summaryrefslogtreecommitdiffstats
path: root/br-nf-bds/linux2.5/net/bridge/br_netfilter.c
diff options
context:
space:
mode:
authorBart De Schuymer <bdschuym@pandora.be>2002-10-19 14:33:23 +0000
committerBart De Schuymer <bdschuym@pandora.be>2002-10-19 14:33:23 +0000
commit722b86bda957a8cafed82b7fb1b91f8312c3c775 (patch)
treece96bd808571e330a56a4c1a888d726c24c1bd51 /br-nf-bds/linux2.5/net/bridge/br_netfilter.c
parent435b14632a66d54f1aee4602b26f365b58aec518 (diff)
Use nf_bridge
Diffstat (limited to 'br-nf-bds/linux2.5/net/bridge/br_netfilter.c')
-rw-r--r--br-nf-bds/linux2.5/net/bridge/br_netfilter.c474
1 files changed, 240 insertions, 234 deletions
diff --git a/br-nf-bds/linux2.5/net/bridge/br_netfilter.c b/br-nf-bds/linux2.5/net/bridge/br_netfilter.c
index d42b910..ef14531 100644
--- a/br-nf-bds/linux2.5/net/bridge/br_netfilter.c
+++ b/br-nf-bds/linux2.5/net/bridge/br_netfilter.c
@@ -6,7 +6,7 @@
* Lennert Buytenhek <buytenh@gnu.org>
* Bart De Schuymer <bart.de.schuymer@pandora.be>
*
- * $Id: br_netfilter.c,v 1.2 2002/09/11 19:35:44 bdschuym Exp $
+ * $Id: br_netfilter.c,v 1.3 2002/10/19 14:33:23 bdschuym Exp $
*
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU General Public License
@@ -26,54 +26,21 @@
#include <linux/netfilter_ipv4.h>
#include <linux/in_route.h>
#include <net/ip.h>
-#include <net/tcp.h>
#include <asm/uaccess.h>
#include <asm/checksum.h>
#include "br_private.h"
-#ifndef WE_REALLY_INSIST_ON_NOT_HAVING_NAT_SUPPORT
-/* As the original source/destination addresses are variables private to this
- * file, we store them in unused space at the end of the control buffer.
- * On 64-bit platforms the TCP control buffer size still leaves us 8 bytes
- * of space at the end, so that fits. Usage of the original source address
- * and the original destination address never overlaps (daddr is needed
- * around PRE_ROUTING, and saddr around POST_ROUTING), so that's okay as
- * well.
- */
-#define skb_origaddr(skb) (*((u32 *)((skb)->cb + sizeof((skb)->cb) - 4)))
-
-#define store_orig_dstaddr(skb) (skb_origaddr(skb) = (skb)->nh.iph->daddr)
-#define store_orig_srcaddr(skb) (skb_origaddr(skb) = (skb)->nh.iph->saddr)
-#define dnat_took_place(skb) (skb_origaddr(skb) != (skb)->nh.iph->daddr)
-#define snat_took_place(skb) (skb_origaddr(skb) != (skb)->nh.iph->saddr)
-#else
-#define store_orig_dstaddr(skb)
-#define store_orig_srcaddr(skb)
-#define dnat_took_place(skb) (0)
-#define snat_took_place(skb) (0)
-#endif
-
+#define skb_origaddr(skb) (((struct bridge_skb_cb *) \
+ (skb->cb))->daddr.ipv4)
+#define store_orig_dstaddr(skb) (skb_origaddr(skb) = (skb)->nh.iph->daddr)
+#define dnat_took_place(skb) (skb_origaddr(skb) != (skb)->nh.iph->daddr)
+#define clear_cb(skb) (memset(&skb_origaddr(skb), 0, \
+ sizeof(struct bridge_skb_cb)))
#define has_bridge_parent(device) ((device)->br_port != NULL)
#define bridge_parent(device) (&((device)->br_port->br->dev))
-
-/* As opposed to the DNAT case, for the SNAT case it's not quite
- * clear what we should do with ethernet addresses in NAT'ed
- * packets. Use this heuristic for now.
- */
-static inline void __maybe_fixup_src_address(struct sk_buff *skb)
-{
- if (snat_took_place(skb) &&
- inet_addr_type(skb->nh.iph->saddr) == RTN_LOCAL) {
- memcpy(skb->mac.ethernet->h_source,
- bridge_parent(skb->dev)->dev_addr,
- ETH_ALEN);
- }
-}
-
-
/* We need these fake structures to make netfilter happy --
* lots of places assume that skb->dst != NULL, which isn't
* all that unreasonable.
@@ -113,90 +80,91 @@ static void __br_dnat_complain(void)
}
-static int br_nf_pre_routing_finish_bridge(struct sk_buff *skb)
-{
- skb->dev = bridge_parent(skb->dev);
-#ifdef CONFIG_NETFILTER_DEBUG
- skb->nf_debug |= (1 << NF_BR_PRE_ROUTING) | (1 << NF_BR_FORWARD);
-#endif
- skb->dst->output(skb);
- return 0;
-}
-
-#ifdef CONFIG_NETFILTER_DEBUG
-#define __br_handle_frame_finish br_nf_pre_routing_finish_route
-static inline int br_nf_pre_routing_finish_route(struct sk_buff *skb)
-{
- skb->nf_debug = 0;
- br_handle_frame_finish(skb);
- return 0;
-}
-#else
-#define __br_handle_frame_finish br_handle_frame_finish
-#endif
-
-/* This requires some explaining. If DNAT has taken place,
- * we will need to fix up the destination ethernet address,
+/* This requires some explaining. If DNAT has taken place,
+ * we will need to fix up the destination Ethernet address,
* and this is a tricky process.
*
* There are two cases to consider:
* 1. The packet was DNAT'ed to a device in the same bridge
- * port group as it was received on. We can still bridge
+ * port group as it was received on. We can still bridge
* the packet.
* 2. The packet was DNAT'ed to a different device, either
* a non-bridged device or another bridge port group.
* The packet will need to be routed.
*
- * The way to distinguish between the two is by calling ip_route_input()
- * and looking at skb->dst->dev, which it changed to the destination device
- * if ip_route_input() succeeds.
+ * The correct way of distinguishing between these two cases is to
+ * call ip_route_input() and to look at skb->dst->dev, which is
+ * changed to the destination device if ip_route_input() succeeds.
*
- * Let us first consider ip_route_input() succeeds:
+ * Let us first consider the case that ip_route_input() succeeds:
*
- * If skb->dst->dev equals the logical bridge device the packet came in on,
- * we can consider this bridging. We then call skb->dst->output() which will
- * make the packet enter br_nf_local_out() not much later. In that function
- * it is assured that the iptables FORWARD chain is traversed for the packet.
+ * If skb->dst->dev equals the logical bridge device the packet
+ * came in on, we can consider this bridging. We then call
+ * skb->dst->output() which will make the packet enter br_nf_local_out()
+ * not much later. In that function it is assured that the iptables
+ * FORWARD chain is traversed for the packet.
*
- * Else, the packet is considered to be routed and we just change the
- * destination MAC address so that the packet will later be passed up to the ip
- * stack to be routed.
+ * Otherwise, the packet is considered to be routed and we just
+ * change the destination MAC address so that the packet will
+ * later be passed up to the IP stack to be routed.
*
- * Let us now consider ip_route_input() fails:
+ * Let us now consider the case that ip_route_input() fails:
*
- * After a "echo '0' > /proc/sys/net/ipv4/ip_forward" ip_route_input() will
- * fail, while ip_route_output() will return success. The source address for
- * ip_route_output() is set to zero, so ip_route_output()
- * thinks we're handling a locally generated packet and won't care if
- * ip forwarding is allowed. We send a warning message to the users's log
- * telling her to put ip forwarding on.
+ * After a "echo '0' > /proc/sys/net/ipv4/ip_forward" ip_route_input()
+ * will fail, while ip_route_output() will return success. The source
+ * address for ip_route_output() is set to zero, so ip_route_output()
+ * thinks we're handling a locally generated packet and won't care
+ * if IP forwarding is allowed. We send a warning message to the users's
+ * log telling her to put IP forwarding on.
*
- * ip_route_input() will also fail if there is no route available. Then we just
- * drop the packet.
+ * ip_route_input() will also fail if there is no route available.
+ * In that case we just drop the packet.
*
- * The other special thing happening here is putting skb->physoutdev on
- * &__fake_net_device (resp. NULL) for bridged (resp. routed) packets. This is
- * needed so that br_nf_local_out() can know that it has to give the packets to
- * the BR_NF_FORWARD (resp. BR_NF_LOCAL_OUT) bridge hook. See that function.
* --Lennert, 20020411
* --Bart, 20020416 (updated)
+ * --Bart, 20021007 (updated)
*/
+static int br_nf_pre_routing_finish_bridge(struct sk_buff *skb)
+{
+#ifdef CONFIG_NETFILTER_DEBUG
+ skb->nf_debug |= (1 << NF_BR_PRE_ROUTING) | (1 << NF_BR_FORWARD);
+#endif
+
+ if (skb->pkt_type == PACKET_OTHERHOST) {
+ skb->pkt_type = PACKET_HOST;
+ skb->nf_bridge->mask |= BRNF_PKT_TYPE;
+ }
+
+ skb->dev = bridge_parent(skb->dev);
+ skb->dst->output(skb);
+ return 0;
+}
+
static int br_nf_pre_routing_finish(struct sk_buff *skb)
{
struct net_device *dev = skb->dev;
struct iphdr *iph = skb->nh.iph;
+ struct nf_bridge_info *nf_bridge = skb->nf_bridge;
#ifdef CONFIG_NETFILTER_DEBUG
skb->nf_debug ^= (1 << NF_BR_PRE_ROUTING);
#endif
+
+ if (nf_bridge->mask & BRNF_PKT_TYPE) {
+ skb->pkt_type = PACKET_OTHERHOST;
+ nf_bridge->mask ^= BRNF_PKT_TYPE;
+ }
+
if (dnat_took_place(skb)) {
- if (ip_route_input(skb, iph->daddr, iph->saddr, iph->tos, dev)) {
+ if (ip_route_input(skb, iph->daddr, iph->saddr, iph->tos,
+ dev)) {
struct rtable *rt;
if (!ip_route_output(&rt, iph->daddr, 0, iph->tos, 0)) {
- // bridged dnated traffic isn't dependent on
- // disabled ip_forwarding
+ /* Bridged-and-DNAT'ed traffic doesn't
+ * require ip_forwarding.
+ */
if (((struct dst_entry *)rt)->dev == dev) {
skb->dst = (struct dst_entry *)rt;
goto bridged_dnat;
@@ -209,24 +177,30 @@ static int br_nf_pre_routing_finish(struct sk_buff *skb)
} else {
if (skb->dst->dev == dev) {
bridged_dnat:
- // tell br_nf_local_out this is a bridged frame
- skb->physoutdev = &__fake_net_device;
- skb->dev = skb->physindev;
- NF_HOOK_THRESH(PF_BRIDGE, NF_BR_PRE_ROUTING, skb, skb->dev, NULL,
- br_nf_pre_routing_finish_bridge, 1);
+ /* Tell br_nf_local_out this is a
+ * bridged frame
+ */
+ nf_bridge->mask |= BRNF_BRIDGED_DNAT;
+ skb->dev = nf_bridge->physindev;
+ clear_cb(skb);
+ NF_HOOK_THRESH(PF_BRIDGE, NF_BR_PRE_ROUTING,
+ skb, skb->dev, NULL,
+ br_nf_pre_routing_finish_bridge,
+ 1);
return 0;
}
- // tell br_nf_local_out this is a routed frame
- skb->physoutdev = NULL;
- memcpy(skb->mac.ethernet->h_dest, dev->dev_addr, ETH_ALEN);
+ memcpy(skb->mac.ethernet->h_dest, dev->dev_addr,
+ ETH_ALEN);
}
} else {
skb->dst = (struct dst_entry *)&__fake_rtable;
dst_hold(skb->dst);
}
- skb->dev = skb->physindev;
+
+ clear_cb(skb);
+ skb->dev = nf_bridge->physindev;
NF_HOOK_THRESH(PF_BRIDGE, NF_BR_PRE_ROUTING, skb, skb->dev, NULL,
- __br_handle_frame_finish, 1);
+ br_handle_frame_finish, 1);
return 0;
}
@@ -237,11 +211,14 @@ bridged_dnat:
* target in particular. Save the original destination IP
* address to be able to detect DNAT afterwards.
*/
-static unsigned int br_nf_pre_routing(unsigned int hook, struct sk_buff **pskb, const struct net_device *in, const struct net_device *out, int (*okfn)(struct sk_buff *))
+static unsigned int br_nf_pre_routing(unsigned int hook, struct sk_buff **pskb,
+ const struct net_device *in, const struct net_device *out,
+ int (*okfn)(struct sk_buff *))
{
struct iphdr *iph;
__u32 len;
struct sk_buff *skb;
+ struct nf_bridge_info *nf_bridge;
if ((*pskb)->protocol != __constant_htons(ETH_P_IP))
return NF_ACCEPT;
@@ -273,15 +250,20 @@ static unsigned int br_nf_pre_routing(unsigned int hook, struct sk_buff **pskb,
skb->ip_summed = CHECKSUM_NONE;
}
- skb->physindev = skb->dev;
- skb->dev = bridge_parent(skb->dev);
- if (skb->pkt_type == PACKET_OTHERHOST)
+#ifdef CONFIG_NETFILTER_DEBUG
+ skb->nf_debug ^= (1 << NF_IP_PRE_ROUTING);
+#endif
+
+ nf_bridge = skb->nf_bridge;
+ if (skb->pkt_type == PACKET_OTHERHOST) {
skb->pkt_type = PACKET_HOST;
+ nf_bridge->mask |= BRNF_PKT_TYPE;
+ }
+
+ nf_bridge->physindev = skb->dev;
+ skb->dev = bridge_parent(skb->dev);
store_orig_dstaddr(skb);
-#ifdef CONFIG_NETFILTER_DEBUG
- (*pskb)->nf_debug ^= (1 << NF_IP_PRE_ROUTING);
-#endif
NF_HOOK(PF_INET, NF_IP_PRE_ROUTING, skb, skb->dev, NULL,
br_nf_pre_routing_finish);
@@ -302,7 +284,9 @@ out:
* register an IPv4 PRE_ROUTING 'sabotage' hook that will
* prevent this from happening.
*/
-static unsigned int br_nf_local_in(unsigned int hook, struct sk_buff **pskb, const struct net_device *in, const struct net_device *out, int (*okfn)(struct sk_buff *))
+static unsigned int br_nf_local_in(unsigned int hook, struct sk_buff **pskb,
+ const struct net_device *in, const struct net_device *out,
+ int (*okfn)(struct sk_buff *))
{
struct sk_buff *skb = *pskb;
@@ -321,10 +305,18 @@ static unsigned int br_nf_local_in(unsigned int hook, struct sk_buff **pskb, con
/* PF_BRIDGE/FORWARD *************************************************/
static int br_nf_forward_finish(struct sk_buff *skb)
{
+ struct nf_bridge_info *nf_bridge = skb->nf_bridge;
+
#ifdef CONFIG_NETFILTER_DEBUG
skb->nf_debug ^= (1 << NF_BR_FORWARD);
#endif
- NF_HOOK_THRESH(PF_BRIDGE, NF_BR_FORWARD, skb, skb->physindev,
+
+ if (nf_bridge->mask & BRNF_PKT_TYPE) {
+ skb->pkt_type = PACKET_OTHERHOST;
+ nf_bridge->mask ^= BRNF_PKT_TYPE;
+ }
+
+ NF_HOOK_THRESH(PF_BRIDGE, NF_BR_FORWARD, skb, nf_bridge->physindev,
skb->dev, br_forward_finish, 1);
return 0;
@@ -338,91 +330,80 @@ static int br_nf_forward_finish(struct sk_buff *skb)
* skb->phys{in,out}dev into account as well (so both the real
* device and the bridge device will match).
*/
-static unsigned int br_nf_forward(unsigned int hook, struct sk_buff **pskb, const struct net_device *in, const struct net_device *out, int (*okfn)(struct sk_buff *))
+static unsigned int br_nf_forward(unsigned int hook, struct sk_buff **pskb,
+ const struct net_device *in, const struct net_device *out,
+ int (*okfn)(struct sk_buff *))
{
struct sk_buff *skb = *pskb;
+ struct nf_bridge_info *nf_bridge;
- // don't mess with non-ip frames, also don't mess with the ip-packets
- // when br_nf_local_out_finish explicitly says so.
- if (skb->protocol != __constant_htons(ETH_P_IP) || skb->physindev == NULL)
+ if (skb->protocol != __constant_htons(ETH_P_IP))
return NF_ACCEPT;
- skb->physoutdev = skb->dev;
#ifdef CONFIG_NETFILTER_DEBUG
- skb->nf_debug ^= (1 << NF_IP_FORWARD);
+ skb->nf_debug ^= (1 << NF_BR_FORWARD);
#endif
- NF_HOOK(PF_INET, NF_IP_FORWARD, skb, bridge_parent(skb->physindev),
- bridge_parent(skb->dev), br_nf_forward_finish);
- return NF_STOLEN;
-}
+ nf_bridge = skb->nf_bridge;
+ if (skb->pkt_type == PACKET_OTHERHOST) {
+ skb->pkt_type = PACKET_HOST;
+ nf_bridge->mask |= BRNF_PKT_TYPE;
+ }
+ nf_bridge->physoutdev = skb->dev;
-/* PF_BRIDGE/LOCAL_OUT
-***********************************************/
-static int br_nf_local_out_finish_forward(struct sk_buff *skb)
-{
- struct net_device *dev;
-
- dev = skb->physindev;
- // tell br_nf_forward to stay away
- skb->physindev = NULL;
-#ifdef CONFIG_NETFILTER_DEBUG
- skb->nf_debug &= ~(1 << NF_BR_FORWARD);
-#endif
- NF_HOOK(PF_BRIDGE, NF_BR_FORWARD, skb, dev, skb->dev,
- br_forward_finish);
+ NF_HOOK(PF_INET, NF_IP_FORWARD, skb, bridge_parent(nf_bridge->physindev),
+ bridge_parent(skb->dev), br_nf_forward_finish);
- return 0;
+ return NF_STOLEN;
}
+
+/* PF_BRIDGE/LOCAL_OUT ***********************************************/
static int br_nf_local_out_finish(struct sk_buff *skb)
{
#ifdef CONFIG_NETFILTER_DEBUG
skb->nf_debug &= ~(1 << NF_BR_LOCAL_OUT);
#endif
+
NF_HOOK_THRESH(PF_BRIDGE, NF_BR_LOCAL_OUT, skb, NULL, skb->dev,
- br_forward_finish, INT_MIN + 1);
+ br_forward_finish, NF_BR_PRI_FIRST + 1);
return 0;
}
-/* This hook sees both locally originated IP packets and forwarded
+/* This function sees both locally originated IP packets and forwarded
* IP packets (in both cases the destination device is a bridge
- * device). For the sake of interface transparency (i.e. properly
+ * device). It also sees bridged-and-DNAT'ed packets.
+ * For the sake of interface transparency (i.e. properly
* overloading the '-o' option), we steal packets destined to
- * a bridge device away from the IPv4 FORWARD and OUTPUT hooks,
- * and reinject them later, when we have determined the real
- * output device. This reinjecting happens here.
- *
- * If skb->physindev is NULL, the bridge-nf code never touched
- * this packet before, and so the packet was locally originated.
- * We call the IPv4 LOCAL_OUT hook.
+ * a bridge device away from the PF_INET/FORWARD and PF_INET/OUTPUT hook
+ * functions, and give them back later, when we have determined the real
+ * output device. This is done in here.
*
- * If skb->physindev isn't NULL, there are two cases:
- * 1. The packet was IP routed.
- * 2. The packet was cross-bridge DNAT'ed (see the comment near
- * PF_BRIDGE/PRE_ROUTING).
- * In both cases, we call the IPv4 FORWARD hook. In case 1,
- * if the packet originally came from a bridge device, and in
- * case 2, skb->physindev will have a bridge device as parent,
- * so we use that parent device as indev. Otherwise, we just
- * use physindev.
- *
- * If skb->physoutdev == NULL the bridge code never touched the
- * packet or the packet was routed in br_nf_pre_routing_finish().
- * We give the packet to the bridge NF_BR_LOCAL_OUT hook.
- * If not, the packet is actually a bridged one so we give it to
- * the NF_BR_FORWARD hook.
+ * If (nf_bridge->mask & BRNF_BRIDGED_DNAT) then the packet is bridged
+ * and we fake the PF_BRIDGE/FORWARD hook. The function br_nf_forward()
+ * will then fake the PF_INET/FORWARD hook. br_nf_local_out() has priority
+ * NF_BR_PRI_FIRST, so no relevant PF_BRIDGE/INPUT functions have been nor
+ * will be executed.
+ * Otherwise, if nf_bridge->physindev is NULL, the bridge-nf code never touched
+ * this packet before, and so the packet was locally originated. We fake
+ * the PF_INET/LOCAL_OUT hook.
+ * Finally, if nf_bridge->physindev isn't NULL, then the packet was IP routed,
+ * so we fake the PF_INET/FORWARD hook. ipv4_sabotage_out() makes sure
+ * even routed packets that didn't arrive on a bridge interface have their
+ * nf_bridge->physindev set.
*/
-static unsigned int br_nf_local_out(unsigned int hook, struct sk_buff **pskb, const struct net_device *in, const struct net_device *out, int (*_okfn)(struct sk_buff *))
+static unsigned int br_nf_local_out(unsigned int hook, struct sk_buff **pskb,
+ const struct net_device *in, const struct net_device *out,
+ int (*_okfn)(struct sk_buff *))
{
- int hookno, prio;
int (*okfn)(struct sk_buff *skb);
struct net_device *realindev;
struct sk_buff *skb = *pskb;
+ struct nf_bridge_info *nf_bridge;
if (skb->protocol != __constant_htons(ETH_P_IP))
return NF_ACCEPT;
@@ -433,62 +414,64 @@ static unsigned int br_nf_local_out(unsigned int hook, struct sk_buff **pskb, co
if (skb->dst == NULL)
return NF_ACCEPT;
- // bridged, take forward
- // (see big note in front of br_nf_pre_routing_finish)
- if (skb->physoutdev == &__fake_net_device) {
- okfn = br_nf_local_out_finish_forward;
- } else if (skb->physoutdev == NULL) {
- // non-bridged: routed or locally generated traffic, take local_out
- // (see big note in front of br_nf_pre_routing_finish)
- okfn = br_nf_local_out_finish;
- } else {
- printk("ARGH: bridge_or_routed hack doesn't work\n");
- okfn = br_nf_local_out_finish;
- }
+ nf_bridge = skb->nf_bridge;
+ nf_bridge->physoutdev = skb->dev;
- skb->physoutdev = skb->dev;
+ realindev = nf_bridge->physindev;
+ /* Bridged, take PF_BRIDGE/FORWARD.
+ * (see big note in front of br_nf_pre_routing_finish)
+ */
+ if (nf_bridge->mask & BRNF_BRIDGED_DNAT) {
+ okfn = br_forward_finish;
+
+ if (nf_bridge->mask & BRNF_PKT_TYPE) {
+ skb->pkt_type = PACKET_OTHERHOST;
+ nf_bridge->mask ^= BRNF_PKT_TYPE;
+ }
+
+ NF_HOOK(PF_BRIDGE, NF_BR_FORWARD, skb, realindev,
+ skb->dev, okfn);
+ } else {
+ okfn = br_nf_local_out_finish;
+ /* IP forwarded traffic has a physindev, locally
+ * generated traffic hasn't.
+ */
+ if (realindev != NULL) {
+ if (((nf_bridge->mask & BRNF_DONT_TAKE_PARENT) == 0) &&
+ has_bridge_parent(realindev))
+ realindev = bridge_parent(realindev);
+
+ NF_HOOK_THRESH(PF_INET, NF_IP_FORWARD, skb, realindev,
+ bridge_parent(skb->dev), okfn,
+ NF_IP_PRI_BRIDGE_SABOTAGE_FORWARD + 1);
+ } else {
#ifdef CONFIG_NETFILTER_DEBUG
- skb->nf_debug ^= (1 << NF_BR_LOCAL_OUT);
+ skb->nf_debug ^= (1 << NF_IP_LOCAL_OUT);
#endif
- hookno = NF_IP_LOCAL_OUT;
- prio = NF_IP_PRI_BRIDGE_SABOTAGE;
- if ((realindev = skb->physindev) != NULL) {
- hookno = NF_IP_FORWARD;
- // there is an iptables mangle table FORWARD chain with
- // priority -150. This chain should see the physical out-dev.
- prio = NF_IP_PRI_BRIDGE_SABOTAGE_FORWARD;
- if (has_bridge_parent(realindev))
- realindev = bridge_parent(realindev);
- }
- NF_HOOK_THRESH(PF_INET, hookno, skb, realindev,
- bridge_parent(skb->dev), okfn, prio + 1);
+ NF_HOOK_THRESH(PF_INET, NF_IP_LOCAL_OUT, skb, realindev,
+ bridge_parent(skb->dev), okfn,
+ NF_IP_PRI_BRIDGE_SABOTAGE_LOCAL_OUT + 1);
+ }
+ }
return NF_STOLEN;
}
/* PF_BRIDGE/POST_ROUTING ********************************************/
-static int br_nf_post_routing_finish(struct sk_buff *skb)
-{
- __maybe_fixup_src_address(skb);
-#ifdef CONFIG_NETFILTER_DEBUG
- skb->nf_debug ^= (1 << NF_BR_POST_ROUTING);
-#endif
- NF_HOOK_THRESH(PF_BRIDGE, NF_BR_POST_ROUTING, skb, NULL,
- bridge_parent(skb->dev), br_dev_queue_push_xmit, 1);
-
- return 0;
-}
-
-static unsigned int br_nf_post_routing(unsigned int hook, struct sk_buff **pskb, const struct net_device *in, const struct net_device *out, int (*okfn)(struct sk_buff *))
+static unsigned int br_nf_post_routing(unsigned int hook, struct sk_buff **pskb,
+ const struct net_device *in, const struct net_device *out,
+ int (*okfn)(struct sk_buff *))
{
struct sk_buff *skb = *pskb;
+ struct nf_bridge_info *nf_bridge = (*pskb)->nf_bridge;
/* Be very paranoid. */
if (skb->mac.raw < skb->head || skb->mac.raw + ETH_HLEN > skb->data) {
- printk(KERN_CRIT "Argh!! Fuck me harder with a chainsaw. ");
+ printk(KERN_CRIT "br_netfilter: Argh!! br_nf_post_routing: "
+ "bad mac.raw pointer.");
if (skb->dev != NULL) {
printk("[%s]", skb->dev->name);
if (has_bridge_parent(skb->dev))
@@ -507,21 +490,36 @@ static unsigned int br_nf_post_routing(unsigned int hook, struct sk_buff **pskb,
if (skb->dst == NULL)
return NF_ACCEPT;
- store_orig_srcaddr(skb);
#ifdef CONFIG_NETFILTER_DEBUG
skb->nf_debug ^= (1 << NF_IP_POST_ROUTING);
#endif
+
+ /* We assume any code from br_dev_queue_push_xmit onwards doesn't care
+ * about the value of skb->pkt_type.
+ */
+ if (skb->pkt_type == PACKET_OTHERHOST) {
+ skb->pkt_type = PACKET_HOST;
+ nf_bridge->mask |= BRNF_PKT_TYPE;
+ }
+
+ memcpy(nf_bridge->hh, skb->data - 16, 16);
+ nf_bridge->mask |= BRNF_COPY_HEADER;
+
NF_HOOK(PF_INET, NF_IP_POST_ROUTING, skb, NULL,
- bridge_parent(skb->dev), br_nf_post_routing_finish);
+ bridge_parent(skb->dev), br_dev_queue_push_xmit);
return NF_STOLEN;
}
/* IPv4/SABOTAGE *****************************************************/
+
/* Don't hand locally destined packets to PF_INET/PRE_ROUTING
- * for the second time. */
-static unsigned int ipv4_sabotage_in(unsigned int hook, struct sk_buff **pskb, const struct net_device *in, const struct net_device *out, int (*okfn)(struct sk_buff *))
+ * for the second time.
+ */
+static unsigned int ipv4_sabotage_in(unsigned int hook, struct sk_buff **pskb,
+ const struct net_device *in, const struct net_device *out,
+ int (*okfn)(struct sk_buff *))
{
if (in->hard_start_xmit == br_dev_xmit &&
okfn != br_nf_pre_routing_finish) {
@@ -536,16 +534,32 @@ static unsigned int ipv4_sabotage_in(unsigned int hook, struct sk_buff **pskb, c
* and PF_INET/POST_ROUTING until we have done the forwarding
* decision in the bridge code and have determined skb->physoutdev.
*/
-static unsigned int ipv4_sabotage_out(unsigned int hook, struct sk_buff **pskb, const struct net_device *in, const struct net_device *out, int (*okfn)(struct sk_buff *))
+static unsigned int ipv4_sabotage_out(unsigned int hook, struct sk_buff **pskb,
+ const struct net_device *in, const struct net_device *out,
+ int (*okfn)(struct sk_buff *))
{
if (out->hard_start_xmit == br_dev_xmit &&
okfn != br_nf_forward_finish &&
okfn != br_nf_local_out_finish &&
- okfn != br_nf_post_routing_finish) {
+ okfn != br_dev_queue_push_xmit) {
struct sk_buff *skb = *pskb;
-
- if (hook == NF_IP_FORWARD && skb->physindev == NULL)
- skb->physindev = (struct net_device *)in;
+ struct nf_bridge_info *nf_bridge;
+
+ if (!skb->nf_bridge)
+ nf_bridge_alloc(skb);
+
+ nf_bridge = skb->nf_bridge;
+
+ /* This frame will arrive on PF_BRIDGE/LOCAL_OUT and we
+ * will need the indev then. For a brouter, the real indev
+ * can be a bridge port, so we make sure br_nf_local_out()
+ * doesn't use the bridge parent of the indev by using
+ * the BRNF_DONT_TAKE_PARENT mask.
+ */
+ if (hook == NF_IP_FORWARD && nf_bridge->physindev == NULL) {
+ nf_bridge->mask &= BRNF_DONT_TAKE_PARENT;
+ nf_bridge->physindev = (struct net_device *)in;
+ }
okfn(skb);
return NF_STOLEN;
}
@@ -553,38 +567,30 @@ static unsigned int ipv4_sabotage_out(unsigned int hook, struct sk_buff **pskb,
return NF_ACCEPT;
}
-
+/* For br_nf_local_out we need (prio = NF_BR_PRI_FIRST), to insure that innocent
+ * PF_BRIDGE/NF_BR_LOCAL_OUT functions don't get bridged traffic as input.
+ * For br_nf_post_routing, we need (prio = NF_BR_PRI_LAST), because
+ * ip_refrag() can return NF_STOLEN.
+ */
static struct nf_hook_ops br_nf_ops[] = {
- { { NULL, NULL }, br_nf_pre_routing, PF_BRIDGE, NF_BR_PRE_ROUTING, 0 },
- { { NULL, NULL }, br_nf_local_in, PF_BRIDGE, NF_BR_LOCAL_IN, 0 },
- { { NULL, NULL }, br_nf_forward, PF_BRIDGE, NF_BR_FORWARD, 0 },
- // we need INT_MIN, so innocent NF_BR_LOCAL_OUT functions don't
- // get bridged traffic as input
- { { NULL, NULL }, br_nf_local_out, PF_BRIDGE, NF_BR_LOCAL_OUT, INT_MIN },
- { { NULL, NULL }, br_nf_post_routing, PF_BRIDGE, NF_BR_POST_ROUTING, 0 },
-
+ { { NULL, NULL }, br_nf_pre_routing, PF_BRIDGE, NF_BR_PRE_ROUTING, NF_BR_PRI_BRNF },
+ { { NULL, NULL }, br_nf_local_in, PF_BRIDGE, NF_BR_LOCAL_IN, NF_BR_PRI_BRNF },
+ { { NULL, NULL }, br_nf_forward, PF_BRIDGE, NF_BR_FORWARD, NF_BR_PRI_BRNF },
+ { { NULL, NULL }, br_nf_local_out, PF_BRIDGE, NF_BR_LOCAL_OUT, NF_BR_PRI_FIRST },
+ { { NULL, NULL }, br_nf_post_routing, PF_BRIDGE, NF_BR_POST_ROUTING, NF_BR_PRI_LAST },
{ { NULL, NULL }, ipv4_sabotage_in, PF_INET, NF_IP_PRE_ROUTING, NF_IP_PRI_FIRST },
-
{ { NULL, NULL }, ipv4_sabotage_out, PF_INET, NF_IP_FORWARD, NF_IP_PRI_BRIDGE_SABOTAGE_FORWARD },
- { { NULL, NULL }, ipv4_sabotage_out, PF_INET, NF_IP_LOCAL_OUT, NF_IP_PRI_BRIDGE_SABOTAGE },
- { { NULL, NULL }, ipv4_sabotage_out, PF_INET, NF_IP_POST_ROUTING, NF_IP_PRI_FIRST },
+ { { NULL, NULL }, ipv4_sabotage_out, PF_INET, NF_IP_LOCAL_OUT, NF_IP_PRI_BRIDGE_SABOTAGE_LOCAL_OUT },
+ { { NULL, NULL }, ipv4_sabotage_out, PF_INET, NF_IP_POST_ROUTING, NF_IP_PRI_FIRST }
};
#define NUMHOOKS (sizeof(br_nf_ops)/sizeof(br_nf_ops[0]))
-
int br_netfilter_init(void)
{
int i;
-#ifndef WE_REALLY_INSIST_ON_NOT_HAVING_NAT_SUPPORT
- if (sizeof(struct tcp_skb_cb) + 4 >= sizeof(((struct sk_buff *)NULL)->cb)) {
- extern int __too_little_space_in_control_buffer(void);
- __too_little_space_in_control_buffer();
- }
-#endif
-
- for (i=0;i<NUMHOOKS;i++) {
+ for (i = 0; i < NUMHOOKS; i++) {
int ret;
if ((ret = nf_register_hook(&br_nf_ops[i])) >= 0)
@@ -605,6 +611,6 @@ void br_netfilter_fini(void)
{
int i;
- for (i=NUMHOOKS-1;i>=0;i--)
+ for (i = NUMHOOKS - 1; i >= 0; i--)
nf_unregister_hook(&br_nf_ops[i]);
}