1 #include <net/netfilter/nf_tproxy.h>
2 #include <linux/module.h>
3 #include <net/inet6_hashtables.h>
4 #include <net/addrconf.h>
8 const struct in6_addr *
9 nf_tproxy_laddr6(struct sk_buff *skb, const struct in6_addr *user_laddr,
10 const struct in6_addr *daddr)
12 struct inet6_dev *indev;
13 struct inet6_ifaddr *ifa;
14 struct in6_addr *laddr;
16 if (!ipv6_addr_any(user_laddr))
20 indev = __in6_dev_get(skb->dev);
22 read_lock_bh(&indev->lock);
23 list_for_each_entry(ifa, &indev->addr_list, if_list) {
24 if (ifa->flags & (IFA_F_TENTATIVE | IFA_F_DEPRECATED))
30 read_unlock_bh(&indev->lock);
33 return laddr ? laddr : daddr;
35 EXPORT_SYMBOL_GPL(nf_tproxy_laddr6);
38 nf_tproxy_handle_time_wait6(struct sk_buff *skb, int tproto, int thoff,
40 const struct in6_addr *laddr,
44 const struct ipv6hdr *iph = ipv6_hdr(skb);
45 struct tcphdr _hdr, *hp;
47 hp = skb_header_pointer(skb, thoff, sizeof(_hdr), &_hdr);
49 inet_twsk_put(inet_twsk(sk));
53 if (hp->syn && !hp->rst && !hp->ack && !hp->fin) {
54 /* SYN to a TIME_WAIT socket, we'd rather redirect it
55 * to a listener socket if there's one */
58 sk2 = nf_tproxy_get_sock_v6(net, skb, thoff, tproto,
60 nf_tproxy_laddr6(skb, laddr, &iph->daddr),
62 lport ? lport : hp->dest,
63 skb->dev, NF_TPROXY_LOOKUP_LISTENER);
65 inet_twsk_deschedule_put(inet_twsk(sk));
72 EXPORT_SYMBOL_GPL(nf_tproxy_handle_time_wait6);
75 nf_tproxy_get_sock_v6(struct net *net, struct sk_buff *skb, int thoff,
77 const struct in6_addr *saddr, const struct in6_addr *daddr,
78 const __be16 sport, const __be16 dport,
79 const struct net_device *in,
80 const enum nf_tproxy_lookup_t lookup_type)
86 struct tcphdr _hdr, *hp;
88 hp = skb_header_pointer(skb, thoff,
89 sizeof(struct tcphdr), &_hdr);
93 switch (lookup_type) {
94 case NF_TPROXY_LOOKUP_LISTENER:
95 sk = inet6_lookup_listener(net, &tcp_hashinfo, skb,
96 thoff + __tcp_hdrlen(hp),
101 if (sk && !refcount_inc_not_zero(&sk->sk_refcnt))
103 /* NOTE: we return listeners even if bound to
104 * 0.0.0.0, those are filtered out in
105 * xt_socket, since xt_TPROXY needs 0 bound
109 case NF_TPROXY_LOOKUP_ESTABLISHED:
110 sk = __inet6_lookup_established(net, &tcp_hashinfo,
111 saddr, sport, daddr, ntohs(dport),
120 sk = udp6_lib_lookup(net, saddr, sport, daddr, dport,
123 int connected = (sk->sk_state == TCP_ESTABLISHED);
124 int wildcard = ipv6_addr_any(&sk->sk_v6_rcv_saddr);
126 /* NOTE: we return listeners even if bound to
127 * 0.0.0.0, those are filtered out in
128 * xt_socket, since xt_TPROXY needs 0 bound
131 if ((lookup_type == NF_TPROXY_LOOKUP_ESTABLISHED && (!connected || wildcard)) ||
132 (lookup_type == NF_TPROXY_LOOKUP_LISTENER && connected)) {
143 pr_debug("tproxy socket lookup: proto %u %pI6:%u -> %pI6:%u, lookup type: %d, sock %p\n",
144 protocol, saddr, ntohs(sport), daddr, ntohs(dport), lookup_type, sk);
148 EXPORT_SYMBOL_GPL(nf_tproxy_get_sock_v6);
150 MODULE_LICENSE("GPL");
151 MODULE_AUTHOR("Balazs Scheidler, Krisztian Kovacs");
152 MODULE_DESCRIPTION("Netfilter IPv4 transparent proxy support");