-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge git://git.kernel.org/pub/scm/linux/kernel/git/pablo/nf-next
Pablo Neira Ayuso says: ==================== Netfilter updates for net-next The following patchset contains Netfilter updates for your net-next tree. This includes better integration with the routing subsystem for nf_tables, explicit notrack support and smaller updates. More specifically, they are: 1) Add fib lookup expression for nf_tables, from Florian Westphal. This new expression provides a native replacement for iptables addrtype and rp_filter matches. This is more flexible though, since we can populate the kernel flowi representation to inquire fib to accomodate new usecases, such as RTBH through skb mark. 2) Introduce rt expression for nf_tables, from Anders K. Pedersen. This new expression allow you to access skbuff route metadata, more specifically nexthop and classid fields. 3) Add notrack support for nf_tables, to skip conntracking, requested by many users already. 4) Add boilerplate code to allow to use nf_log infrastructure from nf_tables ingress. 5) Allow to mangle pkttype from nf_tables prerouting chain, to emulate the xtables cluster match, from Liping Zhang. 6) Move socket lookup code into generic nf_socket_* infrastructure so we can provide a native replacement for the xtables socket match. 7) Make sure nfnetlink_queue data that is updated on every packets is placed in a different cache from read-only data, from Florian Westphal. 8) Handle NF_STOLEN from nf_tables core, also from Florian Westphal. 9) Start round robin number generation in nft_numgen from zero, instead of n-1, for consistency with xtables statistics match, patch from Liping Zhang. 10) Set GFP_NOWARN flag in skbuff netlink allocations in nfnetlink_log, given we retry with a smaller allocation on failure, from Calvin Owens. 11) Cleanup xt_multiport to use switch(), from Gao feng. 12) Remove superfluous check in nft_immediate and nft_cmp, from Liping Zhang. ==================== Signed-off-by: David S. Miller <davem@davemloft.net>
- Loading branch information
Showing
31 changed files
with
1,610 additions
and
340 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,27 @@ | ||
#ifndef _NF_SOCK_H_ | ||
#define _NF_SOCK_H_ | ||
|
||
struct net_device; | ||
struct sk_buff; | ||
struct sock; | ||
struct net; | ||
|
||
static inline bool nf_sk_is_transparent(struct sock *sk) | ||
{ | ||
switch (sk->sk_state) { | ||
case TCP_TIME_WAIT: | ||
return inet_twsk(sk)->tw_transparent; | ||
case TCP_NEW_SYN_RECV: | ||
return inet_rsk(inet_reqsk(sk))->no_srccheck; | ||
default: | ||
return inet_sk(sk)->transparent; | ||
} | ||
} | ||
|
||
struct sock *nf_sk_lookup_slow_v4(struct net *net, const struct sk_buff *skb, | ||
const struct net_device *indev); | ||
|
||
struct sock *nf_sk_lookup_slow_v6(struct net *net, const struct sk_buff *skb, | ||
const struct net_device *indev); | ||
|
||
#endif |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,31 @@ | ||
#ifndef _NFT_FIB_H_ | ||
#define _NFT_FIB_H_ | ||
|
||
struct nft_fib { | ||
enum nft_registers dreg:8; | ||
u8 result; | ||
u32 flags; | ||
}; | ||
|
||
extern const struct nla_policy nft_fib_policy[]; | ||
|
||
int nft_fib_dump(struct sk_buff *skb, const struct nft_expr *expr); | ||
int nft_fib_init(const struct nft_ctx *ctx, const struct nft_expr *expr, | ||
const struct nlattr * const tb[]); | ||
int nft_fib_validate(const struct nft_ctx *ctx, const struct nft_expr *expr, | ||
const struct nft_data **data); | ||
|
||
|
||
void nft_fib4_eval_type(const struct nft_expr *expr, struct nft_regs *regs, | ||
const struct nft_pktinfo *pkt); | ||
void nft_fib4_eval(const struct nft_expr *expr, struct nft_regs *regs, | ||
const struct nft_pktinfo *pkt); | ||
|
||
void nft_fib6_eval_type(const struct nft_expr *expr, struct nft_regs *regs, | ||
const struct nft_pktinfo *pkt); | ||
void nft_fib6_eval(const struct nft_expr *expr, struct nft_regs *regs, | ||
const struct nft_pktinfo *pkt); | ||
|
||
void nft_fib_store_result(void *reg, enum nft_fib_result r, | ||
const struct nft_pktinfo *pkt, int index); | ||
#endif |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,163 @@ | ||
/* | ||
* Copyright (C) 2007-2008 BalaBit IT Ltd. | ||
* Author: Krisztian Kovacs | ||
* | ||
* This program is free software; you can redistribute it and/or modify | ||
* it under the terms of the GNU General Public License version 2 as | ||
* published by the Free Software Foundation. | ||
* | ||
*/ | ||
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt | ||
#include <linux/module.h> | ||
#include <linux/skbuff.h> | ||
#include <net/tcp.h> | ||
#include <net/udp.h> | ||
#include <net/icmp.h> | ||
#include <net/sock.h> | ||
#include <net/inet_sock.h> | ||
#include <net/netfilter/nf_socket.h> | ||
#if IS_ENABLED(CONFIG_NF_CONNTRACK) | ||
#include <net/netfilter/nf_conntrack.h> | ||
#endif | ||
|
||
static int | ||
extract_icmp4_fields(const struct sk_buff *skb, u8 *protocol, | ||
__be32 *raddr, __be32 *laddr, | ||
__be16 *rport, __be16 *lport) | ||
{ | ||
unsigned int outside_hdrlen = ip_hdrlen(skb); | ||
struct iphdr *inside_iph, _inside_iph; | ||
struct icmphdr *icmph, _icmph; | ||
__be16 *ports, _ports[2]; | ||
|
||
icmph = skb_header_pointer(skb, outside_hdrlen, | ||
sizeof(_icmph), &_icmph); | ||
if (icmph == NULL) | ||
return 1; | ||
|
||
switch (icmph->type) { | ||
case ICMP_DEST_UNREACH: | ||
case ICMP_SOURCE_QUENCH: | ||
case ICMP_REDIRECT: | ||
case ICMP_TIME_EXCEEDED: | ||
case ICMP_PARAMETERPROB: | ||
break; | ||
default: | ||
return 1; | ||
} | ||
|
||
inside_iph = skb_header_pointer(skb, outside_hdrlen + | ||
sizeof(struct icmphdr), | ||
sizeof(_inside_iph), &_inside_iph); | ||
if (inside_iph == NULL) | ||
return 1; | ||
|
||
if (inside_iph->protocol != IPPROTO_TCP && | ||
inside_iph->protocol != IPPROTO_UDP) | ||
return 1; | ||
|
||
ports = skb_header_pointer(skb, outside_hdrlen + | ||
sizeof(struct icmphdr) + | ||
(inside_iph->ihl << 2), | ||
sizeof(_ports), &_ports); | ||
if (ports == NULL) | ||
return 1; | ||
|
||
/* the inside IP packet is the one quoted from our side, thus | ||
* its saddr is the local address */ | ||
*protocol = inside_iph->protocol; | ||
*laddr = inside_iph->saddr; | ||
*lport = ports[0]; | ||
*raddr = inside_iph->daddr; | ||
*rport = ports[1]; | ||
|
||
return 0; | ||
} | ||
|
||
static struct sock * | ||
nf_socket_get_sock_v4(struct net *net, struct sk_buff *skb, const int doff, | ||
const u8 protocol, | ||
const __be32 saddr, const __be32 daddr, | ||
const __be16 sport, const __be16 dport, | ||
const struct net_device *in) | ||
{ | ||
switch (protocol) { | ||
case IPPROTO_TCP: | ||
return inet_lookup(net, &tcp_hashinfo, skb, doff, | ||
saddr, sport, daddr, dport, | ||
in->ifindex); | ||
case IPPROTO_UDP: | ||
return udp4_lib_lookup(net, saddr, sport, daddr, dport, | ||
in->ifindex); | ||
} | ||
return NULL; | ||
} | ||
|
||
struct sock *nf_sk_lookup_slow_v4(struct net *net, const struct sk_buff *skb, | ||
const struct net_device *indev) | ||
{ | ||
__be32 uninitialized_var(daddr), uninitialized_var(saddr); | ||
__be16 uninitialized_var(dport), uninitialized_var(sport); | ||
const struct iphdr *iph = ip_hdr(skb); | ||
struct sk_buff *data_skb = NULL; | ||
u8 uninitialized_var(protocol); | ||
#if IS_ENABLED(CONFIG_NF_CONNTRACK) | ||
enum ip_conntrack_info ctinfo; | ||
struct nf_conn const *ct; | ||
#endif | ||
int doff = 0; | ||
|
||
if (iph->protocol == IPPROTO_UDP || iph->protocol == IPPROTO_TCP) { | ||
struct udphdr _hdr, *hp; | ||
|
||
hp = skb_header_pointer(skb, ip_hdrlen(skb), | ||
sizeof(_hdr), &_hdr); | ||
if (hp == NULL) | ||
return NULL; | ||
|
||
protocol = iph->protocol; | ||
saddr = iph->saddr; | ||
sport = hp->source; | ||
daddr = iph->daddr; | ||
dport = hp->dest; | ||
data_skb = (struct sk_buff *)skb; | ||
doff = iph->protocol == IPPROTO_TCP ? | ||
ip_hdrlen(skb) + __tcp_hdrlen((struct tcphdr *)hp) : | ||
ip_hdrlen(skb) + sizeof(*hp); | ||
|
||
} else if (iph->protocol == IPPROTO_ICMP) { | ||
if (extract_icmp4_fields(skb, &protocol, &saddr, &daddr, | ||
&sport, &dport)) | ||
return NULL; | ||
} else { | ||
return NULL; | ||
} | ||
|
||
#if IS_ENABLED(CONFIG_NF_CONNTRACK) | ||
/* Do the lookup with the original socket address in | ||
* case this is a reply packet of an established | ||
* SNAT-ted connection. | ||
*/ | ||
ct = nf_ct_get(skb, &ctinfo); | ||
if (ct && !nf_ct_is_untracked(ct) && | ||
((iph->protocol != IPPROTO_ICMP && | ||
ctinfo == IP_CT_ESTABLISHED_REPLY) || | ||
(iph->protocol == IPPROTO_ICMP && | ||
ctinfo == IP_CT_RELATED_REPLY)) && | ||
(ct->status & IPS_SRC_NAT_DONE)) { | ||
|
||
daddr = ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.src.u3.ip; | ||
dport = (iph->protocol == IPPROTO_TCP) ? | ||
ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.src.u.tcp.port : | ||
ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple.src.u.udp.port; | ||
} | ||
#endif | ||
|
||
return nf_socket_get_sock_v4(net, data_skb, doff, protocol, saddr, | ||
daddr, sport, dport, indev); | ||
} | ||
EXPORT_SYMBOL_GPL(nf_sk_lookup_slow_v4); | ||
|
||
MODULE_LICENSE("GPL"); | ||
MODULE_AUTHOR("Krisztian Kovacs, Balazs Scheidler"); | ||
MODULE_DESCRIPTION("Netfilter IPv4 socket lookup infrastructure"); |
Oops, something went wrong.