/* * Extension Header handling for IPv6 * Linux INET6 implementation * * Authors: * Pedro Roque * Andi Kleen * Alexey Kuznetsov * * $Id: exthdrs.c,v 1.13 2001/06/19 15:58:56 davem Exp $ * * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU General Public License * as published by the Free Software Foundation; either version * 2 of the License, or (at your option) any later version. */ /* Changes: * yoshfuji : ensure not to overrun while parsing * tlv options. */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include /* * Parsing inbound headers. * * Parsing function "func" returns offset wrt skb->nh of the place, * where next nexthdr value is stored or NULL, if parsing * failed. It should also update skb->h tp point at the next header. */ struct hdrtype_proc { int type; int (*func) (struct sk_buff **, int offset); }; /* * Parsing tlv encoded headers. * * Parsing function "func" returns 1, if parsing succeed * and 0, if it failed. * It MUST NOT touch skb->h. */ struct tlvtype_proc { int type; int (*func) (struct sk_buff *, int offset); }; /********************* Generic functions *********************/ /* An unknown option is detected, decide what to do */ int ip6_tlvopt_unknown(struct sk_buff *skb, int optoff) { switch ((skb->nh.raw[optoff] & 0xC0) >> 6) { case 0: /* ignore */ return 1; case 1: /* drop packet */ break; case 3: /* Send ICMP if not a multicast address and drop packet */ /* Actually, it is redundant check. icmp_send will recheck in any case. */ if (ipv6_addr_is_multicast(&skb->nh.ipv6h->daddr)) break; case 2: /* send ICMP PARM PROB regardless and drop packet */ icmpv6_param_prob(skb, ICMPV6_UNK_OPTION, optoff); return 0; }; kfree_skb(skb); return 0; } /* Parse tlv encoded option header (hop-by-hop or destination) */ static int ip6_parse_tlv(struct tlvtype_proc *procs, struct sk_buff *skb) { struct tlvtype_proc *curr; int off = skb->h.raw - skb->nh.raw; int len = ((skb->h.raw[1]+1)<<3); if ((skb->h.raw + len) - skb->data > skb_headlen(skb)) goto bad; off += 2; len -= 2; while (len > 0) { int optlen = skb->nh.raw[off+1]+2; switch (skb->nh.raw[off]) { case IPV6_TLV_PAD0: optlen = 1; break; case IPV6_TLV_PADN: break; default: /* Other TLV code so scan list */ if (optlen > len) goto bad; for (curr=procs; curr->type >= 0; curr++) { if (curr->type == skb->nh.raw[off]) { /* type specific length/alignment checks will be perfomed in the func(). */ if (curr->func(skb, off) == 0) return 0; break; } } if (curr->type < 0) { if (ip6_tlvopt_unknown(skb, off) == 0) return 0; } break; } off += optlen; len -= optlen; } if (len == 0) return 1; bad: kfree_skb(skb); return 0; } /***************************** Destination options header. *****************************/ struct tlvtype_proc tlvprocdestopt_lst[] = { /* No destination options are defined now */ {-1, NULL} }; static int ipv6_dest_opt(struct sk_buff **skb_ptr, int nhoff) { struct sk_buff *skb=*skb_ptr; struct inet6_skb_parm *opt = (struct inet6_skb_parm *)skb->cb; if (!pskb_may_pull(skb, (skb->h.raw-skb->data)+8) || !pskb_may_pull(skb, (skb->h.raw-skb->data)+((skb->h.raw[1]+1)<<3))) { kfree_skb(skb); return -1; } opt->dst1 = skb->h.raw - skb->nh.raw; if (ip6_parse_tlv(tlvprocdestopt_lst, skb)) { skb->h.raw += ((skb->h.raw[1]+1)<<3); return opt->dst1; } return -1; } /******************************** NONE header. No data in packet. ********************************/ static int ipv6_nodata(struct sk_buff **skb_ptr, int nhoff) { kfree_skb(*skb_ptr); return -1; } /******************************** Routing header. ********************************/ static int ipv6_routing_header(struct sk_buff **skb_ptr, int nhoff) { struct sk_buff *skb = *skb_ptr; struct inet6_skb_parm *opt = (struct inet6_skb_parm *)skb->cb; struct in6_addr *addr; struct in6_addr daddr; int addr_type; int n, i; struct ipv6_rt_hdr *hdr; struct rt0_hdr *rthdr; if (!pskb_may_pull(skb, (skb->h.raw-skb->data)+8) || !pskb_may_pull(skb, (skb->h.raw-skb->data)+((skb->h.raw[1]+1)<<3))) { IP6_INC_STATS_BH(Ip6InHdrErrors); kfree_skb(skb); return -1; } hdr = (struct ipv6_rt_hdr *) skb->h.raw; if ((ipv6_addr_type(&skb->nh.ipv6h->daddr)&IPV6_ADDR_MULTICAST) || skb->pkt_type != PACKET_HOST) { kfree_skb(skb); return -1; } looped_back: if (hdr->segments_left == 0) { opt->srcrt = skb->h.raw - skb->nh.raw; skb->h.raw += (hdr->hdrlen + 1) << 3; opt->dst0 = opt->dst1; opt->dst1 = 0; return (&hdr->nexthdr) - skb->nh.raw; } if (hdr->type != IPV6_SRCRT_TYPE_0 || (hdr->hdrlen & 0x01)) { icmpv6_param_prob(skb, ICMPV6_HDR_FIELD, hdr->type != IPV6_SRCRT_TYPE_0 ? 2 : 1); return -1; } /* * This is the routing header forwarding algorithm from * RFC 1883, page 17. */ n = hdr->hdrlen >> 1; if (hdr->segments_left > n) { icmpv6_param_prob(skb, ICMPV6_HDR_FIELD, (&hdr->segments_left) - skb->nh.raw); return -1; } /* We are about to mangle packet header. Be careful! Do not damage packets queued somewhere. */ if (skb_cloned(skb)) { struct sk_buff *skb2 = skb_copy(skb, GFP_ATOMIC); kfree_skb(skb); if (skb2 == NULL) return -1; *skb_ptr = skb = skb2; opt = (struct inet6_skb_parm *)skb2->cb; hdr = (struct ipv6_rt_hdr *) skb2->h.raw; } if (skb->ip_summed == CHECKSUM_HW) skb->ip_summed = CHECKSUM_NONE; i = n - --hdr->segments_left; rthdr = (struct rt0_hdr *) hdr; addr = rthdr->addr; addr += i - 1; addr_type = ipv6_addr_type(addr); if (addr_type&IPV6_ADDR_MULTICAST) { kfree_skb(skb); return -1; } ipv6_addr_copy(&daddr, addr); ipv6_addr_copy(addr, &skb->nh.ipv6h->daddr); ipv6_addr_copy(&skb->nh.ipv6h->daddr, &daddr); dst_release(xchg(&skb->dst, NULL)); ip6_route_input(skb); if (skb->dst->error) { skb->dst->input(skb); return -1; } if (skb->dst->dev->flags&IFF_LOOPBACK) { if (skb->nh.ipv6h->hop_limit <= 1) { icmpv6_send(skb, ICMPV6_TIME_EXCEED, ICMPV6_EXC_HOPLIMIT, 0, skb->dev); kfree_skb(skb); return -1; } skb->nh.ipv6h->hop_limit--; goto looped_back; } skb->dst->input(skb); return -1; } /* This function inverts received rthdr. NOTE: specs allow to make it automatically only if packet authenticated. I will not discuss it here (though, I am really pissed off at this stupid requirement making rthdr idea useless) Actually, it creates severe problems for us. Embrionic requests has no associated sockets, so that user have no control over it and cannot not only to set reply options, but even to know, that someone wants to connect without success. :-( For now we need to test the engine, so that I created temporary (or permanent) backdoor. If listening socket set IPV6_RTHDR to 2, then we invert header. --ANK (980729) */ struct ipv6_txoptions * ipv6_invert_rthdr(struct sock *sk, struct ipv6_rt_hdr *hdr) { /* Received rthdr: [ H1 -> H2 -> ... H_prev ] daddr=ME Inverted result: [ H_prev -> ... -> H1 ] daddr =sender Note, that IP output engine will rewrire this rthdr by rotating it left by one addr. */ int n, i; struct rt0_hdr *rthdr = (struct rt0_hdr*)hdr; struct rt0_hdr *irthdr; struct ipv6_txoptions *opt; int hdrlen = ipv6_optlen(hdr); if (hdr->segments_left || hdr->type != IPV6_SRCRT_TYPE_0 || hdr->hdrlen & 0x01) return NULL; n = hdr->hdrlen >> 1; opt = sock_kmalloc(sk, sizeof(*opt) + hdrlen, GFP_ATOMIC); if (opt == NULL) return NULL; memset(opt, 0, sizeof(*opt)); opt->tot_len = sizeof(*opt) + hdrlen; opt->srcrt = (void*)(opt+1); opt->opt_nflen = hdrlen; memcpy(opt->srcrt, hdr, sizeof(*hdr)); irthdr = (struct rt0_hdr*)opt->srcrt; /* Obsolete field, MBZ, when originated by us */ irthdr->bitmap = 0; opt->srcrt->segments_left = n; for (i=0; iaddr+i, rthdr->addr+(n-1-i), 16); return opt; } /******************************** AUTH header. ********************************/ /* rfc1826 said, that if a host does not implement AUTH header it MAY ignore it. We use this hole 8) Actually, now we can implement OSPFv6 without kernel IPsec. Authentication for poors may be done in user space with the same success. Yes, it means, that we allow application to send/receive raw authentication header. Apparently, we suppose, that it knows what it does and calculates authentication data correctly. Certainly, it is possible only for udp and raw sockets, but not for tcp. AUTH header has 4byte granular length, which kills all the idea behind AUTOMATIC 64bit alignment of IPv6. Now we will lose cpu ticks, checking that sender did not something stupid and opt->hdrlen is even. Shit! --ANK (980730) */ static int ipv6_auth_hdr(struct sk_buff **skb_ptr, int nhoff) { struct sk_buff *skb=*skb_ptr; struct inet6_skb_parm *opt = (struct inet6_skb_parm *)skb->cb; int len; if (!pskb_may_pull(skb, (skb->h.raw-skb->data)+8)) goto fail; len = (skb->h.raw[1]+1)<<2; if (len&7) goto fail; if (!pskb_may_pull(skb, (skb->h.raw-skb->data)+len)) goto fail; opt->auth = skb->h.raw - skb->nh.raw; skb->h.raw += len; return opt->auth; fail: kfree_skb(skb); return -1; } /* This list MUST NOT contain entry for NEXTHDR_HOP. It is parsed immediately after packet received and if it occurs somewhere in another place we must generate error. */ struct hdrtype_proc hdrproc_lst[] = { {NEXTHDR_FRAGMENT, ipv6_reassembly}, {NEXTHDR_ROUTING, ipv6_routing_header}, {NEXTHDR_DEST, ipv6_dest_opt}, {NEXTHDR_NONE, ipv6_nodata}, {NEXTHDR_AUTH, ipv6_auth_hdr}, /* {NEXTHDR_ESP, ipv6_esp_hdr}, */ {-1, NULL} }; int ipv6_parse_exthdrs(struct sk_buff **skb_in, int nhoff) { struct hdrtype_proc *hdrt; u8 nexthdr = (*skb_in)->nh.raw[nhoff]; restart: for (hdrt=hdrproc_lst; hdrt->type >= 0; hdrt++) { if (hdrt->type == nexthdr) { if ((nhoff = hdrt->func(skb_in, nhoff)) >= 0) { nexthdr = (*skb_in)->nh.raw[nhoff]; goto restart; } return -1; } } return nhoff; } /********************************** Hop-by-hop options. **********************************/ /* Router Alert as of draft-ietf-ipngwg-ipv6router-alert-04 */ static int ipv6_hop_ra(struct sk_buff *skb, int optoff) { if (skb->nh.raw[optoff+1] == 2) { ((struct inet6_skb_parm*)skb->cb)->ra = optoff; return 1; } if (net_ratelimit()) printk(KERN_DEBUG "ipv6_hop_ra: wrong RA length %d\n", skb->nh.raw[optoff+1]); kfree_skb(skb); return 0; } /* Jumbo payload */ static int ipv6_hop_jumbo(struct sk_buff *skb, int optoff) { u32 pkt_len; if (skb->nh.raw[optoff+1] != 4 || (optoff&3) != 2) { if (net_ratelimit()) printk(KERN_DEBUG "ipv6_hop_jumbo: wrong jumbo opt length/alignment %d\n", skb->nh.raw[optoff+1]); goto drop; } pkt_len = ntohl(*(u32*)(skb->nh.raw+optoff+2)); if (pkt_len < 0x10000) { icmpv6_param_prob(skb, ICMPV6_HDR_FIELD, optoff+2); return 0; } if (skb->nh.ipv6h->payload_len) { icmpv6_param_prob(skb, ICMPV6_HDR_FIELD, optoff); return 0; } if (pkt_len > skb->len - sizeof(struct ipv6hdr)) { IP6_INC_STATS_BH(Ip6InTruncatedPkts); goto drop; } if (pkt_len + sizeof(struct ipv6hdr) < skb->len) { __pskb_trim(skb, pkt_len + sizeof(struct ipv6hdr)); if (skb->ip_summed == CHECKSUM_HW) skb->ip_summed = CHECKSUM_NONE; } return 1; drop: kfree_skb(skb); return 0; } struct tlvtype_proc tlvprochopopt_lst[] = { {IPV6_TLV_ROUTERALERT, ipv6_hop_ra}, {IPV6_TLV_JUMBO, ipv6_hop_jumbo}, {-1, NULL} }; int ipv6_parse_hopopts(struct sk_buff *skb, int nhoff) { ((struct inet6_skb_parm*)skb->cb)->hop = sizeof(struct ipv6hdr); if (ip6_parse_tlv(tlvprochopopt_lst, skb)) return sizeof(struct ipv6hdr); return -1; } /* * Creating outbound headers. * * "build" functions work when skb is filled from head to tail (datagram) * "push" functions work when headers are added from tail to head (tcp) * * In both cases we assume, that caller reserved enough room * for headers. */ u8 *ipv6_build_rthdr(struct sk_buff *skb, u8 *prev_hdr, struct ipv6_rt_hdr *opt, struct in6_addr *addr) { struct rt0_hdr *phdr, *ihdr; int hops; ihdr = (struct rt0_hdr *) opt; phdr = (struct rt0_hdr *) skb_put(skb, (ihdr->rt_hdr.hdrlen + 1) << 3); memcpy(phdr, ihdr, sizeof(struct rt0_hdr)); hops = ihdr->rt_hdr.hdrlen >> 1; if (hops > 1) memcpy(phdr->addr, ihdr->addr + 1, (hops - 1) * sizeof(struct in6_addr)); ipv6_addr_copy(phdr->addr + (hops - 1), addr); phdr->rt_hdr.nexthdr = *prev_hdr; *prev_hdr = NEXTHDR_ROUTING; return &phdr->rt_hdr.nexthdr; } static u8 *ipv6_build_exthdr(struct sk_buff *skb, u8 *prev_hdr, u8 type, struct ipv6_opt_hdr *opt) { struct ipv6_opt_hdr *h = (struct ipv6_opt_hdr *)skb_put(skb, ipv6_optlen(opt)); memcpy(h, opt, ipv6_optlen(opt)); h->nexthdr = *prev_hdr; *prev_hdr = type; return &h->nexthdr; } static u8 *ipv6_build_authhdr(struct sk_buff *skb, u8 *prev_hdr, struct ipv6_opt_hdr *opt) { struct ipv6_opt_hdr *h = (struct ipv6_opt_hdr *)skb_put(skb, (opt->hdrlen+2)<<2); memcpy(h, opt, (opt->hdrlen+2)<<2); h->nexthdr = *prev_hdr; *prev_hdr = NEXTHDR_AUTH; return &h->nexthdr; } u8 *ipv6_build_nfrag_opts(struct sk_buff *skb, u8 *prev_hdr, struct ipv6_txoptions *opt, struct in6_addr *daddr, u32 jumbolen) { struct ipv6_opt_hdr *h = (struct ipv6_opt_hdr *)skb->data; if (opt && opt->hopopt) prev_hdr = ipv6_build_exthdr(skb, prev_hdr, NEXTHDR_HOP, opt->hopopt); if (jumbolen) { u8 *jumboopt = (u8 *)skb_put(skb, 8); if (opt && opt->hopopt) { *jumboopt++ = IPV6_TLV_PADN; *jumboopt++ = 0; h->hdrlen++; } else { h = (struct ipv6_opt_hdr *)jumboopt; h->nexthdr = *prev_hdr; h->hdrlen = 0; jumboopt += 2; *prev_hdr = NEXTHDR_HOP; prev_hdr = &h->nexthdr; } jumboopt[0] = IPV6_TLV_JUMBO; jumboopt[1] = 4; *(u32*)(jumboopt+2) = htonl(jumbolen); } if (opt) { if (opt->dst0opt) prev_hdr = ipv6_build_exthdr(skb, prev_hdr, NEXTHDR_DEST, opt->dst0opt); if (opt->srcrt) prev_hdr = ipv6_build_rthdr(skb, prev_hdr, opt->srcrt, daddr); } return prev_hdr; } u8 *ipv6_build_frag_opts(struct sk_buff *skb, u8 *prev_hdr, struct ipv6_txoptions *opt) { if (opt->auth) prev_hdr = ipv6_build_authhdr(skb, prev_hdr, opt->auth); if (opt->dst1opt) prev_hdr = ipv6_build_exthdr(skb, prev_hdr, NEXTHDR_DEST, opt->dst1opt); return prev_hdr; } static void ipv6_push_rthdr(struct sk_buff *skb, u8 *proto, struct ipv6_rt_hdr *opt, struct in6_addr **addr_p) { struct rt0_hdr *phdr, *ihdr; int hops; ihdr = (struct rt0_hdr *) opt; phdr = (struct rt0_hdr *) skb_push(skb, (ihdr->rt_hdr.hdrlen + 1) << 3); memcpy(phdr, ihdr, sizeof(struct rt0_hdr)); hops = ihdr->rt_hdr.hdrlen >> 1; if (hops > 1) memcpy(phdr->addr, ihdr->addr + 1, (hops - 1) * sizeof(struct in6_addr)); ipv6_addr_copy(phdr->addr + (hops - 1), *addr_p); *addr_p = ihdr->addr; phdr->rt_hdr.nexthdr = *proto; *proto = NEXTHDR_ROUTING; } static void ipv6_push_exthdr(struct sk_buff *skb, u8 *proto, u8 type, struct ipv6_opt_hdr *opt) { struct ipv6_opt_hdr *h = (struct ipv6_opt_hdr *)skb_push(skb, ipv6_optlen(opt)); memcpy(h, opt, ipv6_optlen(opt)); h->nexthdr = *proto; *proto = type; } static void ipv6_push_authhdr(struct sk_buff *skb, u8 *proto, struct ipv6_opt_hdr *opt) { struct ipv6_opt_hdr *h = (struct ipv6_opt_hdr *)skb_push(skb, (opt->hdrlen+2)<<2); memcpy(h, opt, (opt->hdrlen+2)<<2); h->nexthdr = *proto; *proto = NEXTHDR_AUTH; } void ipv6_push_nfrag_opts(struct sk_buff *skb, struct ipv6_txoptions *opt, u8 *proto, struct in6_addr **daddr) { if (opt->srcrt) ipv6_push_rthdr(skb, proto, opt->srcrt, daddr); if (opt->dst0opt) ipv6_push_exthdr(skb, proto, NEXTHDR_DEST, opt->dst0opt); if (opt->hopopt) ipv6_push_exthdr(skb, proto, NEXTHDR_HOP, opt->hopopt); } void ipv6_push_frag_opts(struct sk_buff *skb, struct ipv6_txoptions *opt, u8 *proto) { if (opt->dst1opt) ipv6_push_exthdr(skb, proto, NEXTHDR_DEST, opt->dst1opt); if (opt->auth) ipv6_push_authhdr(skb, proto, opt->auth); } struct ipv6_txoptions * ipv6_dup_options(struct sock *sk, struct ipv6_txoptions *opt) { struct ipv6_txoptions *opt2; opt2 = sock_kmalloc(sk, opt->tot_len, GFP_ATOMIC); if (opt2) { long dif = (char*)opt2 - (char*)opt; memcpy(opt2, opt, opt->tot_len); if (opt2->hopopt) *((char**)&opt2->hopopt) += dif; if (opt2->dst0opt) *((char**)&opt2->dst0opt) += dif; if (opt2->dst1opt) *((char**)&opt2->dst1opt) += dif; if (opt2->auth) *((char**)&opt2->auth) += dif; if (opt2->srcrt) *((char**)&opt2->srcrt) += dif; } return opt2; } /* * find out if nexthdr is a well-known extension header or a protocol */ int ipv6_ext_hdr(u8 nexthdr) { /* * find out if nexthdr is an extension header or a protocol */ return ( (nexthdr == NEXTHDR_HOP) || (nexthdr == NEXTHDR_ROUTING) || (nexthdr == NEXTHDR_FRAGMENT) || (nexthdr == NEXTHDR_AUTH) || (nexthdr == NEXTHDR_NONE) || (nexthdr == NEXTHDR_DEST) ); } /* * Skip any extension headers. This is used by the ICMP module. * * Note that strictly speaking this conflicts with RFC1883 4.0: * ...The contents and semantics of each extension header determine whether * or not to proceed to the next header. Therefore, extension headers must * be processed strictly in the order they appear in the packet; a * receiver must not, for example, scan through a packet looking for a * particular kind of extension header and process that header prior to * processing all preceding ones. * * We do exactly this. This is a protocol bug. We can't decide after a * seeing an unknown discard-with-error flavour TLV option if it's a * ICMP error message or not (errors should never be send in reply to * ICMP error messages). * * But I see no other way to do this. This might need to be reexamined * when Linux implements ESP (and maybe AUTH) headers. * --AK * * This function parses (probably truncated) exthdr set "hdr" * of length "len". "nexthdrp" initially points to some place, * where type of the first header can be found. * * It skips all well-known exthdrs, and returns pointer to the start * of unparsable area i.e. the first header with unknown type. * If it is not NULL *nexthdr is updated by type/protocol of this header. * * NOTES: - if packet terminated with NEXTHDR_NONE it returns NULL. * - it may return pointer pointing beyond end of packet, * if the last recognized header is truncated in the middle. * - if packet is truncated, so that all parsed headers are skipped, * it returns NULL. * - First fragment header is skipped, not-first ones * are considered as unparsable. * - ESP is unparsable for now and considered like * normal payload protocol. * - Note also special handling of AUTH header. Thanks to IPsec wizards. * * --ANK (980726) */ int ipv6_skip_exthdr(struct sk_buff *skb, int start, u8 *nexthdrp, int len) { u8 nexthdr = *nexthdrp; while (ipv6_ext_hdr(nexthdr)) { struct ipv6_opt_hdr hdr; int hdrlen; if (len < (int)sizeof(struct ipv6_opt_hdr)) return -1; if (nexthdr == NEXTHDR_NONE) return -1; if (skb_copy_bits(skb, start, &hdr, sizeof(hdr))) BUG(); if (nexthdr == NEXTHDR_FRAGMENT) { struct frag_hdr *fhdr = (struct frag_hdr *) &hdr; if (ntohs(fhdr->frag_off) & ~0x7) break; hdrlen = 8; } else if (nexthdr == NEXTHDR_AUTH) hdrlen = (hdr.hdrlen+2)<<2; else hdrlen = ipv6_optlen(&hdr); nexthdr = hdr.nexthdr; len -= hdrlen; start += hdrlen; } *nexthdrp = nexthdr; return start; }