[ Upstream commit c6dd1aa2cbb72b33e0569f3e71d95792beab5042 ]
The icmp_ndo_send function was originally introduced to ensure proper
rate limiting when icmp_send is called by a network device driver,
where the packet's source address may have already been transformed
by SNAT.
However, the original implementation only considers the
IP_CT_DIR_ORIGINAL direction for SNAT and always replaced the packet's
source address with that of the original-direction tuple. This causes
two problems:
1. For SNAT:
Reply-direction packets were incorrectly translated using the source
address of the CT original direction, even though no translation is
required.
2. For DNAT:
Reply-direction packets were not handled at all. In DNAT, the original
direction's destination is translated. Therefore, in the reply
direction the source address must be set to the reply-direction
source, so rate limiting works as intended.
Fix this by using the connection direction to select the correct tuple
for source address translation, and adjust the pre-checks to handle
reply-direction packets in case of DNAT.
Additionally, wrap the `ct->status` access in READ_ONCE(). This avoids
possible KCSAN reports about concurrent updates to `ct->status`.
Fixes: 0b41713b60 ("icmp: introduce helper for nat'd source address in network device context")
Signed-off-by: Fabian Bläse <fabian@blaese.de>
Cc: Jason A. Donenfeld <Jason@zx2c4.com>
Reviewed-by: Florian Westphal <fw@strlen.de>
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
87 lines
2.1 KiB
C
87 lines
2.1 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
#include <linux/export.h>
|
|
#include <linux/icmpv6.h>
|
|
#include <linux/mutex.h>
|
|
#include <linux/netdevice.h>
|
|
#include <linux/spinlock.h>
|
|
|
|
#include <net/ipv6.h>
|
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
|
|
|
#if !IS_BUILTIN(CONFIG_IPV6)
|
|
|
|
static ip6_icmp_send_t __rcu *ip6_icmp_send;
|
|
|
|
int inet6_register_icmp_sender(ip6_icmp_send_t *fn)
|
|
{
|
|
return (cmpxchg((ip6_icmp_send_t **)&ip6_icmp_send, NULL, fn) == NULL) ?
|
|
0 : -EBUSY;
|
|
}
|
|
EXPORT_SYMBOL(inet6_register_icmp_sender);
|
|
|
|
int inet6_unregister_icmp_sender(ip6_icmp_send_t *fn)
|
|
{
|
|
int ret;
|
|
|
|
ret = (cmpxchg((ip6_icmp_send_t **)&ip6_icmp_send, fn, NULL) == fn) ?
|
|
0 : -EINVAL;
|
|
|
|
synchronize_net();
|
|
|
|
return ret;
|
|
}
|
|
EXPORT_SYMBOL(inet6_unregister_icmp_sender);
|
|
|
|
void __icmpv6_send(struct sk_buff *skb, u8 type, u8 code, __u32 info,
|
|
const struct inet6_skb_parm *parm)
|
|
{
|
|
ip6_icmp_send_t *send;
|
|
|
|
rcu_read_lock();
|
|
send = rcu_dereference(ip6_icmp_send);
|
|
if (send)
|
|
send(skb, type, code, info, NULL, parm);
|
|
rcu_read_unlock();
|
|
}
|
|
EXPORT_SYMBOL(__icmpv6_send);
|
|
#endif
|
|
|
|
#if IS_ENABLED(CONFIG_NF_NAT)
|
|
#include <net/netfilter/nf_conntrack.h>
|
|
void icmpv6_ndo_send(struct sk_buff *skb_in, u8 type, u8 code, __u32 info)
|
|
{
|
|
struct inet6_skb_parm parm = { 0 };
|
|
struct sk_buff *cloned_skb = NULL;
|
|
enum ip_conntrack_info ctinfo;
|
|
enum ip_conntrack_dir dir;
|
|
struct in6_addr orig_ip;
|
|
struct nf_conn *ct;
|
|
|
|
ct = nf_ct_get(skb_in, &ctinfo);
|
|
if (!ct || !(READ_ONCE(ct->status) & IPS_NAT_MASK)) {
|
|
__icmpv6_send(skb_in, type, code, info, &parm);
|
|
return;
|
|
}
|
|
|
|
if (skb_shared(skb_in))
|
|
skb_in = cloned_skb = skb_clone(skb_in, GFP_ATOMIC);
|
|
|
|
if (unlikely(!skb_in || skb_network_header(skb_in) < skb_in->head ||
|
|
(skb_network_header(skb_in) + sizeof(struct ipv6hdr)) >
|
|
skb_tail_pointer(skb_in) || skb_ensure_writable(skb_in,
|
|
skb_network_offset(skb_in) + sizeof(struct ipv6hdr))))
|
|
goto out;
|
|
|
|
orig_ip = ipv6_hdr(skb_in)->saddr;
|
|
dir = CTINFO2DIR(ctinfo);
|
|
ipv6_hdr(skb_in)->saddr = ct->tuplehash[dir].tuple.src.u3.in6;
|
|
__icmpv6_send(skb_in, type, code, info, &parm);
|
|
ipv6_hdr(skb_in)->saddr = orig_ip;
|
|
out:
|
|
consume_skb(cloned_skb);
|
|
}
|
|
EXPORT_SYMBOL(icmpv6_ndo_send);
|
|
#endif
|
|
#endif
|