xt_NETMAP.c 4.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173
  1. /*
  2. * (C) 2000-2001 Svenning Soerensen <svenning@post5.tele.dk>
  3. * Copyright (c) 2011 Patrick McHardy <kaber@trash.net>
  4. *
  5. * This program is free software; you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License version 2 as
  7. * published by the Free Software Foundation.
  8. */
  9. #include <linux/ip.h>
  10. #include <linux/kernel.h>
  11. #include <linux/module.h>
  12. #include <linux/netdevice.h>
  13. #include <linux/ipv6.h>
  14. #include <linux/netfilter.h>
  15. #include <linux/netfilter_ipv4.h>
  16. #include <linux/netfilter_ipv6.h>
  17. #include <linux/netfilter/x_tables.h>
  18. #include <net/netfilter/nf_nat.h>
  19. static unsigned int
  20. netmap_tg6(struct sk_buff *skb, const struct xt_action_param *par)
  21. {
  22. const struct nf_nat_range2 *range = par->targinfo;
  23. struct nf_nat_range2 newrange;
  24. struct nf_conn *ct;
  25. enum ip_conntrack_info ctinfo;
  26. union nf_inet_addr new_addr, netmask;
  27. unsigned int i;
  28. ct = nf_ct_get(skb, &ctinfo);
  29. for (i = 0; i < ARRAY_SIZE(range->min_addr.ip6); i++)
  30. netmask.ip6[i] = ~(range->min_addr.ip6[i] ^
  31. range->max_addr.ip6[i]);
  32. if (xt_hooknum(par) == NF_INET_PRE_ROUTING ||
  33. xt_hooknum(par) == NF_INET_LOCAL_OUT)
  34. new_addr.in6 = ipv6_hdr(skb)->daddr;
  35. else
  36. new_addr.in6 = ipv6_hdr(skb)->saddr;
  37. for (i = 0; i < ARRAY_SIZE(new_addr.ip6); i++) {
  38. new_addr.ip6[i] &= ~netmask.ip6[i];
  39. new_addr.ip6[i] |= range->min_addr.ip6[i] &
  40. netmask.ip6[i];
  41. }
  42. newrange.flags = range->flags | NF_NAT_RANGE_MAP_IPS;
  43. newrange.min_addr = new_addr;
  44. newrange.max_addr = new_addr;
  45. newrange.min_proto = range->min_proto;
  46. newrange.max_proto = range->max_proto;
  47. return nf_nat_setup_info(ct, &newrange, HOOK2MANIP(xt_hooknum(par)));
  48. }
  49. static int netmap_tg6_checkentry(const struct xt_tgchk_param *par)
  50. {
  51. const struct nf_nat_range2 *range = par->targinfo;
  52. if (!(range->flags & NF_NAT_RANGE_MAP_IPS))
  53. return -EINVAL;
  54. return nf_ct_netns_get(par->net, par->family);
  55. }
  56. static void netmap_tg_destroy(const struct xt_tgdtor_param *par)
  57. {
  58. nf_ct_netns_put(par->net, par->family);
  59. }
  60. static unsigned int
  61. netmap_tg4(struct sk_buff *skb, const struct xt_action_param *par)
  62. {
  63. struct nf_conn *ct;
  64. enum ip_conntrack_info ctinfo;
  65. __be32 new_ip, netmask;
  66. const struct nf_nat_ipv4_multi_range_compat *mr = par->targinfo;
  67. struct nf_nat_range2 newrange;
  68. WARN_ON(xt_hooknum(par) != NF_INET_PRE_ROUTING &&
  69. xt_hooknum(par) != NF_INET_POST_ROUTING &&
  70. xt_hooknum(par) != NF_INET_LOCAL_OUT &&
  71. xt_hooknum(par) != NF_INET_LOCAL_IN);
  72. ct = nf_ct_get(skb, &ctinfo);
  73. netmask = ~(mr->range[0].min_ip ^ mr->range[0].max_ip);
  74. if (xt_hooknum(par) == NF_INET_PRE_ROUTING ||
  75. xt_hooknum(par) == NF_INET_LOCAL_OUT)
  76. new_ip = ip_hdr(skb)->daddr & ~netmask;
  77. else
  78. new_ip = ip_hdr(skb)->saddr & ~netmask;
  79. new_ip |= mr->range[0].min_ip & netmask;
  80. memset(&newrange.min_addr, 0, sizeof(newrange.min_addr));
  81. memset(&newrange.max_addr, 0, sizeof(newrange.max_addr));
  82. newrange.flags = mr->range[0].flags | NF_NAT_RANGE_MAP_IPS;
  83. newrange.min_addr.ip = new_ip;
  84. newrange.max_addr.ip = new_ip;
  85. newrange.min_proto = mr->range[0].min;
  86. newrange.max_proto = mr->range[0].max;
  87. /* Hand modified range to generic setup. */
  88. return nf_nat_setup_info(ct, &newrange, HOOK2MANIP(xt_hooknum(par)));
  89. }
  90. static int netmap_tg4_check(const struct xt_tgchk_param *par)
  91. {
  92. const struct nf_nat_ipv4_multi_range_compat *mr = par->targinfo;
  93. if (!(mr->range[0].flags & NF_NAT_RANGE_MAP_IPS)) {
  94. pr_debug("bad MAP_IPS.\n");
  95. return -EINVAL;
  96. }
  97. if (mr->rangesize != 1) {
  98. pr_debug("bad rangesize %u.\n", mr->rangesize);
  99. return -EINVAL;
  100. }
  101. return nf_ct_netns_get(par->net, par->family);
  102. }
  103. static struct xt_target netmap_tg_reg[] __read_mostly = {
  104. {
  105. .name = "NETMAP",
  106. .family = NFPROTO_IPV6,
  107. .revision = 0,
  108. .target = netmap_tg6,
  109. .targetsize = sizeof(struct nf_nat_range),
  110. .table = "nat",
  111. .hooks = (1 << NF_INET_PRE_ROUTING) |
  112. (1 << NF_INET_POST_ROUTING) |
  113. (1 << NF_INET_LOCAL_OUT) |
  114. (1 << NF_INET_LOCAL_IN),
  115. .checkentry = netmap_tg6_checkentry,
  116. .destroy = netmap_tg_destroy,
  117. .me = THIS_MODULE,
  118. },
  119. {
  120. .name = "NETMAP",
  121. .family = NFPROTO_IPV4,
  122. .revision = 0,
  123. .target = netmap_tg4,
  124. .targetsize = sizeof(struct nf_nat_ipv4_multi_range_compat),
  125. .table = "nat",
  126. .hooks = (1 << NF_INET_PRE_ROUTING) |
  127. (1 << NF_INET_POST_ROUTING) |
  128. (1 << NF_INET_LOCAL_OUT) |
  129. (1 << NF_INET_LOCAL_IN),
  130. .checkentry = netmap_tg4_check,
  131. .destroy = netmap_tg_destroy,
  132. .me = THIS_MODULE,
  133. },
  134. };
  135. static int __init netmap_tg_init(void)
  136. {
  137. return xt_register_targets(netmap_tg_reg, ARRAY_SIZE(netmap_tg_reg));
  138. }
  139. static void netmap_tg_exit(void)
  140. {
  141. xt_unregister_targets(netmap_tg_reg, ARRAY_SIZE(netmap_tg_reg));
  142. }
  143. module_init(netmap_tg_init);
  144. module_exit(netmap_tg_exit);
  145. MODULE_LICENSE("GPL");
  146. MODULE_DESCRIPTION("Xtables: 1:1 NAT mapping of subnets");
  147. MODULE_AUTHOR("Patrick McHardy <kaber@trash.net>");
  148. MODULE_ALIAS("ip6t_NETMAP");
  149. MODULE_ALIAS("ipt_NETMAP");