Blame view
net/netfilter/xt_HL.c
3.38 KB
d2912cb15 treewide: Replace... |
1 |
// SPDX-License-Identifier: GPL-2.0-only |
563d36eb3 netfilter: Combin... |
2 3 4 5 6 7 |
/* * TTL modification target for IP tables * (C) 2000,2005 by Harald Welte <laforge@netfilter.org> * * Hop Limit modification target for ip6tables * Maciej Soltysiak <solt@dns.toxicfilms.tv> |
563d36eb3 netfilter: Combin... |
8 |
*/ |
8bee4bad0 netfilter: xt ext... |
9 |
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt |
563d36eb3 netfilter: Combin... |
10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 |
#include <linux/module.h> #include <linux/skbuff.h> #include <linux/ip.h> #include <linux/ipv6.h> #include <net/checksum.h> #include <linux/netfilter/x_tables.h> #include <linux/netfilter_ipv4/ipt_TTL.h> #include <linux/netfilter_ipv6/ip6t_HL.h> MODULE_AUTHOR("Harald Welte <laforge@netfilter.org>"); MODULE_AUTHOR("Maciej Soltysiak <solt@dns.toxicfilms.tv>"); MODULE_DESCRIPTION("Xtables: Hoplimit/TTL Limit field modification target"); MODULE_LICENSE("GPL"); static unsigned int |
4b560b447 netfilter: xtable... |
26 |
ttl_tg(struct sk_buff *skb, const struct xt_action_param *par) |
563d36eb3 netfilter: Combin... |
27 28 29 30 |
{ struct iphdr *iph; const struct ipt_TTL_info *info = par->targinfo; int new_ttl; |
8e03707f1 netfilter: xt_HL:... |
31 |
if (skb_ensure_writable(skb, sizeof(*iph))) |
563d36eb3 netfilter: Combin... |
32 33 34 35 36 |
return NF_DROP; iph = ip_hdr(skb); switch (info->mode) { |
181b1e9ce netfilter: Reduce... |
37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 |
case IPT_TTL_SET: new_ttl = info->ttl; break; case IPT_TTL_INC: new_ttl = iph->ttl + info->ttl; if (new_ttl > 255) new_ttl = 255; break; case IPT_TTL_DEC: new_ttl = iph->ttl - info->ttl; if (new_ttl < 0) new_ttl = 0; break; default: new_ttl = iph->ttl; break; |
563d36eb3 netfilter: Combin... |
53 54 55 56 57 58 59 60 61 62 63 64 |
} if (new_ttl != iph->ttl) { csum_replace2(&iph->check, htons(iph->ttl << 8), htons(new_ttl << 8)); iph->ttl = new_ttl; } return XT_CONTINUE; } static unsigned int |
4b560b447 netfilter: xtable... |
65 |
hl_tg6(struct sk_buff *skb, const struct xt_action_param *par) |
563d36eb3 netfilter: Combin... |
66 67 68 69 |
{ struct ipv6hdr *ip6h; const struct ip6t_HL_info *info = par->targinfo; int new_hl; |
8e03707f1 netfilter: xt_HL:... |
70 |
if (skb_ensure_writable(skb, sizeof(*ip6h))) |
563d36eb3 netfilter: Combin... |
71 72 73 74 75 |
return NF_DROP; ip6h = ipv6_hdr(skb); switch (info->mode) { |
181b1e9ce netfilter: Reduce... |
76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 |
case IP6T_HL_SET: new_hl = info->hop_limit; break; case IP6T_HL_INC: new_hl = ip6h->hop_limit + info->hop_limit; if (new_hl > 255) new_hl = 255; break; case IP6T_HL_DEC: new_hl = ip6h->hop_limit - info->hop_limit; if (new_hl < 0) new_hl = 0; break; default: new_hl = ip6h->hop_limit; break; |
563d36eb3 netfilter: Combin... |
92 93 94 95 96 97 |
} ip6h->hop_limit = new_hl; return XT_CONTINUE; } |
135367b8f netfilter: xtable... |
98 |
static int ttl_tg_check(const struct xt_tgchk_param *par) |
563d36eb3 netfilter: Combin... |
99 100 |
{ const struct ipt_TTL_info *info = par->targinfo; |
0cc9501f9 netfilter: x_tabl... |
101 |
if (info->mode > IPT_TTL_MAXMODE) |
4a5a5c73b netfilter: xtable... |
102 |
return -EINVAL; |
563d36eb3 netfilter: Combin... |
103 |
if (info->mode != IPT_TTL_SET && info->ttl == 0) |
d6b00a534 netfilter: xtable... |
104 105 |
return -EINVAL; return 0; |
563d36eb3 netfilter: Combin... |
106 |
} |
135367b8f netfilter: xtable... |
107 |
static int hl_tg6_check(const struct xt_tgchk_param *par) |
563d36eb3 netfilter: Combin... |
108 109 |
{ const struct ip6t_HL_info *info = par->targinfo; |
0cc9501f9 netfilter: x_tabl... |
110 |
if (info->mode > IP6T_HL_MAXMODE) |
d6b00a534 netfilter: xtable... |
111 |
return -EINVAL; |
0cc9501f9 netfilter: x_tabl... |
112 |
if (info->mode != IP6T_HL_SET && info->hop_limit == 0) |
d6b00a534 netfilter: xtable... |
113 |
return -EINVAL; |
d6b00a534 netfilter: xtable... |
114 |
return 0; |
563d36eb3 netfilter: Combin... |
115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 |
} static struct xt_target hl_tg_reg[] __read_mostly = { { .name = "TTL", .revision = 0, .family = NFPROTO_IPV4, .target = ttl_tg, .targetsize = sizeof(struct ipt_TTL_info), .table = "mangle", .checkentry = ttl_tg_check, .me = THIS_MODULE, }, { .name = "HL", .revision = 0, .family = NFPROTO_IPV6, .target = hl_tg6, .targetsize = sizeof(struct ip6t_HL_info), .table = "mangle", .checkentry = hl_tg6_check, .me = THIS_MODULE, }, }; static int __init hl_tg_init(void) { return xt_register_targets(hl_tg_reg, ARRAY_SIZE(hl_tg_reg)); } static void __exit hl_tg_exit(void) { xt_unregister_targets(hl_tg_reg, ARRAY_SIZE(hl_tg_reg)); } module_init(hl_tg_init); module_exit(hl_tg_exit); MODULE_ALIAS("ipt_TTL"); MODULE_ALIAS("ip6t_HL"); |