diff options
Diffstat (limited to 'net/ipv4/netfilter.c')
| -rw-r--r-- | net/ipv4/netfilter.c | 141 | 
1 files changed, 46 insertions, 95 deletions
diff --git a/net/ipv4/netfilter.c b/net/ipv4/netfilter.c index 994a1f29ebb..7ebd6e37875 100644 --- a/net/ipv4/netfilter.c +++ b/net/ipv4/netfilter.c @@ -1,76 +1,67 @@ -/* IPv4 specific functions of netfilter core */ +/* + * IPv4 specific functions of netfilter core + * + * Rusty Russell (C) 2000 -- This code is GPL. + * Patrick McHardy (C) 2006-2012 + */  #include <linux/kernel.h>  #include <linux/netfilter.h>  #include <linux/netfilter_ipv4.h>  #include <linux/ip.h>  #include <linux/skbuff.h>  #include <linux/gfp.h> +#include <linux/export.h>  #include <net/route.h>  #include <net/xfrm.h>  #include <net/ip.h>  #include <net/netfilter/nf_queue.h>  /* route_me_harder function, used by iptable_nat, iptable_mangle + ip_queue */ -int ip_route_me_harder(struct sk_buff *skb, unsigned addr_type) +int ip_route_me_harder(struct sk_buff *skb, unsigned int addr_type)  {  	struct net *net = dev_net(skb_dst(skb)->dev);  	const struct iphdr *iph = ip_hdr(skb);  	struct rtable *rt; -	struct flowi fl = {}; -	unsigned long orefdst; +	struct flowi4 fl4 = {}; +	__be32 saddr = iph->saddr; +	__u8 flags = skb->sk ? inet_sk_flowi_flags(skb->sk) : 0;  	unsigned int hh_len; -	unsigned int type; -	type = inet_addr_type(net, iph->saddr); -	if (skb->sk && inet_sk(skb->sk)->transparent) -		type = RTN_LOCAL;  	if (addr_type == RTN_UNSPEC) -		addr_type = type; +		addr_type = inet_addr_type(net, saddr); +	if (addr_type == RTN_LOCAL || addr_type == RTN_UNICAST) +		flags |= FLOWI_FLAG_ANYSRC; +	else +		saddr = 0;  	/* some non-standard hacks like ipt_REJECT.c:send_reset() can cause  	 * packets with foreign saddr to appear on the NF_INET_LOCAL_OUT hook.  	 */ -	if (addr_type == RTN_LOCAL) { -		fl.fl4_dst = iph->daddr; -		if (type == RTN_LOCAL) -			fl.fl4_src = iph->saddr; -		fl.fl4_tos = RT_TOS(iph->tos); -		fl.oif = skb->sk ? skb->sk->sk_bound_dev_if : 0; -		fl.mark = skb->mark; -		fl.flags = skb->sk ? inet_sk_flowi_flags(skb->sk) : 0; -		if (ip_route_output_key(net, &rt, &fl) != 0) -			return -1; - -		/* Drop old route. */ -		skb_dst_drop(skb); -		skb_dst_set(skb, &rt->dst); -	} else { -		/* non-local src, find valid iif to satisfy -		 * rp-filter when calling ip_route_input. */ -		fl.fl4_dst = iph->saddr; -		if (ip_route_output_key(net, &rt, &fl) != 0) -			return -1; - -		orefdst = skb->_skb_refdst; -		if (ip_route_input(skb, iph->daddr, iph->saddr, -				   RT_TOS(iph->tos), rt->dst.dev) != 0) { -			dst_release(&rt->dst); -			return -1; -		} -		dst_release(&rt->dst); -		refdst_drop(orefdst); -	} +	fl4.daddr = iph->daddr; +	fl4.saddr = saddr; +	fl4.flowi4_tos = RT_TOS(iph->tos); +	fl4.flowi4_oif = skb->sk ? skb->sk->sk_bound_dev_if : 0; +	fl4.flowi4_mark = skb->mark; +	fl4.flowi4_flags = flags; +	rt = ip_route_output_key(net, &fl4); +	if (IS_ERR(rt)) +		return PTR_ERR(rt); + +	/* Drop old route. */ +	skb_dst_drop(skb); +	skb_dst_set(skb, &rt->dst);  	if (skb_dst(skb)->error) -		return -1; +		return skb_dst(skb)->error;  #ifdef CONFIG_XFRM  	if (!(IPCB(skb)->flags & IPSKB_XFRM_TRANSFORMED) && -	    xfrm_decode_session(skb, &fl, AF_INET) == 0) { +	    xfrm_decode_session(skb, flowi4_to_flowi(&fl4), AF_INET) == 0) {  		struct dst_entry *dst = skb_dst(skb);  		skb_dst_set(skb, NULL); -		if (xfrm_lookup(net, &dst, &fl, skb->sk, 0)) -			return -1; +		dst = xfrm_lookup(net, dst, flowi4_to_flowi(&fl4), skb->sk, 0); +		if (IS_ERR(dst)) +			return PTR_ERR(dst);  		skb_dst_set(skb, dst);  	}  #endif @@ -78,49 +69,14 @@ int ip_route_me_harder(struct sk_buff *skb, unsigned addr_type)  	/* Change in oif may mean change in hh_len. */  	hh_len = skb_dst(skb)->dev->hard_header_len;  	if (skb_headroom(skb) < hh_len && -	    pskb_expand_head(skb, hh_len - skb_headroom(skb), 0, GFP_ATOMIC)) -		return -1; +	    pskb_expand_head(skb, HH_DATA_ALIGN(hh_len - skb_headroom(skb)), +				0, GFP_ATOMIC)) +		return -ENOMEM;  	return 0;  }  EXPORT_SYMBOL(ip_route_me_harder); -#ifdef CONFIG_XFRM -int ip_xfrm_me_harder(struct sk_buff *skb) -{ -	struct flowi fl; -	unsigned int hh_len; -	struct dst_entry *dst; - -	if (IPCB(skb)->flags & IPSKB_XFRM_TRANSFORMED) -		return 0; -	if (xfrm_decode_session(skb, &fl, AF_INET) < 0) -		return -1; - -	dst = skb_dst(skb); -	if (dst->xfrm) -		dst = ((struct xfrm_dst *)dst)->route; -	dst_hold(dst); - -	if (xfrm_lookup(dev_net(dst->dev), &dst, &fl, skb->sk, 0) < 0) -		return -1; - -	skb_dst_drop(skb); -	skb_dst_set(skb, dst); - -	/* Change in oif may mean change in hh_len. */ -	hh_len = skb_dst(skb)->dev->hard_header_len; -	if (skb_headroom(skb) < hh_len && -	    pskb_expand_head(skb, hh_len - skb_headroom(skb), 0, GFP_ATOMIC)) -		return -1; -	return 0; -} -EXPORT_SYMBOL(ip_xfrm_me_harder); -#endif - -void (*ip_nat_decode_session)(struct sk_buff *, struct flowi *); -EXPORT_SYMBOL(ip_nat_decode_session); -  /*   * Extra routing may needed on local out, as the QUEUE target never   * returns control to the table. @@ -217,9 +173,14 @@ static __sum16 nf_ip_checksum_partial(struct sk_buff *skb, unsigned int hook,  	return csum;  } -static int nf_ip_route(struct dst_entry **dst, struct flowi *fl) +static int nf_ip_route(struct net *net, struct dst_entry **dst, +		       struct flowi *fl, bool strict __always_unused)  { -	return ip_route_output_key(&init_net, (struct rtable **)dst, fl); +	struct rtable *rt = ip_route_output_key(net, &fl->u.ip4); +	if (IS_ERR(rt)) +		return PTR_ERR(rt); +	*dst = &rt->dst; +	return 0;  }  static const struct nf_afinfo nf_ip_afinfo = { @@ -232,25 +193,15 @@ static const struct nf_afinfo nf_ip_afinfo = {  	.route_key_size		= sizeof(struct ip_rt_info),  }; -static int ipv4_netfilter_init(void) +static int __init ipv4_netfilter_init(void)  {  	return nf_register_afinfo(&nf_ip_afinfo);  } -static void ipv4_netfilter_fini(void) +static void __exit ipv4_netfilter_fini(void)  {  	nf_unregister_afinfo(&nf_ip_afinfo);  }  module_init(ipv4_netfilter_init);  module_exit(ipv4_netfilter_fini); - -#ifdef CONFIG_SYSCTL -struct ctl_path nf_net_ipv4_netfilter_sysctl_path[] = { -	{ .procname = "net", }, -	{ .procname = "ipv4", }, -	{ .procname = "netfilter", }, -	{ } -}; -EXPORT_SYMBOL_GPL(nf_net_ipv4_netfilter_sysctl_path); -#endif /* CONFIG_SYSCTL */  | 
