// SPDX-License-Identifier: GPL-2.0-only
|
/*
|
* xt_ipvs - kernel module to match IPVS connection properties
|
*
|
* Author: Hannes Eder <heder@google.com>
|
*/
|
|
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
|
|
#include <linux/module.h>
|
#include <linux/moduleparam.h>
|
#include <linux/spinlock.h>
|
#include <linux/skbuff.h>
|
#ifdef CONFIG_IP_VS_IPV6
|
#include <net/ipv6.h>
|
#endif
|
#include <linux/ip_vs.h>
|
#include <linux/types.h>
|
#include <linux/netfilter/x_tables.h>
|
#include <linux/netfilter/xt_ipvs.h>
|
#include <net/netfilter/nf_conntrack.h>
|
|
#include <net/ip_vs.h>
|
|
MODULE_AUTHOR("Hannes Eder <heder@google.com>");
|
MODULE_DESCRIPTION("Xtables: match IPVS connection properties");
|
MODULE_LICENSE("GPL");
|
MODULE_ALIAS("ipt_ipvs");
|
MODULE_ALIAS("ip6t_ipvs");
|
|
/* borrowed from xt_conntrack */
|
static bool ipvs_mt_addrcmp(const union nf_inet_addr *kaddr,
|
const union nf_inet_addr *uaddr,
|
const union nf_inet_addr *umask,
|
unsigned int l3proto)
|
{
|
if (l3proto == NFPROTO_IPV4)
|
return ((kaddr->ip ^ uaddr->ip) & umask->ip) == 0;
|
#ifdef CONFIG_IP_VS_IPV6
|
else if (l3proto == NFPROTO_IPV6)
|
return ipv6_masked_addr_cmp(&kaddr->in6, &umask->in6,
|
&uaddr->in6) == 0;
|
#endif
|
else
|
return false;
|
}
|
|
static bool
|
ipvs_mt(const struct sk_buff *skb, struct xt_action_param *par)
|
{
|
const struct xt_ipvs_mtinfo *data = par->matchinfo;
|
struct netns_ipvs *ipvs = net_ipvs(xt_net(par));
|
/* ipvs_mt_check ensures that family is only NFPROTO_IPV[46]. */
|
const u_int8_t family = xt_family(par);
|
struct ip_vs_iphdr iph;
|
struct ip_vs_protocol *pp;
|
struct ip_vs_conn *cp;
|
bool match = true;
|
|
if (data->bitmask == XT_IPVS_IPVS_PROPERTY) {
|
match = skb->ipvs_property ^
|
!!(data->invert & XT_IPVS_IPVS_PROPERTY);
|
goto out;
|
}
|
|
/* other flags than XT_IPVS_IPVS_PROPERTY are set */
|
if (!skb->ipvs_property) {
|
match = false;
|
goto out;
|
}
|
|
ip_vs_fill_iph_skb(family, skb, true, &iph);
|
|
if (data->bitmask & XT_IPVS_PROTO)
|
if ((iph.protocol == data->l4proto) ^
|
!(data->invert & XT_IPVS_PROTO)) {
|
match = false;
|
goto out;
|
}
|
|
pp = ip_vs_proto_get(iph.protocol);
|
if (unlikely(!pp)) {
|
match = false;
|
goto out;
|
}
|
|
/*
|
* Check if the packet belongs to an existing entry
|
*/
|
cp = pp->conn_out_get(ipvs, family, skb, &iph);
|
if (unlikely(cp == NULL)) {
|
match = false;
|
goto out;
|
}
|
|
/*
|
* We found a connection, i.e. ct != 0, make sure to call
|
* __ip_vs_conn_put before returning. In our case jump to out_put_con.
|
*/
|
|
if (data->bitmask & XT_IPVS_VPORT)
|
if ((cp->vport == data->vport) ^
|
!(data->invert & XT_IPVS_VPORT)) {
|
match = false;
|
goto out_put_cp;
|
}
|
|
if (data->bitmask & XT_IPVS_VPORTCTL)
|
if ((cp->control != NULL &&
|
cp->control->vport == data->vportctl) ^
|
!(data->invert & XT_IPVS_VPORTCTL)) {
|
match = false;
|
goto out_put_cp;
|
}
|
|
if (data->bitmask & XT_IPVS_DIR) {
|
enum ip_conntrack_info ctinfo;
|
struct nf_conn *ct = nf_ct_get(skb, &ctinfo);
|
|
if (ct == NULL) {
|
match = false;
|
goto out_put_cp;
|
}
|
|
if ((ctinfo >= IP_CT_IS_REPLY) ^
|
!!(data->invert & XT_IPVS_DIR)) {
|
match = false;
|
goto out_put_cp;
|
}
|
}
|
|
if (data->bitmask & XT_IPVS_METHOD)
|
if (((cp->flags & IP_VS_CONN_F_FWD_MASK) == data->fwd_method) ^
|
!(data->invert & XT_IPVS_METHOD)) {
|
match = false;
|
goto out_put_cp;
|
}
|
|
if (data->bitmask & XT_IPVS_VADDR) {
|
if (ipvs_mt_addrcmp(&cp->vaddr, &data->vaddr,
|
&data->vmask, family) ^
|
!(data->invert & XT_IPVS_VADDR)) {
|
match = false;
|
goto out_put_cp;
|
}
|
}
|
|
out_put_cp:
|
__ip_vs_conn_put(cp);
|
out:
|
pr_debug("match=%d\n", match);
|
return match;
|
}
|
|
static int ipvs_mt_check(const struct xt_mtchk_param *par)
|
{
|
if (par->family != NFPROTO_IPV4
|
#ifdef CONFIG_IP_VS_IPV6
|
&& par->family != NFPROTO_IPV6
|
#endif
|
) {
|
pr_info_ratelimited("protocol family %u not supported\n",
|
par->family);
|
return -EINVAL;
|
}
|
|
return 0;
|
}
|
|
static struct xt_match xt_ipvs_mt_reg __read_mostly = {
|
.name = "ipvs",
|
.revision = 0,
|
.family = NFPROTO_UNSPEC,
|
.match = ipvs_mt,
|
.checkentry = ipvs_mt_check,
|
.matchsize = XT_ALIGN(sizeof(struct xt_ipvs_mtinfo)),
|
.me = THIS_MODULE,
|
};
|
|
static int __init ipvs_mt_init(void)
|
{
|
return xt_register_match(&xt_ipvs_mt_reg);
|
}
|
|
static void __exit ipvs_mt_exit(void)
|
{
|
xt_unregister_match(&xt_ipvs_mt_reg);
|
}
|
|
module_init(ipvs_mt_init);
|
module_exit(ipvs_mt_exit);
|