1 /* Kernel module to match Hop-by-Hop and Destination parameters. */
3 /* (C) 2001-2002 Andras Kis-Szabo <kisza@sch.bme.hu>
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License version 2 as
7 * published by the Free Software Foundation.
9 #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
10 #include <linux/module.h>
11 #include <linux/skbuff.h>
12 #include <linux/ipv6.h>
13 #include <linux/types.h>
14 #include <net/checksum.h>
17 #include <asm/byteorder.h>
19 #include <linux/netfilter/x_tables.h>
20 #include <linux/netfilter_ipv6/ip6_tables.h>
21 #include <linux/netfilter_ipv6/ip6t_opts.h>
23 MODULE_LICENSE("GPL");
24 MODULE_DESCRIPTION("Xtables: IPv6 Hop-By-Hop and Destination Header match");
25 MODULE_AUTHOR("Andras Kis-Szabo <kisza@sch.bme.hu>");
26 MODULE_ALIAS("ip6t_dst");
31 * 1 -> must drop the packet
32 * 2 -> send ICMP PARM PROB regardless and drop packet
33 * 3 -> Send ICMP if not a multicast address and drop packet
36 * 1 -> can change the routing
38 * 0 -> Pad1 (only 1 byte!)
39 * 1 -> PadN LENGTH info (total length = length + 2)
40 * C0 | 2 -> JUMBO 4 x x x x ( xxxx > 64k )
44 static struct xt_match hbh_mt6_reg
[] __read_mostly
;
47 hbh_mt6(const struct sk_buff
*skb
, struct xt_action_param
*par
)
49 struct ipv6_opt_hdr _optsh
;
50 const struct ipv6_opt_hdr
*oh
;
51 const struct ip6t_opts
*optinfo
= par
->matchinfo
;
54 unsigned int hdrlen
= 0;
58 const u_int8_t
*tp
= NULL
;
59 const u_int8_t
*lp
= NULL
;
63 err
= ipv6_find_hdr(skb
, &ptr
,
64 (par
->match
== &hbh_mt6_reg
[0]) ?
65 NEXTHDR_HOP
: NEXTHDR_DEST
, NULL
);
72 oh
= skb_header_pointer(skb
, ptr
, sizeof(_optsh
), &_optsh
);
78 hdrlen
= ipv6_optlen(oh
);
79 if (skb
->len
- ptr
< hdrlen
) {
80 /* Packet smaller than it's length field */
84 pr_debug("IPv6 OPTS LEN %u %u ", hdrlen
, oh
->hdrlen
);
86 pr_debug("len %02X %04X %02X ",
87 optinfo
->hdrlen
, hdrlen
,
88 (!(optinfo
->flags
& IP6T_OPTS_LEN
) ||
89 ((optinfo
->hdrlen
== hdrlen
) ^
90 !!(optinfo
->invflags
& IP6T_OPTS_INV_LEN
))));
93 (!(optinfo
->flags
& IP6T_OPTS_LEN
) ||
94 ((optinfo
->hdrlen
== hdrlen
) ^
95 !!(optinfo
->invflags
& IP6T_OPTS_INV_LEN
)));
99 if (!(optinfo
->flags
& IP6T_OPTS_OPTS
)) {
103 pr_debug("#%d ", optinfo
->optsnr
);
104 for (temp
= 0; temp
< optinfo
->optsnr
; temp
++) {
105 /* type field exists ? */
108 tp
= skb_header_pointer(skb
, ptr
, sizeof(_opttype
),
114 if (*tp
!= (optinfo
->opts
[temp
] & 0xFF00) >> 8) {
115 pr_debug("Tbad %02X %02X\n", *tp
,
116 (optinfo
->opts
[temp
] & 0xFF00) >> 8);
125 /* length field exists ? */
128 lp
= skb_header_pointer(skb
, ptr
+ 1,
133 spec_len
= optinfo
->opts
[temp
] & 0x00FF;
135 if (spec_len
!= 0x00FF && spec_len
!= *lp
) {
136 pr_debug("Lbad %02X %04X\n", *lp
,
147 /* Step to the next */
148 pr_debug("len%04X\n", optlen
);
150 if ((ptr
> skb
->len
- optlen
|| hdrlen
< optlen
) &&
151 temp
< optinfo
->optsnr
- 1) {
152 pr_debug("new pointer is too large!\n");
158 if (temp
== optinfo
->optsnr
)
167 static int hbh_mt6_check(const struct xt_mtchk_param
*par
)
169 const struct ip6t_opts
*optsinfo
= par
->matchinfo
;
171 if (optsinfo
->invflags
& ~IP6T_OPTS_INV_MASK
) {
172 pr_debug("unknown flags %X\n", optsinfo
->invflags
);
176 if (optsinfo
->flags
& IP6T_OPTS_NSTRICT
) {
177 pr_debug("Not strict - not implemented");
184 static struct xt_match hbh_mt6_reg
[] __read_mostly
= {
186 /* Note, hbh_mt6 relies on the order of hbh_mt6_reg */
188 .family
= NFPROTO_IPV6
,
190 .matchsize
= sizeof(struct ip6t_opts
),
191 .checkentry
= hbh_mt6_check
,
196 .family
= NFPROTO_IPV6
,
198 .matchsize
= sizeof(struct ip6t_opts
),
199 .checkentry
= hbh_mt6_check
,
204 static int __init
hbh_mt6_init(void)
206 return xt_register_matches(hbh_mt6_reg
, ARRAY_SIZE(hbh_mt6_reg
));
209 static void __exit
hbh_mt6_exit(void)
211 xt_unregister_matches(hbh_mt6_reg
, ARRAY_SIZE(hbh_mt6_reg
));
214 module_init(hbh_mt6_init
);
215 module_exit(hbh_mt6_exit
);