1// SPDX-License-Identifier: GPL-2.0-only
2/*
3 *  ebt_ip
4 *
5 *	Authors:
6 *	Bart De Schuymer <bdschuym@pandora.be>
7 *
8 *  April, 2002
9 *
10 *  Changes:
11 *    added ip-sport and ip-dport
12 *    Innominate Security Technologies AG <mhopf@innominate.com>
13 *    September, 2002
14 */
15#include <linux/ip.h>
16#include <net/ip.h>
17#include <linux/in.h>
18#include <linux/module.h>
19#include <linux/netfilter/x_tables.h>
20#include <linux/netfilter_bridge/ebtables.h>
21#include <linux/netfilter_bridge/ebt_ip.h>
22
23union pkthdr {
24	struct {
25		__be16 src;
26		__be16 dst;
27	} tcpudphdr;
28	struct {
29		u8 type;
30		u8 code;
31	} icmphdr;
32	struct {
33		u8 type;
34	} igmphdr;
35};
36
37static bool
38ebt_ip_mt(const struct sk_buff *skb, struct xt_action_param *par)
39{
40	const struct ebt_ip_info *info = par->matchinfo;
41	const struct iphdr *ih;
42	struct iphdr _iph;
43	const union pkthdr *pptr;
44	union pkthdr _pkthdr;
45
46	ih = skb_header_pointer(skb, 0, sizeof(_iph), &_iph);
47	if (ih == NULL)
48		return false;
49	if ((info->bitmask & EBT_IP_TOS) &&
50	    NF_INVF(info, EBT_IP_TOS, info->tos != ih->tos))
51		return false;
52	if ((info->bitmask & EBT_IP_SOURCE) &&
53	    NF_INVF(info, EBT_IP_SOURCE,
54		    (ih->saddr & info->smsk) != info->saddr))
55		return false;
56	if ((info->bitmask & EBT_IP_DEST) &&
57	    NF_INVF(info, EBT_IP_DEST,
58		    (ih->daddr & info->dmsk) != info->daddr))
59		return false;
60	if (info->bitmask & EBT_IP_PROTO) {
61		if (NF_INVF(info, EBT_IP_PROTO, info->protocol != ih->protocol))
62			return false;
63		if (!(info->bitmask & (EBT_IP_DPORT | EBT_IP_SPORT |
64				       EBT_IP_ICMP | EBT_IP_IGMP)))
65			return true;
66		if (ntohs(ih->frag_off) & IP_OFFSET)
67			return false;
68
69		/* min icmp/igmp headersize is 4, so sizeof(_pkthdr) is ok. */
70		pptr = skb_header_pointer(skb, ih->ihl*4,
71					  sizeof(_pkthdr), &_pkthdr);
72		if (pptr == NULL)
73			return false;
74		if (info->bitmask & EBT_IP_DPORT) {
75			u32 dst = ntohs(pptr->tcpudphdr.dst);
76			if (NF_INVF(info, EBT_IP_DPORT,
77				    dst < info->dport[0] ||
78				    dst > info->dport[1]))
79				return false;
80		}
81		if (info->bitmask & EBT_IP_SPORT) {
82			u32 src = ntohs(pptr->tcpudphdr.src);
83			if (NF_INVF(info, EBT_IP_SPORT,
84				    src < info->sport[0] ||
85				    src > info->sport[1]))
86				return false;
87		}
88		if ((info->bitmask & EBT_IP_ICMP) &&
89		    NF_INVF(info, EBT_IP_ICMP,
90			    pptr->icmphdr.type < info->icmp_type[0] ||
91			    pptr->icmphdr.type > info->icmp_type[1] ||
92			    pptr->icmphdr.code < info->icmp_code[0] ||
93			    pptr->icmphdr.code > info->icmp_code[1]))
94			return false;
95		if ((info->bitmask & EBT_IP_IGMP) &&
96		    NF_INVF(info, EBT_IP_IGMP,
97			    pptr->igmphdr.type < info->igmp_type[0] ||
98			    pptr->igmphdr.type > info->igmp_type[1]))
99			return false;
100	}
101	return true;
102}
103
104static int ebt_ip_mt_check(const struct xt_mtchk_param *par)
105{
106	const struct ebt_ip_info *info = par->matchinfo;
107	const struct ebt_entry *e = par->entryinfo;
108
109	if (e->ethproto != htons(ETH_P_IP) ||
110	   e->invflags & EBT_IPROTO)
111		return -EINVAL;
112	if (info->bitmask & ~EBT_IP_MASK || info->invflags & ~EBT_IP_MASK)
113		return -EINVAL;
114	if (info->bitmask & (EBT_IP_DPORT | EBT_IP_SPORT)) {
115		if (info->invflags & EBT_IP_PROTO)
116			return -EINVAL;
117		if (info->protocol != IPPROTO_TCP &&
118		    info->protocol != IPPROTO_UDP &&
119		    info->protocol != IPPROTO_UDPLITE &&
120		    info->protocol != IPPROTO_SCTP &&
121		    info->protocol != IPPROTO_DCCP)
122			 return -EINVAL;
123	}
124	if (info->bitmask & EBT_IP_DPORT && info->dport[0] > info->dport[1])
125		return -EINVAL;
126	if (info->bitmask & EBT_IP_SPORT && info->sport[0] > info->sport[1])
127		return -EINVAL;
128	if (info->bitmask & EBT_IP_ICMP) {
129		if ((info->invflags & EBT_IP_PROTO) ||
130		    info->protocol != IPPROTO_ICMP)
131			return -EINVAL;
132		if (info->icmp_type[0] > info->icmp_type[1] ||
133		    info->icmp_code[0] > info->icmp_code[1])
134			return -EINVAL;
135	}
136	if (info->bitmask & EBT_IP_IGMP) {
137		if ((info->invflags & EBT_IP_PROTO) ||
138		    info->protocol != IPPROTO_IGMP)
139			return -EINVAL;
140		if (info->igmp_type[0] > info->igmp_type[1])
141			return -EINVAL;
142	}
143	return 0;
144}
145
146static struct xt_match ebt_ip_mt_reg __read_mostly = {
147	.name		= "ip",
148	.revision	= 0,
149	.family		= NFPROTO_BRIDGE,
150	.match		= ebt_ip_mt,
151	.checkentry	= ebt_ip_mt_check,
152	.matchsize	= sizeof(struct ebt_ip_info),
153	.me		= THIS_MODULE,
154};
155
156static int __init ebt_ip_init(void)
157{
158	return xt_register_match(&ebt_ip_mt_reg);
159}
160
161static void __exit ebt_ip_fini(void)
162{
163	xt_unregister_match(&ebt_ip_mt_reg);
164}
165
166module_init(ebt_ip_init);
167module_exit(ebt_ip_fini);
168MODULE_DESCRIPTION("Ebtables: IPv4 protocol packet match");
169MODULE_LICENSE("GPL");
170