|
14 | 14 | #include <linux/netfilter/nf_tables.h> |
15 | 15 | #include <net/netfilter/nf_tables.h> |
16 | 16 | #include <net/netfilter/nft_reject.h> |
| 17 | +#include <net/netfilter/ipv4/nf_reject.h> |
| 18 | +#include <net/netfilter/ipv6/nf_reject.h> |
17 | 19 |
|
18 | 20 | static void nft_reject_bridge_eval(const struct nft_expr *expr, |
19 | 21 | struct nft_data data[NFT_REG_MAX + 1], |
20 | 22 | const struct nft_pktinfo *pkt) |
21 | 23 | { |
| 24 | + struct nft_reject *priv = nft_expr_priv(expr); |
| 25 | + struct net *net = dev_net((pkt->in != NULL) ? pkt->in : pkt->out); |
| 26 | + |
22 | 27 | switch (eth_hdr(pkt->skb)->h_proto) { |
23 | 28 | case htons(ETH_P_IP): |
24 | | - return nft_reject_ipv4_eval(expr, data, pkt); |
| 29 | + switch (priv->type) { |
| 30 | + case NFT_REJECT_ICMP_UNREACH: |
| 31 | + nf_send_unreach(pkt->skb, priv->icmp_code); |
| 32 | + break; |
| 33 | + case NFT_REJECT_TCP_RST: |
| 34 | + nf_send_reset(pkt->skb, pkt->ops->hooknum); |
| 35 | + break; |
| 36 | + case NFT_REJECT_ICMPX_UNREACH: |
| 37 | + nf_send_unreach(pkt->skb, |
| 38 | + nft_reject_icmp_code(priv->icmp_code)); |
| 39 | + break; |
| 40 | + } |
| 41 | + break; |
25 | 42 | case htons(ETH_P_IPV6): |
26 | | - return nft_reject_ipv6_eval(expr, data, pkt); |
| 43 | + switch (priv->type) { |
| 44 | + case NFT_REJECT_ICMP_UNREACH: |
| 45 | + nf_send_unreach6(net, pkt->skb, priv->icmp_code, |
| 46 | + pkt->ops->hooknum); |
| 47 | + break; |
| 48 | + case NFT_REJECT_TCP_RST: |
| 49 | + nf_send_reset6(net, pkt->skb, pkt->ops->hooknum); |
| 50 | + break; |
| 51 | + case NFT_REJECT_ICMPX_UNREACH: |
| 52 | + nf_send_unreach6(net, pkt->skb, |
| 53 | + nft_reject_icmpv6_code(priv->icmp_code), |
| 54 | + pkt->ops->hooknum); |
| 55 | + break; |
| 56 | + } |
| 57 | + break; |
27 | 58 | default: |
28 | 59 | /* No explicit way to reject this protocol, drop it. */ |
29 | | - data[NFT_REG_VERDICT].verdict = NF_DROP; |
30 | 60 | break; |
31 | 61 | } |
| 62 | + data[NFT_REG_VERDICT].verdict = NF_DROP; |
| 63 | +} |
| 64 | + |
| 65 | +static int nft_reject_bridge_init(const struct nft_ctx *ctx, |
| 66 | + const struct nft_expr *expr, |
| 67 | + const struct nlattr * const tb[]) |
| 68 | +{ |
| 69 | + struct nft_reject *priv = nft_expr_priv(expr); |
| 70 | + int icmp_code; |
| 71 | + |
| 72 | + if (tb[NFTA_REJECT_TYPE] == NULL) |
| 73 | + return -EINVAL; |
| 74 | + |
| 75 | + priv->type = ntohl(nla_get_be32(tb[NFTA_REJECT_TYPE])); |
| 76 | + switch (priv->type) { |
| 77 | + case NFT_REJECT_ICMP_UNREACH: |
| 78 | + case NFT_REJECT_ICMPX_UNREACH: |
| 79 | + if (tb[NFTA_REJECT_ICMP_CODE] == NULL) |
| 80 | + return -EINVAL; |
| 81 | + |
| 82 | + icmp_code = nla_get_u8(tb[NFTA_REJECT_ICMP_CODE]); |
| 83 | + if (priv->type == NFT_REJECT_ICMPX_UNREACH && |
| 84 | + icmp_code > NFT_REJECT_ICMPX_MAX) |
| 85 | + return -EINVAL; |
| 86 | + |
| 87 | + priv->icmp_code = icmp_code; |
| 88 | + break; |
| 89 | + case NFT_REJECT_TCP_RST: |
| 90 | + break; |
| 91 | + default: |
| 92 | + return -EINVAL; |
| 93 | + } |
| 94 | + return 0; |
| 95 | +} |
| 96 | + |
| 97 | +static int nft_reject_bridge_dump(struct sk_buff *skb, |
| 98 | + const struct nft_expr *expr) |
| 99 | +{ |
| 100 | + const struct nft_reject *priv = nft_expr_priv(expr); |
| 101 | + |
| 102 | + if (nla_put_be32(skb, NFTA_REJECT_TYPE, htonl(priv->type))) |
| 103 | + goto nla_put_failure; |
| 104 | + |
| 105 | + switch (priv->type) { |
| 106 | + case NFT_REJECT_ICMP_UNREACH: |
| 107 | + case NFT_REJECT_ICMPX_UNREACH: |
| 108 | + if (nla_put_u8(skb, NFTA_REJECT_ICMP_CODE, priv->icmp_code)) |
| 109 | + goto nla_put_failure; |
| 110 | + break; |
| 111 | + } |
| 112 | + |
| 113 | + return 0; |
| 114 | + |
| 115 | +nla_put_failure: |
| 116 | + return -1; |
32 | 117 | } |
33 | 118 |
|
34 | 119 | static struct nft_expr_type nft_reject_bridge_type; |
35 | 120 | static const struct nft_expr_ops nft_reject_bridge_ops = { |
36 | 121 | .type = &nft_reject_bridge_type, |
37 | 122 | .size = NFT_EXPR_SIZE(sizeof(struct nft_reject)), |
38 | 123 | .eval = nft_reject_bridge_eval, |
39 | | - .init = nft_reject_init, |
40 | | - .dump = nft_reject_dump, |
| 124 | + .init = nft_reject_bridge_init, |
| 125 | + .dump = nft_reject_bridge_dump, |
41 | 126 | }; |
42 | 127 |
|
43 | 128 | static struct nft_expr_type nft_reject_bridge_type __read_mostly = { |
|
0 commit comments