blob: 6a6d01cb1acec790d2366db3d7d3eaa9aa828ebf [file] [log] [blame]
Vlad Yasevich3c73a032012-11-15 08:49:20 +00001/*
2 * IPv6 library code, needed by static components when full IPv6 support is
3 * not configured or static. These functions are needed by GSO/GRO implementation.
4 */
5#include <linux/export.h>
Ben Hutchings5188cd42014-10-30 18:27:17 +00006#include <net/ip.h>
Vlad Yasevich3c73a032012-11-15 08:49:20 +00007#include <net/ipv6.h>
8#include <net/ip6_fib.h>
Cong Wang3ce9b352013-08-31 13:44:28 +08009#include <net/addrconf.h>
Hannes Frederic Sowa6dfac5c2014-03-30 18:28:03 +020010#include <net/secure_seq.h>
Pablo Neira Ayusoa2636532015-06-17 10:28:27 -050011#include <linux/netfilter.h>
Vlad Yasevich3c73a032012-11-15 08:49:20 +000012
Eric Dumazetb97a2f32019-08-17 00:01:27 +010013static u32 __ipv6_select_ident(struct net *net,
Martin KaFai Laufd0273d2015-05-22 20:55:57 -070014 const struct in6_addr *dst,
15 const struct in6_addr *src)
Vlad Yasevich0508c072015-02-03 16:36:15 -050016{
Eric Dumazetb97a2f32019-08-17 00:01:27 +010017 const struct {
18 struct in6_addr dst;
19 struct in6_addr src;
20 } __aligned(SIPHASH_ALIGNMENT) combined = {
21 .dst = *dst,
22 .src = *src,
23 };
Vlad Yasevich0508c072015-02-03 16:36:15 -050024 u32 hash, id;
25
Eric Dumazetb97a2f32019-08-17 00:01:27 +010026 /* Note the following code is not safe, but this is okay. */
27 if (unlikely(siphash_key_is_zero(&net->ipv4.ip_id_key)))
28 get_random_bytes(&net->ipv4.ip_id_key,
29 sizeof(net->ipv4.ip_id_key));
30
31 hash = siphash(&combined, sizeof(combined), &net->ipv4.ip_id_key);
Vlad Yasevich0508c072015-02-03 16:36:15 -050032
33 /* Treat id of 0 as unset and if we get 0 back from ip_idents_reserve,
34 * set the hight order instead thus minimizing possible future
35 * collisions.
36 */
37 id = ip_idents_reserve(hash, 1);
38 if (unlikely(!id))
39 id = 1 << 31;
40
41 return id;
42}
43
Ben Hutchings5188cd42014-10-30 18:27:17 +000044/* This function exists only for tap drivers that must support broken
45 * clients requesting UFO without specifying an IPv6 fragment ID.
46 *
47 * This is similar to ipv6_select_ident() but we use an independent hash
48 * seed to limit information leakage.
49 *
50 * The network header must be set before calling this.
51 */
Hannes Frederic Sowa5a352dd2015-03-25 17:07:45 +010052void ipv6_proxy_select_ident(struct net *net, struct sk_buff *skb)
Ben Hutchings5188cd42014-10-30 18:27:17 +000053{
Ben Hutchings5188cd42014-10-30 18:27:17 +000054 struct in6_addr buf[2];
55 struct in6_addr *addrs;
Vlad Yasevich0508c072015-02-03 16:36:15 -050056 u32 id;
Ben Hutchings5188cd42014-10-30 18:27:17 +000057
58 addrs = skb_header_pointer(skb,
59 skb_network_offset(skb) +
60 offsetof(struct ipv6hdr, saddr),
61 sizeof(buf), buf);
62 if (!addrs)
63 return;
64
Eric Dumazetb97a2f32019-08-17 00:01:27 +010065 id = __ipv6_select_ident(net, &addrs[1], &addrs[0]);
Vlad Yasevich51f30772015-02-09 09:38:20 -050066 skb_shinfo(skb)->ip6_frag_id = htonl(id);
Ben Hutchings5188cd42014-10-30 18:27:17 +000067}
68EXPORT_SYMBOL_GPL(ipv6_proxy_select_ident);
69
Eric Dumazet7f159862015-05-25 16:02:21 -070070__be32 ipv6_select_ident(struct net *net,
71 const struct in6_addr *daddr,
72 const struct in6_addr *saddr)
Vlad Yasevich0508c072015-02-03 16:36:15 -050073{
Vlad Yasevich0508c072015-02-03 16:36:15 -050074 u32 id;
75
Eric Dumazetb97a2f32019-08-17 00:01:27 +010076 id = __ipv6_select_ident(net, daddr, saddr);
Martin KaFai Lau286c2342015-05-22 20:55:56 -070077 return htonl(id);
Vlad Yasevich0508c072015-02-03 16:36:15 -050078}
79EXPORT_SYMBOL(ipv6_select_ident);
80
Vlad Yasevich3c73a032012-11-15 08:49:20 +000081int ip6_find_1stfragopt(struct sk_buff *skb, u8 **nexthdr)
82{
Sabrina Dubroca4a2ffe12017-07-19 22:28:55 +020083 unsigned int offset = sizeof(struct ipv6hdr);
Simon Horman29a3cad2013-05-28 20:34:26 +000084 unsigned int packet_len = skb_tail_pointer(skb) -
85 skb_network_header(skb);
Vlad Yasevich3c73a032012-11-15 08:49:20 +000086 int found_rhdr = 0;
87 *nexthdr = &ipv6_hdr(skb)->nexthdr;
88
Craig Galleka2c845e2017-05-16 14:36:23 -040089 while (offset <= packet_len) {
90 struct ipv6_opt_hdr *exthdr;
Vlad Yasevich3c73a032012-11-15 08:49:20 +000091
92 switch (**nexthdr) {
93
94 case NEXTHDR_HOP:
95 break;
96 case NEXTHDR_ROUTING:
97 found_rhdr = 1;
98 break;
99 case NEXTHDR_DEST:
100#if IS_ENABLED(CONFIG_IPV6_MIP6)
101 if (ipv6_find_tlv(skb, offset, IPV6_TLV_HAO) >= 0)
102 break;
103#endif
104 if (found_rhdr)
105 return offset;
106 break;
Ian Morris67ba4152014-08-24 21:53:10 +0100107 default:
Vlad Yasevich3c73a032012-11-15 08:49:20 +0000108 return offset;
109 }
110
Craig Galleka2c845e2017-05-16 14:36:23 -0400111 if (offset + sizeof(struct ipv6_opt_hdr) > packet_len)
112 return -EINVAL;
113
Vlad Yasevich3c73a032012-11-15 08:49:20 +0000114 exthdr = (struct ipv6_opt_hdr *)(skb_network_header(skb) +
115 offset);
Stefano Briviodccb31b2017-08-18 14:40:53 +0200116 offset += ipv6_optlen(exthdr);
117 if (offset > IPV6_MAXPLEN)
Sabrina Dubroca4a2ffe12017-07-19 22:28:55 +0200118 return -EINVAL;
Craig Galleka2c845e2017-05-16 14:36:23 -0400119 *nexthdr = &exthdr->nexthdr;
Vlad Yasevich3c73a032012-11-15 08:49:20 +0000120 }
121
Craig Galleka2c845e2017-05-16 14:36:23 -0400122 return -EINVAL;
Vlad Yasevich3c73a032012-11-15 08:49:20 +0000123}
124EXPORT_SYMBOL(ip6_find_1stfragopt);
Cong Wang3ce9b352013-08-31 13:44:28 +0800125
126#if IS_ENABLED(CONFIG_IPV6)
127int ip6_dst_hoplimit(struct dst_entry *dst)
128{
129 int hoplimit = dst_metric_raw(dst, RTAX_HOPLIMIT);
130 if (hoplimit == 0) {
131 struct net_device *dev = dst->dev;
132 struct inet6_dev *idev;
133
134 rcu_read_lock();
135 idev = __in6_dev_get(dev);
136 if (idev)
137 hoplimit = idev->cnf.hop_limit;
138 else
139 hoplimit = dev_net(dev)->ipv6.devconf_all->hop_limit;
140 rcu_read_unlock();
141 }
142 return hoplimit;
143}
144EXPORT_SYMBOL(ip6_dst_hoplimit);
145#endif
Cong Wang788787b2013-08-31 13:44:29 +0800146
Eric W. Biedermancf91a992015-10-07 16:48:45 -0500147int __ip6_local_out(struct net *net, struct sock *sk, struct sk_buff *skb)
Cong Wang788787b2013-08-31 13:44:29 +0800148{
149 int len;
150
151 len = skb->len - sizeof(struct ipv6hdr);
152 if (len > IPV6_MAXPLEN)
153 len = 0;
154 ipv6_hdr(skb)->payload_len = htons(len);
huizhangf6c20c52014-06-09 12:37:25 +0800155 IP6CB(skb)->nhoff = offsetof(struct ipv6hdr, nexthdr);
Cong Wang788787b2013-08-31 13:44:29 +0800156
David Aherna8e3e1a2016-09-10 12:09:53 -0700157 /* if egress device is enslaved to an L3 master device pass the
158 * skb to its handler for processing
159 */
160 skb = l3mdev_ip6_out(sk, skb);
161 if (unlikely(!skb))
162 return 0;
163
Eli Cooperb4e479a2016-12-01 10:05:11 +0800164 skb->protocol = htons(ETH_P_IPV6);
165
Eric W. Biederman29a26a52015-09-15 20:04:16 -0500166 return nf_hook(NFPROTO_IPV6, NF_INET_LOCAL_OUT,
167 net, sk, skb, NULL, skb_dst(skb)->dev,
Eric W. Biederman13206b62015-10-07 16:48:35 -0500168 dst_output);
Cong Wang788787b2013-08-31 13:44:29 +0800169}
170EXPORT_SYMBOL_GPL(__ip6_local_out);
171
Eric W. Biederman33224b12015-10-07 16:48:46 -0500172int ip6_local_out(struct net *net, struct sock *sk, struct sk_buff *skb)
Cong Wang788787b2013-08-31 13:44:29 +0800173{
174 int err;
175
Eric W. Biedermancf91a992015-10-07 16:48:45 -0500176 err = __ip6_local_out(net, sk, skb);
Cong Wang788787b2013-08-31 13:44:29 +0800177 if (likely(err == 1))
Eric W. Biederman13206b62015-10-07 16:48:35 -0500178 err = dst_output(net, sk, skb);
Cong Wang788787b2013-08-31 13:44:29 +0800179
180 return err;
181}
182EXPORT_SYMBOL_GPL(ip6_local_out);