Add support for ip rules
[project/netifd.git] / iprule.c
1 /*
2 * netifd - network interface daemon
3 * Copyright (C) 2012 Felix Fietkau <nbd@openwrt.org>
4 * Copyright (C) 2013 Jo-Philipp Wich <jow@openwrt.org>
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License version 2
8 * as published by the Free Software Foundation
9 *
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
14 */
15 #include <string.h>
16 #include <stdlib.h>
17 #include <stdio.h>
18 #include <unistd.h>
19
20 #include <arpa/inet.h>
21
22 #include "netifd.h"
23 #include "device.h"
24 #include "interface.h"
25 #include "iprule.h"
26 #include "proto.h"
27 #include "ubus.h"
28 #include "system.h"
29
30 struct vlist_tree iprules;
31 static bool iprules_flushed = false;
32
33 enum {
34 RULE_INTERFACE_IN,
35 RULE_INTERFACE_OUT,
36 RULE_INVERT,
37 RULE_SRC,
38 RULE_DEST,
39 RULE_PRIORITY,
40 RULE_TOS,
41 RULE_FWMARK,
42 RULE_LOOKUP,
43 RULE_ACTION,
44 RULE_GOTO,
45 __RULE_MAX
46 };
47
48 static const struct blobmsg_policy rule_attr[__RULE_MAX] = {
49 [RULE_INTERFACE_IN] = { .name = "in", .type = BLOBMSG_TYPE_STRING },
50 [RULE_INTERFACE_OUT] = { .name = "out", .type = BLOBMSG_TYPE_STRING },
51 [RULE_INVERT] = { .name = "invert", .type = BLOBMSG_TYPE_BOOL },
52 [RULE_SRC] = { .name = "src", .type = BLOBMSG_TYPE_STRING },
53 [RULE_DEST] = { .name = "dest", .type = BLOBMSG_TYPE_STRING },
54 [RULE_PRIORITY] = { .name = "priority", .type = BLOBMSG_TYPE_INT32 },
55 [RULE_TOS] = { .name = "tos", .type = BLOBMSG_TYPE_INT32 },
56 [RULE_FWMARK] = { .name = "mark", .type = BLOBMSG_TYPE_STRING },
57 [RULE_LOOKUP] = { .name = "lookup", .type = BLOBMSG_TYPE_STRING },
58 [RULE_ACTION] = { .name = "action", .type = BLOBMSG_TYPE_STRING },
59 [RULE_GOTO] = { .name = "goto", .type = BLOBMSG_TYPE_INT32 },
60 };
61
62 const struct config_param_list rule_attr_list = {
63 .n_params = __RULE_MAX,
64 .params = rule_attr,
65 };
66
67
68 static bool
69 iprule_parse_mark(const char *mark, struct iprule *rule)
70 {
71 char *s, *e;
72 unsigned int n;
73
74 if ((s = strchr(mark, '/')) != NULL)
75 *s++ = 0;
76
77 n = strtoul(mark, &e, 0);
78
79 if (e == mark || *e)
80 return false;
81
82 rule->fwmark = n;
83 rule->flags |= IPRULE_FWMARK;
84
85 if (s) {
86 n = strtoul(s, &e, 0);
87
88 if (e == s || *e)
89 return false;
90
91 rule->fwmask = n;
92 rule->flags |= IPRULE_FWMASK;
93 }
94
95 return true;
96 }
97
98 void
99 iprule_add(struct blob_attr *attr, bool v6)
100 {
101 struct interface *iif = NULL, *oif = NULL;
102 struct blob_attr *tb[__RULE_MAX], *cur;
103 struct interface *iface;
104 struct iprule *rule;
105 int af = v6 ? AF_INET6 : AF_INET;
106
107 blobmsg_parse(rule_attr, __RULE_MAX, tb, blobmsg_data(attr), blobmsg_data_len(attr));
108
109 rule = calloc(1, sizeof(*rule));
110 if (!rule)
111 return;
112
113 rule->flags = v6 ? IPRULE_INET6 : IPRULE_INET4;
114
115 if ((cur = tb[RULE_INVERT]) != NULL)
116 rule->invert = blobmsg_get_bool(cur);
117
118 if ((cur = tb[RULE_INTERFACE_IN]) != NULL) {
119 iif = vlist_find(&interfaces, blobmsg_data(cur), iface, node);
120
121 if (!iif || !iif->l3_dev.dev) {
122 DPRINTF("Failed to resolve device of network: %s\n", (char *) blobmsg_data(cur));
123 goto error;
124 }
125
126 memcpy(rule->in_dev, iif->l3_dev.dev->ifname, sizeof(rule->in_dev));
127 rule->flags |= IPRULE_IN;
128 }
129
130 if ((cur = tb[RULE_INTERFACE_OUT]) != NULL) {
131 oif = vlist_find(&interfaces, blobmsg_data(cur), iface, node);
132
133 if (!oif || !oif->l3_dev.dev) {
134 DPRINTF("Failed to resolve device of network: %s\n", (char *) blobmsg_data(cur));
135 goto error;
136 }
137
138 memcpy(rule->out_dev, oif->l3_dev.dev->ifname, sizeof(rule->out_dev));
139 rule->flags |= IPRULE_OUT;
140 }
141
142 if ((cur = tb[RULE_SRC]) != NULL) {
143 if (!parse_ip_and_netmask(af, blobmsg_data(cur), &rule->src_addr, &rule->src_mask)) {
144 DPRINTF("Failed to parse rule source: %s\n", (char *) blobmsg_data(cur));
145 goto error;
146 }
147 rule->flags |= IPRULE_SRC;
148 }
149
150 if ((cur = tb[RULE_DEST]) != NULL) {
151 if (!parse_ip_and_netmask(af, blobmsg_data(cur), &rule->dest_addr, &rule->dest_mask)) {
152 DPRINTF("Failed to parse rule destination: %s\n", (char *) blobmsg_data(cur));
153 goto error;
154 }
155 rule->flags |= IPRULE_DEST;
156 }
157
158 if ((cur = tb[RULE_PRIORITY]) != NULL) {
159 rule->priority = blobmsg_get_u32(cur);
160 rule->flags |= IPRULE_PRIORITY;
161 }
162
163 if ((cur = tb[RULE_TOS]) != NULL) {
164 if ((rule->tos = blobmsg_get_u32(cur)) > 255) {
165 DPRINTF("Invalid TOS value: %u\n", blobmsg_get_u32(cur));
166 goto error;
167 }
168 rule->flags |= IPRULE_TOS;
169 }
170
171 if ((cur = tb[RULE_FWMARK]) != NULL) {
172 if (!iprule_parse_mark(blobmsg_data(cur), rule)) {
173 DPRINTF("Failed to parse rule fwmark: %s\n", (char *) blobmsg_data(cur));
174 goto error;
175 }
176 /* flags set by iprule_parse_mark() */
177 }
178
179 if ((cur = tb[RULE_LOOKUP]) != NULL) {
180 if (!system_resolve_rt_table(blobmsg_data(cur), &rule->lookup)) {
181 DPRINTF("Failed to parse rule lookup table: %s\n", (char *) blobmsg_data(cur));
182 goto error;
183 }
184 rule->flags |= IPRULE_LOOKUP;
185 }
186
187 if ((cur = tb[RULE_ACTION]) != NULL) {
188 if (!system_resolve_iprule_action(blobmsg_data(cur), &rule->action)) {
189 DPRINTF("Failed to parse rule action: %s\n", (char *) blobmsg_data(cur));
190 goto error;
191 }
192 rule->flags |= IPRULE_ACTION;
193 }
194
195 if ((cur = tb[RULE_GOTO]) != NULL) {
196 rule->gotoid = blobmsg_get_u32(cur);
197 rule->flags |= IPRULE_GOTO;
198 }
199
200 /* trigger flush of existing rules when adding first uci rule the first time */
201 if (!iprules_flushed)
202 {
203 system_flush_iprules();
204 iprules_flushed = true;
205 }
206
207 vlist_add(&iprules, &rule->node, &rule->flags);
208 return;
209
210 error:
211 free(rule);
212 }
213
214 void
215 iprule_update_start(void)
216 {
217 vlist_update(&iprules);
218 }
219
220 void
221 iprule_update_complete(void)
222 {
223 vlist_flush(&iprules);
224 }
225
226
227 static int
228 rule_cmp(const void *k1, const void *k2, void *ptr)
229 {
230 return memcmp(k1, k2, sizeof(struct iprule)-offsetof(struct iprule, flags));
231 }
232
233 static void
234 iprule_update_rule(struct vlist_tree *tree,
235 struct vlist_node *node_new, struct vlist_node *node_old)
236 {
237 struct iprule *rule_old, *rule_new;
238
239 rule_old = container_of(node_old, struct iprule, node);
240 rule_new = container_of(node_new, struct iprule, node);
241
242 if (node_old) {
243 system_del_iprule(rule_old);
244 free(rule_old);
245 }
246
247 if (node_new)
248 system_add_iprule(rule_new);
249 }
250
251 static void __init
252 iprule_init_list(void)
253 {
254 vlist_init(&iprules, rule_cmp, iprule_update_rule);
255 }