blob: 8c08dd07419f6d2a60669d6e26b5cbf5303eff2f [file] [log] [blame]
Pablo Neira Ayuso230ac492015-06-16 14:07:03 +02001/*
2 * Handle firewalling
3 * Linux ethernet bridge
4 *
5 * Authors:
6 * Lennert Buytenhek <buytenh@gnu.org>
7 * Bart De Schuymer <bdschuym@pandora.be>
8 *
9 * This program is free software; you can redistribute it and/or
10 * modify it under the terms of the GNU General Public License
11 * as published by the Free Software Foundation; either version
12 * 2 of the License, or (at your option) any later version.
13 *
14 * Lennert dedicates this file to Kerstin Wurdinger.
15 */
16
17#include <linux/module.h>
18#include <linux/kernel.h>
19#include <linux/slab.h>
20#include <linux/ip.h>
21#include <linux/netdevice.h>
22#include <linux/skbuff.h>
23#include <linux/if_arp.h>
24#include <linux/if_ether.h>
25#include <linux/if_vlan.h>
26#include <linux/if_pppox.h>
27#include <linux/ppp_defs.h>
28#include <linux/netfilter_bridge.h>
29#include <linux/netfilter_ipv4.h>
30#include <linux/netfilter_ipv6.h>
31#include <linux/netfilter_arp.h>
32#include <linux/in_route.h>
33#include <linux/inetdevice.h>
34
35#include <net/ip.h>
36#include <net/ipv6.h>
37#include <net/addrconf.h>
38#include <net/route.h>
39#include <net/netfilter/br_netfilter.h>
40
41#include <asm/uaccess.h>
42#include "br_private.h"
43#ifdef CONFIG_SYSCTL
44#include <linux/sysctl.h>
45#endif
46
47/* We only check the length. A bridge shouldn't do any hop-by-hop stuff
48 * anyway
49 */
50static int br_nf_check_hbh_len(struct sk_buff *skb)
51{
52 unsigned char *raw = (u8 *)(ipv6_hdr(skb) + 1);
53 u32 pkt_len;
54 const unsigned char *nh = skb_network_header(skb);
55 int off = raw - nh;
56 int len = (raw[1] + 1) << 3;
57
58 if ((raw + len) - skb->data > skb_headlen(skb))
59 goto bad;
60
61 off += 2;
62 len -= 2;
63
64 while (len > 0) {
65 int optlen = nh[off + 1] + 2;
66
67 switch (nh[off]) {
68 case IPV6_TLV_PAD1:
69 optlen = 1;
70 break;
71
72 case IPV6_TLV_PADN:
73 break;
74
75 case IPV6_TLV_JUMBO:
76 if (nh[off + 1] != 4 || (off & 3) != 2)
77 goto bad;
78 pkt_len = ntohl(*(__be32 *)(nh + off + 2));
79 if (pkt_len <= IPV6_MAXPLEN ||
80 ipv6_hdr(skb)->payload_len)
81 goto bad;
82 if (pkt_len > skb->len - sizeof(struct ipv6hdr))
83 goto bad;
84 if (pskb_trim_rcsum(skb,
85 pkt_len + sizeof(struct ipv6hdr)))
86 goto bad;
87 nh = skb_network_header(skb);
88 break;
89 default:
90 if (optlen > len)
91 goto bad;
92 break;
93 }
94 off += optlen;
95 len -= optlen;
96 }
97 if (len == 0)
98 return 0;
99bad:
100 return -1;
101}
102
Eric W. Biedermanc1444c62015-09-25 16:52:51 -0500103int br_validate_ipv6(struct net *net, struct sk_buff *skb)
Pablo Neira Ayuso230ac492015-06-16 14:07:03 +0200104{
105 const struct ipv6hdr *hdr;
Julien Grall86e89712015-07-07 15:55:21 +0100106 struct inet6_dev *idev = __in6_dev_get(skb->dev);
Pablo Neira Ayuso230ac492015-06-16 14:07:03 +0200107 u32 pkt_len;
108 u8 ip6h_len = sizeof(struct ipv6hdr);
109
110 if (!pskb_may_pull(skb, ip6h_len))
111 goto inhdr_error;
112
113 if (skb->len < ip6h_len)
114 goto drop;
115
116 hdr = ipv6_hdr(skb);
117
118 if (hdr->version != 6)
119 goto inhdr_error;
120
121 pkt_len = ntohs(hdr->payload_len);
122
123 if (pkt_len || hdr->nexthdr != NEXTHDR_HOP) {
124 if (pkt_len + ip6h_len > skb->len) {
Eric Dumazet1d015502016-04-27 16:44:40 -0700125 __IP6_INC_STATS(net, idev,
126 IPSTATS_MIB_INTRUNCATEDPKTS);
Pablo Neira Ayuso230ac492015-06-16 14:07:03 +0200127 goto drop;
128 }
129 if (pskb_trim_rcsum(skb, pkt_len + ip6h_len)) {
Eric Dumazet1d015502016-04-27 16:44:40 -0700130 __IP6_INC_STATS(net, idev,
131 IPSTATS_MIB_INDISCARDS);
Pablo Neira Ayuso230ac492015-06-16 14:07:03 +0200132 goto drop;
133 }
Ross Lagerwall04663e82019-01-17 15:34:38 +0000134 hdr = ipv6_hdr(skb);
Pablo Neira Ayuso230ac492015-06-16 14:07:03 +0200135 }
136 if (hdr->nexthdr == NEXTHDR_HOP && br_nf_check_hbh_len(skb))
137 goto drop;
138
139 memset(IP6CB(skb), 0, sizeof(struct inet6_skb_parm));
140 /* No IP options in IPv6 header; however it should be
141 * checked if some next headers need special treatment
142 */
143 return 0;
144
145inhdr_error:
Eric Dumazet1d015502016-04-27 16:44:40 -0700146 __IP6_INC_STATS(net, idev, IPSTATS_MIB_INHDRERRORS);
Pablo Neira Ayuso230ac492015-06-16 14:07:03 +0200147drop:
148 return -1;
149}
150
151static inline bool
152br_nf_ipv6_daddr_was_changed(const struct sk_buff *skb,
153 const struct nf_bridge_info *nf_bridge)
154{
155 return memcmp(&nf_bridge->ipv6_daddr, &ipv6_hdr(skb)->daddr,
156 sizeof(ipv6_hdr(skb)->daddr)) != 0;
157}
158
159/* PF_BRIDGE/PRE_ROUTING: Undo the changes made for ip6tables
160 * PREROUTING and continue the bridge PRE_ROUTING hook. See comment
161 * for br_nf_pre_routing_finish(), same logic is used here but
162 * equivalent IPv6 function ip6_route_input() called indirectly.
163 */
Eric W. Biederman0c4b51f2015-09-15 20:04:18 -0500164static int br_nf_pre_routing_finish_ipv6(struct net *net, struct sock *sk, struct sk_buff *skb)
Pablo Neira Ayuso230ac492015-06-16 14:07:03 +0200165{
166 struct nf_bridge_info *nf_bridge = nf_bridge_info_get(skb);
167 struct rtable *rt;
168 struct net_device *dev = skb->dev;
169 const struct nf_ipv6_ops *v6ops = nf_get_ipv6_ops();
170
171 nf_bridge->frag_max_size = IP6CB(skb)->frag_max_size;
172
173 if (nf_bridge->pkt_otherhost) {
174 skb->pkt_type = PACKET_OTHERHOST;
175 nf_bridge->pkt_otherhost = false;
176 }
Florian Westphal72b1e5e2015-07-23 16:21:30 +0200177 nf_bridge->in_prerouting = 0;
Pablo Neira Ayuso230ac492015-06-16 14:07:03 +0200178 if (br_nf_ipv6_daddr_was_changed(skb, nf_bridge)) {
179 skb_dst_drop(skb);
180 v6ops->route_input(skb);
181
182 if (skb_dst(skb)->error) {
183 kfree_skb(skb);
184 return 0;
185 }
186
187 if (skb_dst(skb)->dev == dev) {
188 skb->dev = nf_bridge->physindev;
189 nf_bridge_update_protocol(skb);
190 nf_bridge_push_encap_header(skb);
Florian Westphalc5136b12016-09-21 11:35:01 -0400191 br_nf_hook_thresh(NF_BR_PRE_ROUTING,
192 net, sk, skb, skb->dev, NULL,
193 br_nf_pre_routing_finish_bridge);
Pablo Neira Ayuso230ac492015-06-16 14:07:03 +0200194 return 0;
195 }
196 ether_addr_copy(eth_hdr(skb)->h_dest, dev->dev_addr);
197 skb->pkt_type = PACKET_HOST;
198 } else {
199 rt = bridge_parent_rtable(nf_bridge->physindev);
200 if (!rt) {
201 kfree_skb(skb);
202 return 0;
203 }
204 skb_dst_set_noref(skb, &rt->dst);
205 }
206
207 skb->dev = nf_bridge->physindev;
208 nf_bridge_update_protocol(skb);
209 nf_bridge_push_encap_header(skb);
Florian Westphalc5136b12016-09-21 11:35:01 -0400210 br_nf_hook_thresh(NF_BR_PRE_ROUTING, net, sk, skb,
211 skb->dev, NULL, br_handle_frame_finish);
Pablo Neira Ayuso230ac492015-06-16 14:07:03 +0200212
213 return 0;
214}
215
216/* Replicate the checks that IPv6 does on packet reception and pass the packet
217 * to ip6tables.
218 */
Eric W. Biederman06198b32015-09-18 14:33:06 -0500219unsigned int br_nf_pre_routing_ipv6(void *priv,
Pablo Neira Ayuso230ac492015-06-16 14:07:03 +0200220 struct sk_buff *skb,
221 const struct nf_hook_state *state)
222{
223 struct nf_bridge_info *nf_bridge;
224
Eric W. Biedermanc1444c62015-09-25 16:52:51 -0500225 if (br_validate_ipv6(state->net, skb))
Pablo Neira Ayuso230ac492015-06-16 14:07:03 +0200226 return NF_DROP;
227
228 nf_bridge_put(skb->nf_bridge);
229 if (!nf_bridge_alloc(skb))
230 return NF_DROP;
231 if (!setup_pre_routing(skb))
232 return NF_DROP;
233
234 nf_bridge = nf_bridge_info_get(skb);
235 nf_bridge->ipv6_daddr = ipv6_hdr(skb)->daddr;
236
237 skb->protocol = htons(ETH_P_IPV6);
Xin Long1ca33792019-03-13 16:33:29 +0800238 skb->transport_header = skb->network_header + sizeof(struct ipv6hdr);
239
Eric W. Biederman29a26a52015-09-15 20:04:16 -0500240 NF_HOOK(NFPROTO_IPV6, NF_INET_PRE_ROUTING, state->net, state->sk, skb,
Pablo Neira Ayuso230ac492015-06-16 14:07:03 +0200241 skb->dev, NULL,
242 br_nf_pre_routing_finish_ipv6);
243
244 return NF_STOLEN;
245}