Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /* |
2 | * ebt_stp | |
3 | * | |
4 | * Authors: | |
5 | * Bart De Schuymer <bdschuym@pandora.be> | |
6 | * Stephen Hemminger <shemminger@osdl.org> | |
7 | * | |
8 | * July, 2003 | |
9 | */ | |
82bf7e97 | 10 | #include <linux/etherdevice.h> |
1da177e4 | 11 | #include <linux/module.h> |
18219d3f JE |
12 | #include <linux/netfilter/x_tables.h> |
13 | #include <linux/netfilter_bridge/ebtables.h> | |
14 | #include <linux/netfilter_bridge/ebt_stp.h> | |
1da177e4 LT |
15 | |
16 | #define BPDU_TYPE_CONFIG 0 | |
17 | #define BPDU_TYPE_TCN 0x80 | |
18 | ||
19 | struct stp_header { | |
20 | uint8_t dsap; | |
21 | uint8_t ssap; | |
22 | uint8_t ctrl; | |
23 | uint8_t pid; | |
24 | uint8_t vers; | |
25 | uint8_t type; | |
26 | }; | |
27 | ||
28 | struct stp_config_pdu { | |
29 | uint8_t flags; | |
30 | uint8_t root[8]; | |
31 | uint8_t root_cost[4]; | |
32 | uint8_t sender[8]; | |
33 | uint8_t port[2]; | |
34 | uint8_t msg_age[2]; | |
35 | uint8_t max_age[2]; | |
36 | uint8_t hello_time[2]; | |
37 | uint8_t forward_delay[2]; | |
38 | }; | |
39 | ||
40 | #define NR16(p) (p[0] << 8 | p[1]) | |
41 | #define NR32(p) ((p[0] << 24) | (p[1] << 16) | (p[2] << 8) | p[3]) | |
42 | ||
8cc784ee | 43 | static bool ebt_filter_config(const struct ebt_stp_info *info, |
052a4bc4 | 44 | const struct stp_config_pdu *stpc) |
1da177e4 | 45 | { |
abfdf1c4 | 46 | const struct ebt_stp_config_info *c; |
1da177e4 LT |
47 | uint16_t v16; |
48 | uint32_t v32; | |
49 | int verdict, i; | |
50 | ||
51 | c = &info->config; | |
52 | if ((info->bitmask & EBT_STP_FLAGS) && | |
53 | FWINV(c->flags != stpc->flags, EBT_STP_FLAGS)) | |
8cc784ee | 54 | return false; |
1da177e4 LT |
55 | if (info->bitmask & EBT_STP_ROOTPRIO) { |
56 | v16 = NR16(stpc->root); | |
57 | if (FWINV(v16 < c->root_priol || | |
58 | v16 > c->root_priou, EBT_STP_ROOTPRIO)) | |
8cc784ee | 59 | return false; |
1da177e4 LT |
60 | } |
61 | if (info->bitmask & EBT_STP_ROOTADDR) { | |
62 | verdict = 0; | |
63 | for (i = 0; i < 6; i++) | |
64 | verdict |= (stpc->root[2+i] ^ c->root_addr[i]) & | |
9d6f229f | 65 | c->root_addrmsk[i]; |
1da177e4 | 66 | if (FWINV(verdict != 0, EBT_STP_ROOTADDR)) |
8cc784ee | 67 | return false; |
1da177e4 LT |
68 | } |
69 | if (info->bitmask & EBT_STP_ROOTCOST) { | |
70 | v32 = NR32(stpc->root_cost); | |
71 | if (FWINV(v32 < c->root_costl || | |
72 | v32 > c->root_costu, EBT_STP_ROOTCOST)) | |
8cc784ee | 73 | return false; |
1da177e4 LT |
74 | } |
75 | if (info->bitmask & EBT_STP_SENDERPRIO) { | |
76 | v16 = NR16(stpc->sender); | |
77 | if (FWINV(v16 < c->sender_priol || | |
78 | v16 > c->sender_priou, EBT_STP_SENDERPRIO)) | |
8cc784ee | 79 | return false; |
1da177e4 LT |
80 | } |
81 | if (info->bitmask & EBT_STP_SENDERADDR) { | |
82 | verdict = 0; | |
83 | for (i = 0; i < 6; i++) | |
84 | verdict |= (stpc->sender[2+i] ^ c->sender_addr[i]) & | |
9d6f229f | 85 | c->sender_addrmsk[i]; |
1da177e4 | 86 | if (FWINV(verdict != 0, EBT_STP_SENDERADDR)) |
8cc784ee | 87 | return false; |
1da177e4 LT |
88 | } |
89 | if (info->bitmask & EBT_STP_PORT) { | |
90 | v16 = NR16(stpc->port); | |
91 | if (FWINV(v16 < c->portl || | |
92 | v16 > c->portu, EBT_STP_PORT)) | |
8cc784ee | 93 | return false; |
1da177e4 LT |
94 | } |
95 | if (info->bitmask & EBT_STP_MSGAGE) { | |
96 | v16 = NR16(stpc->msg_age); | |
97 | if (FWINV(v16 < c->msg_agel || | |
98 | v16 > c->msg_ageu, EBT_STP_MSGAGE)) | |
8cc784ee | 99 | return false; |
1da177e4 LT |
100 | } |
101 | if (info->bitmask & EBT_STP_MAXAGE) { | |
102 | v16 = NR16(stpc->max_age); | |
103 | if (FWINV(v16 < c->max_agel || | |
104 | v16 > c->max_ageu, EBT_STP_MAXAGE)) | |
8cc784ee | 105 | return false; |
1da177e4 LT |
106 | } |
107 | if (info->bitmask & EBT_STP_HELLOTIME) { | |
108 | v16 = NR16(stpc->hello_time); | |
109 | if (FWINV(v16 < c->hello_timel || | |
110 | v16 > c->hello_timeu, EBT_STP_HELLOTIME)) | |
8cc784ee | 111 | return false; |
1da177e4 LT |
112 | } |
113 | if (info->bitmask & EBT_STP_FWDD) { | |
114 | v16 = NR16(stpc->forward_delay); | |
115 | if (FWINV(v16 < c->forward_delayl || | |
116 | v16 > c->forward_delayu, EBT_STP_FWDD)) | |
8cc784ee | 117 | return false; |
1da177e4 | 118 | } |
8cc784ee | 119 | return true; |
1da177e4 LT |
120 | } |
121 | ||
2d06d4a5 | 122 | static bool |
62fc8051 | 123 | ebt_stp_mt(const struct sk_buff *skb, struct xt_action_param *par) |
1da177e4 | 124 | { |
f7108a20 | 125 | const struct ebt_stp_info *info = par->matchinfo; |
abfdf1c4 JE |
126 | const struct stp_header *sp; |
127 | struct stp_header _stph; | |
128 | const uint8_t header[6] = {0x42, 0x42, 0x03, 0x00, 0x00, 0x00}; | |
1da177e4 LT |
129 | |
130 | sp = skb_header_pointer(skb, 0, sizeof(_stph), &_stph); | |
131 | if (sp == NULL) | |
8cc784ee | 132 | return false; |
1da177e4 LT |
133 | |
134 | /* The stp code only considers these */ | |
135 | if (memcmp(sp, header, sizeof(header))) | |
8cc784ee | 136 | return false; |
1da177e4 | 137 | |
f64f9e71 JP |
138 | if (info->bitmask & EBT_STP_TYPE && |
139 | FWINV(info->type != sp->type, EBT_STP_TYPE)) | |
8cc784ee | 140 | return false; |
1da177e4 LT |
141 | |
142 | if (sp->type == BPDU_TYPE_CONFIG && | |
143 | info->bitmask & EBT_STP_CONFIG_MASK) { | |
abfdf1c4 JE |
144 | const struct stp_config_pdu *st; |
145 | struct stp_config_pdu _stpc; | |
1da177e4 LT |
146 | |
147 | st = skb_header_pointer(skb, sizeof(_stph), | |
148 | sizeof(_stpc), &_stpc); | |
149 | if (st == NULL) | |
8cc784ee | 150 | return false; |
1da177e4 LT |
151 | return ebt_filter_config(info, st); |
152 | } | |
8cc784ee | 153 | return true; |
1da177e4 LT |
154 | } |
155 | ||
b0f38452 | 156 | static int ebt_stp_mt_check(const struct xt_mtchk_param *par) |
1da177e4 | 157 | { |
9b4fce7a | 158 | const struct ebt_stp_info *info = par->matchinfo; |
abfdf1c4 JE |
159 | const uint8_t bridge_ula[6] = {0x01, 0x80, 0xc2, 0x00, 0x00, 0x00}; |
160 | const uint8_t msk[6] = {0xff, 0xff, 0xff, 0xff, 0xff, 0xff}; | |
9b4fce7a | 161 | const struct ebt_entry *e = par->entryinfo; |
1da177e4 LT |
162 | |
163 | if (info->bitmask & ~EBT_STP_MASK || info->invflags & ~EBT_STP_MASK || | |
164 | !(info->bitmask & EBT_STP_MASK)) | |
bd414ee6 | 165 | return -EINVAL; |
1da177e4 | 166 | /* Make sure the match only receives stp frames */ |
55917a21 PNA |
167 | if (!par->nft_compat && |
168 | (!ether_addr_equal(e->destmac, bridge_ula) || | |
169 | !ether_addr_equal(e->destmsk, msk) || | |
170 | !(e->bitmask & EBT_DESTMAC))) | |
bd414ee6 | 171 | return -EINVAL; |
1da177e4 | 172 | |
bd414ee6 | 173 | return 0; |
1da177e4 LT |
174 | } |
175 | ||
043ef46c JE |
176 | static struct xt_match ebt_stp_mt_reg __read_mostly = { |
177 | .name = "stp", | |
001a18d3 JE |
178 | .revision = 0, |
179 | .family = NFPROTO_BRIDGE, | |
2d06d4a5 JE |
180 | .match = ebt_stp_mt, |
181 | .checkentry = ebt_stp_mt_check, | |
fc0e3df4 | 182 | .matchsize = sizeof(struct ebt_stp_info), |
1da177e4 LT |
183 | .me = THIS_MODULE, |
184 | }; | |
185 | ||
65b4b4e8 | 186 | static int __init ebt_stp_init(void) |
1da177e4 | 187 | { |
043ef46c | 188 | return xt_register_match(&ebt_stp_mt_reg); |
1da177e4 LT |
189 | } |
190 | ||
65b4b4e8 | 191 | static void __exit ebt_stp_fini(void) |
1da177e4 | 192 | { |
043ef46c | 193 | xt_unregister_match(&ebt_stp_mt_reg); |
1da177e4 LT |
194 | } |
195 | ||
65b4b4e8 AM |
196 | module_init(ebt_stp_init); |
197 | module_exit(ebt_stp_fini); | |
f776c4cd | 198 | MODULE_DESCRIPTION("Ebtables: Spanning Tree Protocol packet match"); |
1da177e4 | 199 | MODULE_LICENSE("GPL"); |