linux/net/netfilter/nf_nat_helper.c
<<
>>
Prefs
   1/* nf_nat_helper.c - generic support functions for NAT helpers
   2 *
   3 * (C) 2000-2002 Harald Welte <laforge@netfilter.org>
   4 * (C) 2003-2006 Netfilter Core Team <coreteam@netfilter.org>
   5 * (C) 2007-2012 Patrick McHardy <kaber@trash.net>
   6 *
   7 * This program is free software; you can redistribute it and/or modify
   8 * it under the terms of the GNU General Public License version 2 as
   9 * published by the Free Software Foundation.
  10 */
  11#include <linux/module.h>
  12#include <linux/gfp.h>
  13#include <linux/types.h>
  14#include <linux/skbuff.h>
  15#include <linux/tcp.h>
  16#include <linux/udp.h>
  17#include <net/tcp.h>
  18
  19#include <net/netfilter/nf_conntrack.h>
  20#include <net/netfilter/nf_conntrack_helper.h>
  21#include <net/netfilter/nf_conntrack_ecache.h>
  22#include <net/netfilter/nf_conntrack_expect.h>
  23#include <net/netfilter/nf_conntrack_seqadj.h>
  24#include <net/netfilter/nf_nat.h>
  25#include <net/netfilter/nf_nat_l3proto.h>
  26#include <net/netfilter/nf_nat_l4proto.h>
  27#include <net/netfilter/nf_nat_core.h>
  28#include <net/netfilter/nf_nat_helper.h>
  29
  30/* Frobs data inside this packet, which is linear. */
  31static void mangle_contents(struct sk_buff *skb,
  32                            unsigned int dataoff,
  33                            unsigned int match_offset,
  34                            unsigned int match_len,
  35                            const char *rep_buffer,
  36                            unsigned int rep_len)
  37{
  38        unsigned char *data;
  39
  40        BUG_ON(skb_is_nonlinear(skb));
  41        data = skb_network_header(skb) + dataoff;
  42
  43        /* move post-replacement */
  44        memmove(data + match_offset + rep_len,
  45                data + match_offset + match_len,
  46                skb_tail_pointer(skb) - (skb_network_header(skb) + dataoff +
  47                             match_offset + match_len));
  48
  49        /* insert data from buffer */
  50        memcpy(data + match_offset, rep_buffer, rep_len);
  51
  52        /* update skb info */
  53        if (rep_len > match_len) {
  54                pr_debug("nf_nat_mangle_packet: Extending packet by "
  55                         "%u from %u bytes\n", rep_len - match_len, skb->len);
  56                skb_put(skb, rep_len - match_len);
  57        } else {
  58                pr_debug("nf_nat_mangle_packet: Shrinking packet from "
  59                         "%u from %u bytes\n", match_len - rep_len, skb->len);
  60                __skb_trim(skb, skb->len + rep_len - match_len);
  61        }
  62
  63        if (nf_ct_l3num((struct nf_conn *)skb->nfct) == NFPROTO_IPV4) {
  64                /* fix IP hdr checksum information */
  65                ip_hdr(skb)->tot_len = htons(skb->len);
  66                ip_send_check(ip_hdr(skb));
  67        } else
  68                ipv6_hdr(skb)->payload_len =
  69                        htons(skb->len - sizeof(struct ipv6hdr));
  70}
  71
  72/* Unusual, but possible case. */
  73static int enlarge_skb(struct sk_buff *skb, unsigned int extra)
  74{
  75        if (skb->len + extra > 65535)
  76                return 0;
  77
  78        if (pskb_expand_head(skb, 0, extra - skb_tailroom(skb), GFP_ATOMIC))
  79                return 0;
  80
  81        return 1;
  82}
  83
  84/* Generic function for mangling variable-length address changes inside
  85 * NATed TCP connections (like the PORT XXX,XXX,XXX,XXX,XXX,XXX
  86 * command in FTP).
  87 *
  88 * Takes care about all the nasty sequence number changes, checksumming,
  89 * skb enlargement, ...
  90 *
  91 * */
  92int __nf_nat_mangle_tcp_packet(struct sk_buff *skb,
  93                               struct nf_conn *ct,
  94                               enum ip_conntrack_info ctinfo,
  95                               unsigned int protoff,
  96                               unsigned int match_offset,
  97                               unsigned int match_len,
  98                               const char *rep_buffer,
  99                               unsigned int rep_len, bool adjust)
 100{
 101        const struct nf_nat_l3proto *l3proto;
 102        struct tcphdr *tcph;
 103        int oldlen, datalen;
 104
 105        if (!skb_make_writable(skb, skb->len))
 106                return 0;
 107
 108        if (rep_len > match_len &&
 109            rep_len - match_len > skb_tailroom(skb) &&
 110            !enlarge_skb(skb, rep_len - match_len))
 111                return 0;
 112
 113        SKB_LINEAR_ASSERT(skb);
 114
 115        tcph = (void *)skb->data + protoff;
 116
 117        oldlen = skb->len - protoff;
 118        mangle_contents(skb, protoff + tcph->doff*4,
 119                        match_offset, match_len, rep_buffer, rep_len);
 120
 121        datalen = skb->len - protoff;
 122
 123        l3proto = __nf_nat_l3proto_find(nf_ct_l3num(ct));
 124        l3proto->csum_recalc(skb, IPPROTO_TCP, tcph, &tcph->check,
 125                             datalen, oldlen);
 126
 127        if (adjust && rep_len != match_len)
 128                nf_ct_seqadj_set(ct, ctinfo, tcph->seq,
 129                                 (int)rep_len - (int)match_len);
 130
 131        return 1;
 132}
 133EXPORT_SYMBOL(__nf_nat_mangle_tcp_packet);
 134
 135/* Generic function for mangling variable-length address changes inside
 136 * NATed UDP connections (like the CONNECT DATA XXXXX MESG XXXXX INDEX XXXXX
 137 * command in the Amanda protocol)
 138 *
 139 * Takes care about all the nasty sequence number changes, checksumming,
 140 * skb enlargement, ...
 141 *
 142 * XXX - This function could be merged with nf_nat_mangle_tcp_packet which
 143 *       should be fairly easy to do.
 144 */
 145int
 146nf_nat_mangle_udp_packet(struct sk_buff *skb,
 147                         struct nf_conn *ct,
 148                         enum ip_conntrack_info ctinfo,
 149                         unsigned int protoff,
 150                         unsigned int match_offset,
 151                         unsigned int match_len,
 152                         const char *rep_buffer,
 153                         unsigned int rep_len)
 154{
 155        const struct nf_nat_l3proto *l3proto;
 156        struct udphdr *udph;
 157        int datalen, oldlen;
 158
 159        if (!skb_make_writable(skb, skb->len))
 160                return 0;
 161
 162        if (rep_len > match_len &&
 163            rep_len - match_len > skb_tailroom(skb) &&
 164            !enlarge_skb(skb, rep_len - match_len))
 165                return 0;
 166
 167        udph = (void *)skb->data + protoff;
 168
 169        oldlen = skb->len - protoff;
 170        mangle_contents(skb, protoff + sizeof(*udph),
 171                        match_offset, match_len, rep_buffer, rep_len);
 172
 173        /* update the length of the UDP packet */
 174        datalen = skb->len - protoff;
 175        udph->len = htons(datalen);
 176
 177        /* fix udp checksum if udp checksum was previously calculated */
 178        if (!udph->check && skb->ip_summed != CHECKSUM_PARTIAL)
 179                return 1;
 180
 181        l3proto = __nf_nat_l3proto_find(nf_ct_l3num(ct));
 182        l3proto->csum_recalc(skb, IPPROTO_UDP, udph, &udph->check,
 183                             datalen, oldlen);
 184
 185        return 1;
 186}
 187EXPORT_SYMBOL(nf_nat_mangle_udp_packet);
 188
 189/* Setup NAT on this expected conntrack so it follows master. */
 190/* If we fail to get a free NAT slot, we'll get dropped on confirm */
 191void nf_nat_follow_master(struct nf_conn *ct,
 192                          struct nf_conntrack_expect *exp)
 193{
 194        struct nf_nat_range range;
 195
 196        /* This must be a fresh one. */
 197        BUG_ON(ct->status & IPS_NAT_DONE_MASK);
 198
 199        /* Change src to where master sends to */
 200        range.flags = NF_NAT_RANGE_MAP_IPS;
 201        range.min_addr = range.max_addr
 202                = ct->master->tuplehash[!exp->dir].tuple.dst.u3;
 203        nf_nat_setup_info(ct, &range, NF_NAT_MANIP_SRC);
 204
 205        /* For DST manip, map port here to where it's expected. */
 206        range.flags = (NF_NAT_RANGE_MAP_IPS | NF_NAT_RANGE_PROTO_SPECIFIED);
 207        range.min_proto = range.max_proto = exp->saved_proto;
 208        range.min_addr = range.max_addr
 209                = ct->master->tuplehash[!exp->dir].tuple.src.u3;
 210        nf_nat_setup_info(ct, &range, NF_NAT_MANIP_DST);
 211}
 212EXPORT_SYMBOL(nf_nat_follow_master);
 213