1 // SPDX-License-Identifier: GPL-2.0-only
2 /* module that allows mangling of the arp payload */
3 #include <linux/module.h>
4 #include <linux/netfilter.h>
5 #include <linux/netfilter_arp/arpt_mangle.h>
10 MODULE_DESCRIPTION("arptables arp payload mangle target");
13 target(struct sk_buff *skb, const struct xt_action_param *par)
15 const struct arpt_mangle *mangle = par->targinfo;
16 const struct arphdr *arp;
17 unsigned char *arpptr;
20 if (skb_ensure_writable(skb, skb->len))
24 arpptr = skb_network_header(skb) + sizeof(*arp);
27 /* We assume that pln and hln were checked in the match */
28 if (mangle->flags & ARPT_MANGLE_SDEV) {
29 if (ARPT_DEV_ADDR_LEN_MAX < hln ||
30 (arpptr + hln > skb_tail_pointer(skb)))
32 memcpy(arpptr, mangle->src_devaddr, hln);
35 if (mangle->flags & ARPT_MANGLE_SIP) {
36 if (ARPT_MANGLE_ADDR_LEN_MAX < pln ||
37 (arpptr + pln > skb_tail_pointer(skb)))
39 memcpy(arpptr, &mangle->u_s.src_ip, pln);
42 if (mangle->flags & ARPT_MANGLE_TDEV) {
43 if (ARPT_DEV_ADDR_LEN_MAX < hln ||
44 (arpptr + hln > skb_tail_pointer(skb)))
46 memcpy(arpptr, mangle->tgt_devaddr, hln);
49 if (mangle->flags & ARPT_MANGLE_TIP) {
50 if (ARPT_MANGLE_ADDR_LEN_MAX < pln ||
51 (arpptr + pln > skb_tail_pointer(skb)))
53 memcpy(arpptr, &mangle->u_t.tgt_ip, pln);
55 return mangle->target;
58 static int checkentry(const struct xt_tgchk_param *par)
60 const struct arpt_mangle *mangle = par->targinfo;
62 if (mangle->flags & ~ARPT_MANGLE_MASK ||
63 !(mangle->flags & ARPT_MANGLE_MASK))
66 if (mangle->target != NF_DROP && mangle->target != NF_ACCEPT &&
67 mangle->target != XT_CONTINUE)
72 static struct xt_target arpt_mangle_reg __read_mostly = {
74 .family = NFPROTO_ARP,
76 .targetsize = sizeof(struct arpt_mangle),
77 .checkentry = checkentry,
81 static int __init arpt_mangle_init(void)
83 return xt_register_target(&arpt_mangle_reg);
86 static void __exit arpt_mangle_fini(void)
88 xt_unregister_target(&arpt_mangle_reg);
91 module_init(arpt_mangle_init);
92 module_exit(arpt_mangle_fini);