blob: 4b05393faa68606bd0ca37c773e1d11d186c31d9 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/* Kernel module to match Hop-by-Hop and Destination parameters. */
2
3/* (C) 2001-2002 Andras Kis-Szabo <kisza@sch.bme.hu>
4 *
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License version 2 as
7 * published by the Free Software Foundation.
8 */
9
10#include <linux/module.h>
11#include <linux/skbuff.h>
12#include <linux/ipv6.h>
13#include <linux/types.h>
14#include <net/checksum.h>
15#include <net/ipv6.h>
16
17#include <asm/byteorder.h>
18
Jan Engelhardt6709dbb2007-02-07 15:11:19 -080019#include <linux/netfilter/x_tables.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070020#include <linux/netfilter_ipv6/ip6_tables.h>
21#include <linux/netfilter_ipv6/ip6t_opts.h>
22
Linus Torvalds1da177e2005-04-16 15:20:36 -070023MODULE_LICENSE("GPL");
Patrick McHardy5fa2a762006-08-22 00:43:55 -070024MODULE_DESCRIPTION("IPv6 opts match");
Linus Torvalds1da177e2005-04-16 15:20:36 -070025MODULE_AUTHOR("Andras Kis-Szabo <kisza@sch.bme.hu>");
Patrick McHardy5fa2a762006-08-22 00:43:55 -070026MODULE_ALIAS("ip6t_dst");
Linus Torvalds1da177e2005-04-16 15:20:36 -070027
28#if 0
29#define DEBUGP printk
30#else
31#define DEBUGP(format, args...)
32#endif
33
34/*
Yasuyuki Kozakaif0daaa62006-01-17 02:39:39 -080035 * (Type & 0xC0) >> 6
36 * 0 -> ignorable
37 * 1 -> must drop the packet
38 * 2 -> send ICMP PARM PROB regardless and drop packet
39 * 3 -> Send ICMP if not a multicast address and drop packet
Linus Torvalds1da177e2005-04-16 15:20:36 -070040 * (Type & 0x20) >> 5
Yasuyuki Kozakaif0daaa62006-01-17 02:39:39 -080041 * 0 -> invariant
42 * 1 -> can change the routing
Linus Torvalds1da177e2005-04-16 15:20:36 -070043 * (Type & 0x1F) Type
Yasuyuki Kozakaif0daaa62006-01-17 02:39:39 -080044 * 0 -> Pad1 (only 1 byte!)
45 * 1 -> PadN LENGTH info (total length = length + 2)
46 * C0 | 2 -> JUMBO 4 x x x x ( xxxx > 64k )
47 * 5 -> RTALERT 2 x x
Linus Torvalds1da177e2005-04-16 15:20:36 -070048 */
49
Jan Engelhardt1d93a9c2007-07-07 22:15:35 -070050static bool
Linus Torvalds1da177e2005-04-16 15:20:36 -070051match(const struct sk_buff *skb,
52 const struct net_device *in,
53 const struct net_device *out,
Patrick McHardyc4986732006-03-20 18:02:56 -080054 const struct xt_match *match,
Linus Torvalds1da177e2005-04-16 15:20:36 -070055 const void *matchinfo,
56 int offset,
57 unsigned int protoff,
Jan Engelhardtcff533a2007-07-07 22:15:12 -070058 bool *hotdrop)
Linus Torvalds1da177e2005-04-16 15:20:36 -070059{
Yasuyuki Kozakaif0daaa62006-01-17 02:39:39 -080060 struct ipv6_opt_hdr _optsh, *oh;
61 const struct ip6t_opts *optinfo = matchinfo;
62 unsigned int temp;
63 unsigned int ptr;
64 unsigned int hdrlen = 0;
Jan Engelhardt1d93a9c2007-07-07 22:15:35 -070065 bool ret = false;
Yasuyuki Kozakaif0daaa62006-01-17 02:39:39 -080066 u8 _opttype, *tp = NULL;
67 u8 _optlen, *lp = NULL;
68 unsigned int optlen;
Patrick McHardy6d381632006-10-24 16:15:10 -070069 int err;
Yasuyuki Kozakaif0daaa62006-01-17 02:39:39 -080070
Patrick McHardy6d381632006-10-24 16:15:10 -070071 err = ipv6_find_hdr(skb, &ptr, match->data, NULL);
72 if (err < 0) {
73 if (err != -ENOENT)
Jan Engelhardtcff533a2007-07-07 22:15:12 -070074 *hotdrop = true;
Jan Engelhardt1d93a9c2007-07-07 22:15:35 -070075 return false;
Patrick McHardy6d381632006-10-24 16:15:10 -070076 }
Linus Torvalds1da177e2005-04-16 15:20:36 -070077
Yasuyuki Kozakaif0daaa62006-01-17 02:39:39 -080078 oh = skb_header_pointer(skb, ptr, sizeof(_optsh), &_optsh);
79 if (oh == NULL) {
Jan Engelhardtcff533a2007-07-07 22:15:12 -070080 *hotdrop = true;
Jan Engelhardt1d93a9c2007-07-07 22:15:35 -070081 return false;
Yasuyuki Kozakaif0daaa62006-01-17 02:39:39 -080082 }
Linus Torvalds1da177e2005-04-16 15:20:36 -070083
Yasuyuki Kozakaif0daaa62006-01-17 02:39:39 -080084 hdrlen = ipv6_optlen(oh);
85 if (skb->len - ptr < hdrlen) {
86 /* Packet smaller than it's length field */
Jan Engelhardt1d93a9c2007-07-07 22:15:35 -070087 return false;
Yasuyuki Kozakaif0daaa62006-01-17 02:39:39 -080088 }
Linus Torvalds1da177e2005-04-16 15:20:36 -070089
Yasuyuki Kozakaif0daaa62006-01-17 02:39:39 -080090 DEBUGP("IPv6 OPTS LEN %u %u ", hdrlen, oh->hdrlen);
Linus Torvalds1da177e2005-04-16 15:20:36 -070091
Yasuyuki Kozakaif0daaa62006-01-17 02:39:39 -080092 DEBUGP("len %02X %04X %02X ",
93 optinfo->hdrlen, hdrlen,
94 (!(optinfo->flags & IP6T_OPTS_LEN) ||
95 ((optinfo->hdrlen == hdrlen) ^
96 !!(optinfo->invflags & IP6T_OPTS_INV_LEN))));
Linus Torvalds1da177e2005-04-16 15:20:36 -070097
Yasuyuki Kozakaif0daaa62006-01-17 02:39:39 -080098 ret = (oh != NULL) &&
99 (!(optinfo->flags & IP6T_OPTS_LEN) ||
100 ((optinfo->hdrlen == hdrlen) ^
101 !!(optinfo->invflags & IP6T_OPTS_INV_LEN)));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700102
Yasuyuki Kozakaif0daaa62006-01-17 02:39:39 -0800103 ptr += 2;
104 hdrlen -= 2;
105 if (!(optinfo->flags & IP6T_OPTS_OPTS)) {
106 return ret;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700107 } else if (optinfo->flags & IP6T_OPTS_NSTRICT) {
108 DEBUGP("Not strict - not implemented");
109 } else {
110 DEBUGP("Strict ");
Yasuyuki Kozakaif0daaa62006-01-17 02:39:39 -0800111 DEBUGP("#%d ", optinfo->optsnr);
112 for (temp = 0; temp < optinfo->optsnr; temp++) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700113 /* type field exists ? */
114 if (hdrlen < 1)
115 break;
116 tp = skb_header_pointer(skb, ptr, sizeof(_opttype),
117 &_opttype);
118 if (tp == NULL)
119 break;
120
121 /* Type check */
Yasuyuki Kozakaif0daaa62006-01-17 02:39:39 -0800122 if (*tp != (optinfo->opts[temp] & 0xFF00) >> 8) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700123 DEBUGP("Tbad %02X %02X\n",
124 *tp,
Yasuyuki Kozakaif0daaa62006-01-17 02:39:39 -0800125 (optinfo->opts[temp] & 0xFF00) >> 8);
Jan Engelhardt1d93a9c2007-07-07 22:15:35 -0700126 return false;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700127 } else {
128 DEBUGP("Tok ");
129 }
130 /* Length check */
131 if (*tp) {
132 u16 spec_len;
133
134 /* length field exists ? */
135 if (hdrlen < 2)
136 break;
137 lp = skb_header_pointer(skb, ptr + 1,
138 sizeof(_optlen),
139 &_optlen);
140 if (lp == NULL)
141 break;
142 spec_len = optinfo->opts[temp] & 0x00FF;
143
144 if (spec_len != 0x00FF && spec_len != *lp) {
145 DEBUGP("Lbad %02X %04X\n", *lp,
146 spec_len);
Jan Engelhardt1d93a9c2007-07-07 22:15:35 -0700147 return false;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700148 }
149 DEBUGP("Lok ");
150 optlen = *lp + 2;
151 } else {
152 DEBUGP("Pad1\n");
153 optlen = 1;
154 }
155
156 /* Step to the next */
157 DEBUGP("len%04X \n", optlen);
158
159 if ((ptr > skb->len - optlen || hdrlen < optlen) &&
160 (temp < optinfo->optsnr - 1)) {
161 DEBUGP("new pointer is too large! \n");
162 break;
163 }
164 ptr += optlen;
165 hdrlen -= optlen;
166 }
167 if (temp == optinfo->optsnr)
168 return ret;
Yasuyuki Kozakaif0daaa62006-01-17 02:39:39 -0800169 else
Jan Engelhardt1d93a9c2007-07-07 22:15:35 -0700170 return false;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700171 }
172
Jan Engelhardt1d93a9c2007-07-07 22:15:35 -0700173 return false;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700174}
175
176/* Called when user tries to insert an entry of this type. */
177static int
178checkentry(const char *tablename,
Yasuyuki Kozakaif0daaa62006-01-17 02:39:39 -0800179 const void *entry,
Patrick McHardyc4986732006-03-20 18:02:56 -0800180 const struct xt_match *match,
Yasuyuki Kozakaif0daaa62006-01-17 02:39:39 -0800181 void *matchinfo,
Yasuyuki Kozakaif0daaa62006-01-17 02:39:39 -0800182 unsigned int hook_mask)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700183{
Yasuyuki Kozakaif0daaa62006-01-17 02:39:39 -0800184 const struct ip6t_opts *optsinfo = matchinfo;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700185
Yasuyuki Kozakaif0daaa62006-01-17 02:39:39 -0800186 if (optsinfo->invflags & ~IP6T_OPTS_INV_MASK) {
187 DEBUGP("ip6t_opts: unknown flags %X\n", optsinfo->invflags);
188 return 0;
189 }
Yasuyuki Kozakaif0daaa62006-01-17 02:39:39 -0800190 return 1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700191}
192
Patrick McHardy5fa2a762006-08-22 00:43:55 -0700193static struct xt_match opts_match[] = {
194 {
195 .name = "hbh",
196 .family = AF_INET6,
197 .match = match,
198 .matchsize = sizeof(struct ip6t_opts),
199 .checkentry = checkentry,
200 .me = THIS_MODULE,
201 .data = NEXTHDR_HOP,
202 },
203 {
204 .name = "dst",
205 .family = AF_INET6,
206 .match = match,
207 .matchsize = sizeof(struct ip6t_opts),
208 .checkentry = checkentry,
209 .me = THIS_MODULE,
210 .data = NEXTHDR_DEST,
211 },
Linus Torvalds1da177e2005-04-16 15:20:36 -0700212};
213
Andrew Morton65b4b4e2006-03-28 16:37:06 -0800214static int __init ip6t_hbh_init(void)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700215{
Patrick McHardy5fa2a762006-08-22 00:43:55 -0700216 return xt_register_matches(opts_match, ARRAY_SIZE(opts_match));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700217}
218
Andrew Morton65b4b4e2006-03-28 16:37:06 -0800219static void __exit ip6t_hbh_fini(void)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700220{
Patrick McHardy5fa2a762006-08-22 00:43:55 -0700221 xt_unregister_matches(opts_match, ARRAY_SIZE(opts_match));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700222}
223
Andrew Morton65b4b4e2006-03-28 16:37:06 -0800224module_init(ip6t_hbh_init);
225module_exit(ip6t_hbh_fini);