123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415 |
- /*
- * Copyright (c) 2008 Patrick McHardy <kaber@trash.net>
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License version 2 as
- * published by the Free Software Foundation.
- *
- * Development of this code funded by Astaro AG (http://www.astaro.com/)
- */
- #include <asm/unaligned.h>
- #include <linux/kernel.h>
- #include <linux/netlink.h>
- #include <linux/netfilter.h>
- #include <linux/netfilter/nf_tables.h>
- #include <net/netfilter/nf_tables_core.h>
- #include <net/netfilter/nf_tables.h>
- #include <net/tcp.h>
- struct nft_exthdr {
- u8 type;
- u8 offset;
- u8 len;
- u8 op;
- enum nft_registers dreg:8;
- enum nft_registers sreg:8;
- u8 flags;
- };
- static unsigned int optlen(const u8 *opt, unsigned int offset)
- {
- /* Beware zero-length options: make finite progress */
- if (opt[offset] <= TCPOPT_NOP || opt[offset + 1] == 0)
- return 1;
- else
- return opt[offset + 1];
- }
- static void nft_exthdr_ipv6_eval(const struct nft_expr *expr,
- struct nft_regs *regs,
- const struct nft_pktinfo *pkt)
- {
- struct nft_exthdr *priv = nft_expr_priv(expr);
- u32 *dest = ®s->data[priv->dreg];
- unsigned int offset = 0;
- int err;
- err = ipv6_find_hdr(pkt->skb, &offset, priv->type, NULL, NULL);
- if (priv->flags & NFT_EXTHDR_F_PRESENT) {
- *dest = (err >= 0);
- return;
- } else if (err < 0) {
- goto err;
- }
- offset += priv->offset;
- dest[priv->len / NFT_REG32_SIZE] = 0;
- if (skb_copy_bits(pkt->skb, offset, dest, priv->len) < 0)
- goto err;
- return;
- err:
- regs->verdict.code = NFT_BREAK;
- }
- static void *
- nft_tcp_header_pointer(const struct nft_pktinfo *pkt,
- unsigned int len, void *buffer, unsigned int *tcphdr_len)
- {
- struct tcphdr *tcph;
- if (!pkt->tprot_set || pkt->tprot != IPPROTO_TCP)
- return NULL;
- tcph = skb_header_pointer(pkt->skb, pkt->xt.thoff, sizeof(*tcph), buffer);
- if (!tcph)
- return NULL;
- *tcphdr_len = __tcp_hdrlen(tcph);
- if (*tcphdr_len < sizeof(*tcph) || *tcphdr_len > len)
- return NULL;
- return skb_header_pointer(pkt->skb, pkt->xt.thoff, *tcphdr_len, buffer);
- }
- static void nft_exthdr_tcp_eval(const struct nft_expr *expr,
- struct nft_regs *regs,
- const struct nft_pktinfo *pkt)
- {
- u8 buff[sizeof(struct tcphdr) + MAX_TCP_OPTION_SPACE];
- struct nft_exthdr *priv = nft_expr_priv(expr);
- unsigned int i, optl, tcphdr_len, offset;
- u32 *dest = ®s->data[priv->dreg];
- struct tcphdr *tcph;
- u8 *opt;
- tcph = nft_tcp_header_pointer(pkt, sizeof(buff), buff, &tcphdr_len);
- if (!tcph)
- goto err;
- opt = (u8 *)tcph;
- for (i = sizeof(*tcph); i < tcphdr_len - 1; i += optl) {
- optl = optlen(opt, i);
- if (priv->type != opt[i])
- continue;
- if (i + optl > tcphdr_len || priv->len + priv->offset > optl)
- goto err;
- offset = i + priv->offset;
- if (priv->flags & NFT_EXTHDR_F_PRESENT) {
- *dest = 1;
- } else {
- dest[priv->len / NFT_REG32_SIZE] = 0;
- memcpy(dest, opt + offset, priv->len);
- }
- return;
- }
- err:
- if (priv->flags & NFT_EXTHDR_F_PRESENT)
- *dest = 0;
- else
- regs->verdict.code = NFT_BREAK;
- }
- static void nft_exthdr_tcp_set_eval(const struct nft_expr *expr,
- struct nft_regs *regs,
- const struct nft_pktinfo *pkt)
- {
- u8 buff[sizeof(struct tcphdr) + MAX_TCP_OPTION_SPACE];
- struct nft_exthdr *priv = nft_expr_priv(expr);
- unsigned int i, optl, tcphdr_len, offset;
- struct tcphdr *tcph;
- u8 *opt;
- u32 src;
- tcph = nft_tcp_header_pointer(pkt, sizeof(buff), buff, &tcphdr_len);
- if (!tcph)
- return;
- opt = (u8 *)tcph;
- for (i = sizeof(*tcph); i < tcphdr_len - 1; i += optl) {
- union {
- u8 octet;
- __be16 v16;
- __be32 v32;
- } old, new;
- optl = optlen(opt, i);
- if (priv->type != opt[i])
- continue;
- if (i + optl > tcphdr_len || priv->len + priv->offset > optl)
- return;
- if (!skb_make_writable(pkt->skb, pkt->xt.thoff + i + priv->len))
- return;
- tcph = nft_tcp_header_pointer(pkt, sizeof(buff), buff,
- &tcphdr_len);
- if (!tcph)
- return;
- src = regs->data[priv->sreg];
- offset = i + priv->offset;
- switch (priv->len) {
- case 2:
- old.v16 = get_unaligned((u16 *)(opt + offset));
- new.v16 = src;
- switch (priv->type) {
- case TCPOPT_MSS:
- /* increase can cause connection to stall */
- if (ntohs(old.v16) <= ntohs(new.v16))
- return;
- break;
- }
- if (old.v16 == new.v16)
- return;
- put_unaligned(new.v16, (u16*)(opt + offset));
- inet_proto_csum_replace2(&tcph->check, pkt->skb,
- old.v16, new.v16, false);
- break;
- case 4:
- new.v32 = src;
- old.v32 = get_unaligned((u32 *)(opt + offset));
- if (old.v32 == new.v32)
- return;
- put_unaligned(new.v32, (u32*)(opt + offset));
- inet_proto_csum_replace4(&tcph->check, pkt->skb,
- old.v32, new.v32, false);
- break;
- default:
- WARN_ON_ONCE(1);
- break;
- }
- return;
- }
- }
- static const struct nla_policy nft_exthdr_policy[NFTA_EXTHDR_MAX + 1] = {
- [NFTA_EXTHDR_DREG] = { .type = NLA_U32 },
- [NFTA_EXTHDR_TYPE] = { .type = NLA_U8 },
- [NFTA_EXTHDR_OFFSET] = { .type = NLA_U32 },
- [NFTA_EXTHDR_LEN] = { .type = NLA_U32 },
- [NFTA_EXTHDR_FLAGS] = { .type = NLA_U32 },
- [NFTA_EXTHDR_OP] = { .type = NLA_U32 },
- [NFTA_EXTHDR_SREG] = { .type = NLA_U32 },
- };
- static int nft_exthdr_init(const struct nft_ctx *ctx,
- const struct nft_expr *expr,
- const struct nlattr * const tb[])
- {
- struct nft_exthdr *priv = nft_expr_priv(expr);
- u32 offset, len, flags = 0, op = NFT_EXTHDR_OP_IPV6;
- int err;
- if (!tb[NFTA_EXTHDR_DREG] ||
- !tb[NFTA_EXTHDR_TYPE] ||
- !tb[NFTA_EXTHDR_OFFSET] ||
- !tb[NFTA_EXTHDR_LEN])
- return -EINVAL;
- err = nft_parse_u32_check(tb[NFTA_EXTHDR_OFFSET], U8_MAX, &offset);
- if (err < 0)
- return err;
- err = nft_parse_u32_check(tb[NFTA_EXTHDR_LEN], U8_MAX, &len);
- if (err < 0)
- return err;
- if (tb[NFTA_EXTHDR_FLAGS]) {
- err = nft_parse_u32_check(tb[NFTA_EXTHDR_FLAGS], U8_MAX, &flags);
- if (err < 0)
- return err;
- if (flags & ~NFT_EXTHDR_F_PRESENT)
- return -EINVAL;
- }
- if (tb[NFTA_EXTHDR_OP]) {
- err = nft_parse_u32_check(tb[NFTA_EXTHDR_OP], U8_MAX, &op);
- if (err < 0)
- return err;
- }
- priv->type = nla_get_u8(tb[NFTA_EXTHDR_TYPE]);
- priv->offset = offset;
- priv->len = len;
- priv->dreg = nft_parse_register(tb[NFTA_EXTHDR_DREG]);
- priv->flags = flags;
- priv->op = op;
- return nft_validate_register_store(ctx, priv->dreg, NULL,
- NFT_DATA_VALUE, priv->len);
- }
- static int nft_exthdr_tcp_set_init(const struct nft_ctx *ctx,
- const struct nft_expr *expr,
- const struct nlattr * const tb[])
- {
- struct nft_exthdr *priv = nft_expr_priv(expr);
- u32 offset, len, flags = 0, op = NFT_EXTHDR_OP_IPV6;
- int err;
- if (!tb[NFTA_EXTHDR_SREG] ||
- !tb[NFTA_EXTHDR_TYPE] ||
- !tb[NFTA_EXTHDR_OFFSET] ||
- !tb[NFTA_EXTHDR_LEN])
- return -EINVAL;
- if (tb[NFTA_EXTHDR_DREG] || tb[NFTA_EXTHDR_FLAGS])
- return -EINVAL;
- err = nft_parse_u32_check(tb[NFTA_EXTHDR_OFFSET], U8_MAX, &offset);
- if (err < 0)
- return err;
- err = nft_parse_u32_check(tb[NFTA_EXTHDR_LEN], U8_MAX, &len);
- if (err < 0)
- return err;
- if (offset < 2)
- return -EOPNOTSUPP;
- switch (len) {
- case 2: break;
- case 4: break;
- default:
- return -EOPNOTSUPP;
- }
- err = nft_parse_u32_check(tb[NFTA_EXTHDR_OP], U8_MAX, &op);
- if (err < 0)
- return err;
- priv->type = nla_get_u8(tb[NFTA_EXTHDR_TYPE]);
- priv->offset = offset;
- priv->len = len;
- priv->sreg = nft_parse_register(tb[NFTA_EXTHDR_SREG]);
- priv->flags = flags;
- priv->op = op;
- return nft_validate_register_load(priv->sreg, priv->len);
- }
- static int nft_exthdr_dump_common(struct sk_buff *skb, const struct nft_exthdr *priv)
- {
- if (nla_put_u8(skb, NFTA_EXTHDR_TYPE, priv->type))
- goto nla_put_failure;
- if (nla_put_be32(skb, NFTA_EXTHDR_OFFSET, htonl(priv->offset)))
- goto nla_put_failure;
- if (nla_put_be32(skb, NFTA_EXTHDR_LEN, htonl(priv->len)))
- goto nla_put_failure;
- if (nla_put_be32(skb, NFTA_EXTHDR_FLAGS, htonl(priv->flags)))
- goto nla_put_failure;
- if (nla_put_be32(skb, NFTA_EXTHDR_OP, htonl(priv->op)))
- goto nla_put_failure;
- return 0;
- nla_put_failure:
- return -1;
- }
- static int nft_exthdr_dump(struct sk_buff *skb, const struct nft_expr *expr)
- {
- const struct nft_exthdr *priv = nft_expr_priv(expr);
- if (nft_dump_register(skb, NFTA_EXTHDR_DREG, priv->dreg))
- return -1;
- return nft_exthdr_dump_common(skb, priv);
- }
- static int nft_exthdr_dump_set(struct sk_buff *skb, const struct nft_expr *expr)
- {
- const struct nft_exthdr *priv = nft_expr_priv(expr);
- if (nft_dump_register(skb, NFTA_EXTHDR_SREG, priv->sreg))
- return -1;
- return nft_exthdr_dump_common(skb, priv);
- }
- static const struct nft_expr_ops nft_exthdr_ipv6_ops = {
- .type = &nft_exthdr_type,
- .size = NFT_EXPR_SIZE(sizeof(struct nft_exthdr)),
- .eval = nft_exthdr_ipv6_eval,
- .init = nft_exthdr_init,
- .dump = nft_exthdr_dump,
- };
- static const struct nft_expr_ops nft_exthdr_tcp_ops = {
- .type = &nft_exthdr_type,
- .size = NFT_EXPR_SIZE(sizeof(struct nft_exthdr)),
- .eval = nft_exthdr_tcp_eval,
- .init = nft_exthdr_init,
- .dump = nft_exthdr_dump,
- };
- static const struct nft_expr_ops nft_exthdr_tcp_set_ops = {
- .type = &nft_exthdr_type,
- .size = NFT_EXPR_SIZE(sizeof(struct nft_exthdr)),
- .eval = nft_exthdr_tcp_set_eval,
- .init = nft_exthdr_tcp_set_init,
- .dump = nft_exthdr_dump_set,
- };
- static const struct nft_expr_ops *
- nft_exthdr_select_ops(const struct nft_ctx *ctx,
- const struct nlattr * const tb[])
- {
- u32 op;
- if (!tb[NFTA_EXTHDR_OP])
- return &nft_exthdr_ipv6_ops;
- if (tb[NFTA_EXTHDR_SREG] && tb[NFTA_EXTHDR_DREG])
- return ERR_PTR(-EOPNOTSUPP);
- op = ntohl(nla_get_be32(tb[NFTA_EXTHDR_OP]));
- switch (op) {
- case NFT_EXTHDR_OP_TCPOPT:
- if (tb[NFTA_EXTHDR_SREG])
- return &nft_exthdr_tcp_set_ops;
- if (tb[NFTA_EXTHDR_DREG])
- return &nft_exthdr_tcp_ops;
- break;
- case NFT_EXTHDR_OP_IPV6:
- if (tb[NFTA_EXTHDR_DREG])
- return &nft_exthdr_ipv6_ops;
- break;
- }
- return ERR_PTR(-EOPNOTSUPP);
- }
- struct nft_expr_type nft_exthdr_type __read_mostly = {
- .name = "exthdr",
- .select_ops = nft_exthdr_select_ops,
- .policy = nft_exthdr_policy,
- .maxattr = NFTA_EXTHDR_MAX,
- .owner = THIS_MODULE,
- };
|