11da177e4SLinus Torvalds /* 21da177e4SLinus Torvalds * IPv6 input 31da177e4SLinus Torvalds * Linux INET6 implementation 41da177e4SLinus Torvalds * 51da177e4SLinus Torvalds * Authors: 61da177e4SLinus Torvalds * Pedro Roque <roque@di.fc.ul.pt> 71da177e4SLinus Torvalds * Ian P. Morris <I.P.Morris@soton.ac.uk> 81da177e4SLinus Torvalds * 91da177e4SLinus Torvalds * Based in linux/net/ipv4/ip_input.c 101da177e4SLinus Torvalds * 111da177e4SLinus Torvalds * This program is free software; you can redistribute it and/or 121da177e4SLinus Torvalds * modify it under the terms of the GNU General Public License 131da177e4SLinus Torvalds * as published by the Free Software Foundation; either version 141da177e4SLinus Torvalds * 2 of the License, or (at your option) any later version. 151da177e4SLinus Torvalds */ 161da177e4SLinus Torvalds /* Changes 171da177e4SLinus Torvalds * 181da177e4SLinus Torvalds * Mitsuru KANDA @USAGI and 191da177e4SLinus Torvalds * YOSHIFUJI Hideaki @USAGI: Remove ipv6_parse_exthdrs(). 201da177e4SLinus Torvalds */ 211da177e4SLinus Torvalds 221da177e4SLinus Torvalds #include <linux/errno.h> 231da177e4SLinus Torvalds #include <linux/types.h> 241da177e4SLinus Torvalds #include <linux/socket.h> 251da177e4SLinus Torvalds #include <linux/sockios.h> 261da177e4SLinus Torvalds #include <linux/net.h> 271da177e4SLinus Torvalds #include <linux/netdevice.h> 281da177e4SLinus Torvalds #include <linux/in6.h> 291da177e4SLinus Torvalds #include <linux/icmpv6.h> 307bc570c8SYOSHIFUJI Hideaki #include <linux/mroute6.h> 315a0e3ad6STejun Heo #include <linux/slab.h> 321da177e4SLinus Torvalds 331da177e4SLinus Torvalds #include <linux/netfilter.h> 341da177e4SLinus Torvalds #include <linux/netfilter_ipv6.h> 351da177e4SLinus Torvalds 361da177e4SLinus Torvalds #include <net/sock.h> 371da177e4SLinus Torvalds #include <net/snmp.h> 381da177e4SLinus Torvalds 391da177e4SLinus Torvalds #include <net/ipv6.h> 401da177e4SLinus Torvalds #include <net/protocol.h> 411da177e4SLinus Torvalds #include <net/transp_v6.h> 421da177e4SLinus Torvalds #include <net/rawv6.h> 431da177e4SLinus Torvalds #include <net/ndisc.h> 441da177e4SLinus Torvalds #include <net/ip6_route.h> 451da177e4SLinus Torvalds #include <net/addrconf.h> 461da177e4SLinus Torvalds #include <net/xfrm.h> 471f07d03eSEric Dumazet #include <net/inet_ecn.h> 4848fb6b55SWei-Chun Chao #include <net/dst_metadata.h> 491da177e4SLinus Torvalds 50d8269e2cSEdward Cree static void ip6_rcv_finish_core(struct net *net, struct sock *sk, 51d8269e2cSEdward Cree struct sk_buff *skb) 521da177e4SLinus Torvalds { 53dddb64bcSsubashab@codeaurora.org void (*edemux)(struct sk_buff *skb); 54dddb64bcSsubashab@codeaurora.org 55e21145a9SNikolay Borisov if (net->ipv4.sysctl_ip_early_demux && !skb_dst(skb) && skb->sk == NULL) { 56c7109986SEric Dumazet const struct inet6_protocol *ipprot; 57c7109986SEric Dumazet 58c7109986SEric Dumazet ipprot = rcu_dereference(inet6_protos[ipv6_hdr(skb)->nexthdr]); 59dddb64bcSsubashab@codeaurora.org if (ipprot && (edemux = READ_ONCE(ipprot->early_demux))) 60dddb64bcSsubashab@codeaurora.org edemux(skb); 61c7109986SEric Dumazet } 6248fb6b55SWei-Chun Chao if (!skb_valid_dst(skb)) 631da177e4SLinus Torvalds ip6_route_input(skb); 64d8269e2cSEdward Cree } 65d8269e2cSEdward Cree 66d8269e2cSEdward Cree int ip6_rcv_finish(struct net *net, struct sock *sk, struct sk_buff *skb) 67d8269e2cSEdward Cree { 68d8269e2cSEdward Cree /* if ingress device is enslaved to an L3 master device pass the 69d8269e2cSEdward Cree * skb to its handler for processing 70d8269e2cSEdward Cree */ 71d8269e2cSEdward Cree skb = l3mdev_ip6_rcv(skb); 72d8269e2cSEdward Cree if (!skb) 73d8269e2cSEdward Cree return NET_RX_SUCCESS; 74d8269e2cSEdward Cree ip6_rcv_finish_core(net, sk, skb); 751da177e4SLinus Torvalds 761da177e4SLinus Torvalds return dst_input(skb); 771da177e4SLinus Torvalds } 781da177e4SLinus Torvalds 79d8269e2cSEdward Cree static void ip6_sublist_rcv_finish(struct list_head *head) 80d8269e2cSEdward Cree { 81d8269e2cSEdward Cree struct sk_buff *skb, *next; 82d8269e2cSEdward Cree 83d8269e2cSEdward Cree list_for_each_entry_safe(skb, next, head, list) 84d8269e2cSEdward Cree dst_input(skb); 85d8269e2cSEdward Cree } 86d8269e2cSEdward Cree 87d8269e2cSEdward Cree static void ip6_list_rcv_finish(struct net *net, struct sock *sk, 88d8269e2cSEdward Cree struct list_head *head) 89d8269e2cSEdward Cree { 90d8269e2cSEdward Cree struct dst_entry *curr_dst = NULL; 91d8269e2cSEdward Cree struct sk_buff *skb, *next; 92d8269e2cSEdward Cree struct list_head sublist; 93d8269e2cSEdward Cree 94d8269e2cSEdward Cree INIT_LIST_HEAD(&sublist); 95d8269e2cSEdward Cree list_for_each_entry_safe(skb, next, head, list) { 96d8269e2cSEdward Cree struct dst_entry *dst; 97d8269e2cSEdward Cree 98d8269e2cSEdward Cree list_del(&skb->list); 99d8269e2cSEdward Cree /* if ingress device is enslaved to an L3 master device pass the 100d8269e2cSEdward Cree * skb to its handler for processing 101d8269e2cSEdward Cree */ 102d8269e2cSEdward Cree skb = l3mdev_ip6_rcv(skb); 103d8269e2cSEdward Cree if (!skb) 104d8269e2cSEdward Cree continue; 105d8269e2cSEdward Cree ip6_rcv_finish_core(net, sk, skb); 106d8269e2cSEdward Cree dst = skb_dst(skb); 107d8269e2cSEdward Cree if (curr_dst != dst) { 108d8269e2cSEdward Cree /* dispatch old sublist */ 109d8269e2cSEdward Cree if (!list_empty(&sublist)) 110d8269e2cSEdward Cree ip6_sublist_rcv_finish(&sublist); 111d8269e2cSEdward Cree /* start new sublist */ 112d8269e2cSEdward Cree INIT_LIST_HEAD(&sublist); 113d8269e2cSEdward Cree curr_dst = dst; 114d8269e2cSEdward Cree } 115d8269e2cSEdward Cree list_add_tail(&skb->list, &sublist); 116d8269e2cSEdward Cree } 117d8269e2cSEdward Cree /* dispatch final sublist */ 118d8269e2cSEdward Cree ip6_sublist_rcv_finish(&sublist); 119d8269e2cSEdward Cree } 120d8269e2cSEdward Cree 121d8269e2cSEdward Cree static struct sk_buff *ip6_rcv_core(struct sk_buff *skb, struct net_device *dev, 122d8269e2cSEdward Cree struct net *net) 1231da177e4SLinus Torvalds { 124b71d1d42SEric Dumazet const struct ipv6hdr *hdr; 1251da177e4SLinus Torvalds u32 pkt_len; 126a11d206dSYOSHIFUJI Hideaki struct inet6_dev *idev; 1271da177e4SLinus Torvalds 128a11d206dSYOSHIFUJI Hideaki if (skb->pkt_type == PACKET_OTHERHOST) { 129a11d206dSYOSHIFUJI Hideaki kfree_skb(skb); 130d8269e2cSEdward Cree return NULL; 131a11d206dSYOSHIFUJI Hideaki } 1321da177e4SLinus Torvalds 133a11d206dSYOSHIFUJI Hideaki rcu_read_lock(); 134a11d206dSYOSHIFUJI Hideaki 135a11d206dSYOSHIFUJI Hideaki idev = __in6_dev_get(skb->dev); 136a11d206dSYOSHIFUJI Hideaki 137c2005eb0SEric Dumazet __IP6_UPD_PO_STATS(net, idev, IPSTATS_MIB_IN, skb->len); 1381da177e4SLinus Torvalds 139778d80beSYOSHIFUJI Hideaki if ((skb = skb_share_check(skb, GFP_ATOMIC)) == NULL || 140778d80beSYOSHIFUJI Hideaki !idev || unlikely(idev->cnf.disable_ipv6)) { 1411d015503SEric Dumazet __IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS); 14271f6f6dfSJesper Nilsson goto drop; 1431da177e4SLinus Torvalds } 1441da177e4SLinus Torvalds 1456b7fdc3aSGuillaume Chazarain memset(IP6CB(skb), 0, sizeof(struct inet6_skb_parm)); 1466b7fdc3aSGuillaume Chazarain 1471da177e4SLinus Torvalds /* 1481da177e4SLinus Torvalds * Store incoming device index. When the packet will 1491da177e4SLinus Torvalds * be queued, we cannot refer to skb->dev anymore. 1501da177e4SLinus Torvalds * 1511da177e4SLinus Torvalds * BTW, when we send a packet for our own local address on a 1521da177e4SLinus Torvalds * non-loopback interface (e.g. ethX), it is being delivered 153de3cb747SDaniel Lezcano * via the loopback interface (lo) here; skb->dev = loopback_dev. 1541da177e4SLinus Torvalds * It, however, should be considered as if it is being 1551da177e4SLinus Torvalds * arrived via the sending interface (ethX), because of the 1561da177e4SLinus Torvalds * nature of scoping architecture. --yoshfuji 1571da177e4SLinus Torvalds */ 15848fb6b55SWei-Chun Chao IP6CB(skb)->iif = skb_valid_dst(skb) ? ip6_dst_idev(skb_dst(skb))->dev->ifindex : dev->ifindex; 1591da177e4SLinus Torvalds 1602889139aSHerbert Xu if (unlikely(!pskb_may_pull(skb, sizeof(*hdr)))) 1611da177e4SLinus Torvalds goto err; 1621da177e4SLinus Torvalds 1630660e03fSArnaldo Carvalho de Melo hdr = ipv6_hdr(skb); 1641da177e4SLinus Torvalds 1651da177e4SLinus Torvalds if (hdr->version != 6) 1661da177e4SLinus Torvalds goto err; 1671da177e4SLinus Torvalds 1681d015503SEric Dumazet __IP6_ADD_STATS(net, idev, 1691f07d03eSEric Dumazet IPSTATS_MIB_NOECTPKTS + 1701f07d03eSEric Dumazet (ipv6_get_dsfield(hdr) & INET_ECN_MASK), 1711f07d03eSEric Dumazet max_t(unsigned short, 1, skb_shinfo(skb)->gso_segs)); 172f630e43aSYOSHIFUJI Hideaki /* 173f630e43aSYOSHIFUJI Hideaki * RFC4291 2.5.3 1740aa8c13eSFlorian Westphal * The loopback address must not be used as the source address in IPv6 1750aa8c13eSFlorian Westphal * packets that are sent outside of a single node. [..] 176f630e43aSYOSHIFUJI Hideaki * A packet received on an interface with a destination address 177f630e43aSYOSHIFUJI Hideaki * of loopback must be dropped. 178f630e43aSYOSHIFUJI Hideaki */ 1790aa8c13eSFlorian Westphal if ((ipv6_addr_loopback(&hdr->saddr) || 1800aa8c13eSFlorian Westphal ipv6_addr_loopback(&hdr->daddr)) && 1813ede0bbcSRobert Shearman !(dev->flags & IFF_LOOPBACK) && 1823ede0bbcSRobert Shearman !netif_is_l3_master(dev)) 183f630e43aSYOSHIFUJI Hideaki goto err; 184f630e43aSYOSHIFUJI Hideaki 1851c4a154eSHannes Frederic Sowa /* RFC4291 Errata ID: 3480 1861c4a154eSHannes Frederic Sowa * Interface-Local scope spans only a single interface on a 1871c4a154eSHannes Frederic Sowa * node and is useful only for loopback transmission of 1881c4a154eSHannes Frederic Sowa * multicast. Packets with interface-local scope received 1891c4a154eSHannes Frederic Sowa * from another node must be discarded. 1901c4a154eSHannes Frederic Sowa */ 1911c4a154eSHannes Frederic Sowa if (!(skb->pkt_type == PACKET_LOOPBACK || 1921c4a154eSHannes Frederic Sowa dev->flags & IFF_LOOPBACK) && 1931c4a154eSHannes Frederic Sowa ipv6_addr_is_multicast(&hdr->daddr) && 1941c4a154eSHannes Frederic Sowa IPV6_ADDR_MC_SCOPE(&hdr->daddr) == 1) 1951c4a154eSHannes Frederic Sowa goto err; 1961c4a154eSHannes Frederic Sowa 197abbc3043SJohannes Berg /* If enabled, drop unicast packets that were encapsulated in link-layer 198abbc3043SJohannes Berg * multicast or broadcast to protected against the so-called "hole-196" 199abbc3043SJohannes Berg * attack in 802.11 wireless. 200abbc3043SJohannes Berg */ 201abbc3043SJohannes Berg if (!ipv6_addr_is_multicast(&hdr->daddr) && 202abbc3043SJohannes Berg (skb->pkt_type == PACKET_BROADCAST || 203abbc3043SJohannes Berg skb->pkt_type == PACKET_MULTICAST) && 204abbc3043SJohannes Berg idev->cnf.drop_unicast_in_l2_multicast) 205abbc3043SJohannes Berg goto err; 206abbc3043SJohannes Berg 20720314092SHannes Frederic Sowa /* RFC4291 2.7 20820314092SHannes Frederic Sowa * Nodes must not originate a packet to a multicast address whose scope 20920314092SHannes Frederic Sowa * field contains the reserved value 0; if such a packet is received, it 21020314092SHannes Frederic Sowa * must be silently dropped. 21120314092SHannes Frederic Sowa */ 21220314092SHannes Frederic Sowa if (ipv6_addr_is_multicast(&hdr->daddr) && 21320314092SHannes Frederic Sowa IPV6_ADDR_MC_SCOPE(&hdr->daddr) == 0) 21420314092SHannes Frederic Sowa goto err; 21520314092SHannes Frederic Sowa 216c457338dSBrian Haley /* 217c457338dSBrian Haley * RFC4291 2.7 218c457338dSBrian Haley * Multicast addresses must not be used as source addresses in IPv6 219c457338dSBrian Haley * packets or appear in any Routing header. 220c457338dSBrian Haley */ 221c457338dSBrian Haley if (ipv6_addr_is_multicast(&hdr->saddr)) 222c457338dSBrian Haley goto err; 223c457338dSBrian Haley 224b0e380b1SArnaldo Carvalho de Melo skb->transport_header = skb->network_header + sizeof(*hdr); 225951dbc8aSPatrick McHardy IP6CB(skb)->nhoff = offsetof(struct ipv6hdr, nexthdr); 226951dbc8aSPatrick McHardy 2271da177e4SLinus Torvalds pkt_len = ntohs(hdr->payload_len); 2281da177e4SLinus Torvalds 2291da177e4SLinus Torvalds /* pkt_len may be zero if Jumbo payload option is present */ 2301da177e4SLinus Torvalds if (pkt_len || hdr->nexthdr != NEXTHDR_HOP) { 23160e5c166SMitsuru Chinen if (pkt_len + sizeof(struct ipv6hdr) > skb->len) { 2321d015503SEric Dumazet __IP6_INC_STATS(net, 233483a47d2SDenis V. Lunev idev, IPSTATS_MIB_INTRUNCATEDPKTS); 23460e5c166SMitsuru Chinen goto drop; 23560e5c166SMitsuru Chinen } 2361da177e4SLinus Torvalds if (pskb_trim_rcsum(skb, pkt_len + sizeof(struct ipv6hdr))) { 2371d015503SEric Dumazet __IP6_INC_STATS(net, idev, IPSTATS_MIB_INHDRERRORS); 2381da177e4SLinus Torvalds goto drop; 2391da177e4SLinus Torvalds } 2400660e03fSArnaldo Carvalho de Melo hdr = ipv6_hdr(skb); 2411da177e4SLinus Torvalds } 2421da177e4SLinus Torvalds 2431da177e4SLinus Torvalds if (hdr->nexthdr == NEXTHDR_HOP) { 244e5bbef20SHerbert Xu if (ipv6_parse_hopopts(skb) < 0) { 2451d015503SEric Dumazet __IP6_INC_STATS(net, idev, IPSTATS_MIB_INHDRERRORS); 246a11d206dSYOSHIFUJI Hideaki rcu_read_unlock(); 247d8269e2cSEdward Cree return NULL; 2481da177e4SLinus Torvalds } 2491da177e4SLinus Torvalds } 2501da177e4SLinus Torvalds 251a11d206dSYOSHIFUJI Hideaki rcu_read_unlock(); 252a11d206dSYOSHIFUJI Hideaki 25371f9dacdSHerbert Xu /* Must drop socket now because of tproxy. */ 25471f9dacdSHerbert Xu skb_orphan(skb); 25571f9dacdSHerbert Xu 256d8269e2cSEdward Cree return skb; 2571da177e4SLinus Torvalds err: 2581d015503SEric Dumazet __IP6_INC_STATS(net, idev, IPSTATS_MIB_INHDRERRORS); 2591da177e4SLinus Torvalds drop: 260a11d206dSYOSHIFUJI Hideaki rcu_read_unlock(); 2611da177e4SLinus Torvalds kfree_skb(skb); 262d8269e2cSEdward Cree return NULL; 263d8269e2cSEdward Cree } 264d8269e2cSEdward Cree 265d8269e2cSEdward Cree int ipv6_rcv(struct sk_buff *skb, struct net_device *dev, struct packet_type *pt, struct net_device *orig_dev) 266d8269e2cSEdward Cree { 267d8269e2cSEdward Cree struct net *net = dev_net(skb->dev); 268d8269e2cSEdward Cree 269d8269e2cSEdward Cree skb = ip6_rcv_core(skb, dev, net); 270d8269e2cSEdward Cree if (skb == NULL) 2715c91faceSMark Smith return NET_RX_DROP; 272d8269e2cSEdward Cree return NF_HOOK(NFPROTO_IPV6, NF_INET_PRE_ROUTING, 273d8269e2cSEdward Cree net, NULL, skb, dev, NULL, 274d8269e2cSEdward Cree ip6_rcv_finish); 275d8269e2cSEdward Cree } 276d8269e2cSEdward Cree 277d8269e2cSEdward Cree static void ip6_sublist_rcv(struct list_head *head, struct net_device *dev, 278d8269e2cSEdward Cree struct net *net) 279d8269e2cSEdward Cree { 280d8269e2cSEdward Cree NF_HOOK_LIST(NFPROTO_IPV6, NF_INET_PRE_ROUTING, net, NULL, 281d8269e2cSEdward Cree head, dev, NULL, ip6_rcv_finish); 282d8269e2cSEdward Cree ip6_list_rcv_finish(net, NULL, head); 283d8269e2cSEdward Cree } 284d8269e2cSEdward Cree 285d8269e2cSEdward Cree /* Receive a list of IPv6 packets */ 286d8269e2cSEdward Cree void ipv6_list_rcv(struct list_head *head, struct packet_type *pt, 287d8269e2cSEdward Cree struct net_device *orig_dev) 288d8269e2cSEdward Cree { 289d8269e2cSEdward Cree struct net_device *curr_dev = NULL; 290d8269e2cSEdward Cree struct net *curr_net = NULL; 291d8269e2cSEdward Cree struct sk_buff *skb, *next; 292d8269e2cSEdward Cree struct list_head sublist; 293d8269e2cSEdward Cree 294d8269e2cSEdward Cree INIT_LIST_HEAD(&sublist); 295d8269e2cSEdward Cree list_for_each_entry_safe(skb, next, head, list) { 296d8269e2cSEdward Cree struct net_device *dev = skb->dev; 297d8269e2cSEdward Cree struct net *net = dev_net(dev); 298d8269e2cSEdward Cree 299d8269e2cSEdward Cree list_del(&skb->list); 300d8269e2cSEdward Cree skb = ip6_rcv_core(skb, dev, net); 301d8269e2cSEdward Cree if (skb == NULL) 302d8269e2cSEdward Cree continue; 303d8269e2cSEdward Cree 304d8269e2cSEdward Cree if (curr_dev != dev || curr_net != net) { 305d8269e2cSEdward Cree /* dispatch old sublist */ 306d8269e2cSEdward Cree if (!list_empty(&sublist)) 307d8269e2cSEdward Cree ip6_sublist_rcv(&sublist, curr_dev, curr_net); 308d8269e2cSEdward Cree /* start new sublist */ 309d8269e2cSEdward Cree INIT_LIST_HEAD(&sublist); 310d8269e2cSEdward Cree curr_dev = dev; 311d8269e2cSEdward Cree curr_net = net; 312d8269e2cSEdward Cree } 313d8269e2cSEdward Cree list_add_tail(&skb->list, &sublist); 314d8269e2cSEdward Cree } 315d8269e2cSEdward Cree /* dispatch final sublist */ 316d8269e2cSEdward Cree ip6_sublist_rcv(&sublist, curr_dev, curr_net); 3171da177e4SLinus Torvalds } 3181da177e4SLinus Torvalds 3191da177e4SLinus Torvalds /* 3201da177e4SLinus Torvalds * Deliver the packet to the host 3211da177e4SLinus Torvalds */ 3221da177e4SLinus Torvalds 3231da177e4SLinus Torvalds 3240c4b51f0SEric W. Biederman static int ip6_input_finish(struct net *net, struct sock *sk, struct sk_buff *skb) 3251da177e4SLinus Torvalds { 32641135cc8SAlexey Dobriyan const struct inet6_protocol *ipprot; 327f9242b6bSDavid S. Miller struct inet6_dev *idev; 3281da177e4SLinus Torvalds unsigned int nhoff; 329a50feda5SEric Dumazet int nexthdr; 330a50feda5SEric Dumazet bool raw; 3311da44f9cSTom Herbert bool have_final = false; 3321da177e4SLinus Torvalds 3331da177e4SLinus Torvalds /* 3341da177e4SLinus Torvalds * Parse extension headers 3351da177e4SLinus Torvalds */ 3361da177e4SLinus Torvalds 3371da177e4SLinus Torvalds rcu_read_lock(); 3381b0ccfe5SDavid S. Miller resubmit: 339adf30907SEric Dumazet idev = ip6_dst_idev(skb_dst(skb)); 340ea2ae17dSArnaldo Carvalho de Melo if (!pskb_pull(skb, skb_transport_offset(skb))) 3411da177e4SLinus Torvalds goto discard; 342951dbc8aSPatrick McHardy nhoff = IP6CB(skb)->nhoff; 343d56f90a7SArnaldo Carvalho de Melo nexthdr = skb_network_header(skb)[nhoff]; 3441da177e4SLinus Torvalds 3454c64242aSTom Herbert resubmit_final: 34669d6da0bSPavel Emelyanov raw = raw6_local_deliver(skb, nexthdr); 347e5d08d71SIan Morris ipprot = rcu_dereference(inet6_protos[nexthdr]); 34853b24b8fSIan Morris if (ipprot) { 3491da177e4SLinus Torvalds int ret; 3501da177e4SLinus Torvalds 3511da44f9cSTom Herbert if (have_final) { 3521da44f9cSTom Herbert if (!(ipprot->flags & INET6_PROTO_FINAL)) { 3531da44f9cSTom Herbert /* Once we've seen a final protocol don't 3541da44f9cSTom Herbert * allow encapsulation on any non-final 3551da44f9cSTom Herbert * ones. This allows foo in UDP encapsulation 3561da44f9cSTom Herbert * to work. 3571da44f9cSTom Herbert */ 3581da44f9cSTom Herbert goto discard; 3591da44f9cSTom Herbert } 3601da44f9cSTom Herbert } else if (ipprot->flags & INET6_PROTO_FINAL) { 361b71d1d42SEric Dumazet const struct ipv6hdr *hdr; 3625226b6a9SMike Manning int sdif = inet6_sdif(skb); 3635226b6a9SMike Manning struct net_device *dev; 3641da177e4SLinus Torvalds 3651da44f9cSTom Herbert /* Only do this once for first final protocol */ 3661da44f9cSTom Herbert have_final = true; 3671da44f9cSTom Herbert 3689fb9cbb1SYasuyuki Kozakai /* Free reference early: we don't need it any more, 3699fb9cbb1SYasuyuki Kozakai and it may hold ip_conntrack module loaded 3709fb9cbb1SYasuyuki Kozakai indefinitely. */ 3719fb9cbb1SYasuyuki Kozakai nf_reset(skb); 3729fb9cbb1SYasuyuki Kozakai 373d56f90a7SArnaldo Carvalho de Melo skb_postpull_rcsum(skb, skb_network_header(skb), 374cfe1fc77SArnaldo Carvalho de Melo skb_network_header_len(skb)); 3750660e03fSArnaldo Carvalho de Melo hdr = ipv6_hdr(skb); 3765226b6a9SMike Manning 3775226b6a9SMike Manning /* skb->dev passed may be master dev for vrfs. */ 3785226b6a9SMike Manning if (sdif) { 3795226b6a9SMike Manning dev = dev_get_by_index_rcu(net, sdif); 3805226b6a9SMike Manning if (!dev) 3815226b6a9SMike Manning goto discard; 3825226b6a9SMike Manning } else { 3835226b6a9SMike Manning dev = skb->dev; 3845226b6a9SMike Manning } 3855226b6a9SMike Manning 3861da177e4SLinus Torvalds if (ipv6_addr_is_multicast(&hdr->daddr) && 3875226b6a9SMike Manning !ipv6_chk_mcast_addr(dev, &hdr->daddr, 3881da177e4SLinus Torvalds &hdr->saddr) && 389daad1512SYOSHIFUJI Hideaki / 吉藤英明 !ipv6_is_mld(skb, nexthdr, skb_network_header_len(skb))) 3901da177e4SLinus Torvalds goto discard; 3911da177e4SLinus Torvalds } 3921da177e4SLinus Torvalds if (!(ipprot->flags & INET6_PROTO_NOPOLICY) && 3931da177e4SLinus Torvalds !xfrm6_policy_check(NULL, XFRM_POLICY_IN, skb)) 3941da177e4SLinus Torvalds goto discard; 3951da177e4SLinus Torvalds 396e5bbef20SHerbert Xu ret = ipprot->handler(skb); 3974c64242aSTom Herbert if (ret > 0) { 3984c64242aSTom Herbert if (ipprot->flags & INET6_PROTO_FINAL) { 3994c64242aSTom Herbert /* Not an extension header, most likely UDP 4004c64242aSTom Herbert * encapsulation. Use return value as nexthdr 4014c64242aSTom Herbert * protocol not nhoff (which presumably is 4024c64242aSTom Herbert * not set by handler). 4034c64242aSTom Herbert */ 4044c64242aSTom Herbert nexthdr = ret; 4054c64242aSTom Herbert goto resubmit_final; 4064c64242aSTom Herbert } else { 4071da177e4SLinus Torvalds goto resubmit; 4084c64242aSTom Herbert } 4094c64242aSTom Herbert } else if (ret == 0) { 4101d015503SEric Dumazet __IP6_INC_STATS(net, idev, IPSTATS_MIB_INDELIVERS); 4114c64242aSTom Herbert } 4121da177e4SLinus Torvalds } else { 41369d6da0bSPavel Emelyanov if (!raw) { 4141da177e4SLinus Torvalds if (xfrm6_policy_check(NULL, XFRM_POLICY_IN, skb)) { 4151d015503SEric Dumazet __IP6_INC_STATS(net, idev, 416483a47d2SDenis V. Lunev IPSTATS_MIB_INUNKNOWNPROTOS); 417fad87acaSPatrick McHardy icmpv6_send(skb, ICMPV6_PARAMPROB, 4183ffe533cSAlexey Dobriyan ICMPV6_UNK_NEXTHDR, nhoff); 4191da177e4SLinus Torvalds } 4201da177e4SLinus Torvalds kfree_skb(skb); 421d8c6f4b9SNeil Horman } else { 4221d015503SEric Dumazet __IP6_INC_STATS(net, idev, IPSTATS_MIB_INDELIVERS); 423d8c6f4b9SNeil Horman consume_skb(skb); 424d8c6f4b9SNeil Horman } 4251da177e4SLinus Torvalds } 4261da177e4SLinus Torvalds rcu_read_unlock(); 4271da177e4SLinus Torvalds return 0; 4281da177e4SLinus Torvalds 4291da177e4SLinus Torvalds discard: 4301d015503SEric Dumazet __IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS); 4311da177e4SLinus Torvalds rcu_read_unlock(); 4321da177e4SLinus Torvalds kfree_skb(skb); 4331da177e4SLinus Torvalds return 0; 4341da177e4SLinus Torvalds } 4351da177e4SLinus Torvalds 4361da177e4SLinus Torvalds 4371da177e4SLinus Torvalds int ip6_input(struct sk_buff *skb) 4381da177e4SLinus Torvalds { 43929a26a56SEric W. Biederman return NF_HOOK(NFPROTO_IPV6, NF_INET_LOCAL_IN, 44029a26a56SEric W. Biederman dev_net(skb->dev), NULL, skb, skb->dev, NULL, 4416e23ae2aSPatrick McHardy ip6_input_finish); 4421da177e4SLinus Torvalds } 443b4869aa2SDavid Ahern EXPORT_SYMBOL_GPL(ip6_input); 4441da177e4SLinus Torvalds 4451da177e4SLinus Torvalds int ip6_mc_input(struct sk_buff *skb) 4461da177e4SLinus Torvalds { 4475226b6a9SMike Manning int sdif = inet6_sdif(skb); 448b71d1d42SEric Dumazet const struct ipv6hdr *hdr; 4495226b6a9SMike Manning struct net_device *dev; 450a50feda5SEric Dumazet bool deliver; 4511da177e4SLinus Torvalds 452c2005eb0SEric Dumazet __IP6_UPD_PO_STATS(dev_net(skb_dst(skb)->dev), 453bdb7cc64SStephen Suryaputra __in6_dev_get_safely(skb->dev), IPSTATS_MIB_INMCAST, 454edf391ffSNeil Horman skb->len); 4551da177e4SLinus Torvalds 4565226b6a9SMike Manning /* skb->dev passed may be master dev for vrfs. */ 4575226b6a9SMike Manning if (sdif) { 4585226b6a9SMike Manning rcu_read_lock(); 4595226b6a9SMike Manning dev = dev_get_by_index_rcu(dev_net(skb->dev), sdif); 4605226b6a9SMike Manning if (!dev) { 4615226b6a9SMike Manning rcu_read_unlock(); 4625226b6a9SMike Manning kfree_skb(skb); 4635226b6a9SMike Manning return -ENODEV; 4645226b6a9SMike Manning } 4655226b6a9SMike Manning } else { 4665226b6a9SMike Manning dev = skb->dev; 4675226b6a9SMike Manning } 4685226b6a9SMike Manning 4690660e03fSArnaldo Carvalho de Melo hdr = ipv6_hdr(skb); 4705226b6a9SMike Manning deliver = ipv6_chk_mcast_addr(dev, &hdr->daddr, NULL); 4715226b6a9SMike Manning if (sdif) 4725226b6a9SMike Manning rcu_read_unlock(); 4731da177e4SLinus Torvalds 4747bc570c8SYOSHIFUJI Hideaki #ifdef CONFIG_IPV6_MROUTE 4751da177e4SLinus Torvalds /* 4767bc570c8SYOSHIFUJI Hideaki * IPv6 multicast router mode is now supported ;) 4771da177e4SLinus Torvalds */ 47853b7997fSYOSHIFUJI Hideaki if (dev_net(skb->dev)->ipv6.devconf_all->mc_forwarding && 479ddf64354SHannes Frederic Sowa !(ipv6_addr_type(&hdr->daddr) & 480ddf64354SHannes Frederic Sowa (IPV6_ADDR_LOOPBACK|IPV6_ADDR_LINKLOCAL)) && 4817bc570c8SYOSHIFUJI Hideaki likely(!(IP6CB(skb)->flags & IP6SKB_FORWARDED))) { 4827bc570c8SYOSHIFUJI Hideaki /* 4837bc570c8SYOSHIFUJI Hideaki * Okay, we try to forward - split and duplicate 4847bc570c8SYOSHIFUJI Hideaki * packets. 4857bc570c8SYOSHIFUJI Hideaki */ 4861da177e4SLinus Torvalds struct sk_buff *skb2; 4877bc570c8SYOSHIFUJI Hideaki struct inet6_skb_parm *opt = IP6CB(skb); 4881da177e4SLinus Torvalds 4897bc570c8SYOSHIFUJI Hideaki /* Check for MLD */ 490dd3332bfSYOSHIFUJI Hideaki / 吉藤英明 if (unlikely(opt->flags & IP6SKB_ROUTERALERT)) { 4917bc570c8SYOSHIFUJI Hideaki /* Check if this is a mld message */ 4927bc570c8SYOSHIFUJI Hideaki u8 nexthdr = hdr->nexthdr; 49375f2811cSJesse Gross __be16 frag_off; 4947bc570c8SYOSHIFUJI Hideaki int offset; 4951da177e4SLinus Torvalds 4967bc570c8SYOSHIFUJI Hideaki /* Check if the value of Router Alert 4977bc570c8SYOSHIFUJI Hideaki * is for MLD (0x0000). 4987bc570c8SYOSHIFUJI Hideaki */ 499dd3332bfSYOSHIFUJI Hideaki / 吉藤英明 if (opt->ra == htons(IPV6_OPT_ROUTERALERT_MLD)) { 500a50feda5SEric Dumazet deliver = false; 501aba6096bSYOSHIFUJI Hideaki 5027bc570c8SYOSHIFUJI Hideaki if (!ipv6_ext_hdr(nexthdr)) { 5037bc570c8SYOSHIFUJI Hideaki /* BUG */ 504aba6096bSYOSHIFUJI Hideaki goto out; 5051da177e4SLinus Torvalds } 5067bc570c8SYOSHIFUJI Hideaki offset = ipv6_skip_exthdr(skb, sizeof(*hdr), 50775f2811cSJesse Gross &nexthdr, &frag_off); 5087bc570c8SYOSHIFUJI Hideaki if (offset < 0) 509aba6096bSYOSHIFUJI Hideaki goto out; 5107bc570c8SYOSHIFUJI Hideaki 5114c938d22SAngga if (ipv6_is_mld(skb, nexthdr, offset)) 512a50feda5SEric Dumazet deliver = true; 5134c938d22SAngga 5144c938d22SAngga goto out; 5157bc570c8SYOSHIFUJI Hideaki } 5167bc570c8SYOSHIFUJI Hideaki /* unknown RA - process it normally */ 5177bc570c8SYOSHIFUJI Hideaki } 5187bc570c8SYOSHIFUJI Hideaki 5197bc570c8SYOSHIFUJI Hideaki if (deliver) 5207bc570c8SYOSHIFUJI Hideaki skb2 = skb_clone(skb, GFP_ATOMIC); 5217bc570c8SYOSHIFUJI Hideaki else { 5227bc570c8SYOSHIFUJI Hideaki skb2 = skb; 5237bc570c8SYOSHIFUJI Hideaki skb = NULL; 5247bc570c8SYOSHIFUJI Hideaki } 5257bc570c8SYOSHIFUJI Hideaki 5267bc570c8SYOSHIFUJI Hideaki if (skb2) { 5277bc570c8SYOSHIFUJI Hideaki ip6_mr_input(skb2); 5281da177e4SLinus Torvalds } 5291da177e4SLinus Torvalds } 5307bc570c8SYOSHIFUJI Hideaki out: 531aba6096bSYOSHIFUJI Hideaki #endif 532aba6096bSYOSHIFUJI Hideaki if (likely(deliver)) 5331da177e4SLinus Torvalds ip6_input(skb); 534aba6096bSYOSHIFUJI Hideaki else { 5351da177e4SLinus Torvalds /* discard */ 5361da177e4SLinus Torvalds kfree_skb(skb); 537aba6096bSYOSHIFUJI Hideaki } 5381da177e4SLinus Torvalds 5391da177e4SLinus Torvalds return 0; 5401da177e4SLinus Torvalds } 541