| // SPDX-License-Identifier: GPL-2.0-only |
| /* Copyright (C) 2010: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org> |
| * Copyright (C) 2015: Linus Lüssing <linus.luessing@c0d3.blue> |
| * |
| * Based on the MLD support added to br_multicast.c by YOSHIFUJI Hideaki. |
| */ |
| |
| #include <linux/skbuff.h> |
| #include <net/ipv6.h> |
| #include <net/mld.h> |
| #include <net/addrconf.h> |
| #include <net/ip6_checksum.h> |
| |
| static int ipv6_mc_check_ip6hdr(struct sk_buff *skb) |
| { |
| const struct ipv6hdr *ip6h; |
| unsigned int len; |
| unsigned int offset = skb_network_offset(skb) + sizeof(*ip6h); |
| |
| if (!pskb_may_pull(skb, offset)) |
| return -EINVAL; |
| |
| ip6h = ipv6_hdr(skb); |
| |
| if (ip6h->version != 6) |
| return -EINVAL; |
| |
| len = offset + ntohs(ip6h->payload_len); |
| if (skb->len < len || len <= offset) |
| return -EINVAL; |
| |
| skb_set_transport_header(skb, offset); |
| |
| return 0; |
| } |
| |
| static int ipv6_mc_check_exthdrs(struct sk_buff *skb) |
| { |
| const struct ipv6hdr *ip6h; |
| int offset; |
| u8 nexthdr; |
| __be16 frag_off; |
| |
| ip6h = ipv6_hdr(skb); |
| |
| if (ip6h->nexthdr != IPPROTO_HOPOPTS) |
| return -ENOMSG; |
| |
| nexthdr = ip6h->nexthdr; |
| offset = skb_network_offset(skb) + sizeof(*ip6h); |
| offset = ipv6_skip_exthdr(skb, offset, &nexthdr, &frag_off); |
| |
| if (offset < 0) |
| return -EINVAL; |
| |
| if (nexthdr != IPPROTO_ICMPV6) |
| return -ENOMSG; |
| |
| skb_set_transport_header(skb, offset); |
| |
| return 0; |
| } |
| |
| static int ipv6_mc_check_mld_reportv2(struct sk_buff *skb) |
| { |
| unsigned int len = skb_transport_offset(skb); |
| |
| len += sizeof(struct mld2_report); |
| |
| return ipv6_mc_may_pull(skb, len) ? 0 : -EINVAL; |
| } |
| |
| static int ipv6_mc_check_mld_query(struct sk_buff *skb) |
| { |
| unsigned int transport_len = ipv6_transport_len(skb); |
| struct mld_msg *mld; |
| unsigned int len; |
| |
| /* RFC2710+RFC3810 (MLDv1+MLDv2) require link-local source addresses */ |
| if (!(ipv6_addr_type(&ipv6_hdr(skb)->saddr) & IPV6_ADDR_LINKLOCAL)) |
| return -EINVAL; |
| |
| /* MLDv1? */ |
| if (transport_len != sizeof(struct mld_msg)) { |
| /* or MLDv2? */ |
| if (transport_len < sizeof(struct mld2_query)) |
| return -EINVAL; |
| |
| len = skb_transport_offset(skb) + sizeof(struct mld2_query); |
| if (!ipv6_mc_may_pull(skb, len)) |
| return -EINVAL; |
| } |
| |
| mld = (struct mld_msg *)skb_transport_header(skb); |
| |
| /* RFC2710+RFC3810 (MLDv1+MLDv2) require the multicast link layer |
| * all-nodes destination address (ff02::1) for general queries |
| */ |
| if (ipv6_addr_any(&mld->mld_mca) && |
| !ipv6_addr_is_ll_all_nodes(&ipv6_hdr(skb)->daddr)) |
| return -EINVAL; |
| |
| return 0; |
| } |
| |
| static int ipv6_mc_check_mld_msg(struct sk_buff *skb) |
| { |
| unsigned int len = skb_transport_offset(skb) + sizeof(struct mld_msg); |
| struct mld_msg *mld; |
| |
| if (!ipv6_mc_may_pull(skb, len)) |
| return -EINVAL; |
| |
| mld = (struct mld_msg *)skb_transport_header(skb); |
| |
| switch (mld->mld_type) { |
| case ICMPV6_MGM_REDUCTION: |
| case ICMPV6_MGM_REPORT: |
| return 0; |
| case ICMPV6_MLD2_REPORT: |
| return ipv6_mc_check_mld_reportv2(skb); |
| case ICMPV6_MGM_QUERY: |
| return ipv6_mc_check_mld_query(skb); |
| default: |
| return -ENOMSG; |
| } |
| } |
| |
| static inline __sum16 ipv6_mc_validate_checksum(struct sk_buff *skb) |
| { |
| return skb_checksum_validate(skb, IPPROTO_ICMPV6, ip6_compute_pseudo); |
| } |
| |
| int ipv6_mc_check_icmpv6(struct sk_buff *skb) |
| { |
| unsigned int len = skb_transport_offset(skb) + sizeof(struct icmp6hdr); |
| unsigned int transport_len = ipv6_transport_len(skb); |
| struct sk_buff *skb_chk; |
| |
| if (!ipv6_mc_may_pull(skb, len)) |
| return -EINVAL; |
| |
| skb_chk = skb_checksum_trimmed(skb, transport_len, |
| ipv6_mc_validate_checksum); |
| if (!skb_chk) |
| return -EINVAL; |
| |
| if (skb_chk != skb) |
| kfree_skb(skb_chk); |
| |
| return 0; |
| } |
| EXPORT_SYMBOL(ipv6_mc_check_icmpv6); |
| |
| /** |
| * ipv6_mc_check_mld - checks whether this is a sane MLD packet |
| * @skb: the skb to validate |
| * |
| * Checks whether an IPv6 packet is a valid MLD packet. If so sets |
| * skb transport header accordingly and returns zero. |
| * |
| * -EINVAL: A broken packet was detected, i.e. it violates some internet |
| * standard |
| * -ENOMSG: IP header validation succeeded but it is not an MLD packet. |
| * -ENOMEM: A memory allocation failure happened. |
| * |
| * Caller needs to set the skb network header and free any returned skb if it |
| * differs from the provided skb. |
| */ |
| int ipv6_mc_check_mld(struct sk_buff *skb) |
| { |
| int ret; |
| |
| ret = ipv6_mc_check_ip6hdr(skb); |
| if (ret < 0) |
| return ret; |
| |
| ret = ipv6_mc_check_exthdrs(skb); |
| if (ret < 0) |
| return ret; |
| |
| ret = ipv6_mc_check_icmpv6(skb); |
| if (ret < 0) |
| return ret; |
| |
| return ipv6_mc_check_mld_msg(skb); |
| } |
| EXPORT_SYMBOL(ipv6_mc_check_mld); |