_MAX
]) {
216 priv
->sreg_addr_max
=
217 nft_parse_register(tb
[NFTA_NAT_REG_ADDR_MAX
]);
219 err
= nft_validate_register_load(priv
->sreg_addr_max
,
224 priv
->sreg_addr_max
= priv
->sreg_addr_min
;
227 priv
->flags
|= NF_NAT_RANGE_MAP_IPS
;
230 plen
= sizeof_field(struct nf_nat_range
, min_addr
.all
);
231 if (tb
[NFTA_NAT_REG_PROTO_MIN
]) {
232 priv
->sreg_proto_min
=
233 nft_parse_register(tb
[NFTA_NAT_REG_PROTO_MIN
]);
235 err
= nft_validate_register_load(priv
->sreg_proto_min
, plen
);
239 if (tb
[NFTA_NAT_REG_PROTO_MAX
]) {
240 priv
->sreg_proto_max
=
241 nft_parse_register(tb
[NFTA_NAT_REG_PROTO_MAX
]);
243 err
= nft_validate_register_load(priv
->sreg_proto_max
,
248 priv
->sreg_proto_max
= priv
->sreg_proto_min
;
251 priv
->flags
|= NF_NAT_RANGE_PROTO_SPECIFIED
;
254 if (tb
[NFTA_NAT_FLAGS
]) {
255 priv
->flags
|= ntohl(nla_get_be32(tb
[NFTA_NAT_FLAGS
]));
256 if (priv
->flags
& ~NF_NAT_RANGE_MASK
)
260 return nf_ct_netns_get(ctx
->net
, family
);
263 static int nft_nat_dump(struct sk_buff
*skb
, const struct nft_expr
*expr
)
265 const struct nft_nat
*priv
= nft_expr_priv(expr
);
267 switch (priv
->type
) {
268 case NF_NAT_MANIP_SRC
:
269 if (nla_put_be32(skb
, NFTA_NAT_TYPE
, htonl(NFT_NAT_SNAT
)))
270 goto nla_put_failure
;
272 case NF_NAT_MANIP_DST
:
273 if (nla_put_be32(skb
, NFTA_NAT_TYPE
, htonl(NFT_NAT_DNAT
)))
274 goto nla_put_failure
;
278 if (nla_put_be32(skb
, NFTA_NAT_FAMILY
, htonl(priv
->family
)))
279 goto nla_put_failure
;
281 if (priv
->sreg_addr_min
) {
282 if (nft_dump_register(skb
, NFTA_NAT_REG_ADDR_MIN
,
283 priv
->sreg_addr_min
) ||
284 nft_dump_register(skb
, NFTA_NAT_REG_ADDR_MAX
,
285 priv
->sreg_addr_max
))
286 goto nla_put_failure
;
289 if (priv
->sreg_proto_min
) {
290 if (nft_dump_register(skb
, NFTA_NAT_REG_PROTO_MIN
,
291 priv
->sreg_proto_min
) ||
292 nft_dump_register(skb
, NFTA_NAT_REG_PROTO_MAX
,
293 priv
->sreg_proto_max
))
294 goto nla_put_failure
;
297 if (priv
->flags
!= 0) {
298 if (nla_put_be32(skb
, NFTA_NAT_FLAGS
, htonl(priv
->flags
)))
299 goto nla_put_failure
;
309 nft_nat_destroy(const struct nft_ctx
*ctx
, const struct nft_expr
*expr
)
311 const struct nft_nat
*priv
= nft_expr_priv(expr
);
313 nf_ct_netns_put(ctx
->net
, priv
->family
);
316 static struct nft_expr_type nft_nat_type
;
317 static const struct nft_expr_ops nft_nat_ops
= {
318 .type
= &nft_nat_type
,
319 .size
= NFT_EXPR_SIZE(sizeof(struct nft_nat
)),
320 .eval
= nft_nat_eval
,
321 .init
= nft_nat_init
,
322 .destroy
= nft_nat_destroy
,
323 .dump
= nft_nat_dump
,
324 .validate
= nft_nat_validate
,
327 static struct nft_expr_type nft_nat_type __read_mostly
= {
330 .policy
= nft_nat_policy
,
331 .maxattr
= NFTA_NAT_MAX
,
332 .owner
= THIS_MODULE
,
335 #ifdef CONFIG_NF_TABLES_INET
336 static void nft_nat_inet_eval(const struct nft_expr
*expr
,
337 struct nft_regs
*regs
,
338 const struct nft_pktinfo
*pkt
)
340 const struct nft_nat
*priv
= nft_expr_priv(expr
);
342 if (priv
->family
== nft_pf(pkt
))
343 nft_nat_eval(expr
, regs
, pkt
);
346 static const struct nft_expr_ops nft_nat_inet_ops
= {
347 .type
= &nft_nat_type
,
348 .size
= NFT_EXPR_SIZE(sizeof(struct nft_nat
)),
349 .eval
= nft_nat_inet_eval
,
350 .init
= nft_nat_init
,
351 .destroy
= nft_nat_destroy
,
352 .dump
= nft_nat_dump
,
353 .validate
= nft_nat_validate
,
356 static struct nft_expr_type nft_inet_nat_type __read_mostly
= {
358 .family
= NFPROTO_INET
,
359 .ops
= &nft_nat_inet_ops
,
360 .policy
= nft_nat_policy
,
361 .maxattr
= NFTA_NAT_MAX
,
362 .owner
= THIS_MODULE
,
365 static int nft_nat_inet_module_init(void)
367 return nft_register_expr(&nft_inet_nat_type
);
370 static void nft_nat_inet_module_exit(void)
372 nft_unregister_expr(&nft_inet_nat_type
);
375 static int nft_nat_inet_module_init(void) { return 0; }
376 static void nft_nat_inet_module_exit(void) { }
379 static int __init
nft_nat_module_init(void)
381 int ret
= nft_nat_inet_module_init();
386 ret
= nft_register_expr(&nft_nat_type
);
388 nft_nat_inet_module_exit();
393 static void __exit
nft_nat_module_exit(void)
395 nft_nat_inet_module_exit();
396 nft_unregister_expr(&nft_nat_type
);
399 module_init(nft_nat_module_init
);
400 module_exit(nft_nat_module_exit
);
402 MODULE_LICENSE("GPL");
403 MODULE_AUTHOR("Tomasz Bursztyka <tomasz.bursztyka@linux.intel.com>");
404 MODULE_ALIAS_NFT_EXPR("nat");
405 MODULE_DESCRIPTION("Network Address Translation support");