From patchwork Wed Dec 1 16:32:44 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Andrew Lunn X-Patchwork-Id: 12650335 X-Patchwork-Delegate: kuba@kernel.org Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id D19D3C433FE for ; Wed, 1 Dec 2021 16:33:45 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1351040AbhLAQhE (ORCPT ); Wed, 1 Dec 2021 11:37:04 -0500 Received: from vps0.lunn.ch ([185.16.172.187]:33860 "EHLO vps0.lunn.ch" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1351032AbhLAQg7 (ORCPT ); Wed, 1 Dec 2021 11:36:59 -0500 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lunn.ch; s=20171124; h=Content-Transfer-Encoding:MIME-Version:References:In-Reply-To: Message-Id:Date:Subject:Cc:To:From:From:Sender:Reply-To:Subject:Date: Message-ID:To:Cc:MIME-Version:Content-Type:Content-Transfer-Encoding: Content-ID:Content-Description:Content-Disposition:In-Reply-To:References; bh=Gdr0yuD0WVexzwj2TD22axTuRmuo4OD1zxQdd5Wluqo=; b=qIe6kkDsj8zRdsm/MTGftvfpfB 9S3QCRJw80M+bd/2/xJJ3esfujBoncyO57bQiq5ybiYiFUdNeURiUFFy49btSvFDp0TdbSBGztfn/ yP4jdfHgPSoMke4QVCYXzlRn4W1joUhDnJjpEKJeUUkYFzHNhHbWbYixnWA1CunQJi4w=; Received: from andrew by vps0.lunn.ch with local (Exim 4.94.2) (envelope-from ) id 1msSXl-00FE9g-Aw; Wed, 01 Dec 2021 17:33:17 +0100 From: Andrew Lunn Cc: David Miller , Jakub Kicinski , Hideaki YOSHIFUJI , David Ahern , Willem de Bruijn , James Prestwood , Justin Iurman , Praveen Chaudhary , "Jason A . Donenfeld" , Eric Dumazet , netdev , Andrew Lunn Subject: [patch RFC net-next 2/3] icmp: ICMPV6: Examine invoking packet for Segment Route Headers. Date: Wed, 1 Dec 2021 17:32:44 +0100 Message-Id: <20211201163245.3629254-3-andrew@lunn.ch> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20211201163245.3629254-1-andrew@lunn.ch> References: <20211201163245.3629254-1-andrew@lunn.ch> MIME-Version: 1.0 To: unlisted-recipients:; (no To-header on input) Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org X-Patchwork-Delegate: kuba@kernel.org X-Patchwork-State: RFC RFC8754 says: ICMP error packets generated within the SR domain are sent to source nodes within the SR domain. The invoking packet in the ICMP error message may contain an SRH. Since the destination address of a packet with an SRH changes as each segment is processed, it may not be the destination used by the socket or application that generated the invoking packet. For the source of an invoking packet to process the ICMP error message, the ultimate destination address of the IPv6 header may be required. The following logic is used to determine the destination address for use by protocol-error handlers. * Walk all extension headers of the invoking IPv6 packet to the routing extension header preceding the upper-layer header. - If routing header is type 4 Segment Routing Header (SRH) o The SID at Segment List[0] may be used as the destination address of the invoking packet. Clone the skb and modify the header offset to give a new skb which contains the invoking packet. The seg6 helpers can then be used on the skb to find any segment routing headers. If found, mark this fact in the IPv6 control block of the skb, and store the offset into the packet of the SRH. Signed-off-by: Andrew Lunn --- include/linux/ipv6.h | 2 ++ net/ipv6/icmp.c | 36 +++++++++++++++++++++++++++++++++++- 2 files changed, 37 insertions(+), 1 deletion(-) diff --git a/include/linux/ipv6.h b/include/linux/ipv6.h index 20c1f968da7c..d8ab5022d397 100644 --- a/include/linux/ipv6.h +++ b/include/linux/ipv6.h @@ -133,6 +133,7 @@ struct inet6_skb_parm { __u16 dsthao; #endif __u16 frag_max_size; + __u16 srhoff; #define IP6SKB_XFRM_TRANSFORMED 1 #define IP6SKB_FORWARDED 2 @@ -142,6 +143,7 @@ struct inet6_skb_parm { #define IP6SKB_HOPBYHOP 32 #define IP6SKB_L3SLAVE 64 #define IP6SKB_JUMBOGRAM 128 +#define IP6SKB_SEG6 512 }; #if defined(CONFIG_NET_L3_MASTER_DEV) diff --git a/net/ipv6/icmp.c b/net/ipv6/icmp.c index a7c31ab67c5d..315787b79f29 100644 --- a/net/ipv6/icmp.c +++ b/net/ipv6/icmp.c @@ -57,6 +57,7 @@ #include #include #include +#include #include #include #include @@ -818,9 +819,40 @@ static void icmpv6_echo_reply(struct sk_buff *skb) local_bh_enable(); } +/* Determine if the invoking packet contains a segment routing header. + * If it does, extract the true destination address, which is the + * first segment address + */ +static void icmpv6_notify_srh(struct sk_buff *skb, struct inet6_skb_parm *opt) +{ + struct sk_buff *skb_orig; + struct ipv6_sr_hdr *srh; + + skb_orig = skb_clone(skb, GFP_ATOMIC); + if (!skb_orig) + return; + + skb_dst_drop(skb_orig); + skb_reset_network_header(skb_orig); + + srh = seg6_get_srh(skb_orig, 0); + if (!srh) + goto out; + + if (srh->type != IPV6_SRCRT_TYPE_4) + goto out; + + opt->flags |= IP6SKB_SEG6; + opt->srhoff = (unsigned char *)srh - skb->data; + +out: + kfree_skb(skb_orig); +} + void icmpv6_notify(struct sk_buff *skb, u8 type, u8 code, __be32 info) { const struct inet6_protocol *ipprot; + struct inet6_skb_parm *opt = IP6CB(skb); int inner_offset; __be16 frag_off; u8 nexthdr; @@ -829,6 +861,8 @@ void icmpv6_notify(struct sk_buff *skb, u8 type, u8 code, __be32 info) if (!pskb_may_pull(skb, sizeof(struct ipv6hdr))) goto out; + icmpv6_notify_srh(skb, opt); + nexthdr = ((struct ipv6hdr *)skb->data)->nexthdr; if (ipv6_ext_hdr(nexthdr)) { /* now skip over extension headers */ @@ -853,7 +887,7 @@ void icmpv6_notify(struct sk_buff *skb, u8 type, u8 code, __be32 info) ipprot = rcu_dereference(inet6_protos[nexthdr]); if (ipprot && ipprot->err_handler) - ipprot->err_handler(skb, NULL, type, code, inner_offset, info); + ipprot->err_handler(skb, opt, type, code, inner_offset, info); raw6_icmp_error(skb, nexthdr, type, code, inner_offset, info); return;