// SPDX-License-Identifier: GPL-2.0-only
|
/*
|
* (C) 2000-2001 Svenning Soerensen <svenning@post5.tele.dk>
|
* Copyright (c) 2011 Patrick McHardy <kaber@trash.net>
|
*/
|
|
#include <linux/ip.h>
|
#include <linux/kernel.h>
|
#include <linux/module.h>
|
#include <linux/netdevice.h>
|
#include <linux/ipv6.h>
|
#include <linux/netfilter.h>
|
#include <linux/netfilter_ipv4.h>
|
#include <linux/netfilter_ipv6.h>
|
#include <linux/netfilter/x_tables.h>
|
#include <net/netfilter/nf_nat.h>
|
|
static unsigned int
|
netmap_tg6(struct sk_buff *skb, const struct xt_action_param *par)
|
{
|
const struct nf_nat_range2 *range = par->targinfo;
|
struct nf_nat_range2 newrange;
|
struct nf_conn *ct;
|
enum ip_conntrack_info ctinfo;
|
union nf_inet_addr new_addr, netmask;
|
unsigned int i;
|
|
ct = nf_ct_get(skb, &ctinfo);
|
for (i = 0; i < ARRAY_SIZE(range->min_addr.ip6); i++)
|
netmask.ip6[i] = ~(range->min_addr.ip6[i] ^
|
range->max_addr.ip6[i]);
|
|
if (xt_hooknum(par) == NF_INET_PRE_ROUTING ||
|
xt_hooknum(par) == NF_INET_LOCAL_OUT)
|
new_addr.in6 = ipv6_hdr(skb)->daddr;
|
else
|
new_addr.in6 = ipv6_hdr(skb)->saddr;
|
|
for (i = 0; i < ARRAY_SIZE(new_addr.ip6); i++) {
|
new_addr.ip6[i] &= ~netmask.ip6[i];
|
new_addr.ip6[i] |= range->min_addr.ip6[i] &
|
netmask.ip6[i];
|
}
|
|
newrange.flags = range->flags | NF_NAT_RANGE_MAP_IPS;
|
newrange.min_addr = new_addr;
|
newrange.max_addr = new_addr;
|
newrange.min_proto = range->min_proto;
|
newrange.max_proto = range->max_proto;
|
|
return nf_nat_setup_info(ct, &newrange, HOOK2MANIP(xt_hooknum(par)));
|
}
|
|
static int netmap_tg6_checkentry(const struct xt_tgchk_param *par)
|
{
|
const struct nf_nat_range2 *range = par->targinfo;
|
|
if (!(range->flags & NF_NAT_RANGE_MAP_IPS))
|
return -EINVAL;
|
return nf_ct_netns_get(par->net, par->family);
|
}
|
|
static void netmap_tg_destroy(const struct xt_tgdtor_param *par)
|
{
|
nf_ct_netns_put(par->net, par->family);
|
}
|
|
static unsigned int
|
netmap_tg4(struct sk_buff *skb, const struct xt_action_param *par)
|
{
|
struct nf_conn *ct;
|
enum ip_conntrack_info ctinfo;
|
__be32 new_ip, netmask;
|
const struct nf_nat_ipv4_multi_range_compat *mr = par->targinfo;
|
struct nf_nat_range2 newrange;
|
|
WARN_ON(xt_hooknum(par) != NF_INET_PRE_ROUTING &&
|
xt_hooknum(par) != NF_INET_POST_ROUTING &&
|
xt_hooknum(par) != NF_INET_LOCAL_OUT &&
|
xt_hooknum(par) != NF_INET_LOCAL_IN);
|
ct = nf_ct_get(skb, &ctinfo);
|
|
netmask = ~(mr->range[0].min_ip ^ mr->range[0].max_ip);
|
|
if (xt_hooknum(par) == NF_INET_PRE_ROUTING ||
|
xt_hooknum(par) == NF_INET_LOCAL_OUT)
|
new_ip = ip_hdr(skb)->daddr & ~netmask;
|
else
|
new_ip = ip_hdr(skb)->saddr & ~netmask;
|
new_ip |= mr->range[0].min_ip & netmask;
|
|
memset(&newrange.min_addr, 0, sizeof(newrange.min_addr));
|
memset(&newrange.max_addr, 0, sizeof(newrange.max_addr));
|
newrange.flags = mr->range[0].flags | NF_NAT_RANGE_MAP_IPS;
|
newrange.min_addr.ip = new_ip;
|
newrange.max_addr.ip = new_ip;
|
newrange.min_proto = mr->range[0].min;
|
newrange.max_proto = mr->range[0].max;
|
|
/* Hand modified range to generic setup. */
|
return nf_nat_setup_info(ct, &newrange, HOOK2MANIP(xt_hooknum(par)));
|
}
|
|
static int netmap_tg4_check(const struct xt_tgchk_param *par)
|
{
|
const struct nf_nat_ipv4_multi_range_compat *mr = par->targinfo;
|
|
if (!(mr->range[0].flags & NF_NAT_RANGE_MAP_IPS)) {
|
pr_debug("bad MAP_IPS.\n");
|
return -EINVAL;
|
}
|
if (mr->rangesize != 1) {
|
pr_debug("bad rangesize %u.\n", mr->rangesize);
|
return -EINVAL;
|
}
|
return nf_ct_netns_get(par->net, par->family);
|
}
|
|
static struct xt_target netmap_tg_reg[] __read_mostly = {
|
{
|
.name = "NETMAP",
|
.family = NFPROTO_IPV6,
|
.revision = 0,
|
.target = netmap_tg6,
|
.targetsize = sizeof(struct nf_nat_range),
|
.table = "nat",
|
.hooks = (1 << NF_INET_PRE_ROUTING) |
|
(1 << NF_INET_POST_ROUTING) |
|
(1 << NF_INET_LOCAL_OUT) |
|
(1 << NF_INET_LOCAL_IN),
|
.checkentry = netmap_tg6_checkentry,
|
.destroy = netmap_tg_destroy,
|
.me = THIS_MODULE,
|
},
|
{
|
.name = "NETMAP",
|
.family = NFPROTO_IPV4,
|
.revision = 0,
|
.target = netmap_tg4,
|
.targetsize = sizeof(struct nf_nat_ipv4_multi_range_compat),
|
.table = "nat",
|
.hooks = (1 << NF_INET_PRE_ROUTING) |
|
(1 << NF_INET_POST_ROUTING) |
|
(1 << NF_INET_LOCAL_OUT) |
|
(1 << NF_INET_LOCAL_IN),
|
.checkentry = netmap_tg4_check,
|
.destroy = netmap_tg_destroy,
|
.me = THIS_MODULE,
|
},
|
};
|
|
static int __init netmap_tg_init(void)
|
{
|
return xt_register_targets(netmap_tg_reg, ARRAY_SIZE(netmap_tg_reg));
|
}
|
|
static void netmap_tg_exit(void)
|
{
|
xt_unregister_targets(netmap_tg_reg, ARRAY_SIZE(netmap_tg_reg));
|
}
|
|
module_init(netmap_tg_init);
|
module_exit(netmap_tg_exit);
|
|
MODULE_LICENSE("GPL");
|
MODULE_DESCRIPTION("Xtables: 1:1 NAT mapping of subnets");
|
MODULE_AUTHOR("Patrick McHardy <kaber@trash.net>");
|
MODULE_ALIAS("ip6t_NETMAP");
|
MODULE_ALIAS("ipt_NETMAP");
|