Commit 3e3850e9 authored by Patrick McHardy's avatar Patrick McHardy Committed by David S. Miller

[NETFILTER]: Fix xfrm lookup in ip_route_me_harder/ip6_route_me_harder

ip_route_me_harder doesn't use the port numbers of the xfrm lookup and
uses ip_route_input for non-local addresses which doesn't do a xfrm
lookup, ip6_route_me_harder doesn't do a xfrm lookup at all.

Use xfrm_decode_session and do the lookup manually, make sure both
only do the lookup if the packet hasn't been transformed already.

Makeing sure the lookup only happens once needs a new field in the
IP6CB, which exceeds the size of skb->cb. The size of skb->cb is
increased to 48b. Apparently the IPv6 mobile extensions need some
more room anyway.
Signed-off-by: default avatarPatrick McHardy <kaber@trash.net>
Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
parent 8cdfab8a
...@@ -192,6 +192,9 @@ struct inet6_skb_parm { ...@@ -192,6 +192,9 @@ struct inet6_skb_parm {
__u16 dst1; __u16 dst1;
__u16 lastopt; __u16 lastopt;
__u32 nhoff; __u32 nhoff;
__u16 flags;
#define IP6SKB_XFRM_TRANSFORMED 1
}; };
#define IP6CB(skb) ((struct inet6_skb_parm*)((skb)->cb)) #define IP6CB(skb) ((struct inet6_skb_parm*)((skb)->cb))
......
...@@ -251,7 +251,7 @@ struct sk_buff { ...@@ -251,7 +251,7 @@ struct sk_buff {
* want to keep them across layers you have to do a skb_clone() * want to keep them across layers you have to do a skb_clone()
* first. This is owned by whoever has the skb queued ATM. * first. This is owned by whoever has the skb queued ATM.
*/ */
char cb[40]; char cb[48];
unsigned int len, unsigned int len,
data_len, data_len,
......
...@@ -39,7 +39,8 @@ struct inet_skb_parm ...@@ -39,7 +39,8 @@ struct inet_skb_parm
#define IPSKB_FORWARDED 1 #define IPSKB_FORWARDED 1
#define IPSKB_XFRM_TUNNEL_SIZE 2 #define IPSKB_XFRM_TUNNEL_SIZE 2
#define IPSKB_FRAG_COMPLETE 4 #define IPSKB_XFRM_TRANSFORMED 4
#define IPSKB_FRAG_COMPLETE 8
}; };
struct ipcm_cookie struct ipcm_cookie
......
...@@ -668,7 +668,7 @@ static inline int xfrm6_policy_check(struct sock *sk, int dir, struct sk_buff *s ...@@ -668,7 +668,7 @@ static inline int xfrm6_policy_check(struct sock *sk, int dir, struct sk_buff *s
return xfrm_policy_check(sk, dir, skb, AF_INET6); return xfrm_policy_check(sk, dir, skb, AF_INET6);
} }
extern int xfrm_decode_session(struct sk_buff *skb, struct flowi *fl, unsigned short family);
extern int __xfrm_route_forward(struct sk_buff *skb, unsigned short family); extern int __xfrm_route_forward(struct sk_buff *skb, unsigned short family);
static inline int xfrm_route_forward(struct sk_buff *skb, unsigned short family) static inline int xfrm_route_forward(struct sk_buff *skb, unsigned short family)
......
...@@ -832,7 +832,7 @@ static int ipgre_tunnel_xmit(struct sk_buff *skb, struct net_device *dev) ...@@ -832,7 +832,7 @@ static int ipgre_tunnel_xmit(struct sk_buff *skb, struct net_device *dev)
skb->h.raw = skb->nh.raw; skb->h.raw = skb->nh.raw;
skb->nh.raw = skb_push(skb, gre_hlen); skb->nh.raw = skb_push(skb, gre_hlen);
memset(&(IPCB(skb)->opt), 0, sizeof(IPCB(skb)->opt)); memset(&(IPCB(skb)->opt), 0, sizeof(IPCB(skb)->opt));
IPCB(skb)->flags &= ~IPSKB_XFRM_TUNNEL_SIZE; IPCB(skb)->flags &= ~(IPSKB_XFRM_TUNNEL_SIZE|IPSKB_XFRM_TRANSFORMED);
dst_release(skb->dst); dst_release(skb->dst);
skb->dst = &rt->u.dst; skb->dst = &rt->u.dst;
......
...@@ -621,7 +621,7 @@ static int ipip_tunnel_xmit(struct sk_buff *skb, struct net_device *dev) ...@@ -621,7 +621,7 @@ static int ipip_tunnel_xmit(struct sk_buff *skb, struct net_device *dev)
skb->h.raw = skb->nh.raw; skb->h.raw = skb->nh.raw;
skb->nh.raw = skb_push(skb, sizeof(struct iphdr)); skb->nh.raw = skb_push(skb, sizeof(struct iphdr));
memset(&(IPCB(skb)->opt), 0, sizeof(IPCB(skb)->opt)); memset(&(IPCB(skb)->opt), 0, sizeof(IPCB(skb)->opt));
IPCB(skb)->flags &= ~IPSKB_XFRM_TUNNEL_SIZE; IPCB(skb)->flags &= ~(IPSKB_XFRM_TUNNEL_SIZE|IPSKB_XFRM_TRANSFORMED);
dst_release(skb->dst); dst_release(skb->dst);
skb->dst = &rt->u.dst; skb->dst = &rt->u.dst;
......
...@@ -7,11 +7,13 @@ ...@@ -7,11 +7,13 @@
#include <linux/netfilter.h> #include <linux/netfilter.h>
#include <linux/netfilter_ipv4.h> #include <linux/netfilter_ipv4.h>
#include <linux/ip.h>
#include <linux/tcp.h> #include <linux/tcp.h>
#include <linux/udp.h> #include <linux/udp.h>
#include <linux/icmp.h> #include <linux/icmp.h>
#include <net/route.h> #include <net/route.h>
#include <linux/ip.h> #include <net/xfrm.h>
#include <net/ip.h>
/* route_me_harder function, used by iptable_nat, iptable_mangle + ip_queue */ /* route_me_harder function, used by iptable_nat, iptable_mangle + ip_queue */
int ip_route_me_harder(struct sk_buff **pskb) int ip_route_me_harder(struct sk_buff **pskb)
...@@ -33,7 +35,6 @@ int ip_route_me_harder(struct sk_buff **pskb) ...@@ -33,7 +35,6 @@ int ip_route_me_harder(struct sk_buff **pskb)
#ifdef CONFIG_IP_ROUTE_FWMARK #ifdef CONFIG_IP_ROUTE_FWMARK
fl.nl_u.ip4_u.fwmark = (*pskb)->nfmark; fl.nl_u.ip4_u.fwmark = (*pskb)->nfmark;
#endif #endif
fl.proto = iph->protocol;
if (ip_route_output_key(&rt, &fl) != 0) if (ip_route_output_key(&rt, &fl) != 0)
return -1; return -1;
...@@ -60,6 +61,13 @@ int ip_route_me_harder(struct sk_buff **pskb) ...@@ -60,6 +61,13 @@ int ip_route_me_harder(struct sk_buff **pskb)
if ((*pskb)->dst->error) if ((*pskb)->dst->error)
return -1; return -1;
#ifdef CONFIG_XFRM
if (!(IPCB(*pskb)->flags & IPSKB_XFRM_TRANSFORMED) &&
xfrm_decode_session(*pskb, &fl, AF_INET) == 0)
if (xfrm_lookup(&(*pskb)->dst, &fl, (*pskb)->sk, 0))
return -1;
#endif
/* Change in oif may mean change in hh_len. */ /* Change in oif may mean change in hh_len. */
hh_len = (*pskb)->dst->dev->hard_header_len; hh_len = (*pskb)->dst->dev->hard_header_len;
if (skb_headroom(*pskb) < hh_len) { if (skb_headroom(*pskb) < hh_len) {
......
...@@ -140,6 +140,7 @@ static int xfrm4_output_one(struct sk_buff *skb) ...@@ -140,6 +140,7 @@ static int xfrm4_output_one(struct sk_buff *skb)
x = dst->xfrm; x = dst->xfrm;
} while (x && !x->props.mode); } while (x && !x->props.mode);
IPCB(skb)->flags |= IPSKB_XFRM_TRANSFORMED;
err = 0; err = 0;
out_exit: out_exit:
......
...@@ -10,6 +10,7 @@ ...@@ -10,6 +10,7 @@
#include <net/dst.h> #include <net/dst.h>
#include <net/ipv6.h> #include <net/ipv6.h>
#include <net/ip6_route.h> #include <net/ip6_route.h>
#include <net/xfrm.h>
int ip6_route_me_harder(struct sk_buff *skb) int ip6_route_me_harder(struct sk_buff *skb)
{ {
...@@ -21,11 +22,17 @@ int ip6_route_me_harder(struct sk_buff *skb) ...@@ -21,11 +22,17 @@ int ip6_route_me_harder(struct sk_buff *skb)
{ .ip6_u = { .ip6_u =
{ .daddr = iph->daddr, { .daddr = iph->daddr,
.saddr = iph->saddr, } }, .saddr = iph->saddr, } },
.proto = iph->nexthdr,
}; };
dst = ip6_route_output(skb->sk, &fl); dst = ip6_route_output(skb->sk, &fl);
#ifdef CONFIG_XFRM
if (!(IP6CB(skb)->flags & IP6SKB_XFRM_TRANSFORMED) &&
xfrm_decode_session(skb, &fl, AF_INET6) == 0)
if (xfrm_lookup(&skb->dst, &fl, skb->sk, 0))
return -1;
#endif
if (dst->error) { if (dst->error) {
IP6_INC_STATS(IPSTATS_MIB_OUTNOROUTES); IP6_INC_STATS(IPSTATS_MIB_OUTNOROUTES);
LIMIT_NETDEBUG(KERN_DEBUG "ip6_route_me_harder: No more route.\n"); LIMIT_NETDEBUG(KERN_DEBUG "ip6_route_me_harder: No more route.\n");
......
...@@ -139,6 +139,7 @@ static int xfrm6_output_one(struct sk_buff *skb) ...@@ -139,6 +139,7 @@ static int xfrm6_output_one(struct sk_buff *skb)
x = dst->xfrm; x = dst->xfrm;
} while (x && !x->props.mode); } while (x && !x->props.mode);
IP6CB(skb)->flags |= IP6SKB_XFRM_TRANSFORMED;
err = 0; err = 0;
out_exit: out_exit:
......
...@@ -951,8 +951,8 @@ xfrm_policy_ok(struct xfrm_tmpl *tmpl, struct sec_path *sp, int start, ...@@ -951,8 +951,8 @@ xfrm_policy_ok(struct xfrm_tmpl *tmpl, struct sec_path *sp, int start,
return start; return start;
} }
static int int
_decode_session(struct sk_buff *skb, struct flowi *fl, unsigned short family) xfrm_decode_session(struct sk_buff *skb, struct flowi *fl, unsigned short family)
{ {
struct xfrm_policy_afinfo *afinfo = xfrm_policy_get_afinfo(family); struct xfrm_policy_afinfo *afinfo = xfrm_policy_get_afinfo(family);
...@@ -963,6 +963,7 @@ _decode_session(struct sk_buff *skb, struct flowi *fl, unsigned short family) ...@@ -963,6 +963,7 @@ _decode_session(struct sk_buff *skb, struct flowi *fl, unsigned short family)
xfrm_policy_put_afinfo(afinfo); xfrm_policy_put_afinfo(afinfo);
return 0; return 0;
} }
EXPORT_SYMBOL(xfrm_decode_session);
static inline int secpath_has_tunnel(struct sec_path *sp, int k) static inline int secpath_has_tunnel(struct sec_path *sp, int k)
{ {
...@@ -982,7 +983,7 @@ int __xfrm_policy_check(struct sock *sk, int dir, struct sk_buff *skb, ...@@ -982,7 +983,7 @@ int __xfrm_policy_check(struct sock *sk, int dir, struct sk_buff *skb,
u8 fl_dir = policy_to_flow_dir(dir); u8 fl_dir = policy_to_flow_dir(dir);
u32 sk_sid; u32 sk_sid;
if (_decode_session(skb, &fl, family) < 0) if (xfrm_decode_session(skb, &fl, family) < 0)
return 0; return 0;
sk_sid = security_sk_sid(sk, &fl, fl_dir); sk_sid = security_sk_sid(sk, &fl, fl_dir);
...@@ -1055,7 +1056,7 @@ int __xfrm_route_forward(struct sk_buff *skb, unsigned short family) ...@@ -1055,7 +1056,7 @@ int __xfrm_route_forward(struct sk_buff *skb, unsigned short family)
{ {
struct flowi fl; struct flowi fl;
if (_decode_session(skb, &fl, family) < 0) if (xfrm_decode_session(skb, &fl, family) < 0)
return 0; return 0;
return xfrm_lookup(&skb->dst, &fl, NULL, 0) == 0; return xfrm_lookup(&skb->dst, &fl, NULL, 0) == 0;
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment