2005-04-17 00:20:36 +02:00
|
|
|
/*
|
|
|
|
* IPv6 input
|
2007-02-09 15:24:49 +01:00
|
|
|
* Linux INET6 implementation
|
2005-04-17 00:20:36 +02:00
|
|
|
*
|
|
|
|
* Authors:
|
|
|
|
* Pedro Roque <roque@di.fc.ul.pt>
|
|
|
|
* Ian P. Morris <I.P.Morris@soton.ac.uk>
|
|
|
|
*
|
|
|
|
* $Id: ip6_input.c,v 1.19 2000/12/13 18:31:50 davem Exp $
|
|
|
|
*
|
|
|
|
* Based in linux/net/ipv4/ip_input.c
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU General Public License
|
|
|
|
* as published by the Free Software Foundation; either version
|
|
|
|
* 2 of the License, or (at your option) any later version.
|
|
|
|
*/
|
|
|
|
/* Changes
|
|
|
|
*
|
|
|
|
* Mitsuru KANDA @USAGI and
|
|
|
|
* YOSHIFUJI Hideaki @USAGI: Remove ipv6_parse_exthdrs().
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/errno.h>
|
|
|
|
#include <linux/types.h>
|
|
|
|
#include <linux/socket.h>
|
|
|
|
#include <linux/sockios.h>
|
|
|
|
#include <linux/net.h>
|
|
|
|
#include <linux/netdevice.h>
|
|
|
|
#include <linux/in6.h>
|
|
|
|
#include <linux/icmpv6.h>
|
|
|
|
|
|
|
|
#include <linux/netfilter.h>
|
|
|
|
#include <linux/netfilter_ipv6.h>
|
|
|
|
|
|
|
|
#include <net/sock.h>
|
|
|
|
#include <net/snmp.h>
|
|
|
|
|
|
|
|
#include <net/ipv6.h>
|
|
|
|
#include <net/protocol.h>
|
|
|
|
#include <net/transp_v6.h>
|
|
|
|
#include <net/rawv6.h>
|
|
|
|
#include <net/ndisc.h>
|
|
|
|
#include <net/ip6_route.h>
|
|
|
|
#include <net/addrconf.h>
|
|
|
|
#include <net/xfrm.h>
|
|
|
|
|
|
|
|
|
|
|
|
|
2007-02-09 15:24:49 +01:00
|
|
|
inline int ip6_rcv_finish( struct sk_buff *skb)
|
2005-04-17 00:20:36 +02:00
|
|
|
{
|
|
|
|
if (skb->dst == NULL)
|
|
|
|
ip6_route_input(skb);
|
|
|
|
|
|
|
|
return dst_input(skb);
|
|
|
|
}
|
|
|
|
|
2005-08-10 04:34:12 +02:00
|
|
|
int ipv6_rcv(struct sk_buff *skb, struct net_device *dev, struct packet_type *pt, struct net_device *orig_dev)
|
2005-04-17 00:20:36 +02:00
|
|
|
{
|
|
|
|
struct ipv6hdr *hdr;
|
|
|
|
u32 pkt_len;
|
2006-11-04 12:11:37 +01:00
|
|
|
struct inet6_dev *idev;
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2006-11-04 12:11:37 +01:00
|
|
|
if (skb->pkt_type == PACKET_OTHERHOST) {
|
|
|
|
kfree_skb(skb);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
rcu_read_lock();
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2006-11-04 12:11:37 +01:00
|
|
|
idev = __in6_dev_get(skb->dev);
|
|
|
|
|
|
|
|
IP6_INC_STATS_BH(idev, IPSTATS_MIB_INRECEIVES);
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
if ((skb = skb_share_check(skb, GFP_ATOMIC)) == NULL) {
|
2006-11-04 12:11:37 +01:00
|
|
|
IP6_INC_STATS_BH(idev, IPSTATS_MIB_INDISCARDS);
|
|
|
|
rcu_read_unlock();
|
2005-04-17 00:20:36 +02:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2006-07-25 08:44:44 +02:00
|
|
|
memset(IP6CB(skb), 0, sizeof(struct inet6_skb_parm));
|
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
/*
|
|
|
|
* Store incoming device index. When the packet will
|
|
|
|
* be queued, we cannot refer to skb->dev anymore.
|
|
|
|
*
|
|
|
|
* BTW, when we send a packet for our own local address on a
|
|
|
|
* non-loopback interface (e.g. ethX), it is being delivered
|
|
|
|
* via the loopback interface (lo) here; skb->dev = &loopback_dev.
|
|
|
|
* It, however, should be considered as if it is being
|
|
|
|
* arrived via the sending interface (ethX), because of the
|
|
|
|
* nature of scoping architecture. --yoshfuji
|
|
|
|
*/
|
2006-10-13 09:17:25 +02:00
|
|
|
IP6CB(skb)->iif = skb->dst ? ip6_dst_idev(skb->dst)->dev->ifindex : dev->ifindex;
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2006-06-30 22:35:46 +02:00
|
|
|
if (unlikely(!pskb_may_pull(skb, sizeof(*hdr))))
|
2005-04-17 00:20:36 +02:00
|
|
|
goto err;
|
|
|
|
|
2007-04-26 02:54:47 +02:00
|
|
|
hdr = ipv6_hdr(skb);
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
if (hdr->version != 6)
|
|
|
|
goto err;
|
|
|
|
|
2007-04-11 06:21:55 +02:00
|
|
|
skb->transport_header = skb->network_header + sizeof(*hdr);
|
2006-01-07 08:02:34 +01:00
|
|
|
IP6CB(skb)->nhoff = offsetof(struct ipv6hdr, nexthdr);
|
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
pkt_len = ntohs(hdr->payload_len);
|
|
|
|
|
|
|
|
/* pkt_len may be zero if Jumbo payload option is present */
|
|
|
|
if (pkt_len || hdr->nexthdr != NEXTHDR_HOP) {
|
2007-04-05 08:54:59 +02:00
|
|
|
if (pkt_len + sizeof(struct ipv6hdr) > skb->len) {
|
|
|
|
IP6_INC_STATS_BH(idev, IPSTATS_MIB_INTRUNCATEDPKTS);
|
|
|
|
goto drop;
|
|
|
|
}
|
2005-04-17 00:20:36 +02:00
|
|
|
if (pskb_trim_rcsum(skb, pkt_len + sizeof(struct ipv6hdr))) {
|
2006-11-04 12:11:37 +01:00
|
|
|
IP6_INC_STATS_BH(idev, IPSTATS_MIB_INHDRERRORS);
|
2005-04-17 00:20:36 +02:00
|
|
|
goto drop;
|
|
|
|
}
|
2007-04-26 02:54:47 +02:00
|
|
|
hdr = ipv6_hdr(skb);
|
2005-04-17 00:20:36 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (hdr->nexthdr == NEXTHDR_HOP) {
|
2006-08-24 04:19:50 +02:00
|
|
|
if (ipv6_parse_hopopts(&skb) < 0) {
|
2006-11-04 12:11:37 +01:00
|
|
|
IP6_INC_STATS_BH(idev, IPSTATS_MIB_INHDRERRORS);
|
|
|
|
rcu_read_unlock();
|
2005-04-17 00:20:36 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2006-11-04 12:11:37 +01:00
|
|
|
rcu_read_unlock();
|
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
return NF_HOOK(PF_INET6,NF_IP6_PRE_ROUTING, skb, dev, NULL, ip6_rcv_finish);
|
|
|
|
err:
|
2006-11-04 12:11:37 +01:00
|
|
|
IP6_INC_STATS_BH(idev, IPSTATS_MIB_INHDRERRORS);
|
2005-04-17 00:20:36 +02:00
|
|
|
drop:
|
2006-11-04 12:11:37 +01:00
|
|
|
rcu_read_unlock();
|
2005-04-17 00:20:36 +02:00
|
|
|
kfree_skb(skb);
|
|
|
|
out:
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Deliver the packet to the host
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
|
|
static inline int ip6_input_finish(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct inet6_protocol *ipprot;
|
|
|
|
struct sock *raw_sk;
|
|
|
|
unsigned int nhoff;
|
|
|
|
int nexthdr;
|
|
|
|
u8 hash;
|
2006-11-04 12:11:37 +01:00
|
|
|
struct inet6_dev *idev;
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Parse extension headers
|
|
|
|
*/
|
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
resubmit:
|
2006-11-04 12:11:37 +01:00
|
|
|
idev = ip6_dst_idev(skb->dst);
|
2007-04-26 02:55:53 +02:00
|
|
|
if (!pskb_pull(skb, skb_transport_offset(skb)))
|
2005-04-17 00:20:36 +02:00
|
|
|
goto discard;
|
2006-01-07 08:02:34 +01:00
|
|
|
nhoff = IP6CB(skb)->nhoff;
|
2007-04-11 05:50:43 +02:00
|
|
|
nexthdr = skb_network_header(skb)[nhoff];
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
raw_sk = sk_head(&raw_v6_htable[nexthdr & (MAX_INET_PROTOS - 1)]);
|
2005-08-10 04:45:02 +02:00
|
|
|
if (raw_sk && !ipv6_raw_deliver(skb, nexthdr))
|
|
|
|
raw_sk = NULL;
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
hash = nexthdr & (MAX_INET_PROTOS - 1);
|
|
|
|
if ((ipprot = rcu_dereference(inet6_protos[hash])) != NULL) {
|
|
|
|
int ret;
|
2007-02-09 15:24:49 +01:00
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
if (ipprot->flags & INET6_PROTO_FINAL) {
|
2007-02-09 15:24:49 +01:00
|
|
|
struct ipv6hdr *hdr;
|
2005-04-17 00:20:36 +02:00
|
|
|
|
[NETFILTER]: Add nf_conntrack subsystem.
The existing connection tracking subsystem in netfilter can only
handle ipv4. There were basically two choices present to add
connection tracking support for ipv6. We could either duplicate all
of the ipv4 connection tracking code into an ipv6 counterpart, or (the
choice taken by these patches) we could design a generic layer that
could handle both ipv4 and ipv6 and thus requiring only one sub-protocol
(TCP, UDP, etc.) connection tracking helper module to be written.
In fact nf_conntrack is capable of working with any layer 3
protocol.
The existing ipv4 specific conntrack code could also not deal
with the pecularities of doing connection tracking on ipv6,
which is also cured here. For example, these issues include:
1) ICMPv6 handling, which is used for neighbour discovery in
ipv6 thus some messages such as these should not participate
in connection tracking since effectively they are like ARP
messages
2) fragmentation must be handled differently in ipv6, because
the simplistic "defrag, connection track and NAT, refrag"
(which the existing ipv4 connection tracking does) approach simply
isn't feasible in ipv6
3) ipv6 extension header parsing must occur at the correct spots
before and after connection tracking decisions, and there were
no provisions for this in the existing connection tracking
design
4) ipv6 has no need for stateful NAT
The ipv4 specific conntrack layer is kept around, until all of
the ipv4 specific conntrack helpers are ported over to nf_conntrack
and it is feature complete. Once that occurs, the old conntrack
stuff will get placed into the feature-removal-schedule and we will
fully kill it off 6 months later.
Signed-off-by: Yasuyuki Kozakai <yasuyuki.kozakai@toshiba.co.jp>
Signed-off-by: Harald Welte <laforge@netfilter.org>
Signed-off-by: Arnaldo Carvalho de Melo <acme@mandriva.com>
2005-11-10 01:38:16 +01:00
|
|
|
/* Free reference early: we don't need it any more,
|
|
|
|
and it may hold ip_conntrack module loaded
|
|
|
|
indefinitely. */
|
|
|
|
nf_reset(skb);
|
|
|
|
|
2007-04-11 05:50:43 +02:00
|
|
|
skb_postpull_rcsum(skb, skb_network_header(skb),
|
2007-03-16 21:26:39 +01:00
|
|
|
skb_network_header_len(skb));
|
2007-04-26 02:54:47 +02:00
|
|
|
hdr = ipv6_hdr(skb);
|
2005-04-17 00:20:36 +02:00
|
|
|
if (ipv6_addr_is_multicast(&hdr->daddr) &&
|
|
|
|
!ipv6_chk_mcast_addr(skb->dev, &hdr->daddr,
|
|
|
|
&hdr->saddr) &&
|
|
|
|
!ipv6_is_mld(skb, nexthdr))
|
|
|
|
goto discard;
|
|
|
|
}
|
|
|
|
if (!(ipprot->flags & INET6_PROTO_NOPOLICY) &&
|
2007-02-09 15:24:49 +01:00
|
|
|
!xfrm6_policy_check(NULL, XFRM_POLICY_IN, skb))
|
2005-04-17 00:20:36 +02:00
|
|
|
goto discard;
|
2007-02-09 15:24:49 +01:00
|
|
|
|
2006-01-07 08:02:34 +01:00
|
|
|
ret = ipprot->handler(&skb);
|
2005-04-17 00:20:36 +02:00
|
|
|
if (ret > 0)
|
|
|
|
goto resubmit;
|
|
|
|
else if (ret == 0)
|
2006-11-04 12:11:37 +01:00
|
|
|
IP6_INC_STATS_BH(idev, IPSTATS_MIB_INDELIVERS);
|
2005-04-17 00:20:36 +02:00
|
|
|
} else {
|
|
|
|
if (!raw_sk) {
|
|
|
|
if (xfrm6_policy_check(NULL, XFRM_POLICY_IN, skb)) {
|
2006-11-04 12:11:37 +01:00
|
|
|
IP6_INC_STATS_BH(idev, IPSTATS_MIB_INUNKNOWNPROTOS);
|
2005-08-17 06:03:41 +02:00
|
|
|
icmpv6_send(skb, ICMPV6_PARAMPROB,
|
2007-02-09 15:24:49 +01:00
|
|
|
ICMPV6_UNK_NEXTHDR, nhoff,
|
|
|
|
skb->dev);
|
2005-04-17 00:20:36 +02:00
|
|
|
}
|
2005-08-17 06:03:41 +02:00
|
|
|
} else
|
2006-11-04 12:11:37 +01:00
|
|
|
IP6_INC_STATS_BH(idev, IPSTATS_MIB_INDELIVERS);
|
2005-08-17 06:03:41 +02:00
|
|
|
kfree_skb(skb);
|
2005-04-17 00:20:36 +02:00
|
|
|
}
|
|
|
|
rcu_read_unlock();
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
discard:
|
2006-11-04 12:11:37 +01:00
|
|
|
IP6_INC_STATS_BH(idev, IPSTATS_MIB_INDISCARDS);
|
2005-04-17 00:20:36 +02:00
|
|
|
rcu_read_unlock();
|
|
|
|
kfree_skb(skb);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int ip6_input(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return NF_HOOK(PF_INET6,NF_IP6_LOCAL_IN, skb, skb->dev, NULL, ip6_input_finish);
|
|
|
|
}
|
|
|
|
|
|
|
|
int ip6_mc_input(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct ipv6hdr *hdr;
|
|
|
|
int deliver;
|
|
|
|
|
2006-11-04 12:11:37 +01:00
|
|
|
IP6_INC_STATS_BH(ip6_dst_idev(skb->dst), IPSTATS_MIB_INMCASTPKTS);
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2007-04-26 02:54:47 +02:00
|
|
|
hdr = ipv6_hdr(skb);
|
2007-05-14 12:00:27 +02:00
|
|
|
deliver = unlikely(skb->dev->flags & (IFF_PROMISC|IFF_ALLMULTI)) ||
|
2005-04-17 00:20:36 +02:00
|
|
|
ipv6_chk_mcast_addr(skb->dev, &hdr->daddr, NULL);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* IPv6 multicast router mode isnt currently supported.
|
|
|
|
*/
|
|
|
|
#if 0
|
|
|
|
if (ipv6_config.multicast_route) {
|
|
|
|
int addr_type;
|
|
|
|
|
|
|
|
addr_type = ipv6_addr_type(&hdr->daddr);
|
|
|
|
|
|
|
|
if (!(addr_type & (IPV6_ADDR_LOOPBACK | IPV6_ADDR_LINKLOCAL))) {
|
|
|
|
struct sk_buff *skb2;
|
|
|
|
struct dst_entry *dst;
|
|
|
|
|
|
|
|
dst = skb->dst;
|
2007-02-09 15:24:49 +01:00
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
if (deliver) {
|
|
|
|
skb2 = skb_clone(skb, GFP_ATOMIC);
|
|
|
|
dst_output(skb2);
|
|
|
|
} else {
|
|
|
|
dst_output(skb);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
if (likely(deliver)) {
|
|
|
|
ip6_input(skb);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
/* discard */
|
|
|
|
kfree_skb(skb);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|