Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /* |
2 | * IPv6 packet mangling table, a port of the IPv4 mangle table to IPv6 | |
3 | * | |
4 | * Copyright (C) 2000-2001 by Harald Welte <laforge@gnumonks.org> | |
5 | * Copyright (C) 2000-2004 Netfilter Core Team <coreteam@netfilter.org> | |
6 | * | |
7 | * This program is free software; you can redistribute it and/or modify | |
8 | * it under the terms of the GNU General Public License version 2 as | |
9 | * published by the Free Software Foundation. | |
1da177e4 LT |
10 | */ |
11 | #include <linux/module.h> | |
12 | #include <linux/netfilter_ipv6/ip6_tables.h> | |
5a0e3ad6 | 13 | #include <linux/slab.h> |
d9e85655 | 14 | #include <net/ipv6.h> |
1da177e4 LT |
15 | |
16 | MODULE_LICENSE("GPL"); | |
17 | MODULE_AUTHOR("Netfilter Core Team <coreteam@netfilter.org>"); | |
18 | MODULE_DESCRIPTION("ip6tables mangle table"); | |
19 | ||
6e23ae2a PM |
20 | #define MANGLE_VALID_HOOKS ((1 << NF_INET_PRE_ROUTING) | \ |
21 | (1 << NF_INET_LOCAL_IN) | \ | |
22 | (1 << NF_INET_FORWARD) | \ | |
23 | (1 << NF_INET_LOCAL_OUT) | \ | |
24 | (1 << NF_INET_POST_ROUTING)) | |
1da177e4 | 25 | |
35aad0ff | 26 | static const struct xt_table packet_mangler = { |
1da177e4 LT |
27 | .name = "mangle", |
28 | .valid_hooks = MANGLE_VALID_HOOKS, | |
1da177e4 | 29 | .me = THIS_MODULE, |
f88e6a8a | 30 | .af = NFPROTO_IPV6, |
2b95efe7 | 31 | .priority = NF_IP6_PRI_MANGLE, |
1da177e4 LT |
32 | }; |
33 | ||
7dd1b8da | 34 | static unsigned int |
8f8a3715 | 35 | ip6t_mangle_out(struct sk_buff *skb, const struct nf_hook_state *state) |
1da177e4 | 36 | { |
1da177e4 LT |
37 | unsigned int ret; |
38 | struct in6_addr saddr, daddr; | |
39 | u_int8_t hop_limit; | |
82e91ffe | 40 | u_int32_t flowlabel, mark; |
58e35d14 | 41 | int err; |
1da177e4 LT |
42 | #if 0 |
43 | /* root is playing with raw sockets. */ | |
3666ed1c JP |
44 | if (skb->len < sizeof(struct iphdr) || |
45 | ip_hdrlen(skb) < sizeof(struct iphdr)) { | |
e87cc472 | 46 | net_warn_ratelimited("ip6t_hook: happy cracking\n"); |
1da177e4 LT |
47 | return NF_ACCEPT; |
48 | } | |
49 | #endif | |
50 | ||
82e91ffe | 51 | /* save source/dest address, mark, hoplimit, flowlabel, priority, */ |
3db05fea HX |
52 | memcpy(&saddr, &ipv6_hdr(skb)->saddr, sizeof(saddr)); |
53 | memcpy(&daddr, &ipv6_hdr(skb)->daddr, sizeof(daddr)); | |
54 | mark = skb->mark; | |
55 | hop_limit = ipv6_hdr(skb)->hop_limit; | |
1da177e4 LT |
56 | |
57 | /* flowlabel and prio (includes version, which shouldn't change either */ | |
3db05fea | 58 | flowlabel = *((u_int32_t *)ipv6_hdr(skb)); |
1da177e4 | 59 | |
6cb8ff3f | 60 | ret = ip6t_do_table(skb, state, state->net->ipv6.ip6table_mangle); |
1da177e4 | 61 | |
3666ed1c | 62 | if (ret != NF_DROP && ret != NF_STOLEN && |
d9e85655 YH |
63 | (!ipv6_addr_equal(&ipv6_hdr(skb)->saddr, &saddr) || |
64 | !ipv6_addr_equal(&ipv6_hdr(skb)->daddr, &daddr) || | |
3666ed1c | 65 | skb->mark != mark || |
b169f6db | 66 | ipv6_hdr(skb)->hop_limit != hop_limit || |
58e35d14 | 67 | flowlabel != *((u_int32_t *)ipv6_hdr(skb)))) { |
5f5d74d7 | 68 | err = ip6_route_me_harder(state->net, skb); |
58e35d14 PM |
69 | if (err < 0) |
70 | ret = NF_DROP_ERR(err); | |
71 | } | |
1da177e4 LT |
72 | |
73 | return ret; | |
74 | } | |
75 | ||
737535c5 JE |
76 | /* The work comes in here from netfilter.c. */ |
77 | static unsigned int | |
06198b34 | 78 | ip6table_mangle_hook(void *priv, struct sk_buff *skb, |
238e54c9 | 79 | const struct nf_hook_state *state) |
737535c5 | 80 | { |
6cb8ff3f | 81 | if (state->hook == NF_INET_LOCAL_OUT) |
8f8a3715 | 82 | return ip6t_mangle_out(skb, state); |
6cb8ff3f EB |
83 | if (state->hook == NF_INET_POST_ROUTING) |
84 | return ip6t_do_table(skb, state, | |
9dff2c96 | 85 | state->net->ipv6.ip6table_mangle); |
737535c5 | 86 | /* INPUT/FORWARD */ |
6cb8ff3f | 87 | return ip6t_do_table(skb, state, state->net->ipv6.ip6table_mangle); |
737535c5 JE |
88 | } |
89 | ||
2b95efe7 | 90 | static struct nf_hook_ops *mangle_ops __read_mostly; |
8280aa61 AD |
91 | static int __net_init ip6table_mangle_net_init(struct net *net) |
92 | { | |
e3eaa991 JE |
93 | struct ip6t_replace *repl; |
94 | ||
95 | repl = ip6t_alloc_initial_table(&packet_mangler); | |
96 | if (repl == NULL) | |
97 | return -ENOMEM; | |
8280aa61 | 98 | net->ipv6.ip6table_mangle = |
e3eaa991 JE |
99 | ip6t_register_table(net, &packet_mangler, repl); |
100 | kfree(repl); | |
8c6ffba0 | 101 | return PTR_ERR_OR_ZERO(net->ipv6.ip6table_mangle); |
8280aa61 AD |
102 | } |
103 | ||
104 | static void __net_exit ip6table_mangle_net_exit(struct net *net) | |
105 | { | |
f54e9367 | 106 | ip6t_unregister_table(net, net->ipv6.ip6table_mangle); |
8280aa61 AD |
107 | } |
108 | ||
109 | static struct pernet_operations ip6table_mangle_net_ops = { | |
110 | .init = ip6table_mangle_net_init, | |
111 | .exit = ip6table_mangle_net_exit, | |
112 | }; | |
113 | ||
65b4b4e8 | 114 | static int __init ip6table_mangle_init(void) |
1da177e4 LT |
115 | { |
116 | int ret; | |
117 | ||
8280aa61 AD |
118 | ret = register_pernet_subsys(&ip6table_mangle_net_ops); |
119 | if (ret < 0) | |
120 | return ret; | |
1da177e4 LT |
121 | |
122 | /* Register hooks */ | |
2b95efe7 JE |
123 | mangle_ops = xt_hook_link(&packet_mangler, ip6table_mangle_hook); |
124 | if (IS_ERR(mangle_ops)) { | |
125 | ret = PTR_ERR(mangle_ops); | |
1da177e4 | 126 | goto cleanup_table; |
2b95efe7 | 127 | } |
1da177e4 | 128 | |
1da177e4 LT |
129 | return ret; |
130 | ||
1da177e4 | 131 | cleanup_table: |
8280aa61 | 132 | unregister_pernet_subsys(&ip6table_mangle_net_ops); |
1da177e4 LT |
133 | return ret; |
134 | } | |
135 | ||
65b4b4e8 | 136 | static void __exit ip6table_mangle_fini(void) |
1da177e4 | 137 | { |
2b95efe7 | 138 | xt_hook_unlink(&packet_mangler, mangle_ops); |
8280aa61 | 139 | unregister_pernet_subsys(&ip6table_mangle_net_ops); |
1da177e4 LT |
140 | } |
141 | ||
65b4b4e8 AM |
142 | module_init(ip6table_mangle_init); |
143 | module_exit(ip6table_mangle_fini); |