cachepc-linux

Fork of AMDESE/linux with modifications for CachePC side-channel attack
git clone https://git.sinitax.com/sinitax/cachepc-linux
Log | Files | Refs | README | LICENSE | sfeed.txt

br_netfilter_ipv6.c (5785B)


      1// SPDX-License-Identifier: GPL-2.0-or-later
      2/*
      3 *	Handle firewalling
      4 *	Linux ethernet bridge
      5 *
      6 *	Authors:
      7 *	Lennert Buytenhek		<buytenh@gnu.org>
      8 *	Bart De Schuymer		<bdschuym@pandora.be>
      9 *
     10 *	Lennert dedicates this file to Kerstin Wurdinger.
     11 */
     12
     13#include <linux/module.h>
     14#include <linux/kernel.h>
     15#include <linux/slab.h>
     16#include <linux/ip.h>
     17#include <linux/netdevice.h>
     18#include <linux/skbuff.h>
     19#include <linux/if_arp.h>
     20#include <linux/if_ether.h>
     21#include <linux/if_vlan.h>
     22#include <linux/if_pppox.h>
     23#include <linux/ppp_defs.h>
     24#include <linux/netfilter_bridge.h>
     25#include <linux/netfilter_ipv4.h>
     26#include <linux/netfilter_ipv6.h>
     27#include <linux/netfilter_arp.h>
     28#include <linux/in_route.h>
     29#include <linux/inetdevice.h>
     30
     31#include <net/ip.h>
     32#include <net/ipv6.h>
     33#include <net/addrconf.h>
     34#include <net/route.h>
     35#include <net/netfilter/br_netfilter.h>
     36
     37#include <linux/uaccess.h>
     38#include "br_private.h"
     39#ifdef CONFIG_SYSCTL
     40#include <linux/sysctl.h>
     41#endif
     42
     43/* We only check the length. A bridge shouldn't do any hop-by-hop stuff
     44 * anyway
     45 */
     46static int br_nf_check_hbh_len(struct sk_buff *skb)
     47{
     48	unsigned char *raw = (u8 *)(ipv6_hdr(skb) + 1);
     49	u32 pkt_len;
     50	const unsigned char *nh = skb_network_header(skb);
     51	int off = raw - nh;
     52	int len = (raw[1] + 1) << 3;
     53
     54	if ((raw + len) - skb->data > skb_headlen(skb))
     55		goto bad;
     56
     57	off += 2;
     58	len -= 2;
     59
     60	while (len > 0) {
     61		int optlen = nh[off + 1] + 2;
     62
     63		switch (nh[off]) {
     64		case IPV6_TLV_PAD1:
     65			optlen = 1;
     66			break;
     67
     68		case IPV6_TLV_PADN:
     69			break;
     70
     71		case IPV6_TLV_JUMBO:
     72			if (nh[off + 1] != 4 || (off & 3) != 2)
     73				goto bad;
     74			pkt_len = ntohl(*(__be32 *)(nh + off + 2));
     75			if (pkt_len <= IPV6_MAXPLEN ||
     76			    ipv6_hdr(skb)->payload_len)
     77				goto bad;
     78			if (pkt_len > skb->len - sizeof(struct ipv6hdr))
     79				goto bad;
     80			if (pskb_trim_rcsum(skb,
     81					    pkt_len + sizeof(struct ipv6hdr)))
     82				goto bad;
     83			nh = skb_network_header(skb);
     84			break;
     85		default:
     86			if (optlen > len)
     87				goto bad;
     88			break;
     89		}
     90		off += optlen;
     91		len -= optlen;
     92	}
     93	if (len == 0)
     94		return 0;
     95bad:
     96	return -1;
     97}
     98
     99int br_validate_ipv6(struct net *net, struct sk_buff *skb)
    100{
    101	const struct ipv6hdr *hdr;
    102	struct inet6_dev *idev = __in6_dev_get(skb->dev);
    103	u32 pkt_len;
    104	u8 ip6h_len = sizeof(struct ipv6hdr);
    105
    106	if (!pskb_may_pull(skb, ip6h_len))
    107		goto inhdr_error;
    108
    109	if (skb->len < ip6h_len)
    110		goto drop;
    111
    112	hdr = ipv6_hdr(skb);
    113
    114	if (hdr->version != 6)
    115		goto inhdr_error;
    116
    117	pkt_len = ntohs(hdr->payload_len);
    118
    119	if (pkt_len || hdr->nexthdr != NEXTHDR_HOP) {
    120		if (pkt_len + ip6h_len > skb->len) {
    121			__IP6_INC_STATS(net, idev,
    122					IPSTATS_MIB_INTRUNCATEDPKTS);
    123			goto drop;
    124		}
    125		if (pskb_trim_rcsum(skb, pkt_len + ip6h_len)) {
    126			__IP6_INC_STATS(net, idev,
    127					IPSTATS_MIB_INDISCARDS);
    128			goto drop;
    129		}
    130		hdr = ipv6_hdr(skb);
    131	}
    132	if (hdr->nexthdr == NEXTHDR_HOP && br_nf_check_hbh_len(skb))
    133		goto drop;
    134
    135	memset(IP6CB(skb), 0, sizeof(struct inet6_skb_parm));
    136	/* No IP options in IPv6 header; however it should be
    137	 * checked if some next headers need special treatment
    138	 */
    139	return 0;
    140
    141inhdr_error:
    142	__IP6_INC_STATS(net, idev, IPSTATS_MIB_INHDRERRORS);
    143drop:
    144	return -1;
    145}
    146
    147static inline bool
    148br_nf_ipv6_daddr_was_changed(const struct sk_buff *skb,
    149			     const struct nf_bridge_info *nf_bridge)
    150{
    151	return memcmp(&nf_bridge->ipv6_daddr, &ipv6_hdr(skb)->daddr,
    152		      sizeof(ipv6_hdr(skb)->daddr)) != 0;
    153}
    154
    155/* PF_BRIDGE/PRE_ROUTING: Undo the changes made for ip6tables
    156 * PREROUTING and continue the bridge PRE_ROUTING hook. See comment
    157 * for br_nf_pre_routing_finish(), same logic is used here but
    158 * equivalent IPv6 function ip6_route_input() called indirectly.
    159 */
    160static int br_nf_pre_routing_finish_ipv6(struct net *net, struct sock *sk, struct sk_buff *skb)
    161{
    162	struct nf_bridge_info *nf_bridge = nf_bridge_info_get(skb);
    163	struct rtable *rt;
    164	struct net_device *dev = skb->dev;
    165	const struct nf_ipv6_ops *v6ops = nf_get_ipv6_ops();
    166
    167	nf_bridge->frag_max_size = IP6CB(skb)->frag_max_size;
    168
    169	if (nf_bridge->pkt_otherhost) {
    170		skb->pkt_type = PACKET_OTHERHOST;
    171		nf_bridge->pkt_otherhost = false;
    172	}
    173	nf_bridge->in_prerouting = 0;
    174	if (br_nf_ipv6_daddr_was_changed(skb, nf_bridge)) {
    175		skb_dst_drop(skb);
    176		v6ops->route_input(skb);
    177
    178		if (skb_dst(skb)->error) {
    179			kfree_skb(skb);
    180			return 0;
    181		}
    182
    183		if (skb_dst(skb)->dev == dev) {
    184			skb->dev = nf_bridge->physindev;
    185			nf_bridge_update_protocol(skb);
    186			nf_bridge_push_encap_header(skb);
    187			br_nf_hook_thresh(NF_BR_PRE_ROUTING,
    188					  net, sk, skb, skb->dev, NULL,
    189					  br_nf_pre_routing_finish_bridge);
    190			return 0;
    191		}
    192		ether_addr_copy(eth_hdr(skb)->h_dest, dev->dev_addr);
    193		skb->pkt_type = PACKET_HOST;
    194	} else {
    195		rt = bridge_parent_rtable(nf_bridge->physindev);
    196		if (!rt) {
    197			kfree_skb(skb);
    198			return 0;
    199		}
    200		skb_dst_set_noref(skb, &rt->dst);
    201	}
    202
    203	skb->dev = nf_bridge->physindev;
    204	nf_bridge_update_protocol(skb);
    205	nf_bridge_push_encap_header(skb);
    206	br_nf_hook_thresh(NF_BR_PRE_ROUTING, net, sk, skb,
    207			  skb->dev, NULL, br_handle_frame_finish);
    208
    209	return 0;
    210}
    211
    212/* Replicate the checks that IPv6 does on packet reception and pass the packet
    213 * to ip6tables.
    214 */
    215unsigned int br_nf_pre_routing_ipv6(void *priv,
    216				    struct sk_buff *skb,
    217				    const struct nf_hook_state *state)
    218{
    219	struct nf_bridge_info *nf_bridge;
    220
    221	if (br_validate_ipv6(state->net, skb))
    222		return NF_DROP;
    223
    224	nf_bridge = nf_bridge_alloc(skb);
    225	if (!nf_bridge)
    226		return NF_DROP;
    227	if (!setup_pre_routing(skb, state->net))
    228		return NF_DROP;
    229
    230	nf_bridge = nf_bridge_info_get(skb);
    231	nf_bridge->ipv6_daddr = ipv6_hdr(skb)->daddr;
    232
    233	skb->protocol = htons(ETH_P_IPV6);
    234	skb->transport_header = skb->network_header + sizeof(struct ipv6hdr);
    235
    236	NF_HOOK(NFPROTO_IPV6, NF_INET_PRE_ROUTING, state->net, state->sk, skb,
    237		skb->dev, NULL,
    238		br_nf_pre_routing_finish_ipv6);
    239
    240	return NF_STOLEN;
    241}