1b4219952SHerbert Xu /* 2b4219952SHerbert Xu * Stateless NAT actions 3b4219952SHerbert Xu * 4b4219952SHerbert Xu * Copyright (c) 2007 Herbert Xu <herbert@gondor.apana.org.au> 5b4219952SHerbert Xu * 6b4219952SHerbert Xu * This program is free software; you can redistribute it and/or modify it 7b4219952SHerbert Xu * under the terms of the GNU General Public License as published by the Free 8b4219952SHerbert Xu * Software Foundation; either version 2 of the License, or (at your option) 9b4219952SHerbert Xu * any later version. 10b4219952SHerbert Xu */ 11b4219952SHerbert Xu 12b4219952SHerbert Xu #include <linux/errno.h> 13b4219952SHerbert Xu #include <linux/init.h> 14b4219952SHerbert Xu #include <linux/kernel.h> 15b4219952SHerbert Xu #include <linux/module.h> 16b4219952SHerbert Xu #include <linux/netfilter.h> 17b4219952SHerbert Xu #include <linux/rtnetlink.h> 18b4219952SHerbert Xu #include <linux/skbuff.h> 19b4219952SHerbert Xu #include <linux/slab.h> 20b4219952SHerbert Xu #include <linux/spinlock.h> 21b4219952SHerbert Xu #include <linux/string.h> 22b4219952SHerbert Xu #include <linux/tc_act/tc_nat.h> 23b4219952SHerbert Xu #include <net/act_api.h> 24b4219952SHerbert Xu #include <net/icmp.h> 25b4219952SHerbert Xu #include <net/ip.h> 26b4219952SHerbert Xu #include <net/netlink.h> 27b4219952SHerbert Xu #include <net/tc_act/tc_nat.h> 28b4219952SHerbert Xu #include <net/tcp.h> 29b4219952SHerbert Xu #include <net/udp.h> 30b4219952SHerbert Xu 31b4219952SHerbert Xu 32b4219952SHerbert Xu #define NAT_TAB_MASK 15 33b4219952SHerbert Xu static struct tcf_common *tcf_nat_ht[NAT_TAB_MASK + 1]; 34b4219952SHerbert Xu static u32 nat_idx_gen; 35b4219952SHerbert Xu static DEFINE_RWLOCK(nat_lock); 36b4219952SHerbert Xu 37b4219952SHerbert Xu static struct tcf_hashinfo nat_hash_info = { 38b4219952SHerbert Xu .htab = tcf_nat_ht, 39b4219952SHerbert Xu .hmask = NAT_TAB_MASK, 40b4219952SHerbert Xu .lock = &nat_lock, 41b4219952SHerbert Xu }; 42b4219952SHerbert Xu 437ba699c6SPatrick McHardy static int tcf_nat_init(struct nlattr *nla, struct nlattr *est, 44b4219952SHerbert Xu struct tc_action *a, int ovr, int bind) 45b4219952SHerbert Xu { 467ba699c6SPatrick McHardy struct nlattr *tb[TCA_NAT_MAX + 1]; 47b4219952SHerbert Xu struct tc_nat *parm; 48*cee63723SPatrick McHardy int ret = 0, err; 49b4219952SHerbert Xu struct tcf_nat *p; 50b4219952SHerbert Xu struct tcf_common *pc; 51b4219952SHerbert Xu 52*cee63723SPatrick McHardy if (nla == NULL) 53b4219952SHerbert Xu return -EINVAL; 54b4219952SHerbert Xu 55*cee63723SPatrick McHardy err = nla_parse_nested(tb, TCA_NAT_MAX, nla, NULL); 56*cee63723SPatrick McHardy if (err < 0) 57*cee63723SPatrick McHardy return err; 58*cee63723SPatrick McHardy 597ba699c6SPatrick McHardy if (tb[TCA_NAT_PARMS] == NULL || 607ba699c6SPatrick McHardy nla_len(tb[TCA_NAT_PARMS]) < sizeof(*parm)) 61b4219952SHerbert Xu return -EINVAL; 627ba699c6SPatrick McHardy parm = nla_data(tb[TCA_NAT_PARMS]); 63b4219952SHerbert Xu 64b4219952SHerbert Xu pc = tcf_hash_check(parm->index, a, bind, &nat_hash_info); 65b4219952SHerbert Xu if (!pc) { 66b4219952SHerbert Xu pc = tcf_hash_create(parm->index, est, a, sizeof(*p), bind, 67b4219952SHerbert Xu &nat_idx_gen, &nat_hash_info); 68b4219952SHerbert Xu if (unlikely(!pc)) 69b4219952SHerbert Xu return -ENOMEM; 70b4219952SHerbert Xu p = to_tcf_nat(pc); 71b4219952SHerbert Xu ret = ACT_P_CREATED; 72b4219952SHerbert Xu } else { 73b4219952SHerbert Xu p = to_tcf_nat(pc); 74b4219952SHerbert Xu if (!ovr) { 75b4219952SHerbert Xu tcf_hash_release(pc, bind, &nat_hash_info); 76b4219952SHerbert Xu return -EEXIST; 77b4219952SHerbert Xu } 78b4219952SHerbert Xu } 79b4219952SHerbert Xu 80b4219952SHerbert Xu spin_lock_bh(&p->tcf_lock); 81b4219952SHerbert Xu p->old_addr = parm->old_addr; 82b4219952SHerbert Xu p->new_addr = parm->new_addr; 83b4219952SHerbert Xu p->mask = parm->mask; 84b4219952SHerbert Xu p->flags = parm->flags; 85b4219952SHerbert Xu 86b4219952SHerbert Xu p->tcf_action = parm->action; 87b4219952SHerbert Xu spin_unlock_bh(&p->tcf_lock); 88b4219952SHerbert Xu 89b4219952SHerbert Xu if (ret == ACT_P_CREATED) 90b4219952SHerbert Xu tcf_hash_insert(pc, &nat_hash_info); 91b4219952SHerbert Xu 92b4219952SHerbert Xu return ret; 93b4219952SHerbert Xu } 94b4219952SHerbert Xu 95b4219952SHerbert Xu static int tcf_nat_cleanup(struct tc_action *a, int bind) 96b4219952SHerbert Xu { 97b4219952SHerbert Xu struct tcf_nat *p = a->priv; 98b4219952SHerbert Xu 99b4219952SHerbert Xu return tcf_hash_release(&p->common, bind, &nat_hash_info); 100b4219952SHerbert Xu } 101b4219952SHerbert Xu 102b4219952SHerbert Xu static int tcf_nat(struct sk_buff *skb, struct tc_action *a, 103b4219952SHerbert Xu struct tcf_result *res) 104b4219952SHerbert Xu { 105b4219952SHerbert Xu struct tcf_nat *p = a->priv; 106b4219952SHerbert Xu struct iphdr *iph; 107b4219952SHerbert Xu __be32 old_addr; 108b4219952SHerbert Xu __be32 new_addr; 109b4219952SHerbert Xu __be32 mask; 110b4219952SHerbert Xu __be32 addr; 111b4219952SHerbert Xu int egress; 112b4219952SHerbert Xu int action; 113b4219952SHerbert Xu int ihl; 114b4219952SHerbert Xu 115b4219952SHerbert Xu spin_lock(&p->tcf_lock); 116b4219952SHerbert Xu 117b4219952SHerbert Xu p->tcf_tm.lastuse = jiffies; 118b4219952SHerbert Xu old_addr = p->old_addr; 119b4219952SHerbert Xu new_addr = p->new_addr; 120b4219952SHerbert Xu mask = p->mask; 121b4219952SHerbert Xu egress = p->flags & TCA_NAT_FLAG_EGRESS; 122b4219952SHerbert Xu action = p->tcf_action; 123b4219952SHerbert Xu 124b4219952SHerbert Xu p->tcf_bstats.bytes += skb->len; 125b4219952SHerbert Xu p->tcf_bstats.packets++; 126b4219952SHerbert Xu 127b4219952SHerbert Xu spin_unlock(&p->tcf_lock); 128b4219952SHerbert Xu 129b4219952SHerbert Xu if (unlikely(action == TC_ACT_SHOT)) 130b4219952SHerbert Xu goto drop; 131b4219952SHerbert Xu 132b4219952SHerbert Xu if (!pskb_may_pull(skb, sizeof(*iph))) 133b4219952SHerbert Xu goto drop; 134b4219952SHerbert Xu 135b4219952SHerbert Xu iph = ip_hdr(skb); 136b4219952SHerbert Xu 137b4219952SHerbert Xu if (egress) 138b4219952SHerbert Xu addr = iph->saddr; 139b4219952SHerbert Xu else 140b4219952SHerbert Xu addr = iph->daddr; 141b4219952SHerbert Xu 142b4219952SHerbert Xu if (!((old_addr ^ addr) & mask)) { 143b4219952SHerbert Xu if (skb_cloned(skb) && 144b4219952SHerbert Xu !skb_clone_writable(skb, sizeof(*iph)) && 145b4219952SHerbert Xu pskb_expand_head(skb, 0, 0, GFP_ATOMIC)) 146b4219952SHerbert Xu goto drop; 147b4219952SHerbert Xu 148b4219952SHerbert Xu new_addr &= mask; 149b4219952SHerbert Xu new_addr |= addr & ~mask; 150b4219952SHerbert Xu 151b4219952SHerbert Xu /* Rewrite IP header */ 152b4219952SHerbert Xu iph = ip_hdr(skb); 153b4219952SHerbert Xu if (egress) 154b4219952SHerbert Xu iph->saddr = new_addr; 155b4219952SHerbert Xu else 156b4219952SHerbert Xu iph->daddr = new_addr; 157b4219952SHerbert Xu 158be0ea7d5SPatrick McHardy csum_replace4(&iph->check, addr, new_addr); 159b4219952SHerbert Xu } 160b4219952SHerbert Xu 161b4219952SHerbert Xu ihl = iph->ihl * 4; 162b4219952SHerbert Xu 163b4219952SHerbert Xu /* It would be nice to share code with stateful NAT. */ 164b4219952SHerbert Xu switch (iph->frag_off & htons(IP_OFFSET) ? 0 : iph->protocol) { 165b4219952SHerbert Xu case IPPROTO_TCP: 166b4219952SHerbert Xu { 167b4219952SHerbert Xu struct tcphdr *tcph; 168b4219952SHerbert Xu 169b4219952SHerbert Xu if (!pskb_may_pull(skb, ihl + sizeof(*tcph)) || 170b4219952SHerbert Xu (skb_cloned(skb) && 171b4219952SHerbert Xu !skb_clone_writable(skb, ihl + sizeof(*tcph)) && 172b4219952SHerbert Xu pskb_expand_head(skb, 0, 0, GFP_ATOMIC))) 173b4219952SHerbert Xu goto drop; 174b4219952SHerbert Xu 175b4219952SHerbert Xu tcph = (void *)(skb_network_header(skb) + ihl); 176be0ea7d5SPatrick McHardy inet_proto_csum_replace4(&tcph->check, skb, addr, new_addr, 1); 177b4219952SHerbert Xu break; 178b4219952SHerbert Xu } 179b4219952SHerbert Xu case IPPROTO_UDP: 180b4219952SHerbert Xu { 181b4219952SHerbert Xu struct udphdr *udph; 182b4219952SHerbert Xu 183b4219952SHerbert Xu if (!pskb_may_pull(skb, ihl + sizeof(*udph)) || 184b4219952SHerbert Xu (skb_cloned(skb) && 185b4219952SHerbert Xu !skb_clone_writable(skb, ihl + sizeof(*udph)) && 186b4219952SHerbert Xu pskb_expand_head(skb, 0, 0, GFP_ATOMIC))) 187b4219952SHerbert Xu goto drop; 188b4219952SHerbert Xu 189b4219952SHerbert Xu udph = (void *)(skb_network_header(skb) + ihl); 190b4219952SHerbert Xu if (udph->check || skb->ip_summed == CHECKSUM_PARTIAL) { 191be0ea7d5SPatrick McHardy inet_proto_csum_replace4(&udph->check, skb, addr, 192b4219952SHerbert Xu new_addr, 1); 193b4219952SHerbert Xu if (!udph->check) 194b4219952SHerbert Xu udph->check = CSUM_MANGLED_0; 195b4219952SHerbert Xu } 196b4219952SHerbert Xu break; 197b4219952SHerbert Xu } 198b4219952SHerbert Xu case IPPROTO_ICMP: 199b4219952SHerbert Xu { 200b4219952SHerbert Xu struct icmphdr *icmph; 201b4219952SHerbert Xu 202b4219952SHerbert Xu if (!pskb_may_pull(skb, ihl + sizeof(*icmph) + sizeof(*iph))) 203b4219952SHerbert Xu goto drop; 204b4219952SHerbert Xu 205b4219952SHerbert Xu icmph = (void *)(skb_network_header(skb) + ihl); 206b4219952SHerbert Xu 207b4219952SHerbert Xu if ((icmph->type != ICMP_DEST_UNREACH) && 208b4219952SHerbert Xu (icmph->type != ICMP_TIME_EXCEEDED) && 209b4219952SHerbert Xu (icmph->type != ICMP_PARAMETERPROB)) 210b4219952SHerbert Xu break; 211b4219952SHerbert Xu 212b4219952SHerbert Xu iph = (void *)(icmph + 1); 213b4219952SHerbert Xu if (egress) 214b4219952SHerbert Xu addr = iph->daddr; 215b4219952SHerbert Xu else 216b4219952SHerbert Xu addr = iph->saddr; 217b4219952SHerbert Xu 218b4219952SHerbert Xu if ((old_addr ^ addr) & mask) 219b4219952SHerbert Xu break; 220b4219952SHerbert Xu 221b4219952SHerbert Xu if (skb_cloned(skb) && 222b4219952SHerbert Xu !skb_clone_writable(skb, 223b4219952SHerbert Xu ihl + sizeof(*icmph) + sizeof(*iph)) && 224b4219952SHerbert Xu pskb_expand_head(skb, 0, 0, GFP_ATOMIC)) 225b4219952SHerbert Xu goto drop; 226b4219952SHerbert Xu 227b4219952SHerbert Xu icmph = (void *)(skb_network_header(skb) + ihl); 228b4219952SHerbert Xu iph = (void *)(icmph + 1); 229b4219952SHerbert Xu 230b4219952SHerbert Xu new_addr &= mask; 231b4219952SHerbert Xu new_addr |= addr & ~mask; 232b4219952SHerbert Xu 233b4219952SHerbert Xu /* XXX Fix up the inner checksums. */ 234b4219952SHerbert Xu if (egress) 235b4219952SHerbert Xu iph->daddr = new_addr; 236b4219952SHerbert Xu else 237b4219952SHerbert Xu iph->saddr = new_addr; 238b4219952SHerbert Xu 239be0ea7d5SPatrick McHardy inet_proto_csum_replace4(&icmph->checksum, skb, addr, new_addr, 240b4219952SHerbert Xu 1); 241b4219952SHerbert Xu break; 242b4219952SHerbert Xu } 243b4219952SHerbert Xu default: 244b4219952SHerbert Xu break; 245b4219952SHerbert Xu } 246b4219952SHerbert Xu 247b4219952SHerbert Xu return action; 248b4219952SHerbert Xu 249b4219952SHerbert Xu drop: 250b4219952SHerbert Xu spin_lock(&p->tcf_lock); 251b4219952SHerbert Xu p->tcf_qstats.drops++; 252b4219952SHerbert Xu spin_unlock(&p->tcf_lock); 253b4219952SHerbert Xu return TC_ACT_SHOT; 254b4219952SHerbert Xu } 255b4219952SHerbert Xu 256b4219952SHerbert Xu static int tcf_nat_dump(struct sk_buff *skb, struct tc_action *a, 257b4219952SHerbert Xu int bind, int ref) 258b4219952SHerbert Xu { 259b4219952SHerbert Xu unsigned char *b = skb_tail_pointer(skb); 260b4219952SHerbert Xu struct tcf_nat *p = a->priv; 261b4219952SHerbert Xu struct tc_nat *opt; 262b4219952SHerbert Xu struct tcf_t t; 263b4219952SHerbert Xu int s; 264b4219952SHerbert Xu 265b4219952SHerbert Xu s = sizeof(*opt); 266b4219952SHerbert Xu 267b4219952SHerbert Xu /* netlink spinlocks held above us - must use ATOMIC */ 268b4219952SHerbert Xu opt = kzalloc(s, GFP_ATOMIC); 269b4219952SHerbert Xu if (unlikely(!opt)) 270b4219952SHerbert Xu return -ENOBUFS; 271b4219952SHerbert Xu 272b4219952SHerbert Xu opt->old_addr = p->old_addr; 273b4219952SHerbert Xu opt->new_addr = p->new_addr; 274b4219952SHerbert Xu opt->mask = p->mask; 275b4219952SHerbert Xu opt->flags = p->flags; 276b4219952SHerbert Xu 277b4219952SHerbert Xu opt->index = p->tcf_index; 278b4219952SHerbert Xu opt->action = p->tcf_action; 279b4219952SHerbert Xu opt->refcnt = p->tcf_refcnt - ref; 280b4219952SHerbert Xu opt->bindcnt = p->tcf_bindcnt - bind; 281b4219952SHerbert Xu 2827ba699c6SPatrick McHardy NLA_PUT(skb, TCA_NAT_PARMS, s, opt); 283b4219952SHerbert Xu t.install = jiffies_to_clock_t(jiffies - p->tcf_tm.install); 284b4219952SHerbert Xu t.lastuse = jiffies_to_clock_t(jiffies - p->tcf_tm.lastuse); 285b4219952SHerbert Xu t.expires = jiffies_to_clock_t(p->tcf_tm.expires); 2867ba699c6SPatrick McHardy NLA_PUT(skb, TCA_NAT_TM, sizeof(t), &t); 287b4219952SHerbert Xu 288b4219952SHerbert Xu kfree(opt); 289b4219952SHerbert Xu 290b4219952SHerbert Xu return skb->len; 291b4219952SHerbert Xu 2927ba699c6SPatrick McHardy nla_put_failure: 293b4219952SHerbert Xu nlmsg_trim(skb, b); 294b4219952SHerbert Xu kfree(opt); 295b4219952SHerbert Xu return -1; 296b4219952SHerbert Xu } 297b4219952SHerbert Xu 298b4219952SHerbert Xu static struct tc_action_ops act_nat_ops = { 299b4219952SHerbert Xu .kind = "nat", 300b4219952SHerbert Xu .hinfo = &nat_hash_info, 301b4219952SHerbert Xu .type = TCA_ACT_NAT, 302b4219952SHerbert Xu .capab = TCA_CAP_NONE, 303b4219952SHerbert Xu .owner = THIS_MODULE, 304b4219952SHerbert Xu .act = tcf_nat, 305b4219952SHerbert Xu .dump = tcf_nat_dump, 306b4219952SHerbert Xu .cleanup = tcf_nat_cleanup, 307b4219952SHerbert Xu .lookup = tcf_hash_search, 308b4219952SHerbert Xu .init = tcf_nat_init, 309b4219952SHerbert Xu .walk = tcf_generic_walker 310b4219952SHerbert Xu }; 311b4219952SHerbert Xu 312b4219952SHerbert Xu MODULE_DESCRIPTION("Stateless NAT actions"); 313b4219952SHerbert Xu MODULE_LICENSE("GPL"); 314b4219952SHerbert Xu 315b4219952SHerbert Xu static int __init nat_init_module(void) 316b4219952SHerbert Xu { 317b4219952SHerbert Xu return tcf_register_action(&act_nat_ops); 318b4219952SHerbert Xu } 319b4219952SHerbert Xu 320b4219952SHerbert Xu static void __exit nat_cleanup_module(void) 321b4219952SHerbert Xu { 322b4219952SHerbert Xu tcf_unregister_action(&act_nat_ops); 323b4219952SHerbert Xu } 324b4219952SHerbert Xu 325b4219952SHerbert Xu module_init(nat_init_module); 326b4219952SHerbert Xu module_exit(nat_cleanup_module); 327