1 // SPDX-License-Identifier: GPL-2.0-or-later 2 /* 3 * Handle firewalling 4 * Linux ethernet bridge 5 * 6 * Authors: 7 * Lennert Buytenhek <buytenh@gnu.org> 8 * Bart De Schuymer <bdschuym@pandora.be> 9 * 10 * Lennert dedicates this file to Kerstin Wurdinger. 11 */ 12 13 #include <linux/module.h> 14 #include <linux/kernel.h> 15 #include <linux/slab.h> 16 #include <linux/ip.h> 17 #include <linux/netdevice.h> 18 #include <linux/skbuff.h> 19 #include <linux/if_arp.h> 20 #include <linux/if_ether.h> 21 #include <linux/if_vlan.h> 22 #include <linux/if_pppox.h> 23 #include <linux/ppp_defs.h> 24 #include <linux/netfilter_bridge.h> 25 #include <linux/netfilter_ipv4.h> 26 #include <linux/netfilter_ipv6.h> 27 #include <linux/netfilter_arp.h> 28 #include <linux/in_route.h> 29 #include <linux/inetdevice.h> 30 31 #include <net/ip.h> 32 #include <net/ipv6.h> 33 #include <net/addrconf.h> 34 #include <net/route.h> 35 #include <net/netfilter/br_netfilter.h> 36 37 #include <linux/uaccess.h> 38 #include "br_private.h" 39 #ifdef CONFIG_SYSCTL 40 #include <linux/sysctl.h> 41 #endif 42 43 /* We only check the length. A bridge shouldn't do any hop-by-hop stuff 44 * anyway 45 */ 46 static int br_nf_check_hbh_len(struct sk_buff *skb) 47 { 48 unsigned char *raw = (u8 *)(ipv6_hdr(skb) + 1); 49 u32 pkt_len; 50 const unsigned char *nh = skb_network_header(skb); 51 int off = raw - nh; 52 int len = (raw[1] + 1) << 3; 53 54 if ((raw + len) - skb->data > skb_headlen(skb)) 55 goto bad; 56 57 off += 2; 58 len -= 2; 59 60 while (len > 0) { 61 int optlen = nh[off + 1] + 2; 62 63 switch (nh[off]) { 64 case IPV6_TLV_PAD1: 65 optlen = 1; 66 break; 67 68 case IPV6_TLV_PADN: 69 break; 70 71 case IPV6_TLV_JUMBO: 72 if (nh[off + 1] != 4 || (off & 3) != 2) 73 goto bad; 74 pkt_len = ntohl(*(__be32 *)(nh + off + 2)); 75 if (pkt_len <= IPV6_MAXPLEN || 76 ipv6_hdr(skb)->payload_len) 77 goto bad; 78 if (pkt_len > skb->len - sizeof(struct ipv6hdr)) 79 goto bad; 80 if (pskb_trim_rcsum(skb, 81 pkt_len + sizeof(struct ipv6hdr))) 82 goto bad; 83 nh = skb_network_header(skb); 84 break; 85 default: 86 if (optlen > len) 87 goto bad; 88 break; 89 } 90 off += optlen; 91 len -= optlen; 92 } 93 if (len == 0) 94 return 0; 95 bad: 96 return -1; 97 } 98 99 int br_validate_ipv6(struct net *net, struct sk_buff *skb) 100 { 101 const struct ipv6hdr *hdr; 102 struct inet6_dev *idev = __in6_dev_get(skb->dev); 103 u32 pkt_len; 104 u8 ip6h_len = sizeof(struct ipv6hdr); 105 106 if (!pskb_may_pull(skb, ip6h_len)) 107 goto inhdr_error; 108 109 if (skb->len < ip6h_len) 110 goto drop; 111 112 hdr = ipv6_hdr(skb); 113 114 if (hdr->version != 6) 115 goto inhdr_error; 116 117 pkt_len = ntohs(hdr->payload_len); 118 119 if (pkt_len || hdr->nexthdr != NEXTHDR_HOP) { 120 if (pkt_len + ip6h_len > skb->len) { 121 __IP6_INC_STATS(net, idev, 122 IPSTATS_MIB_INTRUNCATEDPKTS); 123 goto drop; 124 } 125 if (pskb_trim_rcsum(skb, pkt_len + ip6h_len)) { 126 __IP6_INC_STATS(net, idev, 127 IPSTATS_MIB_INDISCARDS); 128 goto drop; 129 } 130 hdr = ipv6_hdr(skb); 131 } 132 if (hdr->nexthdr == NEXTHDR_HOP && br_nf_check_hbh_len(skb)) 133 goto drop; 134 135 memset(IP6CB(skb), 0, sizeof(struct inet6_skb_parm)); 136 /* No IP options in IPv6 header; however it should be 137 * checked if some next headers need special treatment 138 */ 139 return 0; 140 141 inhdr_error: 142 __IP6_INC_STATS(net, idev, IPSTATS_MIB_INHDRERRORS); 143 drop: 144 return -1; 145 } 146 147 static inline bool 148 br_nf_ipv6_daddr_was_changed(const struct sk_buff *skb, 149 const struct nf_bridge_info *nf_bridge) 150 { 151 return memcmp(&nf_bridge->ipv6_daddr, &ipv6_hdr(skb)->daddr, 152 sizeof(ipv6_hdr(skb)->daddr)) != 0; 153 } 154 155 /* PF_BRIDGE/PRE_ROUTING: Undo the changes made for ip6tables 156 * PREROUTING and continue the bridge PRE_ROUTING hook. See comment 157 * for br_nf_pre_routing_finish(), same logic is used here but 158 * equivalent IPv6 function ip6_route_input() called indirectly. 159 */ 160 static int br_nf_pre_routing_finish_ipv6(struct net *net, struct sock *sk, struct sk_buff *skb) 161 { 162 struct nf_bridge_info *nf_bridge = nf_bridge_info_get(skb); 163 struct rtable *rt; 164 struct net_device *dev = skb->dev; 165 const struct nf_ipv6_ops *v6ops = nf_get_ipv6_ops(); 166 167 nf_bridge->frag_max_size = IP6CB(skb)->frag_max_size; 168 169 if (nf_bridge->pkt_otherhost) { 170 skb->pkt_type = PACKET_OTHERHOST; 171 nf_bridge->pkt_otherhost = false; 172 } 173 nf_bridge->in_prerouting = 0; 174 if (br_nf_ipv6_daddr_was_changed(skb, nf_bridge)) { 175 skb_dst_drop(skb); 176 v6ops->route_input(skb); 177 178 if (skb_dst(skb)->error) { 179 kfree_skb(skb); 180 return 0; 181 } 182 183 if (skb_dst(skb)->dev == dev) { 184 skb->dev = nf_bridge->physindev; 185 nf_bridge_update_protocol(skb); 186 nf_bridge_push_encap_header(skb); 187 br_nf_hook_thresh(NF_BR_PRE_ROUTING, 188 net, sk, skb, skb->dev, NULL, 189 br_nf_pre_routing_finish_bridge); 190 return 0; 191 } 192 ether_addr_copy(eth_hdr(skb)->h_dest, dev->dev_addr); 193 skb->pkt_type = PACKET_HOST; 194 } else { 195 rt = bridge_parent_rtable(nf_bridge->physindev); 196 if (!rt) { 197 kfree_skb(skb); 198 return 0; 199 } 200 skb_dst_drop(skb); 201 skb_dst_set_noref(skb, &rt->dst); 202 } 203 204 skb->dev = nf_bridge->physindev; 205 nf_bridge_update_protocol(skb); 206 nf_bridge_push_encap_header(skb); 207 br_nf_hook_thresh(NF_BR_PRE_ROUTING, net, sk, skb, 208 skb->dev, NULL, br_handle_frame_finish); 209 210 return 0; 211 } 212 213 /* Replicate the checks that IPv6 does on packet reception and pass the packet 214 * to ip6tables. 215 */ 216 unsigned int br_nf_pre_routing_ipv6(void *priv, 217 struct sk_buff *skb, 218 const struct nf_hook_state *state) 219 { 220 struct nf_bridge_info *nf_bridge; 221 222 if (br_validate_ipv6(state->net, skb)) 223 return NF_DROP; 224 225 nf_bridge = nf_bridge_alloc(skb); 226 if (!nf_bridge) 227 return NF_DROP; 228 if (!setup_pre_routing(skb, state->net)) 229 return NF_DROP; 230 231 nf_bridge = nf_bridge_info_get(skb); 232 nf_bridge->ipv6_daddr = ipv6_hdr(skb)->daddr; 233 234 skb->protocol = htons(ETH_P_IPV6); 235 skb->transport_header = skb->network_header + sizeof(struct ipv6hdr); 236 237 NF_HOOK(NFPROTO_IPV6, NF_INET_PRE_ROUTING, state->net, state->sk, skb, 238 skb->dev, NULL, 239 br_nf_pre_routing_finish_ipv6); 240 241 return NF_STOLEN; 242 } 243