nft_rt.c 4.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196
  1. /*
  2. * Copyright (c) 2016 Anders K. Pedersen <akp@cohaesio.com>
  3. *
  4. * This program is free software; you can redistribute it and/or modify
  5. * it under the terms of the GNU General Public License version 2 as
  6. * published by the Free Software Foundation.
  7. */
  8. #include <linux/kernel.h>
  9. #include <linux/netlink.h>
  10. #include <linux/netfilter.h>
  11. #include <linux/netfilter/nf_tables.h>
  12. #include <net/dst.h>
  13. #include <net/ip6_route.h>
  14. #include <net/route.h>
  15. #include <net/netfilter/nf_tables.h>
  16. #include <net/netfilter/nf_tables_core.h>
  17. struct nft_rt {
  18. enum nft_rt_keys key:8;
  19. enum nft_registers dreg:8;
  20. };
  21. static u16 get_tcpmss(const struct nft_pktinfo *pkt, const struct dst_entry *skbdst)
  22. {
  23. u32 minlen = sizeof(struct ipv6hdr), mtu = dst_mtu(skbdst);
  24. const struct sk_buff *skb = pkt->skb;
  25. struct dst_entry *dst = NULL;
  26. struct flowi fl;
  27. memset(&fl, 0, sizeof(fl));
  28. switch (nft_pf(pkt)) {
  29. case NFPROTO_IPV4:
  30. fl.u.ip4.daddr = ip_hdr(skb)->saddr;
  31. minlen = sizeof(struct iphdr) + sizeof(struct tcphdr);
  32. break;
  33. case NFPROTO_IPV6:
  34. fl.u.ip6.daddr = ipv6_hdr(skb)->saddr;
  35. minlen = sizeof(struct ipv6hdr) + sizeof(struct tcphdr);
  36. break;
  37. }
  38. nf_route(nft_net(pkt), &dst, &fl, false, nft_pf(pkt));
  39. if (dst) {
  40. mtu = min(mtu, dst_mtu(dst));
  41. dst_release(dst);
  42. }
  43. if (mtu <= minlen || mtu > 0xffff)
  44. return TCP_MSS_DEFAULT;
  45. return mtu - minlen;
  46. }
  47. static void nft_rt_get_eval(const struct nft_expr *expr,
  48. struct nft_regs *regs,
  49. const struct nft_pktinfo *pkt)
  50. {
  51. const struct nft_rt *priv = nft_expr_priv(expr);
  52. const struct sk_buff *skb = pkt->skb;
  53. u32 *dest = &regs->data[priv->dreg];
  54. const struct dst_entry *dst;
  55. dst = skb_dst(skb);
  56. if (!dst)
  57. goto err;
  58. switch (priv->key) {
  59. #ifdef CONFIG_IP_ROUTE_CLASSID
  60. case NFT_RT_CLASSID:
  61. *dest = dst->tclassid;
  62. break;
  63. #endif
  64. case NFT_RT_NEXTHOP4:
  65. if (nft_pf(pkt) != NFPROTO_IPV4)
  66. goto err;
  67. *dest = (__force u32)rt_nexthop((const struct rtable *)dst,
  68. ip_hdr(skb)->daddr);
  69. break;
  70. case NFT_RT_NEXTHOP6:
  71. if (nft_pf(pkt) != NFPROTO_IPV6)
  72. goto err;
  73. memcpy(dest, rt6_nexthop((struct rt6_info *)dst,
  74. &ipv6_hdr(skb)->daddr),
  75. sizeof(struct in6_addr));
  76. break;
  77. case NFT_RT_TCPMSS:
  78. nft_reg_store16(dest, get_tcpmss(pkt, dst));
  79. break;
  80. default:
  81. WARN_ON(1);
  82. goto err;
  83. }
  84. return;
  85. err:
  86. regs->verdict.code = NFT_BREAK;
  87. }
  88. static const struct nla_policy nft_rt_policy[NFTA_RT_MAX + 1] = {
  89. [NFTA_RT_DREG] = { .type = NLA_U32 },
  90. [NFTA_RT_KEY] = { .type = NLA_U32 },
  91. };
  92. static int nft_rt_get_init(const struct nft_ctx *ctx,
  93. const struct nft_expr *expr,
  94. const struct nlattr * const tb[])
  95. {
  96. struct nft_rt *priv = nft_expr_priv(expr);
  97. unsigned int len;
  98. if (tb[NFTA_RT_KEY] == NULL ||
  99. tb[NFTA_RT_DREG] == NULL)
  100. return -EINVAL;
  101. priv->key = ntohl(nla_get_be32(tb[NFTA_RT_KEY]));
  102. switch (priv->key) {
  103. #ifdef CONFIG_IP_ROUTE_CLASSID
  104. case NFT_RT_CLASSID:
  105. #endif
  106. case NFT_RT_NEXTHOP4:
  107. len = sizeof(u32);
  108. break;
  109. case NFT_RT_NEXTHOP6:
  110. len = sizeof(struct in6_addr);
  111. break;
  112. case NFT_RT_TCPMSS:
  113. len = sizeof(u16);
  114. break;
  115. default:
  116. return -EOPNOTSUPP;
  117. }
  118. priv->dreg = nft_parse_register(tb[NFTA_RT_DREG]);
  119. return nft_validate_register_store(ctx, priv->dreg, NULL,
  120. NFT_DATA_VALUE, len);
  121. }
  122. static int nft_rt_get_dump(struct sk_buff *skb,
  123. const struct nft_expr *expr)
  124. {
  125. const struct nft_rt *priv = nft_expr_priv(expr);
  126. if (nla_put_be32(skb, NFTA_RT_KEY, htonl(priv->key)))
  127. goto nla_put_failure;
  128. if (nft_dump_register(skb, NFTA_RT_DREG, priv->dreg))
  129. goto nla_put_failure;
  130. return 0;
  131. nla_put_failure:
  132. return -1;
  133. }
  134. static int nft_rt_validate(const struct nft_ctx *ctx, const struct nft_expr *expr,
  135. const struct nft_data **data)
  136. {
  137. const struct nft_rt *priv = nft_expr_priv(expr);
  138. unsigned int hooks;
  139. switch (priv->key) {
  140. case NFT_RT_NEXTHOP4:
  141. case NFT_RT_NEXTHOP6:
  142. case NFT_RT_CLASSID:
  143. return 0;
  144. case NFT_RT_TCPMSS:
  145. hooks = (1 << NF_INET_FORWARD) |
  146. (1 << NF_INET_LOCAL_OUT) |
  147. (1 << NF_INET_POST_ROUTING);
  148. break;
  149. default:
  150. return -EINVAL;
  151. }
  152. return nft_chain_validate_hooks(ctx->chain, hooks);
  153. }
  154. static const struct nft_expr_ops nft_rt_get_ops = {
  155. .type = &nft_rt_type,
  156. .size = NFT_EXPR_SIZE(sizeof(struct nft_rt)),
  157. .eval = nft_rt_get_eval,
  158. .init = nft_rt_get_init,
  159. .dump = nft_rt_get_dump,
  160. .validate = nft_rt_validate,
  161. };
  162. struct nft_expr_type nft_rt_type __read_mostly = {
  163. .name = "rt",
  164. .ops = &nft_rt_get_ops,
  165. .policy = nft_rt_policy,
  166. .maxattr = NFTA_RT_MAX,
  167. .owner = THIS_MODULE,
  168. };