License cleanup: add SPDX GPL-2.0 license identifier to files with no license
Many source files in the tree are missing licensing information, which
makes it harder for compliance tools to determine the correct license.
By default all files without license information are under the default
license of the kernel, which is GPL version 2.
Update the files which contain no license information with the 'GPL-2.0'
SPDX license identifier. The SPDX identifier is a legally binding
shorthand, which can be used instead of the full boiler plate text.
This patch is based on work done by Thomas Gleixner and Kate Stewart and
Philippe Ombredanne.
How this work was done:
Patches were generated and checked against linux-4.14-rc6 for a subset of
the use cases:
- file had no licensing information it it.
- file was a */uapi/* one with no licensing information in it,
- file was a */uapi/* one with existing licensing information,
Further patches will be generated in subsequent months to fix up cases
where non-standard license headers were used, and references to license
had to be inferred by heuristics based on keywords.
The analysis to determine which SPDX License Identifier to be applied to
a file was done in a spreadsheet of side by side results from of the
output of two independent scanners (ScanCode & Windriver) producing SPDX
tag:value files created by Philippe Ombredanne. Philippe prepared the
base worksheet, and did an initial spot review of a few 1000 files.
The 4.13 kernel was the starting point of the analysis with 60,537 files
assessed. Kate Stewart did a file by file comparison of the scanner
results in the spreadsheet to determine which SPDX license identifier(s)
to be applied to the file. She confirmed any determination that was not
immediately clear with lawyers working with the Linux Foundation.
Criteria used to select files for SPDX license identifier tagging was:
- Files considered eligible had to be source code files.
- Make and config files were included as candidates if they contained >5
lines of source
- File already had some variant of a license header in it (even if <5
lines).
All documentation files were explicitly excluded.
The following heuristics were used to determine which SPDX license
identifiers to apply.
- when both scanners couldn't find any license traces, file was
considered to have no license information in it, and the top level
COPYING file license applied.
For non */uapi/* files that summary was:
SPDX license identifier # files
---------------------------------------------------|-------
GPL-2.0 11139
and resulted in the first patch in this series.
If that file was a */uapi/* path one, it was "GPL-2.0 WITH
Linux-syscall-note" otherwise it was "GPL-2.0". Results of that was:
SPDX license identifier # files
---------------------------------------------------|-------
GPL-2.0 WITH Linux-syscall-note 930
and resulted in the second patch in this series.
- if a file had some form of licensing information in it, and was one
of the */uapi/* ones, it was denoted with the Linux-syscall-note if
any GPL family license was found in the file or had no licensing in
it (per prior point). Results summary:
SPDX license identifier # files
---------------------------------------------------|------
GPL-2.0 WITH Linux-syscall-note 270
GPL-2.0+ WITH Linux-syscall-note 169
((GPL-2.0 WITH Linux-syscall-note) OR BSD-2-Clause) 21
((GPL-2.0 WITH Linux-syscall-note) OR BSD-3-Clause) 17
LGPL-2.1+ WITH Linux-syscall-note 15
GPL-1.0+ WITH Linux-syscall-note 14
((GPL-2.0+ WITH Linux-syscall-note) OR BSD-3-Clause) 5
LGPL-2.0+ WITH Linux-syscall-note 4
LGPL-2.1 WITH Linux-syscall-note 3
((GPL-2.0 WITH Linux-syscall-note) OR MIT) 3
((GPL-2.0 WITH Linux-syscall-note) AND MIT) 1
and that resulted in the third patch in this series.
- when the two scanners agreed on the detected license(s), that became
the concluded license(s).
- when there was disagreement between the two scanners (one detected a
license but the other didn't, or they both detected different
licenses) a manual inspection of the file occurred.
- In most cases a manual inspection of the information in the file
resulted in a clear resolution of the license that should apply (and
which scanner probably needed to revisit its heuristics).
- When it was not immediately clear, the license identifier was
confirmed with lawyers working with the Linux Foundation.
- If there was any question as to the appropriate license identifier,
the file was flagged for further research and to be revisited later
in time.
In total, over 70 hours of logged manual review was done on the
spreadsheet to determine the SPDX license identifiers to apply to the
source files by Kate, Philippe, Thomas and, in some cases, confirmation
by lawyers working with the Linux Foundation.
Kate also obtained a third independent scan of the 4.13 code base from
FOSSology, and compared selected files where the other two scanners
disagreed against that SPDX file, to see if there was new insights. The
Windriver scanner is based on an older version of FOSSology in part, so
they are related.
Thomas did random spot checks in about 500 files from the spreadsheets
for the uapi headers and agreed with SPDX license identifier in the
files he inspected. For the non-uapi files Thomas did random spot checks
in about 15000 files.
In initial set of patches against 4.14-rc6, 3 files were found to have
copy/paste license identifier errors, and have been fixed to reflect the
correct identifier.
Additionally Philippe spent 10 hours this week doing a detailed manual
inspection and review of the 12,461 patched files from the initial patch
version early this week with:
- a full scancode scan run, collecting the matched texts, detected
license ids and scores
- reviewing anything where there was a license detected (about 500+
files) to ensure that the applied SPDX license was correct
- reviewing anything where there was no detection but the patch license
was not GPL-2.0 WITH Linux-syscall-note to ensure that the applied
SPDX license was correct
This produced a worksheet with 20 files needing minor correction. This
worksheet was then exported into 3 different .csv files for the
different types of files to be modified.
These .csv files were then reviewed by Greg. Thomas wrote a script to
parse the csv files and add the proper SPDX tag to the file, in the
format that the file expected. This script was further refined by Greg
based on the output to detect more types of files automatically and to
distinguish between header and source .c files (which need different
comment types.) Finally Greg ran the script using the .csv files to
generate the patches.
Reviewed-by: Kate Stewart <kstewart@linuxfoundation.org>
Reviewed-by: Philippe Ombredanne <pombredanne@nexb.com>
Reviewed-by: Thomas Gleixner <tglx@linutronix.de>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2017-11-01 22:07:57 +08:00
|
|
|
/* SPDX-License-Identifier: GPL-2.0 */
|
2005-04-17 06:20:36 +08:00
|
|
|
#ifndef _IPV6_H
|
|
|
|
#define _IPV6_H
|
|
|
|
|
2012-10-13 17:46:48 +08:00
|
|
|
#include <uapi/linux/ipv6.h>
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
#define ipv6_optlen(p) (((p)->hdrlen+1) << 3)
|
2013-12-04 01:39:29 +08:00
|
|
|
#define ipv6_authlen(p) (((p)->hdrlen+2) << 2)
|
2005-04-17 06:20:36 +08:00
|
|
|
/*
|
|
|
|
* This structure contains configuration options per IPv6 link.
|
|
|
|
*/
|
|
|
|
struct ipv6_devconf {
|
|
|
|
__s32 forwarding;
|
|
|
|
__s32 hop_limit;
|
|
|
|
__s32 mtu6;
|
|
|
|
__s32 accept_ra;
|
|
|
|
__s32 accept_redirects;
|
|
|
|
__s32 autoconf;
|
|
|
|
__s32 dad_transmits;
|
|
|
|
__s32 rtr_solicits;
|
|
|
|
__s32 rtr_solicit_interval;
|
2016-09-28 14:57:58 +08:00
|
|
|
__s32 rtr_solicit_max_interval;
|
2005-04-17 06:20:36 +08:00
|
|
|
__s32 rtr_solicit_delay;
|
|
|
|
__s32 force_mld_version;
|
2013-08-14 07:03:46 +08:00
|
|
|
__s32 mldv1_unsolicited_report_interval;
|
|
|
|
__s32 mldv2_unsolicited_report_interval;
|
2005-04-17 06:20:36 +08:00
|
|
|
__s32 use_tempaddr;
|
|
|
|
__s32 temp_valid_lft;
|
|
|
|
__s32 temp_prefered_lft;
|
|
|
|
__s32 regen_max_retry;
|
|
|
|
__s32 max_desync_factor;
|
|
|
|
__s32 max_addresses;
|
2006-03-21 08:55:08 +08:00
|
|
|
__s32 accept_ra_defrtr;
|
net: allow user to set metric on default route learned via Router Advertisement
For IPv4, default route is learned via DHCPv4 and user is allowed to change
metric using config etc/network/interfaces. But for IPv6, default route can
be learned via RA, for which, currently a fixed metric value 1024 is used.
Ideally, user should be able to configure metric on default route for IPv6
similar to IPv4. This patch adds sysctl for the same.
Logs:
For IPv4:
Config in etc/network/interfaces:
auto eth0
iface eth0 inet dhcp
metric 4261413864
IPv4 Kernel Route Table:
$ ip route list
default via 172.21.47.1 dev eth0 metric 4261413864
FRR Table, if a static route is configured:
[In real scenario, it is useful to prefer BGP learned default route over DHCPv4 default route.]
Codes: K - kernel route, C - connected, S - static, R - RIP,
O - OSPF, I - IS-IS, B - BGP, P - PIM, E - EIGRP, N - NHRP,
T - Table, v - VNC, V - VNC-Direct, A - Babel, D - SHARP,
> - selected route, * - FIB route
S>* 0.0.0.0/0 [20/0] is directly connected, eth0, 00:00:03
K 0.0.0.0/0 [254/1000] via 172.21.47.1, eth0, 6d08h51m
i.e. User can prefer Default Router learned via Routing Protocol in IPv4.
Similar behavior is not possible for IPv6, without this fix.
After fix [for IPv6]:
sudo sysctl -w net.ipv6.conf.eth0.net.ipv6.conf.eth0.ra_defrtr_metric=1996489705
IP monitor: [When IPv6 RA is received]
default via fe80::xx16:xxxx:feb3:ce8e dev eth0 proto ra metric 1996489705 pref high
Kernel IPv6 routing table
$ ip -6 route list
default via fe80::be16:65ff:feb3:ce8e dev eth0 proto ra metric 1996489705 expires 21sec hoplimit 64 pref high
FRR Table, if a static route is configured:
[In real scenario, it is useful to prefer BGP learned default route over IPv6 RA default route.]
Codes: K - kernel route, C - connected, S - static, R - RIPng,
O - OSPFv3, I - IS-IS, B - BGP, N - NHRP, T - Table,
v - VNC, V - VNC-Direct, A - Babel, D - SHARP,
> - selected route, * - FIB route
S>* ::/0 [20/0] is directly connected, eth0, 00:00:06
K ::/0 [119/1001] via fe80::xx16:xxxx:feb3:ce8e, eth0, 6d07h43m
If the metric is changed later, the effect will be seen only when next IPv6
RA is received, because the default route must be fully controlled by RA msg.
Below metric is changed from 1996489705 to 1996489704.
$ sudo sysctl -w net.ipv6.conf.eth0.ra_defrtr_metric=1996489704
net.ipv6.conf.eth0.ra_defrtr_metric = 1996489704
IP monitor:
[On next IPv6 RA msg, Kernel deletes prev route and installs new route with updated metric]
Deleted default via fe80::xx16:xxxx:feb3:ce8e dev eth0 proto ra metric 1996489705 expires 3sec hoplimit 64 pref high
default via fe80::xx16:xxxx:feb3:ce8e dev eth0 proto ra metric 1996489704 pref high
Signed-off-by: Praveen Chaudhary <pchaudhary@linkedin.com>
Signed-off-by: Zhenggen Xu <zxu@linkedin.com>
Reviewed-by: David Ahern <dsahern@kernel.org>
Link: https://lore.kernel.org/r/20210125214430.24079-1-pchaudhary@linkedin.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
2021-01-26 05:44:30 +08:00
|
|
|
__u32 ra_defrtr_metric;
|
2015-07-30 14:28:42 +08:00
|
|
|
__s32 accept_ra_min_hop_limit;
|
2006-03-21 08:55:26 +08:00
|
|
|
__s32 accept_ra_pinfo;
|
2015-08-13 22:39:01 +08:00
|
|
|
__s32 ignore_routes_with_linkdown;
|
2006-03-21 09:05:30 +08:00
|
|
|
#ifdef CONFIG_IPV6_ROUTER_PREF
|
|
|
|
__s32 accept_ra_rtr_pref;
|
2006-03-21 09:05:47 +08:00
|
|
|
__s32 rtr_probe_interval;
|
2006-03-21 09:07:03 +08:00
|
|
|
#ifdef CONFIG_IPV6_ROUTE_INFO
|
2017-03-22 17:19:04 +08:00
|
|
|
__s32 accept_ra_rt_info_min_plen;
|
2006-03-21 09:07:03 +08:00
|
|
|
__s32 accept_ra_rt_info_max_plen;
|
|
|
|
#endif
|
2006-03-21 09:05:30 +08:00
|
|
|
#endif
|
2006-09-23 05:43:49 +08:00
|
|
|
__s32 proxy_ndp;
|
2007-04-25 05:58:30 +08:00
|
|
|
__s32 accept_source_route;
|
2014-06-26 05:44:53 +08:00
|
|
|
__s32 accept_ra_from_local;
|
2007-04-26 08:08:10 +08:00
|
|
|
#ifdef CONFIG_IPV6_OPTIMISTIC_DAD
|
|
|
|
__s32 optimistic_dad;
|
net: ipv6: Add a sysctl to make optimistic addresses useful candidates
Add a sysctl that causes an interface's optimistic addresses
to be considered equivalent to other non-deprecated addresses
for source address selection purposes. Preferred addresses
will still take precedence over optimistic addresses, subject
to other ranking in the source address selection algorithm.
This is useful where different interfaces are connected to
different networks from different ISPs (e.g., a cell network
and a home wifi network).
The current behaviour complies with RFC 3484/6724, and it
makes sense if the host has only one interface, or has
multiple interfaces on the same network (same or cooperating
administrative domain(s), but not in the multiple distinct
networks case.
For example, if a mobile device has an IPv6 address on an LTE
network and then connects to IPv6-enabled wifi, while the wifi
IPv6 address is undergoing DAD, IPv6 connections will try use
the wifi default route with the LTE IPv6 address, and will get
stuck until they time out.
Also, because optimistic nodes can receive frames, issue
an RTM_NEWADDR as soon as DAD starts (with the IFA_F_OPTIMSTIC
flag appropriately set). A second RTM_NEWADDR is sent if DAD
completes (the address flags have changed), otherwise an
RTM_DELADDR is sent.
Also: add an entry in ip-sysctl.txt for optimistic_dad.
Signed-off-by: Erik Kline <ek@google.com>
Acked-by: Lorenzo Colitti <lorenzo@google.com>
Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-10-28 17:11:14 +08:00
|
|
|
__s32 use_optimistic;
|
2008-04-03 08:22:53 +08:00
|
|
|
#endif
|
|
|
|
#ifdef CONFIG_IPV6_MROUTE
|
|
|
|
__s32 mc_forwarding;
|
2007-04-26 08:08:10 +08:00
|
|
|
#endif
|
2008-06-28 13:17:11 +08:00
|
|
|
__s32 disable_ipv6;
|
2016-02-04 20:31:19 +08:00
|
|
|
__s32 drop_unicast_in_l2_multicast;
|
2008-06-28 13:18:38 +08:00
|
|
|
__s32 accept_dad;
|
2009-10-02 19:39:15 +08:00
|
|
|
__s32 force_tllao;
|
2012-11-07 00:46:20 +08:00
|
|
|
__s32 ndisc_notify;
|
2013-08-27 07:36:51 +08:00
|
|
|
__s32 suppress_frag_ndisc;
|
2015-01-21 01:06:05 +08:00
|
|
|
__s32 accept_ra_mtu;
|
2016-02-04 20:31:20 +08:00
|
|
|
__s32 drop_unsolicited_na;
|
2015-03-24 06:36:00 +08:00
|
|
|
struct ipv6_stable_secret {
|
|
|
|
bool initialized;
|
|
|
|
struct in6_addr secret;
|
|
|
|
} stable_secret;
|
2015-07-22 15:38:25 +08:00
|
|
|
__s32 use_oif_addrs_only;
|
net: ipv6: Make address flushing on ifdown optional
Currently, all ipv6 addresses are flushed when the interface is configured
down, including global, static addresses:
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
<< nothing; all addresses have been flushed>>
Add a new sysctl to make this behavior optional. The new setting defaults to
flush all addresses to maintain backwards compatibility. When the set global
addresses with no expire times are not flushed on an admin down. The sysctl
is per-interface or system-wide for all interfaces
$ sysctl -w net.ipv6.conf.eth1.keep_addr_on_down=1
or
$ sysctl -w net.ipv6.conf.all.keep_addr_on_down=1
Will keep addresses on eth1 on an admin down.
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 state UP qlen 1000
inet6 2100:1::2/120 scope global
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link
valid_lft forever preferred_lft forever
$ ip link set dev eth1 down
$ ip -6 addr show dev eth1
3: eth1: <BROADCAST,MULTICAST> mtu 1500 state DOWN qlen 1000
inet6 2100:1::2/120 scope global tentative
valid_lft forever preferred_lft forever
inet6 fe80::e0:f9ff:fe79:34bd/64 scope link tentative
valid_lft forever preferred_lft forever
Signed-off-by: David Ahern <dsa@cumulusnetworks.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-02-25 01:25:37 +08:00
|
|
|
__s32 keep_addr_on_down;
|
2016-11-08 21:57:39 +08:00
|
|
|
__s32 seg6_enabled;
|
2016-11-08 21:57:42 +08:00
|
|
|
#ifdef CONFIG_IPV6_SEG6_HMAC
|
|
|
|
__s32 seg6_require_hmac;
|
|
|
|
#endif
|
2016-12-03 06:00:08 +08:00
|
|
|
__u32 enhanced_dad;
|
2017-01-26 11:59:17 +08:00
|
|
|
__u32 addr_gen_mode;
|
2017-02-24 00:27:18 +08:00
|
|
|
__s32 disable_policy;
|
net: ipv6: sysctl to specify IPv6 ND traffic class
Add a per-device sysctl to specify the default traffic class to use for
kernel originated IPv6 Neighbour Discovery packets.
Currently this includes:
- Router Solicitation (ICMPv6 type 133)
ndisc_send_rs() -> ndisc_send_skb() -> ip6_nd_hdr()
- Neighbour Solicitation (ICMPv6 type 135)
ndisc_send_ns() -> ndisc_send_skb() -> ip6_nd_hdr()
- Neighbour Advertisement (ICMPv6 type 136)
ndisc_send_na() -> ndisc_send_skb() -> ip6_nd_hdr()
- Redirect (ICMPv6 type 137)
ndisc_send_redirect() -> ndisc_send_skb() -> ip6_nd_hdr()
and if the kernel ever gets around to generating RA's,
it would presumably also include:
- Router Advertisement (ICMPv6 type 134)
(radvd daemon could pick up on the kernel setting and use it)
Interface drivers may examine the Traffic Class value and translate
the DiffServ Code Point into a link-layer appropriate traffic
prioritization scheme. An example of mapping IETF DSCP values to
IEEE 802.11 User Priority values can be found here:
https://tools.ietf.org/html/draft-ietf-tsvwg-ieee-802-11
The expected primary use case is to properly prioritize ND over wifi.
Testing:
jzem22:~# cat /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
0
jzem22:~# echo -1 > /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
-bash: echo: write error: Invalid argument
jzem22:~# echo 256 > /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
-bash: echo: write error: Invalid argument
jzem22:~# echo 0 > /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
jzem22:~# echo 255 > /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
jzem22:~# cat /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
255
jzem22:~# echo 34 > /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
jzem22:~# cat /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
34
jzem22:~# echo $[0xDC] > /proc/sys/net/ipv6/conf/eth0/ndisc_tclass
jzem22:~# tcpdump -v -i eth0 icmp6 and src host jzem22.pgc and dst host fe80::1
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
IP6 (class 0xdc, hlim 255, next-header ICMPv6 (58) payload length: 24)
jzem22.pgc > fe80::1: [icmp6 sum ok] ICMP6, neighbor advertisement,
length 24, tgt is jzem22.pgc, Flags [solicited]
(based on original change written by Erik Kline, with minor changes)
v2: fix 'suspicious rcu_dereference_check() usage'
by explicitly grabbing the rcu_read_lock.
Cc: Lorenzo Colitti <lorenzo@google.com>
Signed-off-by: Erik Kline <ek@google.com>
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-11-08 13:52:09 +08:00
|
|
|
__s32 ndisc_tclass;
|
2020-03-28 06:00:20 +08:00
|
|
|
__s32 rpl_seg_enabled;
|
2016-04-18 19:41:10 +08:00
|
|
|
|
|
|
|
struct ctl_table_header *sysctl_header;
|
2005-04-17 06:20:36 +08:00
|
|
|
};
|
2009-06-01 18:07:33 +08:00
|
|
|
|
|
|
|
struct ipv6_params {
|
|
|
|
__s32 disable_ipv6;
|
|
|
|
__s32 autoconf;
|
|
|
|
};
|
|
|
|
extern struct ipv6_params ipv6_defaults;
|
2005-04-17 06:20:36 +08:00
|
|
|
#include <linux/tcp.h>
|
|
|
|
#include <linux/udp.h>
|
|
|
|
|
2005-12-27 12:43:12 +08:00
|
|
|
#include <net/inet_sock.h>
|
|
|
|
|
2007-04-26 08:54:47 +08:00
|
|
|
static inline struct ipv6hdr *ipv6_hdr(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return (struct ipv6hdr *)skb_network_header(skb);
|
|
|
|
}
|
|
|
|
|
2012-12-07 22:14:14 +08:00
|
|
|
static inline struct ipv6hdr *inner_ipv6_hdr(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return (struct ipv6hdr *)skb_inner_network_header(skb);
|
|
|
|
}
|
|
|
|
|
2007-04-11 12:06:25 +08:00
|
|
|
static inline struct ipv6hdr *ipipv6_hdr(const struct sk_buff *skb)
|
|
|
|
{
|
2007-04-26 09:04:18 +08:00
|
|
|
return (struct ipv6hdr *)skb_transport_header(skb);
|
2007-04-11 12:06:25 +08:00
|
|
|
}
|
|
|
|
|
2019-01-21 14:26:25 +08:00
|
|
|
static inline unsigned int ipv6_transport_len(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return ntohs(ipv6_hdr(skb)->payload_len) + sizeof(struct ipv6hdr) -
|
|
|
|
skb_network_header_len(skb);
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/*
|
|
|
|
This structure contains results of exthdrs parsing
|
|
|
|
as offsets from skb->nh.
|
|
|
|
*/
|
|
|
|
|
|
|
|
struct inet6_skb_parm {
|
|
|
|
int iif;
|
2013-01-13 13:02:45 +08:00
|
|
|
__be16 ra;
|
2005-04-17 06:20:36 +08:00
|
|
|
__u16 dst0;
|
|
|
|
__u16 srcrt;
|
|
|
|
__u16 dst1;
|
[IPV6]: Support several new sockopt / ancillary data in Advanced API (RFC3542).
Support several new socket options / ancillary data:
IPV6_RECVPKTINFO, IPV6_PKTINFO,
IPV6_RECVHOPOPTS, IPV6_HOPOPTS,
IPV6_RECVDSTOPTS, IPV6_DSTOPTS, IPV6_RTHDRDSTOPTS,
IPV6_RECVRTHDR, IPV6_RTHDR,
IPV6_RECVHOPOPTS, IPV6_HOPOPTS
Old semantics are preserved as IPV6_2292xxxx so that
we can maintain backward compatibility.
Signed-off-by: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
2005-09-08 08:59:17 +08:00
|
|
|
__u16 lastopt;
|
2010-07-20 13:01:26 +08:00
|
|
|
__u16 nhoff;
|
2006-01-07 15:04:54 +08:00
|
|
|
__u16 flags;
|
2007-06-27 14:56:32 +08:00
|
|
|
#if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE)
|
2006-08-24 10:25:55 +08:00
|
|
|
__u16 dsthao;
|
|
|
|
#endif
|
netfilter: nf_conntrack_ipv6: improve fragmentation handling
The IPv6 conntrack fragmentation currently has a couple of shortcomings.
Fragmentes are collected in PREROUTING/OUTPUT, are defragmented, the
defragmented packet is then passed to conntrack, the resulting conntrack
information is attached to each original fragment and the fragments then
continue their way through the stack.
Helper invocation occurs in the POSTROUTING hook, at which point only
the original fragments are available. The result of this is that
fragmented packets are never passed to helpers.
This patch improves the situation in the following way:
- If a reassembled packet belongs to a connection that has a helper
assigned, the reassembled packet is passed through the stack instead
of the original fragments.
- During defragmentation, the largest received fragment size is stored.
On output, the packet is refragmented if required. If the largest
received fragment size exceeds the outgoing MTU, a "packet too big"
message is generated, thus behaving as if the original fragments
were passed through the stack from an outside point of view.
- The ipv6_helper() hook function can't receive fragments anymore for
connections using a helper, so it is switched to use ipv6_skip_exthdr()
instead of the netfilter specific nf_ct_ipv6_skip_exthdr() and the
reassembled packets are passed to connection tracking helpers.
The result of this is that we can properly track fragmented packets, but
still generate ICMPv6 Packet too big messages if we would have before.
This patch is also required as a precondition for IPv6 NAT, where NAT
helpers might enlarge packets up to a point that they require
fragmentation. In that case we can't generate Packet too big messages
since the proper MTU can't be calculated in all cases (f.i. when
changing textual representation of a variable amount of addresses),
so the packet is transparently fragmented iff the original packet or
fragments would have fit the outgoing MTU.
IPVS parts by Jesper Dangaard Brouer <brouer@redhat.com>.
Signed-off-by: Patrick McHardy <kaber@trash.net>
2012-08-27 01:13:58 +08:00
|
|
|
__u16 frag_max_size;
|
2006-01-07 15:04:54 +08:00
|
|
|
|
|
|
|
#define IP6SKB_XFRM_TRANSFORMED 1
|
2008-04-03 08:22:53 +08:00
|
|
|
#define IP6SKB_FORWARDED 2
|
2010-04-13 21:32:16 +08:00
|
|
|
#define IP6SKB_REROUTED 4
|
2013-01-13 13:02:45 +08:00
|
|
|
#define IP6SKB_ROUTERALERT 8
|
2013-08-16 19:30:07 +08:00
|
|
|
#define IP6SKB_FRAGMENTED 16
|
2015-07-09 05:32:12 +08:00
|
|
|
#define IP6SKB_HOPBYHOP 32
|
2016-05-11 02:19:50 +08:00
|
|
|
#define IP6SKB_L3SLAVE 64
|
2017-07-31 22:52:36 +08:00
|
|
|
#define IP6SKB_JUMBOGRAM 128
|
2005-04-17 06:20:36 +08:00
|
|
|
};
|
|
|
|
|
2016-05-11 02:19:50 +08:00
|
|
|
#if defined(CONFIG_NET_L3_MASTER_DEV)
|
2016-10-17 11:02:52 +08:00
|
|
|
static inline bool ipv6_l3mdev_skb(__u16 flags)
|
2016-05-11 02:19:50 +08:00
|
|
|
{
|
|
|
|
return flags & IP6SKB_L3SLAVE;
|
|
|
|
}
|
|
|
|
#else
|
2016-10-17 11:02:52 +08:00
|
|
|
static inline bool ipv6_l3mdev_skb(__u16 flags)
|
2016-05-11 02:19:50 +08:00
|
|
|
{
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
#define IP6CB(skb) ((struct inet6_skb_parm*)((skb)->cb))
|
2010-04-23 19:26:09 +08:00
|
|
|
#define IP6CBMTU(skb) ((struct ip6_mtuinfo *)((skb)->cb))
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2005-08-12 20:19:38 +08:00
|
|
|
static inline int inet6_iif(const struct sk_buff *skb)
|
|
|
|
{
|
2016-10-17 11:02:52 +08:00
|
|
|
bool l3_slave = ipv6_l3mdev_skb(IP6CB(skb)->flags);
|
2016-05-11 02:19:50 +08:00
|
|
|
|
|
|
|
return l3_slave ? skb->skb_iif : IP6CB(skb)->iif;
|
2005-08-12 20:19:38 +08:00
|
|
|
}
|
2017-07-31 22:52:36 +08:00
|
|
|
|
|
|
|
static inline bool inet6_is_jumbogram(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return !!(IP6CB(skb)->flags & IP6SKB_JUMBOGRAM);
|
|
|
|
}
|
2017-08-07 23:44:20 +08:00
|
|
|
|
|
|
|
/* can not be used in TCP layer after tcp_v6_fill_cb */
|
|
|
|
static inline int inet6_sdif(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
#if IS_ENABLED(CONFIG_NET_L3_MASTER_DEV)
|
|
|
|
if (skb && ipv6_l3mdev_skb(IP6CB(skb)->flags))
|
|
|
|
return IP6CB(skb)->iif;
|
|
|
|
#endif
|
|
|
|
return 0;
|
|
|
|
}
|
2005-08-12 20:19:38 +08:00
|
|
|
|
2005-12-14 15:15:40 +08:00
|
|
|
struct tcp6_request_sock {
|
|
|
|
struct tcp_request_sock tcp6rsk_tcp;
|
|
|
|
};
|
[NET] Generalise TCP's struct open_request minisock infrastructure
Kept this first changeset minimal, without changing existing names to
ease peer review.
Basicaly tcp_openreq_alloc now receives the or_calltable, that in turn
has two new members:
->slab, that replaces tcp_openreq_cachep
->obj_size, to inform the size of the openreq descendant for
a specific protocol
The protocol specific fields in struct open_request were moved to a
class hierarchy, with the things that are common to all connection
oriented PF_INET protocols in struct inet_request_sock, the TCP ones
in tcp_request_sock, that is an inet_request_sock, that is an
open_request.
I.e. this uses the same approach used for the struct sock class
hierarchy, with sk_prot indicating if the protocol wants to use the
open_request infrastructure by filling in sk_prot->rsk_prot with an
or_calltable.
Results? Performance is improved and TCP v4 now uses only 64 bytes per
open request minisock, down from 96 without this patch :-)
Next changeset will rename some of the structs, fields and functions
mentioned above, struct or_calltable is way unclear, better name it
struct request_sock_ops, s/struct open_request/struct request_sock/g,
etc.
Signed-off-by: Arnaldo Carvalho de Melo <acme@ghostprotocols.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
2005-06-19 13:46:52 +08:00
|
|
|
|
2007-07-31 08:05:49 +08:00
|
|
|
struct ipv6_mc_socklist;
|
|
|
|
struct ipv6_ac_socklist;
|
|
|
|
struct ipv6_fl_socklist;
|
|
|
|
|
2015-01-31 23:40:13 +08:00
|
|
|
struct inet6_cork {
|
|
|
|
struct ipv6_txoptions *opt;
|
|
|
|
u8 hop_limit;
|
|
|
|
u8 tclass;
|
|
|
|
};
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/**
|
|
|
|
* struct ipv6_pinfo - ipv6 private area
|
|
|
|
*
|
|
|
|
* In the struct sock hierarchy (tcp6_sock, upd6_sock, etc)
|
|
|
|
* this _must_ be the last member, so that inet6_sk_generic
|
|
|
|
* is able to calculate its offset from the base struct sock
|
|
|
|
* by using the struct proto->slab_obj_size member. -acme
|
|
|
|
*/
|
|
|
|
struct ipv6_pinfo {
|
|
|
|
struct in6_addr saddr;
|
2008-12-16 18:06:23 +08:00
|
|
|
struct in6_pktinfo sticky_pktinfo;
|
2012-07-18 05:38:04 +08:00
|
|
|
const struct in6_addr *daddr_cache;
|
2006-08-30 08:15:09 +08:00
|
|
|
#ifdef CONFIG_IPV6_SUBTREES
|
2012-07-18 05:38:04 +08:00
|
|
|
const struct in6_addr *saddr_cache;
|
2006-08-30 08:15:09 +08:00
|
|
|
#endif
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2006-11-08 16:25:17 +08:00
|
|
|
__be32 flow_label;
|
2005-04-17 06:20:36 +08:00
|
|
|
__u32 frag_size;
|
2008-03-10 22:56:55 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Packed in 16bits.
|
2020-07-16 00:42:46 +08:00
|
|
|
* Omit one shift by putting the signed field at MSB.
|
2008-03-10 22:56:55 +08:00
|
|
|
*/
|
|
|
|
#if defined(__BIG_ENDIAN_BITFIELD)
|
|
|
|
__s16 hop_limit:9;
|
|
|
|
__u16 __unused_1:7;
|
|
|
|
#else
|
|
|
|
__u16 __unused_1:7;
|
|
|
|
__s16 hop_limit:9;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if defined(__BIG_ENDIAN_BITFIELD)
|
|
|
|
/* Packed in 16bits. */
|
|
|
|
__s16 mcast_hops:9;
|
|
|
|
__u16 __unused_2:6,
|
|
|
|
mc_loop:1;
|
|
|
|
#else
|
|
|
|
__u16 mc_loop:1,
|
|
|
|
__unused_2:6;
|
|
|
|
__s16 mcast_hops:9;
|
|
|
|
#endif
|
2012-02-08 17:11:08 +08:00
|
|
|
int ucast_oif;
|
2005-04-17 06:20:36 +08:00
|
|
|
int mcast_oif;
|
|
|
|
|
|
|
|
/* pktoption flags */
|
|
|
|
union {
|
|
|
|
struct {
|
2007-05-23 12:28:48 +08:00
|
|
|
__u16 srcrt:1,
|
|
|
|
osrcrt:1,
|
2005-04-17 06:20:36 +08:00
|
|
|
rxinfo:1,
|
[IPV6]: Support several new sockopt / ancillary data in Advanced API (RFC3542).
Support several new socket options / ancillary data:
IPV6_RECVPKTINFO, IPV6_PKTINFO,
IPV6_RECVHOPOPTS, IPV6_HOPOPTS,
IPV6_RECVDSTOPTS, IPV6_DSTOPTS, IPV6_RTHDRDSTOPTS,
IPV6_RECVRTHDR, IPV6_RTHDR,
IPV6_RECVHOPOPTS, IPV6_HOPOPTS
Old semantics are preserved as IPV6_2292xxxx so that
we can maintain backward compatibility.
Signed-off-by: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
2005-09-08 08:59:17 +08:00
|
|
|
rxoinfo:1,
|
2005-04-17 06:20:36 +08:00
|
|
|
rxhlim:1,
|
[IPV6]: Support several new sockopt / ancillary data in Advanced API (RFC3542).
Support several new socket options / ancillary data:
IPV6_RECVPKTINFO, IPV6_PKTINFO,
IPV6_RECVHOPOPTS, IPV6_HOPOPTS,
IPV6_RECVDSTOPTS, IPV6_DSTOPTS, IPV6_RTHDRDSTOPTS,
IPV6_RECVRTHDR, IPV6_RTHDR,
IPV6_RECVHOPOPTS, IPV6_HOPOPTS
Old semantics are preserved as IPV6_2292xxxx so that
we can maintain backward compatibility.
Signed-off-by: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
2005-09-08 08:59:17 +08:00
|
|
|
rxohlim:1,
|
2005-04-17 06:20:36 +08:00
|
|
|
hopopts:1,
|
[IPV6]: Support several new sockopt / ancillary data in Advanced API (RFC3542).
Support several new socket options / ancillary data:
IPV6_RECVPKTINFO, IPV6_PKTINFO,
IPV6_RECVHOPOPTS, IPV6_HOPOPTS,
IPV6_RECVDSTOPTS, IPV6_DSTOPTS, IPV6_RTHDRDSTOPTS,
IPV6_RECVRTHDR, IPV6_RTHDR,
IPV6_RECVHOPOPTS, IPV6_HOPOPTS
Old semantics are preserved as IPV6_2292xxxx so that
we can maintain backward compatibility.
Signed-off-by: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
2005-09-08 08:59:17 +08:00
|
|
|
ohopopts:1,
|
2005-04-17 06:20:36 +08:00
|
|
|
dstopts:1,
|
[IPV6]: Support several new sockopt / ancillary data in Advanced API (RFC3542).
Support several new socket options / ancillary data:
IPV6_RECVPKTINFO, IPV6_PKTINFO,
IPV6_RECVHOPOPTS, IPV6_HOPOPTS,
IPV6_RECVDSTOPTS, IPV6_DSTOPTS, IPV6_RTHDRDSTOPTS,
IPV6_RECVRTHDR, IPV6_RTHDR,
IPV6_RECVHOPOPTS, IPV6_HOPOPTS
Old semantics are preserved as IPV6_2292xxxx so that
we can maintain backward compatibility.
Signed-off-by: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
2005-09-08 08:59:17 +08:00
|
|
|
odstopts:1,
|
2005-09-08 09:19:03 +08:00
|
|
|
rxflow:1,
|
2010-04-23 19:26:07 +08:00
|
|
|
rxtclass:1,
|
2010-10-21 22:08:28 +08:00
|
|
|
rxpmtu:1,
|
2016-11-02 23:02:17 +08:00
|
|
|
rxorigdstaddr:1,
|
|
|
|
recvfragsize:1;
|
|
|
|
/* 1 bits hole */
|
2005-04-17 06:20:36 +08:00
|
|
|
} bits;
|
[IPV6]: Support several new sockopt / ancillary data in Advanced API (RFC3542).
Support several new socket options / ancillary data:
IPV6_RECVPKTINFO, IPV6_PKTINFO,
IPV6_RECVHOPOPTS, IPV6_HOPOPTS,
IPV6_RECVDSTOPTS, IPV6_DSTOPTS, IPV6_RTHDRDSTOPTS,
IPV6_RECVRTHDR, IPV6_RTHDR,
IPV6_RECVHOPOPTS, IPV6_HOPOPTS
Old semantics are preserved as IPV6_2292xxxx so that
we can maintain backward compatibility.
Signed-off-by: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
2005-09-08 08:59:17 +08:00
|
|
|
__u16 all;
|
2005-04-17 06:20:36 +08:00
|
|
|
} rxopt;
|
|
|
|
|
|
|
|
/* sockopt flags */
|
2010-04-23 19:26:07 +08:00
|
|
|
__u16 recverr:1,
|
2005-04-17 06:20:36 +08:00
|
|
|
sndflow:1,
|
2014-01-18 00:15:03 +08:00
|
|
|
repflow:1,
|
2013-12-15 10:41:14 +08:00
|
|
|
pmtudisc:3,
|
2014-06-27 23:36:16 +08:00
|
|
|
padding:1, /* 1 bit hole */
|
2010-04-23 19:26:07 +08:00
|
|
|
srcprefs:3, /* 001: prefer temporary address
|
2008-03-25 08:37:42 +08:00
|
|
|
* 010: prefer public address
|
|
|
|
* 100: prefer care-of address
|
|
|
|
*/
|
2014-07-02 12:33:10 +08:00
|
|
|
dontfrag:1,
|
net: reevalulate autoflowlabel setting after sysctl setting
sysctl.ip6.auto_flowlabels is default 1. In our hosts, we set it to 2.
If sockopt doesn't set autoflowlabel, outcome packets from the hosts are
supposed to not include flowlabel. This is true for normal packet, but
not for reset packet.
The reason is ipv6_pinfo.autoflowlabel is set in sock creation. Later if
we change sysctl.ip6.auto_flowlabels, the ipv6_pinfo.autoflowlabel isn't
changed, so the sock will keep the old behavior in terms of auto
flowlabel. Reset packet is suffering from this problem, because reset
packet is sent from a special control socket, which is created at boot
time. Since sysctl.ipv6.auto_flowlabels is 1 by default, the control
socket will always have its ipv6_pinfo.autoflowlabel set, even after
user set sysctl.ipv6.auto_flowlabels to 1, so reset packset will always
have flowlabel. Normal sock created before sysctl setting suffers from
the same issue. We can't even turn off autoflowlabel unless we kill all
socks in the hosts.
To fix this, if IPV6_AUTOFLOWLABEL sockopt is used, we use the
autoflowlabel setting from user, otherwise we always call
ip6_default_np_autolabel() which has the new settings of sysctl.
Note, this changes behavior a little bit. Before commit 42240901f7c4
(ipv6: Implement different admin modes for automatic flow labels), the
autoflowlabel behavior of a sock isn't sticky, eg, if sysctl changes,
existing connection will change autoflowlabel behavior. After that
commit, autoflowlabel behavior is sticky in the whole life of the sock.
With this patch, the behavior isn't sticky again.
Cc: Martin KaFai Lau <kafai@fb.com>
Cc: Eric Dumazet <eric.dumazet@gmail.com>
Cc: Tom Herbert <tom@quantonium.net>
Signed-off-by: Shaohua Li <shli@fb.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-12-21 04:10:21 +08:00
|
|
|
autoflowlabel:1,
|
2018-09-10 16:27:15 +08:00
|
|
|
autoflowlabel_set:1,
|
2019-03-02 07:31:03 +08:00
|
|
|
mc_all:1,
|
2020-07-24 21:03:10 +08:00
|
|
|
recverr_rfc4884:1,
|
2019-03-02 07:31:03 +08:00
|
|
|
rtalert_isolate:1;
|
IPv6: Generic TTL Security Mechanism (final version)
This patch adds IPv6 support for RFC5082 Generalized TTL Security Mechanism.
Not to users of mapped address; the IPV6 and IPV4 socket options are seperate.
The server does have to deal with both IPv4 and IPv6 socket options
and the client has to handle the different for each family.
On client:
int ttl = 255;
getaddrinfo(argv[1], argv[2], &hint, &result);
for (rp = result; rp != NULL; rp = rp->ai_next) {
s = socket(rp->ai_family, rp->ai_socktype, rp->ai_protocol);
if (s < 0) continue;
if (rp->ai_family == AF_INET) {
setsockopt(s, IPPROTO_IP, IP_TTL, &ttl, sizeof(ttl));
} else if (rp->ai_family == AF_INET6) {
setsockopt(s, IPPROTO_IPV6, IPV6_UNICAST_HOPS,
&ttl, sizeof(ttl)))
}
if (connect(s, rp->ai_addr, rp->ai_addrlen) == 0) {
...
On server:
int minttl = 255 - maxhops;
getaddrinfo(NULL, port, &hints, &result);
for (rp = result; rp != NULL; rp = rp->ai_next) {
s = socket(rp->ai_family, rp->ai_socktype, rp->ai_protocol);
if (s < 0) continue;
if (rp->ai_family == AF_INET6)
setsockopt(s, IPPROTO_IPV6, IPV6_MINHOPCOUNT,
&minttl, sizeof(minttl));
setsockopt(s, IPPROTO_IP, IP_MINTTL, &minttl, sizeof(minttl));
if (bind(s, rp->ai_addr, rp->ai_addrlen) == 0)
break
...
Signed-off-by: Stephen Hemminger <shemminger@vyatta.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2010-04-23 06:24:53 +08:00
|
|
|
__u8 min_hopcount;
|
2005-09-08 09:19:03 +08:00
|
|
|
__u8 tclass;
|
2013-12-08 22:46:57 +08:00
|
|
|
__be32 rcv_flowinfo;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
__u32 dst_cookie;
|
2012-08-06 13:09:33 +08:00
|
|
|
__u32 rx_dst_cookie;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2010-11-23 21:12:15 +08:00
|
|
|
struct ipv6_mc_socklist __rcu *ipv6_mc_list;
|
2005-04-17 06:20:36 +08:00
|
|
|
struct ipv6_ac_socklist *ipv6_ac_list;
|
2013-01-30 17:27:52 +08:00
|
|
|
struct ipv6_fl_socklist __rcu *ipv6_fl_list;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2015-11-30 11:37:57 +08:00
|
|
|
struct ipv6_txoptions __rcu *opt;
|
2005-04-17 06:20:36 +08:00
|
|
|
struct sk_buff *pktoptions;
|
2010-04-23 19:26:09 +08:00
|
|
|
struct sk_buff *rxpmtu;
|
2015-01-31 23:40:13 +08:00
|
|
|
struct inet6_cork cork;
|
2005-04-17 06:20:36 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
/* WARNING: don't change the layout of the members in {raw,udp,tcp}6_sock! */
|
|
|
|
struct raw6_sock {
|
|
|
|
/* inet_sock has to be the first member of raw6_sock */
|
|
|
|
struct inet_sock inet;
|
|
|
|
__u32 checksum; /* perform checksum */
|
|
|
|
__u32 offset; /* checksum offset */
|
|
|
|
struct icmp6_filter filter;
|
ipv6: ip6mr: support multiple tables
This patch adds support for multiple independant multicast routing instances,
named "tables".
Userspace multicast routing daemons can bind to a specific table instance by
issuing a setsockopt call using a new option MRT6_TABLE. The table number is
stored in the raw socket data and affects all following ip6mr setsockopt(),
getsockopt() and ioctl() calls. By default, a single table (RT6_TABLE_DFLT)
is created with a default routing rule pointing to it. Newly created pim6reg
devices have the table number appended ("pim6regX"), with the exception of
devices created in the default table, which are named just "pim6reg" for
compatibility reasons.
Packets are directed to a specific table instance using routing rules,
similar to how regular routing rules work. Currently iif, oif and mark
are supported as keys, source and destination addresses could be supported
additionally.
Example usage:
- bind pimd/xorp/... to a specific table:
uint32_t table = 123;
setsockopt(fd, SOL_IPV6, MRT6_TABLE, &table, sizeof(table));
- create routing rules directing packets to the new table:
# ip -6 mrule add iif eth0 lookup 123
# ip -6 mrule add oif eth0 lookup 123
Signed-off-by: Patrick McHardy <kaber@trash.net>
2010-05-11 20:40:55 +08:00
|
|
|
__u32 ip6mr_table;
|
2005-04-17 06:20:36 +08:00
|
|
|
/* ipv6_pinfo has to be the last member of raw6_sock, see inet6_sk_generic */
|
|
|
|
struct ipv6_pinfo inet6;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct udp6_sock {
|
|
|
|
struct udp_sock udp;
|
|
|
|
/* ipv6_pinfo has to be the last member of udp6_sock, see inet6_sk_generic */
|
|
|
|
struct ipv6_pinfo inet6;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct tcp6_sock {
|
|
|
|
struct tcp_sock tcp;
|
|
|
|
/* ipv6_pinfo has to be the last member of tcp6_sock, see inet6_sk_generic */
|
|
|
|
struct ipv6_pinfo inet6;
|
|
|
|
};
|
|
|
|
|
2005-12-14 15:22:54 +08:00
|
|
|
extern int inet6_sk_rebuild_header(struct sock *sk);
|
|
|
|
|
2012-07-11 17:39:24 +08:00
|
|
|
struct tcp6_timewait_sock {
|
|
|
|
struct tcp_timewait_sock tcp6tw_tcp;
|
|
|
|
};
|
|
|
|
|
2011-12-10 17:48:31 +08:00
|
|
|
#if IS_ENABLED(CONFIG_IPV6)
|
2016-06-10 01:21:00 +08:00
|
|
|
bool ipv6_mod_enabled(void);
|
|
|
|
|
2015-10-05 12:08:09 +08:00
|
|
|
static inline struct ipv6_pinfo *inet6_sk(const struct sock *__sk)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2015-10-05 12:08:09 +08:00
|
|
|
return sk_fullsock(__sk) ? inet_sk(__sk)->pinet6 : NULL;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static inline struct raw6_sock *raw6_sk(const struct sock *sk)
|
|
|
|
{
|
|
|
|
return (struct raw6_sock *)sk;
|
|
|
|
}
|
|
|
|
|
2014-06-27 23:36:16 +08:00
|
|
|
#define __ipv6_only_sock(sk) (sk->sk_ipv6only)
|
|
|
|
#define ipv6_only_sock(sk) (__ipv6_only_sock(sk))
|
2014-01-20 10:43:08 +08:00
|
|
|
#define ipv6_sk_rxinfo(sk) ((sk)->sk_family == PF_INET6 && \
|
|
|
|
inet6_sk(sk)->rxopt.bits.rxinfo)
|
2005-08-10 11:09:30 +08:00
|
|
|
|
ipv6: make lookups simpler and faster
TCP listener refactoring, part 4 :
To speed up inet lookups, we moved IPv4 addresses from inet to struct
sock_common
Now is time to do the same for IPv6, because it permits us to have fast
lookups for all kind of sockets, including upcoming SYN_RECV.
Getting IPv6 addresses in TCP lookups currently requires two extra cache
lines, plus a dereference (and memory stall).
inet6_sk(sk) does the dereference of inet_sk(__sk)->pinet6
This patch is way bigger than its IPv4 counter part, because for IPv4,
we could add aliases (inet_daddr, inet_rcv_saddr), while on IPv6,
it's not doable easily.
inet6_sk(sk)->daddr becomes sk->sk_v6_daddr
inet6_sk(sk)->rcv_saddr becomes sk->sk_v6_rcv_saddr
And timewait socket also have tw->tw_v6_daddr & tw->tw_v6_rcv_saddr
at the same offset.
We get rid of INET6_TW_MATCH() as INET6_MATCH() is now the generic
macro.
Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-10-04 06:42:29 +08:00
|
|
|
static inline const struct in6_addr *inet6_rcv_saddr(const struct sock *sk)
|
2005-08-10 11:09:30 +08:00
|
|
|
{
|
ipv6: make lookups simpler and faster
TCP listener refactoring, part 4 :
To speed up inet lookups, we moved IPv4 addresses from inet to struct
sock_common
Now is time to do the same for IPv6, because it permits us to have fast
lookups for all kind of sockets, including upcoming SYN_RECV.
Getting IPv6 addresses in TCP lookups currently requires two extra cache
lines, plus a dereference (and memory stall).
inet6_sk(sk) does the dereference of inet_sk(__sk)->pinet6
This patch is way bigger than its IPv4 counter part, because for IPv4,
we could add aliases (inet_daddr, inet_rcv_saddr), while on IPv6,
it's not doable easily.
inet6_sk(sk)->daddr becomes sk->sk_v6_daddr
inet6_sk(sk)->rcv_saddr becomes sk->sk_v6_rcv_saddr
And timewait socket also have tw->tw_v6_daddr & tw->tw_v6_rcv_saddr
at the same offset.
We get rid of INET6_TW_MATCH() as INET6_MATCH() is now the generic
macro.
Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-10-04 06:42:29 +08:00
|
|
|
if (sk->sk_family == AF_INET6)
|
|
|
|
return &sk->sk_v6_rcv_saddr;
|
|
|
|
return NULL;
|
2005-08-10 11:09:30 +08:00
|
|
|
}
|
|
|
|
|
2005-08-10 11:10:42 +08:00
|
|
|
static inline int inet_v6_ipv6only(const struct sock *sk)
|
2005-08-10 11:09:30 +08:00
|
|
|
{
|
2014-06-27 23:36:16 +08:00
|
|
|
/* ipv6only field is at same position for timewait and other sockets */
|
|
|
|
return ipv6_only_sock(sk);
|
2005-08-10 11:09:30 +08:00
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
#else
|
|
|
|
#define __ipv6_only_sock(sk) 0
|
|
|
|
#define ipv6_only_sock(sk) 0
|
2014-01-20 10:43:08 +08:00
|
|
|
#define ipv6_sk_rxinfo(sk) 0
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2016-06-10 01:21:00 +08:00
|
|
|
static inline bool ipv6_mod_enabled(void)
|
|
|
|
{
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
static inline struct ipv6_pinfo * inet6_sk(const struct sock *__sk)
|
|
|
|
{
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2005-12-14 15:15:40 +08:00
|
|
|
static inline struct inet6_request_sock *
|
|
|
|
inet6_rsk(const struct request_sock *rsk)
|
|
|
|
{
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
static inline struct raw6_sock *raw6_sk(const struct sock *sk)
|
|
|
|
{
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2005-12-14 15:23:09 +08:00
|
|
|
#define inet6_rcv_saddr(__sk) NULL
|
2005-08-10 11:09:30 +08:00
|
|
|
#define tcp_twsk_ipv6only(__sk) 0
|
2005-08-10 11:10:42 +08:00
|
|
|
#define inet_v6_ipv6only(__sk) 0
|
2011-12-10 17:48:31 +08:00
|
|
|
#endif /* IS_ENABLED(CONFIG_IPV6) */
|
2005-08-10 11:09:30 +08:00
|
|
|
#endif /* _IPV6_H */
|