netfilter: xtables: change xt_match.checkentry return type
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / net / bridge / netfilter / ebt_stp.c
CommitLineData
1da177e4
LT
1/*
2 * ebt_stp
3 *
4 * Authors:
5 * Bart De Schuymer <bdschuym@pandora.be>
6 * Stephen Hemminger <shemminger@osdl.org>
7 *
8 * July, 2003
9 */
82bf7e97 10#include <linux/etherdevice.h>
1da177e4 11#include <linux/module.h>
18219d3f
JE
12#include <linux/netfilter/x_tables.h>
13#include <linux/netfilter_bridge/ebtables.h>
14#include <linux/netfilter_bridge/ebt_stp.h>
1da177e4
LT
15
16#define BPDU_TYPE_CONFIG 0
17#define BPDU_TYPE_TCN 0x80
18
19struct stp_header {
20 uint8_t dsap;
21 uint8_t ssap;
22 uint8_t ctrl;
23 uint8_t pid;
24 uint8_t vers;
25 uint8_t type;
26};
27
28struct stp_config_pdu {
29 uint8_t flags;
30 uint8_t root[8];
31 uint8_t root_cost[4];
32 uint8_t sender[8];
33 uint8_t port[2];
34 uint8_t msg_age[2];
35 uint8_t max_age[2];
36 uint8_t hello_time[2];
37 uint8_t forward_delay[2];
38};
39
40#define NR16(p) (p[0] << 8 | p[1])
41#define NR32(p) ((p[0] << 24) | (p[1] << 16) | (p[2] << 8) | p[3])
42
8cc784ee 43static bool ebt_filter_config(const struct ebt_stp_info *info,
abfdf1c4 44 const struct stp_config_pdu *stpc)
1da177e4 45{
abfdf1c4 46 const struct ebt_stp_config_info *c;
1da177e4
LT
47 uint16_t v16;
48 uint32_t v32;
49 int verdict, i;
50
51 c = &info->config;
52 if ((info->bitmask & EBT_STP_FLAGS) &&
53 FWINV(c->flags != stpc->flags, EBT_STP_FLAGS))
8cc784ee 54 return false;
1da177e4
LT
55 if (info->bitmask & EBT_STP_ROOTPRIO) {
56 v16 = NR16(stpc->root);
57 if (FWINV(v16 < c->root_priol ||
58 v16 > c->root_priou, EBT_STP_ROOTPRIO))
8cc784ee 59 return false;
1da177e4
LT
60 }
61 if (info->bitmask & EBT_STP_ROOTADDR) {
62 verdict = 0;
63 for (i = 0; i < 6; i++)
64 verdict |= (stpc->root[2+i] ^ c->root_addr[i]) &
9d6f229f 65 c->root_addrmsk[i];
1da177e4 66 if (FWINV(verdict != 0, EBT_STP_ROOTADDR))
8cc784ee 67 return false;
1da177e4
LT
68 }
69 if (info->bitmask & EBT_STP_ROOTCOST) {
70 v32 = NR32(stpc->root_cost);
71 if (FWINV(v32 < c->root_costl ||
72 v32 > c->root_costu, EBT_STP_ROOTCOST))
8cc784ee 73 return false;
1da177e4
LT
74 }
75 if (info->bitmask & EBT_STP_SENDERPRIO) {
76 v16 = NR16(stpc->sender);
77 if (FWINV(v16 < c->sender_priol ||
78 v16 > c->sender_priou, EBT_STP_SENDERPRIO))
8cc784ee 79 return false;
1da177e4
LT
80 }
81 if (info->bitmask & EBT_STP_SENDERADDR) {
82 verdict = 0;
83 for (i = 0; i < 6; i++)
84 verdict |= (stpc->sender[2+i] ^ c->sender_addr[i]) &
9d6f229f 85 c->sender_addrmsk[i];
1da177e4 86 if (FWINV(verdict != 0, EBT_STP_SENDERADDR))
8cc784ee 87 return false;
1da177e4
LT
88 }
89 if (info->bitmask & EBT_STP_PORT) {
90 v16 = NR16(stpc->port);
91 if (FWINV(v16 < c->portl ||
92 v16 > c->portu, EBT_STP_PORT))
8cc784ee 93 return false;
1da177e4
LT
94 }
95 if (info->bitmask & EBT_STP_MSGAGE) {
96 v16 = NR16(stpc->msg_age);
97 if (FWINV(v16 < c->msg_agel ||
98 v16 > c->msg_ageu, EBT_STP_MSGAGE))
8cc784ee 99 return false;
1da177e4
LT
100 }
101 if (info->bitmask & EBT_STP_MAXAGE) {
102 v16 = NR16(stpc->max_age);
103 if (FWINV(v16 < c->max_agel ||
104 v16 > c->max_ageu, EBT_STP_MAXAGE))
8cc784ee 105 return false;
1da177e4
LT
106 }
107 if (info->bitmask & EBT_STP_HELLOTIME) {
108 v16 = NR16(stpc->hello_time);
109 if (FWINV(v16 < c->hello_timel ||
110 v16 > c->hello_timeu, EBT_STP_HELLOTIME))
8cc784ee 111 return false;
1da177e4
LT
112 }
113 if (info->bitmask & EBT_STP_FWDD) {
114 v16 = NR16(stpc->forward_delay);
115 if (FWINV(v16 < c->forward_delayl ||
116 v16 > c->forward_delayu, EBT_STP_FWDD))
8cc784ee 117 return false;
1da177e4 118 }
8cc784ee 119 return true;
1da177e4
LT
120}
121
2d06d4a5 122static bool
f7108a20 123ebt_stp_mt(const struct sk_buff *skb, const struct xt_match_param *par)
1da177e4 124{
f7108a20 125 const struct ebt_stp_info *info = par->matchinfo;
abfdf1c4
JE
126 const struct stp_header *sp;
127 struct stp_header _stph;
128 const uint8_t header[6] = {0x42, 0x42, 0x03, 0x00, 0x00, 0x00};
1da177e4
LT
129
130 sp = skb_header_pointer(skb, 0, sizeof(_stph), &_stph);
131 if (sp == NULL)
8cc784ee 132 return false;
1da177e4
LT
133
134 /* The stp code only considers these */
135 if (memcmp(sp, header, sizeof(header)))
8cc784ee 136 return false;
1da177e4 137
f64f9e71
JP
138 if (info->bitmask & EBT_STP_TYPE &&
139 FWINV(info->type != sp->type, EBT_STP_TYPE))
8cc784ee 140 return false;
1da177e4
LT
141
142 if (sp->type == BPDU_TYPE_CONFIG &&
143 info->bitmask & EBT_STP_CONFIG_MASK) {
abfdf1c4
JE
144 const struct stp_config_pdu *st;
145 struct stp_config_pdu _stpc;
1da177e4
LT
146
147 st = skb_header_pointer(skb, sizeof(_stph),
148 sizeof(_stpc), &_stpc);
149 if (st == NULL)
8cc784ee 150 return false;
1da177e4
LT
151 return ebt_filter_config(info, st);
152 }
8cc784ee 153 return true;
1da177e4
LT
154}
155
b0f38452 156static int ebt_stp_mt_check(const struct xt_mtchk_param *par)
1da177e4 157{
9b4fce7a 158 const struct ebt_stp_info *info = par->matchinfo;
abfdf1c4
JE
159 const uint8_t bridge_ula[6] = {0x01, 0x80, 0xc2, 0x00, 0x00, 0x00};
160 const uint8_t msk[6] = {0xff, 0xff, 0xff, 0xff, 0xff, 0xff};
9b4fce7a 161 const struct ebt_entry *e = par->entryinfo;
1da177e4
LT
162
163 if (info->bitmask & ~EBT_STP_MASK || info->invflags & ~EBT_STP_MASK ||
164 !(info->bitmask & EBT_STP_MASK))
19eda879 165 return false;
1da177e4 166 /* Make sure the match only receives stp frames */
d3f4a687
KK
167 if (compare_ether_addr(e->destmac, bridge_ula) ||
168 compare_ether_addr(e->destmsk, msk) || !(e->bitmask & EBT_DESTMAC))
19eda879 169 return false;
1da177e4 170
19eda879 171 return true;
1da177e4
LT
172}
173
043ef46c
JE
174static struct xt_match ebt_stp_mt_reg __read_mostly = {
175 .name = "stp",
001a18d3
JE
176 .revision = 0,
177 .family = NFPROTO_BRIDGE,
2d06d4a5
JE
178 .match = ebt_stp_mt,
179 .checkentry = ebt_stp_mt_check,
fc0e3df4 180 .matchsize = sizeof(struct ebt_stp_info),
1da177e4
LT
181 .me = THIS_MODULE,
182};
183
65b4b4e8 184static int __init ebt_stp_init(void)
1da177e4 185{
043ef46c 186 return xt_register_match(&ebt_stp_mt_reg);
1da177e4
LT
187}
188
65b4b4e8 189static void __exit ebt_stp_fini(void)
1da177e4 190{
043ef46c 191 xt_unregister_match(&ebt_stp_mt_reg);
1da177e4
LT
192}
193
65b4b4e8
AM
194module_init(ebt_stp_init);
195module_exit(ebt_stp_fini);
f776c4cd 196MODULE_DESCRIPTION("Ebtables: Spanning Tree Protocol packet match");
1da177e4 197MODULE_LICENSE("GPL");