Blame view
net/netfilter/xt_CHECKSUM.c
2.18 KB
d2912cb15 treewide: Replace... |
1 |
// SPDX-License-Identifier: GPL-2.0-only |
edf0e1fb0 netfilter: add CH... |
2 3 4 5 6 7 |
/* iptables module for the packet checksum mangling * * (C) 2002 by Harald Welte <laforge@netfilter.org> * (C) 2010 Red Hat, Inc. * * Author: Michael S. Tsirkin <mst@redhat.com> |
edf0e1fb0 netfilter: add CH... |
8 9 10 11 12 13 14 |
*/ #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt #include <linux/module.h> #include <linux/skbuff.h> #include <linux/netfilter/x_tables.h> #include <linux/netfilter/xt_CHECKSUM.h> |
10568f6c5 netfilter: xt_che... |
15 16 |
#include <linux/netfilter_ipv4/ip_tables.h> #include <linux/netfilter_ipv6/ip6_tables.h> |
edf0e1fb0 netfilter: add CH... |
17 18 19 20 21 22 23 24 25 |
MODULE_LICENSE("GPL"); MODULE_AUTHOR("Michael S. Tsirkin <mst@redhat.com>"); MODULE_DESCRIPTION("Xtables: checksum modification"); MODULE_ALIAS("ipt_CHECKSUM"); MODULE_ALIAS("ip6t_CHECKSUM"); static unsigned int checksum_tg(struct sk_buff *skb, const struct xt_action_param *par) { |
10568f6c5 netfilter: xt_che... |
26 |
if (skb->ip_summed == CHECKSUM_PARTIAL && !skb_is_gso(skb)) |
edf0e1fb0 netfilter: add CH... |
27 28 29 30 31 32 33 34 |
skb_checksum_help(skb); return XT_CONTINUE; } static int checksum_tg_check(const struct xt_tgchk_param *par) { const struct xt_CHECKSUM_info *einfo = par->targinfo; |
10568f6c5 netfilter: xt_che... |
35 36 |
const struct ip6t_ip6 *i6 = par->entryinfo; const struct ipt_ip *i4 = par->entryinfo; |
edf0e1fb0 netfilter: add CH... |
37 38 |
if (einfo->operation & ~XT_CHECKSUM_OP_FILL) { |
b26066447 netfilter: x_tabl... |
39 40 41 |
pr_info_ratelimited("unsupported CHECKSUM operation %x ", einfo->operation); |
edf0e1fb0 netfilter: add CH... |
42 43 |
return -EINVAL; } |
0cc9501f9 netfilter: x_tabl... |
44 |
if (!einfo->operation) |
edf0e1fb0 netfilter: add CH... |
45 |
return -EINVAL; |
0cc9501f9 netfilter: x_tabl... |
46 |
|
10568f6c5 netfilter: xt_che... |
47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 |
switch (par->family) { case NFPROTO_IPV4: if (i4->proto == IPPROTO_UDP && (i4->invflags & XT_INV_PROTO) == 0) return 0; break; case NFPROTO_IPV6: if ((i6->flags & IP6T_F_PROTO) && i6->proto == IPPROTO_UDP && (i6->invflags & XT_INV_PROTO) == 0) return 0; break; } pr_warn_once("CHECKSUM should be avoided. If really needed, restrict with \"-p udp\" and only use in OUTPUT "); |
edf0e1fb0 netfilter: add CH... |
63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 |
return 0; } static struct xt_target checksum_tg_reg __read_mostly = { .name = "CHECKSUM", .family = NFPROTO_UNSPEC, .target = checksum_tg, .targetsize = sizeof(struct xt_CHECKSUM_info), .table = "mangle", .checkentry = checksum_tg_check, .me = THIS_MODULE, }; static int __init checksum_tg_init(void) { return xt_register_target(&checksum_tg_reg); } static void __exit checksum_tg_exit(void) { xt_unregister_target(&checksum_tg_reg); } module_init(checksum_tg_init); module_exit(checksum_tg_exit); |