nft_exthdr.c 9.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415
  1. /*
  2. * Copyright (c) 2008 Patrick McHardy <kaber@trash.net>
  3. *
  4. * This program is free software; you can redistribute it and/or modify
  5. * it under the terms of the GNU General Public License version 2 as
  6. * published by the Free Software Foundation.
  7. *
  8. * Development of this code funded by Astaro AG (http://www.astaro.com/)
  9. */
  10. #include <asm/unaligned.h>
  11. #include <linux/kernel.h>
  12. #include <linux/netlink.h>
  13. #include <linux/netfilter.h>
  14. #include <linux/netfilter/nf_tables.h>
  15. #include <net/netfilter/nf_tables_core.h>
  16. #include <net/netfilter/nf_tables.h>
  17. #include <net/tcp.h>
  18. struct nft_exthdr {
  19. u8 type;
  20. u8 offset;
  21. u8 len;
  22. u8 op;
  23. enum nft_registers dreg:8;
  24. enum nft_registers sreg:8;
  25. u8 flags;
  26. };
  27. static unsigned int optlen(const u8 *opt, unsigned int offset)
  28. {
  29. /* Beware zero-length options: make finite progress */
  30. if (opt[offset] <= TCPOPT_NOP || opt[offset + 1] == 0)
  31. return 1;
  32. else
  33. return opt[offset + 1];
  34. }
  35. static void nft_exthdr_ipv6_eval(const struct nft_expr *expr,
  36. struct nft_regs *regs,
  37. const struct nft_pktinfo *pkt)
  38. {
  39. struct nft_exthdr *priv = nft_expr_priv(expr);
  40. u32 *dest = &regs->data[priv->dreg];
  41. unsigned int offset = 0;
  42. int err;
  43. err = ipv6_find_hdr(pkt->skb, &offset, priv->type, NULL, NULL);
  44. if (priv->flags & NFT_EXTHDR_F_PRESENT) {
  45. *dest = (err >= 0);
  46. return;
  47. } else if (err < 0) {
  48. goto err;
  49. }
  50. offset += priv->offset;
  51. dest[priv->len / NFT_REG32_SIZE] = 0;
  52. if (skb_copy_bits(pkt->skb, offset, dest, priv->len) < 0)
  53. goto err;
  54. return;
  55. err:
  56. regs->verdict.code = NFT_BREAK;
  57. }
  58. static void *
  59. nft_tcp_header_pointer(const struct nft_pktinfo *pkt,
  60. unsigned int len, void *buffer, unsigned int *tcphdr_len)
  61. {
  62. struct tcphdr *tcph;
  63. if (!pkt->tprot_set || pkt->tprot != IPPROTO_TCP)
  64. return NULL;
  65. tcph = skb_header_pointer(pkt->skb, pkt->xt.thoff, sizeof(*tcph), buffer);
  66. if (!tcph)
  67. return NULL;
  68. *tcphdr_len = __tcp_hdrlen(tcph);
  69. if (*tcphdr_len < sizeof(*tcph) || *tcphdr_len > len)
  70. return NULL;
  71. return skb_header_pointer(pkt->skb, pkt->xt.thoff, *tcphdr_len, buffer);
  72. }
  73. static void nft_exthdr_tcp_eval(const struct nft_expr *expr,
  74. struct nft_regs *regs,
  75. const struct nft_pktinfo *pkt)
  76. {
  77. u8 buff[sizeof(struct tcphdr) + MAX_TCP_OPTION_SPACE];
  78. struct nft_exthdr *priv = nft_expr_priv(expr);
  79. unsigned int i, optl, tcphdr_len, offset;
  80. u32 *dest = &regs->data[priv->dreg];
  81. struct tcphdr *tcph;
  82. u8 *opt;
  83. tcph = nft_tcp_header_pointer(pkt, sizeof(buff), buff, &tcphdr_len);
  84. if (!tcph)
  85. goto err;
  86. opt = (u8 *)tcph;
  87. for (i = sizeof(*tcph); i < tcphdr_len - 1; i += optl) {
  88. optl = optlen(opt, i);
  89. if (priv->type != opt[i])
  90. continue;
  91. if (i + optl > tcphdr_len || priv->len + priv->offset > optl)
  92. goto err;
  93. offset = i + priv->offset;
  94. if (priv->flags & NFT_EXTHDR_F_PRESENT) {
  95. *dest = 1;
  96. } else {
  97. dest[priv->len / NFT_REG32_SIZE] = 0;
  98. memcpy(dest, opt + offset, priv->len);
  99. }
  100. return;
  101. }
  102. err:
  103. if (priv->flags & NFT_EXTHDR_F_PRESENT)
  104. *dest = 0;
  105. else
  106. regs->verdict.code = NFT_BREAK;
  107. }
  108. static void nft_exthdr_tcp_set_eval(const struct nft_expr *expr,
  109. struct nft_regs *regs,
  110. const struct nft_pktinfo *pkt)
  111. {
  112. u8 buff[sizeof(struct tcphdr) + MAX_TCP_OPTION_SPACE];
  113. struct nft_exthdr *priv = nft_expr_priv(expr);
  114. unsigned int i, optl, tcphdr_len, offset;
  115. struct tcphdr *tcph;
  116. u8 *opt;
  117. u32 src;
  118. tcph = nft_tcp_header_pointer(pkt, sizeof(buff), buff, &tcphdr_len);
  119. if (!tcph)
  120. return;
  121. opt = (u8 *)tcph;
  122. for (i = sizeof(*tcph); i < tcphdr_len - 1; i += optl) {
  123. union {
  124. u8 octet;
  125. __be16 v16;
  126. __be32 v32;
  127. } old, new;
  128. optl = optlen(opt, i);
  129. if (priv->type != opt[i])
  130. continue;
  131. if (i + optl > tcphdr_len || priv->len + priv->offset > optl)
  132. return;
  133. if (!skb_make_writable(pkt->skb, pkt->xt.thoff + i + priv->len))
  134. return;
  135. tcph = nft_tcp_header_pointer(pkt, sizeof(buff), buff,
  136. &tcphdr_len);
  137. if (!tcph)
  138. return;
  139. src = regs->data[priv->sreg];
  140. offset = i + priv->offset;
  141. switch (priv->len) {
  142. case 2:
  143. old.v16 = get_unaligned((u16 *)(opt + offset));
  144. new.v16 = src;
  145. switch (priv->type) {
  146. case TCPOPT_MSS:
  147. /* increase can cause connection to stall */
  148. if (ntohs(old.v16) <= ntohs(new.v16))
  149. return;
  150. break;
  151. }
  152. if (old.v16 == new.v16)
  153. return;
  154. put_unaligned(new.v16, (u16*)(opt + offset));
  155. inet_proto_csum_replace2(&tcph->check, pkt->skb,
  156. old.v16, new.v16, false);
  157. break;
  158. case 4:
  159. new.v32 = src;
  160. old.v32 = get_unaligned((u32 *)(opt + offset));
  161. if (old.v32 == new.v32)
  162. return;
  163. put_unaligned(new.v32, (u32*)(opt + offset));
  164. inet_proto_csum_replace4(&tcph->check, pkt->skb,
  165. old.v32, new.v32, false);
  166. break;
  167. default:
  168. WARN_ON_ONCE(1);
  169. break;
  170. }
  171. return;
  172. }
  173. }
  174. static const struct nla_policy nft_exthdr_policy[NFTA_EXTHDR_MAX + 1] = {
  175. [NFTA_EXTHDR_DREG] = { .type = NLA_U32 },
  176. [NFTA_EXTHDR_TYPE] = { .type = NLA_U8 },
  177. [NFTA_EXTHDR_OFFSET] = { .type = NLA_U32 },
  178. [NFTA_EXTHDR_LEN] = { .type = NLA_U32 },
  179. [NFTA_EXTHDR_FLAGS] = { .type = NLA_U32 },
  180. [NFTA_EXTHDR_OP] = { .type = NLA_U32 },
  181. [NFTA_EXTHDR_SREG] = { .type = NLA_U32 },
  182. };
  183. static int nft_exthdr_init(const struct nft_ctx *ctx,
  184. const struct nft_expr *expr,
  185. const struct nlattr * const tb[])
  186. {
  187. struct nft_exthdr *priv = nft_expr_priv(expr);
  188. u32 offset, len, flags = 0, op = NFT_EXTHDR_OP_IPV6;
  189. int err;
  190. if (!tb[NFTA_EXTHDR_DREG] ||
  191. !tb[NFTA_EXTHDR_TYPE] ||
  192. !tb[NFTA_EXTHDR_OFFSET] ||
  193. !tb[NFTA_EXTHDR_LEN])
  194. return -EINVAL;
  195. err = nft_parse_u32_check(tb[NFTA_EXTHDR_OFFSET], U8_MAX, &offset);
  196. if (err < 0)
  197. return err;
  198. err = nft_parse_u32_check(tb[NFTA_EXTHDR_LEN], U8_MAX, &len);
  199. if (err < 0)
  200. return err;
  201. if (tb[NFTA_EXTHDR_FLAGS]) {
  202. err = nft_parse_u32_check(tb[NFTA_EXTHDR_FLAGS], U8_MAX, &flags);
  203. if (err < 0)
  204. return err;
  205. if (flags & ~NFT_EXTHDR_F_PRESENT)
  206. return -EINVAL;
  207. }
  208. if (tb[NFTA_EXTHDR_OP]) {
  209. err = nft_parse_u32_check(tb[NFTA_EXTHDR_OP], U8_MAX, &op);
  210. if (err < 0)
  211. return err;
  212. }
  213. priv->type = nla_get_u8(tb[NFTA_EXTHDR_TYPE]);
  214. priv->offset = offset;
  215. priv->len = len;
  216. priv->dreg = nft_parse_register(tb[NFTA_EXTHDR_DREG]);
  217. priv->flags = flags;
  218. priv->op = op;
  219. return nft_validate_register_store(ctx, priv->dreg, NULL,
  220. NFT_DATA_VALUE, priv->len);
  221. }
  222. static int nft_exthdr_tcp_set_init(const struct nft_ctx *ctx,
  223. const struct nft_expr *expr,
  224. const struct nlattr * const tb[])
  225. {
  226. struct nft_exthdr *priv = nft_expr_priv(expr);
  227. u32 offset, len, flags = 0, op = NFT_EXTHDR_OP_IPV6;
  228. int err;
  229. if (!tb[NFTA_EXTHDR_SREG] ||
  230. !tb[NFTA_EXTHDR_TYPE] ||
  231. !tb[NFTA_EXTHDR_OFFSET] ||
  232. !tb[NFTA_EXTHDR_LEN])
  233. return -EINVAL;
  234. if (tb[NFTA_EXTHDR_DREG] || tb[NFTA_EXTHDR_FLAGS])
  235. return -EINVAL;
  236. err = nft_parse_u32_check(tb[NFTA_EXTHDR_OFFSET], U8_MAX, &offset);
  237. if (err < 0)
  238. return err;
  239. err = nft_parse_u32_check(tb[NFTA_EXTHDR_LEN], U8_MAX, &len);
  240. if (err < 0)
  241. return err;
  242. if (offset < 2)
  243. return -EOPNOTSUPP;
  244. switch (len) {
  245. case 2: break;
  246. case 4: break;
  247. default:
  248. return -EOPNOTSUPP;
  249. }
  250. err = nft_parse_u32_check(tb[NFTA_EXTHDR_OP], U8_MAX, &op);
  251. if (err < 0)
  252. return err;
  253. priv->type = nla_get_u8(tb[NFTA_EXTHDR_TYPE]);
  254. priv->offset = offset;
  255. priv->len = len;
  256. priv->sreg = nft_parse_register(tb[NFTA_EXTHDR_SREG]);
  257. priv->flags = flags;
  258. priv->op = op;
  259. return nft_validate_register_load(priv->sreg, priv->len);
  260. }
  261. static int nft_exthdr_dump_common(struct sk_buff *skb, const struct nft_exthdr *priv)
  262. {
  263. if (nla_put_u8(skb, NFTA_EXTHDR_TYPE, priv->type))
  264. goto nla_put_failure;
  265. if (nla_put_be32(skb, NFTA_EXTHDR_OFFSET, htonl(priv->offset)))
  266. goto nla_put_failure;
  267. if (nla_put_be32(skb, NFTA_EXTHDR_LEN, htonl(priv->len)))
  268. goto nla_put_failure;
  269. if (nla_put_be32(skb, NFTA_EXTHDR_FLAGS, htonl(priv->flags)))
  270. goto nla_put_failure;
  271. if (nla_put_be32(skb, NFTA_EXTHDR_OP, htonl(priv->op)))
  272. goto nla_put_failure;
  273. return 0;
  274. nla_put_failure:
  275. return -1;
  276. }
  277. static int nft_exthdr_dump(struct sk_buff *skb, const struct nft_expr *expr)
  278. {
  279. const struct nft_exthdr *priv = nft_expr_priv(expr);
  280. if (nft_dump_register(skb, NFTA_EXTHDR_DREG, priv->dreg))
  281. return -1;
  282. return nft_exthdr_dump_common(skb, priv);
  283. }
  284. static int nft_exthdr_dump_set(struct sk_buff *skb, const struct nft_expr *expr)
  285. {
  286. const struct nft_exthdr *priv = nft_expr_priv(expr);
  287. if (nft_dump_register(skb, NFTA_EXTHDR_SREG, priv->sreg))
  288. return -1;
  289. return nft_exthdr_dump_common(skb, priv);
  290. }
  291. static const struct nft_expr_ops nft_exthdr_ipv6_ops = {
  292. .type = &nft_exthdr_type,
  293. .size = NFT_EXPR_SIZE(sizeof(struct nft_exthdr)),
  294. .eval = nft_exthdr_ipv6_eval,
  295. .init = nft_exthdr_init,
  296. .dump = nft_exthdr_dump,
  297. };
  298. static const struct nft_expr_ops nft_exthdr_tcp_ops = {
  299. .type = &nft_exthdr_type,
  300. .size = NFT_EXPR_SIZE(sizeof(struct nft_exthdr)),
  301. .eval = nft_exthdr_tcp_eval,
  302. .init = nft_exthdr_init,
  303. .dump = nft_exthdr_dump,
  304. };
  305. static const struct nft_expr_ops nft_exthdr_tcp_set_ops = {
  306. .type = &nft_exthdr_type,
  307. .size = NFT_EXPR_SIZE(sizeof(struct nft_exthdr)),
  308. .eval = nft_exthdr_tcp_set_eval,
  309. .init = nft_exthdr_tcp_set_init,
  310. .dump = nft_exthdr_dump_set,
  311. };
  312. static const struct nft_expr_ops *
  313. nft_exthdr_select_ops(const struct nft_ctx *ctx,
  314. const struct nlattr * const tb[])
  315. {
  316. u32 op;
  317. if (!tb[NFTA_EXTHDR_OP])
  318. return &nft_exthdr_ipv6_ops;
  319. if (tb[NFTA_EXTHDR_SREG] && tb[NFTA_EXTHDR_DREG])
  320. return ERR_PTR(-EOPNOTSUPP);
  321. op = ntohl(nla_get_be32(tb[NFTA_EXTHDR_OP]));
  322. switch (op) {
  323. case NFT_EXTHDR_OP_TCPOPT:
  324. if (tb[NFTA_EXTHDR_SREG])
  325. return &nft_exthdr_tcp_set_ops;
  326. if (tb[NFTA_EXTHDR_DREG])
  327. return &nft_exthdr_tcp_ops;
  328. break;
  329. case NFT_EXTHDR_OP_IPV6:
  330. if (tb[NFTA_EXTHDR_DREG])
  331. return &nft_exthdr_ipv6_ops;
  332. break;
  333. }
  334. return ERR_PTR(-EOPNOTSUPP);
  335. }
  336. struct nft_expr_type nft_exthdr_type __read_mostly = {
  337. .name = "exthdr",
  338. .select_ops = nft_exthdr_select_ops,
  339. .policy = nft_exthdr_policy,
  340. .maxattr = NFTA_EXTHDR_MAX,
  341. .owner = THIS_MODULE,
  342. };